SlideShare a Scribd company logo
1 of 48
Download to read offline
Don’t Mention The “A”
Word – Trends In Continuing
Business And IT
Misalignment

Alan McSweeney
Business View Of IT Trends Vs. IT View Of Trends
•

AICPA – Survey of members from 2001 on initiatives in IT
that are of concern to their nearly 400,000 members
− http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLO
GY/RESOURCES/TOPTECHNOLOGYINITIATIVES/TOP10TECHNOLO
GIESARCHIVE

Gartner – well known analyst company
• Two very different views of information technology trends
•

− Business-oriented
− Technology-oriented
•

IT tends to be concerned with technology trends for
themselves rather than their application to business –
internal focus
January 27, 2014

2
Business And IT Disconnect – Speaking A Different
Language
Business

You are not
listening to
me

I want:

January 27, 2014

You are not
listening to
me

IT

You need:

3
AICPA IT Initiatives Survey 2011-2013 Results
2013
Managing And Retaining Data

1
2
3
4
5
6
7
8
9
10

2012

2011

Securing The IT Environment

Control And Use Of Mobile
Devices
Securing The IT Environment
Managing And Retaining Data
Information Security
Managing Vendors And Service
Managing Risk And
Data Retention Policies And
Providers
Compliance
Structure
Managing IT Risks And Compliance
Ensuring Privacy
Remote Access
Ensuring Privacy
Leveraging Emerging
Staff And Management
Technologies
Training
Managing System Implementations
Managing System
Process Documentation And
Implementation
Improvements
Preventing And Responding To
Enabling Decision Support And Saving And Making Money
Computer Fraud
Managing Performance
W/Technology
Governing And Managing IT Investment Governing And Managing IT
Technology Cost Controls
And Spending
Investment/Spending
Enabling Decision Support And
Preventing And Responding To
Budget Processes
Analytics
Fraud
Leveraging Emerging Technologies Managing Vendors And Service
Project Management &
Providers
Deployment Of New Systems

January 27, 2014

4
Gartner View of IT Trends 2009-2014
2014

2013

2012

2011

Media Tablets and
Cloud Computing Cloud Computing
1 Mobile Device Battles
Beyond

2

Mobile Applications
and HTML5

3

Personal Cloud

4 Enterprise App Stores
5 The Internet of Things
6

Hybrid IT and Cloud
Computing

7

Strategic Big Data

8

Actionable Analytics

9

In Memory
Computing

10

Integrated
Ecosystems

January 27, 2014

2010

2009

Virtualization

Green IT

Mobile-Centric
Mobile
Advanced
Applications and Applications and
Cloud Computing
Analytics
Interfaces
Media Tablets
Social
Contextual and
Servers — Beyond
Social User
Communications Client Computing
Blades
Experience
and Collaboration
Web-Oriented
Internet of Things
Video
IT for Green
Architectures
App Stores and Next Generation
Reshaping the
Enterprise
Marketplaces
Analytics
Data Center
Mashups
Next-Generation
Specialized
Social Analytics Social Computing
Analytics
Systems
Social Software
In-Memory
Context-Aware Security – Activity
and Social
Computing
Computing
Monitoring
Networking
Storage Class
Unified
Big Data
Flash Memory
Memory
Communications
Extreme LowUbiquitous
Virtualization for
Business
Energy Servers
Computing
Availability
Intelligence
Fabric-Based
Mobile
Cloud Computing Infrastructure and
Green IT
Applications
Computers

Unified
Communications
Business Process
Modeling
Metadata
Management
Virtualization 2.0
Mashup &
Composite Apps
Web Platform &
WOA
Computing Fabric
Real World Web
Social Software
5
Business And IT View Of Technology
•
•
•
•

Business views technologies as means to an end and not as ends in
themselves
IT views technologies as solutions rather than as components of an
overall business solution
IT technology trends are very variable and depend on the everchanging new next best thing
Business view of the importance of technology application remains
quite constant:
−
−
−
−
−
−

Security
Data
Delivery
Value
Data
Managing Suppliers

January 27, 2014

6
AICPA Top 10 IT Initiatives 2005-2013
2013

2012

1

Managing And
Retaining Data

Securing The IT
Environment

2

Securing The IT
Environment

Managing And
Retaining Data

Information
Security

3

Managing
Vendors And
Service Providers

Managing Risk
And Compliance

Data Retention
Policies And
Structure

4

Managing IT Risks
Ensuring Privacy
And Compliance

Remote Access

Leveraging
Emerging
Technologies

2011

Control And Use
Security Of Data
Of Mobile Devices

Staff And
Management
Training

5

Ensuring Privacy

6

Managing System Managing System
Implementations Implementation

7

Preventing And
Responding To
Computer Fraud

8

Governing And
Managing IT
Investment And
Spending

9

Enabling Decision
Support And
Analytics

Preventing And
Responding To
Fraud

Budget Processes

10

Leveraging
Emerging
Technologies

Managing
Vendors And
Service Providers

Project
Management &
Deployment Of
New Systems

January 27, 2014

2010

Process
Documentation
And
Improvements

Enabling Decision
Saving And
Support And
Making Money
Managing
W/Technology
Performance
Governing And
Technology Cost
Managing IT
Controls
Investment/
Spending

Connectivity and
Communications

2009

2008

2008

Information
Security
Management

Information
Security
Management

Privacy
Management

IT Governance

Information
Security
Management
Identity And
Access
Management

Business
Conforming To
Backup, Disaster Secure Data File
Continuity
Assurance And
Storage,
Recovery/
Management And
Compliance
Transmission And
Business
Disaster Recovery
Standards
Exchange
Continuity
Planning
Business Process
Improvement,
Privacy
Privacy
Secure Electronic
Work Flow And
Management
Management
Collaboration
Process Exception
Alerts
Business Process Disaster Recovery
Planning And
Improvement,
Mobile And
Document
Business
Workflow And
Remote
Management and
Continuity
Process Exception
Computing
Workflow
Management
Alerts

2006

2005

Information
Security

Information
Security

Assurance And
Compliance
Applications

Electronic
Document
Management

Disaster And
Business
Continuity
Planning

Data Integration

IT Governance

Spam Technology

Privacy
Management

Disaster Recovery

Collaboration And
Messaging
Technologies

Laptop Security /
Encryption

Training And
Competency

Identity And
Access
Management

IT Governance

Digital Identity
And
Authentication
Technologies

Small Business
Software

Identity And
Access
Management

Conforming To
Assurance And
Compliance
Standards

Securing And
Controlling
Information
Distribution

Wireless
Technologies

Wireless
Technologies

Mobile Devices

Improved
Application And
Data Integration

Business
Intelligence

Mobile And
Remote
Computing

Application And
Data Integration

Authentication
Technologies

Tax Software

Document, Forms,
Content And
Knowledge
Management

Mobile And
Remote
Computing

Electronic
Archiving And
Data Retention

Paperless Digital
Technologies

Storage
Technologies

Document, Forms,
Content And
Knowledge
Management

Document,
Content And
Knowledge
Management

Spyware Detection
And Removal

Learning And
Training
Competency

Server
Electronic Data
Virtualization And
Retention Strategy
Consolidation

7
Importance of Security, Privacy, Continuity
2013

2012

1

Managing And
Retaining Data

Securing The IT
Environment

2

Securing The IT
Environment

Managing And
Retaining Data

Information
Security

3

Managing
Vendors And
Service Providers

Managing Risk
And Compliance

Data Retention
Policies And
Structure

4

Managing IT Risks
Ensuring Privacy
And Compliance

Remote Access

5

Ensuring Privacy

6

Managing System Managing System
Implementations Implementation

7

Preventing And
Responding To
Computer Fraud

8

Governing And
Managing IT
Investment And
Spending

9

Enabling Decision
Support And
Analytics

Preventing And
Responding To
Fraud

Budget Processes

10

Leveraging
Emerging
Technologies

Managing
Vendors And
Service Providers

Project
Management &
Deployment Of
New Systems

January 27, 2014

Leveraging
Emerging
Technologies

2011

2010

Control And Use
Security Of Data
Of Mobile Devices

Staff And
Management
Training
Process
Documentation
And
Improvements

Enabling Decision
Saving And
Support And
Making Money
Managing
W/Technology
Performance
Governing And
Technology Cost
Managing IT
Controls
Investment/
Spending

Connectivity and
Communications

2009

2008

2008

Information
Security
Management

Information
Security
Management

Privacy
Management

IT Governance

Information
Security
Management
Identity And
Access
Management

Business
Backup, Disaster Secure Data File
Conforming To
Continuity
Recovery/
Assurance And
Storage,
Management And
Business
Compliance
Transmission And
Disaster Recovery
Continuity
Standards
Exchange
Planning
Business Process
Improvement,
Secure Electronic
Privacy
Privacy
Work Flow And
Collaboration
Management
Management
Process Exception
Alerts
Business Process Disaster Recovery
Improvement,
Planning And
Mobile And
Document
Workflow And
Business
Remote
Management and
Process Exception
Continuity
Computing
Workflow
Alerts
Management

2006

2005

Information
Security

Information
Security

Assurance And
Compliance
Applications

Electronic
Document
Management

Disaster And
Business
Continuity
Planning

Data Integration

IT Governance

Spam Technology

Privacy
Management

Disaster Recovery

Collaboration And
Messaging
Technologies

Laptop Security /
Encryption

Training And
Competency

Identity And
Access
Management

IT Governance

Digital Identity
And
Authentication
Technologies

Small Business
Software

Identity And
Access
Management

Conforming To
Assurance And
Compliance
Standards

Securing And
Controlling
Information
Distribution

Wireless
Technologies

Wireless
Technologies

Mobile Devices

Improved
Application And
Data Integration

Business
Intelligence

Mobile And
Remote
Computing

Application And
Data Integration

Authentication
Technologies

Tax Software

Document, Forms,
Content And
Knowledge
Management

Mobile And
Remote
Computing

Electronic
Archiving And
Data Retention

Paperless Digital
Technologies

Storage
Technologies

Document, Forms,
Content And
Knowledge
Management

Document,
Content And
Knowledge
Management

Spyware Detection
And Removal

Learning And
Training
Competency

Server
Electronic Data
Virtualization And
Retention Strategy
Consolidation

8
Importance of Data
2013

2012

1

Managing And
Retaining Data

Securing The IT
Environment

2

Securing The IT
Environment

Managing And
Retaining Data

Information
Security

3

Managing
Vendors And
Service Providers

Managing Risk
And Compliance

Data Retention
Policies And
Structure

4

Managing IT Risks
Ensuring Privacy
And Compliance

Remote Access

Leveraging
Emerging
Technologies

5

Ensuring Privacy

6

Managing System Managing System
Implementations Implementation

7

Preventing And
Responding To
Computer Fraud

8

Governing And
Managing IT
Investment And
Spending

9

Enabling Decision
Support And
Analytics

Preventing And
Responding To
Fraud

10

Leveraging
Emerging
Technologies

Managing
Vendors And
Service Providers

January 27, 2014

2011

2010

Control And Use
Security Of Data
Of Mobile Devices

Staff And
Management
Training

Connectivity and
Communications

2009

2008

2008

Information
Security
Management

Information
Security
Management

Privacy
Management

IT Governance

Information
Security
Management
Identity And
Access
Management

Business
Backup, Disaster Secure Data File
Conforming To
Continuity
Recovery/
Storage,
Assurance And
Management And
Business
Transmission And
Compliance
Disaster Recovery
Continuity
Exchange
Standards
Planning
Business Process
Improvement,
Privacy
Privacy
Secure Electronic
Work Flow And
Management
Management
Collaboration
Process Exception
Alerts
Business Process Disaster Recovery
Planning And
Document
Improvement,
Mobile And
Business
Management and
Workflow And
Remote
Continuity
Workflow
Process Exception
Computing
Management
Alerts

2006

2005

Information
Security

Information
Security

Assurance And
Compliance
Applications

Electronic
Document
Management

Disaster And
Business
Continuity
Planning

Data Integration

IT Governance

Spam Technology

Privacy
Management

Disaster Recovery

Collaboration And
Messaging
Technologies

Laptop Security /
Encryption

Training And
Competency

Identity And
Access
Management

IT Governance

Digital Identity
And
Authentication
Technologies

Small Business
Software

Identity And
Access
Management

Conforming To
Assurance And
Compliance
Standards

Securing And
Controlling
Information
Distribution

Wireless
Technologies

Wireless
Technologies

Mobile Devices

Improved
Application And
Data Integration

Business
Intelligence

Mobile And
Remote
Computing

Application And
Data Integration

Authentication
Technologies

Budget Processes

Tax Software

Document, Forms,
Content And
Knowledge
Management

Mobile And
Remote
Computing

Electronic
Archiving And
Data Retention

Paperless Digital
Technologies

Storage
Technologies

Project
Management &
Deployment Of
New Systems

Server
Virtualization And
Consolidation

Electronic Data
Retention
Strategy

Document, Forms,
Content And
Knowledge
Management

Document,
Content And
Knowledge
Management

Spyware Detection
And Removal

Learning And
Training
Competency

Process
Documentation
And
Improvements

Enabling Decision
Saving And
Support And
Making Money
Managing
W/Technology
Performance
Governing And
Technology Cost
Managing IT
Controls
Investment/
Spending

9
Importance of Cost and Implementation
2013

2012

1

Managing And
Retaining Data

Securing The IT
Environment

2

Securing The IT
Environment

Managing And
Retaining Data

2011

Control And Use
Security Of Data
Of Mobile Devices
Information
Security

3

Managing
Managing Risk
Vendors And
And Compliance
Service Providers

Data Retention
Policies And
Structure

4

Managing IT Risks
Ensuring Privacy
And Compliance

Remote Access

5
6
7
8

Ensuring Privacy

Leveraging
Emerging
Technologies

Managing System Managing System
Implementations Implementation

Staff And
Management
Training
Process
Documentation
And
Improvements

Enabling Decision
Saving And
Support And
Making Money
Managing
W/Technology
Performance
Governing And
Governing And
Technology Cost
Managing IT
Managing IT
Controls
Investment/
Investment And
Spending
Spending

Preventing And
Responding To
Computer Fraud

9

Enabling Decision
Support And
Analytics

Preventing And
Responding To
Fraud

10

Leveraging
Emerging
Technologies

Managing
Vendors And
Service Providers

January 27, 2014

2010

Budget Processes

Connectivity and
Communications

2009

2008

2008

Information
Security
Management

Information
Security
Management

Privacy
Management

IT Governance

Information
Security
Management
Identity And
Access
Management

Business
Conforming To
Backup, Disaster Secure Data File
Continuity
Assurance And
Storage,
Recovery/
Management And
Compliance
Transmission And
Business
Disaster Recovery
Standards
Exchange
Continuity
Planning
Business Process
Improvement,
Privacy
Privacy
Secure Electronic
Work Flow And
Management
Management
Collaboration
Process Exception
Alerts
Business Process Disaster Recovery
Planning And
Improvement,
Mobile And
Document
Business
Workflow And
Remote
Management and
Continuity
Process Exception
Computing
Workflow
Management
Alerts

2006

2005

Information
Security

Information
Security

Assurance And
Compliance
Applications

Electronic
Document
Management

Disaster And
Business
Continuity
Planning

Data Integration

IT Governance

Spam Technology

Privacy
Management

Disaster Recovery

Collaboration And
Messaging
Technologies

Laptop Security /
Encryption

Training And
Competency

Identity And
Access
Management

IT Governance

Digital Identity
And
Authentication
Technologies

Small Business
Software

Identity And
Access
Management

Conforming To
Assurance And
Compliance
Standards

Securing And
Controlling
Information
Distribution

Wireless
Technologies

Wireless
Technologies

Mobile Devices

Improved
Application And
Data Integration

Business
Intelligence

Mobile And
Remote
Computing

Application And
Data Integration

Authentication
Technologies

Tax Software

Document, Forms,
Content And
Knowledge
Management

Mobile And
Remote
Computing

Electronic
Archiving And
Data Retention

Paperless Digital
Technologies

Storage
Technologies

Document,
Content And
Knowledge
Management

Spyware Detection
And Removal

Learning And
Training
Competency

Project
Document, Forms,
Server
Management &
Content And
Electronic Data
Virtualization And
Deployment Of
Knowledge
Retention Strategy
Consolidation
New Systems
Management

10
Difference Between How The Business Feels IT Should
Spend Budget And How The Budget Is Actually Spent
•

Business view of how it wants the proportion of IT
expenditure to be allocated and how spending is actually
allocated
What the Business Wants

What the Business Gets
25%

5%

50%
35%

15%
Maintain The Momentum Of The Business Through Existing Business Systems
Contribute To Improving Business Results
Provide IT Direction And Management That Is Aligned To The Needs Of The Business

January 27, 2014

70%
Maintain The Momentum Of The Business Through Existing Business Systems
Contribute To Improving Business Results
Provide IT Direction And Management That Is Aligned To The Needs Of The Business

11
Difference Between How The Business Feels IT
Should Spend Budget And How It Is Actually Spent
•

Reasons for differences lie with both sides

•

Each side does not fully understand the other or explain
itself properly to the other

January 27, 2014

12
Spending - Maintain The Momentum Of The
Business Through Existing Business Systems
•
•

Business has unrealistic view of how much it costs to keep IT
function operational
IT does not automate operations to drive operational costs
down
What the Business Wants

What the Business Gets
25%

5%

50%
35%

15%
Maintain The Momentum Of The Business Through Existing Business Systems
Contribute To Improving Business Results
Provide IT Direction And Management That Is Aligned To The Needs Of The Business
January 27, 2014

70%
Maintain The Momentum Of The Business Through Existing Business Systems
Contribute To Improving Business Results
Provide IT Direction And Management That Is Aligned To The Needs Of The Business
13
Contribute To Improving Business Results
•
•

IT is poor at delivery and proactive provision of advice and
consulting
Business expects too much without understanding the resource
consequences of these expectations
What the Business Wants

What the Business Gets
25%

5%

50%
35%

15%

70%

Maintain The Momentum Of The Business Through Existing Business Systems
Maintain The Momentum Of The Business Through Existing Business Systems
Contribute To Improving Business Results
Contribute To Improving Business Results
Provide IT Direction And Management That Is Aligned To The Needs Of The Business Provide IT Direction And Management That Is Aligned To The Needs Of The Business
January 27, 2014

14
Provide IT Direction And Management That Is
Aligned To The Needs Of The Business
•
•

IT is not providing the leadership and direction the business feels it
wants
Business has unrealistic expectation of the amount of IT spending
should be or needs to be allocated to leadership and direction
What the Business Wants

What the Business Gets
25%

5%

50%
35%

15%
Maintain The Momentum Of The Business Through Existing Business Systems
Contribute To Improving Business Results
Provide IT Direction And Management That Is Aligned To The Needs Of The Business
January 27, 2014

70%
Maintain The Momentum Of The Business Through Existing Business Systems
Contribute To Improving Business Results
Provide IT Direction And Management That Is Aligned To The Needs Of The Business
15
Continuing Disconnect Between IT And Business
•

IT’s role is to mediate between the business and
technologies and suppliers

•

Needs to maintain an external focus on fulfilling business
needs and requirements

•

IT needs to act as a lens focussing business needs on
appropriate technology and supplier solutions

•

Gulf is between business and IT seems to be getting wider

January 27, 2014

16
IT Needs To Deliver Business-Oriented
Solutions
IT
Supplier
Ecosystem

Business

Technology
Landscape

27 January 2014

IT Needs to Mediate Between the
Business and Suppliers/ Technologies,
Acting as a Lens Focussing Business
Needs on Appropriate Solutions

IT Needs To
Focus
Appropriate
Services on
Appropriate
Suppliers and
Technologies

17
Bringing The Gap Between IT And The Business
•

Both business and IT
must work to close the
gap

January 27, 2014

18
AICPA Technology Initiatives Survey 2012
2012

Lack of business confidence in
getting the basics of IT governance,
management and delivery right
62%

1 - Securing The IT Environment

61%

2 - Managing And Retaining Data

65%

← Priority →

3 - Managing Risk And Compliance

62%

4 - Ensuring Privacy

34%

5 - Leveraging Emerging Technologies

52%

6 - Managing System Implementation
7 - Enabling Decision Support And
Managing Performance

46%

8 - Governing And Managing IT
Investment/Spending

56%
60%

9 - Preventing And Responding To Fraud
10 - Managing Vendors And Service
Providers

56%
0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50%

55%

60%

65%

70%

← Confidence in Level of Achievement →
January 27, 2014

19
AICPA Technology Initiatives Survey 2013
2013
55%

1 - Managing And Retaining Data

51%

2 - Securing The IT Environment

← Priority →

3 - Managing Vendors And Service
Providers

47%

4 - Managing IT Risks And Compliance

47%

Continuing lack
of business
confidence in
getting the
basics of IT
governance,
management
and delivery
right

45%

5 - Ensuring Privacy
6 - Managing System Implementations

44%

7 - Preventing And Responding To
Computer Fraud

44%

8 - Governing And Managing IT
Investment And Spending

38%

9 - Enabling Decision Support And
Analytics

37%
27%

10 - Leveraging Emerging Technologies
0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50%

55%

60%

65%

70%

← Confidence in Level of Achievement →
January 27, 2014

20
Managing Suppliers - 2012
Only average view of the
performance of the key role of
managing suppliers

2012

62%

1 - Securing The IT Environment

61%

2 - Managing And Retaining Data

65%

← Priority →

3 - Managing Risk And Compliance

62%

4 - Ensuring Privacy

34%

5 - Leveraging Emerging Technologies

52%

6 - Managing System Implementation
7 - Enabling Decision Support And
Managing Performance

46%

8 - Governing And Managing IT
Investment/Spending

56%
60%

9 - Preventing And Responding To Fraud
10 - Managing Vendors And Service
Providers

56%
0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50%

55%

60%

65%

70%

← Confidence in Level of Achievement →
January 27, 2014

21
Managing Suppliers - 2013

Importance of supplier management
increasing and level of confidence
decreasing

2013

55%

1 - Managing And Retaining Data

51%

2 - Securing The IT Environment

← Priority →

3 - Managing Vendors And Service
Providers

47%

4 - Managing IT Risks And Compliance

47%
45%

5 - Ensuring Privacy
6 - Managing System Implementations

44%

7 - Preventing And Responding To
Computer Fraud

44%

8 - Governing And Managing IT
Investment And Spending

38%

9 - Enabling Decision Support And
Analytics

37%
27%

10 - Leveraging Emerging Technologies
0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50%

55%

60%

65%

70%

← Confidence in Level of Achievement →
January 27, 2014

22
Delivering IT Innovation - 2012
2012

Important but very low confidence
of delivery
62%

1 - Securing The IT Environment

61%

2 - Managing And Retaining Data

65%

← Priority →

3 - Managing Risk And Compliance

62%

4 - Ensuring Privacy

34%

5 - Leveraging Emerging Technologies

52%

6 - Managing System Implementation
7 - Enabling Decision Support And
Managing Performance

46%

8 - Governing And Managing IT
Investment/Spending

56%
60%

9 - Preventing And Responding To Fraud
10 - Managing Vendors And Service
Providers

56%
0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50%

55%

60%

65%

70%

← Confidence in Level of Achievement →
January 27, 2014

23
Delivering IT Innovation - 2013
2013

Lower level of importance but even
lower confidence of delivery
55%

1 - Managing And Retaining Data

51%

2 - Securing The IT Environment

← Priority →

3 - Managing Vendors And Service
Providers

47%

4 - Managing IT Risks And Compliance

47%
45%

5 - Ensuring Privacy
6 - Managing System Implementations

44%

7 - Preventing And Responding To
Computer Fraud

44%

8 - Governing And Managing IT
Investment And Spending

38%

9 - Enabling Decision Support And
Analytics

37%
27%

10 - Leveraging Emerging Technologies
0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50%

55%

60%

65%

70%

← Confidence in Level of Achievement →
January 27, 2014

24
Business Intelligence - 2012
2012

After years of BI and related
technologies being available and
implemented, there is still a low level of
confidence
62%

1 - Securing The IT Environment

61%

2 - Managing And Retaining Data

65%

← Priority →

3 - Managing Risk And Compliance

62%

4 - Ensuring Privacy

34%

5 - Leveraging Emerging Technologies

52%

6 - Managing System Implementation
7 - Enabling Decision Support And
Managing Performance

46%

8 - Governing And Managing IT
Investment/Spending

56%
60%

9 - Preventing And Responding To Fraud
10 - Managing Vendors And Service
Providers

56%
0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50%

55%

60%

65%

70%

← Confidence in Level of Achievement →
January 27, 2014

25
Business Intelligence - 2013
Level of confidence reducing

2013
55%

1 - Managing And Retaining Data

51%

2 - Securing The IT Environment

← Priority →

3 - Managing Vendors And Service
Providers

47%

4 - Managing IT Risks And Compliance

47%
45%

5 - Ensuring Privacy
6 - Managing System Implementations

44%

7 - Preventing And Responding To
Computer Fraud

44%

8 - Governing And Managing IT
Investment And Spending

38%

9 - Enabling Decision Support And
Analytics

37%
27%

10 - Leveraging Emerging Technologies
0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50%

55%

60%

65%

70%

← Confidence in Level of Achievement →
January 27, 2014

26
Generic Structure Of An IT Function
IT Governance
IT Strategy

Business
Relationship
and
Engagement
Business
Relationship
Management
Business
Analysis and
Consulting

Solution
Architecture

IT Enterprise
Architecture
management

Business
Readiness and
Organisation
Change
January 27, 2014

IT Service and
Sourcing
Strategy

IT Financial
Management

IT Security
Management

Program and
Project
Management

IT Process and
Quality
Management

IT Resource
Management

Asset and
License
Management

Design

Realisation

Takeover and Management

Test

Co-ordination and Risk
Management

Operations

Service and Solution Support
Transition to
Production

Infrastructure and Communications
Implementation
Design

Realisation

Test
Management

Service Operations

Solution Design, Development, Implementation
and Integration
Analysis

Infrastructure,
Networks
Management

Acquisition,
Sourcing and
Supplier
Management

Technology
Selection and
Management

Service and Solution Delivery

Data,
Information,
Knowledge
Management

Service
Planning

IT Innovation
Management

IT Management

Analysis
Demand
Management

IT Governance
and
Leadership

Operations
Management

Support Function
Monitoring and
Alerting

Test

Incident
Management

Service Request
Management

Problem Management

Service and Solution Support

Facilities and Device Management

Service Lifecycle Management
Service
Catalog
Management

Configuration
Management

Change
Management

Continuity and
Availability
Management

Capacity
Management

Service Level
Management

Release
Management
27
Generic Structure Of An IT Function
•
•

Generalised and idealised view of the structure, organisation and set
of logical sub-functions within an IT function
Organisational view rather than capability view
− Capabilities must reside in organisation functions

•
•
•
•
•
•

Actual optimum implementation depends on the size and profile of
the organisation
Not all sub-functions relevant to all organisations
Not all sub-functions have the same importance for all organisations
Not all sub-functions are at the same level of operational
effectiveness for all organisations
Logical sub-functions can be combined or split further
A model that explicitly includes proactive linkage to the business and
the delivery of business requirements
January 27, 2014

28
Matching Key IT Skills and Capabilities To
Organisation Functions
Capability

IT
Business
IT
Service Service
Service
Governance Relationship Management and Operations Lifecycle
and
Solution
Management
Engagement
Delivery

IT Leadership and Governance
Strategic and Business Planning
Demand and Supply Management, Capacity Forecasting
and Planning
Sourcing and Supplier Management, Acquisition,
Procurement
Innovation
Accounting, Funding, Financing, Budgeting and Planning
Programme Management, Portfolio Management, Project
Management
Relationship Management and Business Engagement
Organisation Design and Planning
Enterprise Architecture
Infrastructure, Networks and Communications
Business and Process Analysis and Design
Solution Architecture and Design
Benefits Assessment and Realisation
Service Provisioning, Service Delivery and Service
Management
Testing
Security, Continuity and Disaster Recovery
Solution Development and Delivery
People Asset Management
Data, Information, Knowledge Asset Management
User Experience Design
Change and Change Management
January 27, 2014

29
Sub-Function Importance To Organisation
IT Governance
IT Strategy

Business
Relationship
and
Engagement
Business
Relationship
Management
Business
Analysis and
Consulting

Solution
Architecture

IT Enterprise
Architecture
management

Business
Readiness and
Organisation
Change
27 January 2014

IT Financial
Management

IT Service and
Sourcing
Strategy

IT Security
Management

Program and
Project
Management

IT Process and
Quality
Management

IT Resource
Management

Asset and
License
Management

Design

Realisation

Takeover and Management

Test

Co-ordination and Risk
Management

Operations

Service and Solution Support
Transition to
Production

Infrastructure and Communications
Implementation
Design

Realisation

Test
Management

Service Operations

Solution Design, Development, Implementation
and Integration
Analysis

Infrastructure,
Networks
Management

Acquisition,
Sourcing and
Supplier
Management

Technology
Selection and
Management

Service and Solution Delivery

Data,
Information,
Knowledge
Management

Service
Planning

IT Innovation
Management

IT Management

Analysis
Demand
Management

IT Governance
and
Leadership

Operations
Management

Support Function
Monitoring and
Alerting

Test

Incident
Management

Service Request
Management

Problem Management

Service and Solution Support

Facilities and Device Management

Service Lifecycle Management
Service
Catalog
Management

Configuration
Management

Change
Management

Continuity and
Availability
Management

Capacity
Management

Service Level
Management

Release
Management
30
View Of Importance Of Sub-Functions

= Very Important
= Important
= Less Important
•

Use this as a view of what areas you to prioritise getting
better at

January 27, 2014

31
External IT and Business Alignment
Business-facing
sub-functions

Business
Relationship
and
Engagement

IT Governance

IT Management

Service and Solution Delivery

Service Operations

Service Lifecycle Management

January 27, 2014

32
Internal IT and Business Alignment
Business-facing
sub-functions
mediate
between
business and
technology and
service delivery
and operation

Business
Relationship
and
Engagement

IT Governance

IT Management

Service and Solution Delivery

Service Operations

Service Lifecycle Management

January 27, 2014

33
IT Function Structure And Alignment
Alignment is not
just about being
aligned at the
Business
Relationship and
Engagement and
IT Governance
levels

Business
Relationship
and
Engagement

IT Governance

IT Management

Service and Solution Delivery

Service Operations

Alignment
means following
through
throughout the
IT function

Service Lifecycle Management

January 27, 2014

34
IT Function Structure And Alignment
•

Real IT and business alignment needs to pervade the entire
IT function

•

IT must embed business alignment in the way it operates
to ensure it remains relevant to the business

•

Otherwise the business will bypass IT and go straight to
suppliers and service providers

•

Disintermediation of IT is central to the business plans of
many internet-based service providers

•

Failure to systematise alignment will expose IT to the
danger of becoming irrelevant
IT Governance Sub-Functions
Defines strategy for IT function for both the IT function and how IT delivers on the overall business
strategy
Manages the definition and maintenance of overall enterprise IT architecture
including systems and application standards and operational framework
Implements IT governance and maintains leadership of the IT function

IT Governance
IT Strategy

IT Enterprise
Architecture
management

IT
Governance
and
Leadership

IT Financial
Management

IT Service and
Sourcing
Strategy

IT Innovation
Management

IT Security
Management

Manages the IT budget, finances, financial
reporting and control standards, cost-benefit
analysis
Manages the process for defining how services and solutions
should be acquired and managed
Manages the process for bringing new ideas to an appropriate
implementation to generate value
Manages IT application and infrastructure security standards
January 27, 2014

36
Business Relationship and Engagement SubFunctions
Business
Relationship
and
Engagement
Business
Relationship
Management

Manages the relationship with the business and escalations , the identification of
work, helps the business navigate IT processes and acts as the voice of the business
to IT

Business
Analysis and
Consulting

Offers business analysis and consulting services to translate business needs into a
structured set of requirements to enable the business understand its needs

Solution
Architecture

Defines business-oriented solutions based on structured business requirements
that comply with IT delivery and operational standards

Demand
Management

Manages the demand from the business for resources and ensures the business can
accommodate the associated change

Business
Readiness and
Organisation
Change

Ensures the organisation is ready and able to accept the changes required of new
or changed application

27 January 2014

37
IT Management Sub-Functions

Manages data,
defines data
standards
Operations
Management

Service
Planning

Manages the IT operation

Data,
Information,
Knowledge
Management
Infrastructure,
Networks
Management

Plans for the introduction of new services

IT Management
Program and
Project
Management

IT Process and
Quality
Management

IT Resource
Management

Asset and
License
Management

Technology
Selection and
Management

Acquisition,
Sourcing and
Supplier
Management

Test
Management

Manages IT
infrastructure

Manages testing
Manages and implements service and
supplier acquisition
Manages process for selecting suitable
technologies
Manages IT assets and software licenses
Manages IT people resources, induction, training, development, standards
Ensures quality of IT processes
Manages delivery of programs and projects, manages standards and ensures consistency
27 January 2014

38
Service Lifecycle Management Sub-Functions
Manages catalog of IT services

Manages configuration of installed assets
Manages the delivery of change

Service Lifecycle Management
Service
Catalog
Management

Configuration
Management

Change
Management

Continuity and
Availability
Management

Capacity
Management

Service Level
Management

Release
Management

Manages business continuity, disaster recovery
and system and application availability
Ensures capacity of IT assets
Implements and manages network of service level agreements

Manages and implements release to production process
27 January 2014

39
Service and Solution Delivery Sub-Functions
Designs, develops and
implements new solutions
and changes and ensures
integration with existing
systems

Service and Solution Delivery
Solution Design, Development,
Implementation and Integration
Analysis

Design

Realisation

Test

Service and Solution Support

Designs, develops and
implements IT
infrastructure and
communications networks

Infrastructure and Communications
Implementation
Analysis

Design

Realisation

Test

Transition
to
Production

Transitions new
systems and
changes to
production and
manages handover
to support, ensures
new systems are
operable and
supportable

Service and Solution Support

Implements
support
arrangements for
new services and
solutions

27 January 2014

40
Service Operations Sub-Functions
Takes over the support and
operation of new systems
and applications,
implements support
arrangements

Service Operations
Takeover and Management
Operations

Co-ordination and Risk
Management
Support Function

Monitoring and
Alerting

Resolves recurring
problems to improve
support efficiency

Incident
Management

Service Request
Management

Operates application
and infrastructure
support function and
processes

Problem Management

Facilities and Device Management

Manages and operates IT
infrastructure, equipment
and communications
network

27 January 2014

41
View Of Status Of Sub-Functions
IT Governance
IT Strategy

Business
Relationship
and
Engagement
Business
Relationship
Management
Business
Analysis and
Consulting

Solution
Architecture

IT Enterprise
Architecture
management

Business
Readiness and
Organisation
Change
January 27, 2014

IT Financial
Management

IT Service and
Sourcing
Strategy

IT Security
Management

Program and
Project
Management

IT Process and
Quality
Management

IT Resource
Management

Asset and
License
Management

Design

Realisation

Takeover and Management

Test

Co-ordination and Risk
Management

Operations

Service and Solution Support
Transition to
Production

Infrastructure and Communications
Implementation
Design

Realisation

Test
Management

Service Operations

Solution Design, Development, Implementation
and Integration
Analysis

Infrastructure,
Networks
Management

Acquisition,
Sourcing and
Supplier
Management

Technology
Selection and
Management

Service and Solution Delivery

Data,
Information,
Knowledge
Management

Service
Planning

IT Innovation
Management

IT Management

Analysis
Demand
Management

IT Governance
and
Leadership

Operations
Management

Support Function
Monitoring and
Alerting

Test

Incident
Management

Service Request
Management

Problem Management

Service and Solution Support

Facilities and Device Management

Service Lifecycle Management
Service
Catalog
Management

Configuration
Management

Change
Management

Continuity and
Availability
Management

Capacity
Management

Service Level
Management

Release
Management
42
View Of Status Of Sub-Functions
= Fully Implemented and Operational
= Partially Implemented and Operational
= Not Implemented and Operational

•

Use this as a view of what areas you need to get better at

•

Match with importance to identify high priority functions
to address first
January 27, 2014

43
Sample View - What IT Is Good At
IT Governance
IT Strategy

Business
Relationship
and
Engagement
Business
Relationship
Management
Business
Analysis and
Consulting

Solution
Architecture

IT Enterprise
Architecture
management

Business
Readiness and
Organisation
Change
January 27, 2014

IT Financial
Management

IT Service and
Sourcing
Strategy

IT Security
Management

Program and
Project
Management

IT Process and
Quality
Management

IT Resource
Management

Asset and
License
Management

Design

Realisation

Takeover and Management

Test

Co-ordination and Risk
Management

Operations

Service and Solution Support
Transition to
Production

Infrastructure and Communications
Implementation
Design

Realisation

Test
Management

Service Operations

Solution Design, Development, Implementation
and Integration
Analysis

Infrastructure,
Networks
Management

Acquisition,
Sourcing and
Supplier
Management

Technology
Selection and
Management

Service and Solution Delivery

Data,
Information,
Knowledge
Management

Service
Planning

IT Innovation
Management

IT Management

Analysis
Demand
Management

IT Governance
and
Leadership

Operations
Management

Support Function
Monitoring and
Alerting

Test

Incident
Management

Service Request
Management

Problem Management

Service and Solution Support

Facilities and Device Management

Service Lifecycle Management
Service
Catalog
Management

Configuration
Management

Change
Management

Continuity and
Availability
Management

Capacity
Management

Service Level
Management

Release
Management
44
Sample View - What IT Is Average At
IT Governance
IT Strategy

Business
Relationship
and
Engagement
Business
Relationship
Management
Business
Analysis and
Consulting

Solution
Architecture

IT Enterprise
Architecture
management

Business
Readiness and
Organisation
Change
January 27, 2014

IT Financial
Management

IT Service and
Sourcing
Strategy

IT Security
Management

Program and
Project
Management

IT Process and
Quality
Management

IT Resource
Management

Asset and
License
Management

Design

Realisation

Takeover and Management

Test

Co-ordination and Risk
Management

Operations

Service and Solution Support
Transition to
Production

Infrastructure and Communications
Implementation
Design

Realisation

Test
Management

Service Operations

Solution Design, Development, Implementation
and Integration
Analysis

Infrastructure,
Networks
Management

Acquisition,
Sourcing and
Supplier
Management

Technology
Selection and
Management

Service and Solution Delivery

Data,
Information,
Knowledge
Management

Service
Planning

IT Innovation
Management

IT Management

Analysis
Demand
Management

IT Governance
and
Leadership

Operations
Management

Support Function
Monitoring and
Alerting

Test

Incident
Management

Service Request
Management

Problem Management

Service and Solution Support

Facilities and Device Management

Service Lifecycle Management
Service
Catalog
Management

Configuration
Management

Change
Management

Continuity and
Availability
Management

Capacity
Management

Service Level
Management

Release
Management
45
Sample View - What IT Is Poor At
IT Governance
IT Strategy

Business
Relationship
and
Engagement
Business
Relationship
Management
Business
Analysis and
Consulting

Solution
Architecture

IT Enterprise
Architecture
management

Business
Readiness and
Organisation
Change
January 27, 2014

IT Financial
Management

IT Service and
Sourcing
Strategy

IT Security
Management

Program and
Project
Management

IT Process and
Quality
Management

IT Resource
Management

Asset and
License
Management

Design

Realisation

Takeover and Management

Test

Co-ordination and Risk
Management

Operations

Service and Solution Support
Transition to
Production

Infrastructure and Communications
Implementation
Design

Realisation

Test
Management

Service Operations

Solution Design, Development, Implementation
and Integration
Analysis

Infrastructure,
Networks
Management

Acquisition,
Sourcing and
Supplier
Management

Technology
Selection and
Management

Service and Solution Delivery

Data,
Information,
Knowledge
Management

Service
Planning

IT Innovation
Management

IT Management

Analysis
Demand
Management

IT Governance
and
Leadership

Operations
Management

Support Function
Monitoring and
Alerting

Test

Incident
Management

Service Request
Management

Problem Management

Service and Solution Support

Facilities and Device Management

Service Lifecycle Management
Service
Catalog
Management

Configuration
Management

Change
Management

Continuity and
Availability
Management

Capacity
Management

Service Level
Management

Release
Management
46
Summary
•
•
•
•
•
•
•
•
•
•

Low confidence in IT by business stills exists
IT delivery of what the business wants is poor
IT does not explain itself well
Business can have unrealistic expectations
IT needs to structure itself for business alignment and delivery
Real IT and business alignment needs to pervade the entire IT function
IT must embed business alignment in the way it operates to ensure it remains
relevant to the business
Otherwise the business will bypass IT and go straight to suppliers and service
providers
Disintermediation of IT is central to the business plans of many internet-based
service providers
Failure to systematise alignment will expose IT to the danger of becoming
irrelevant

January 27, 2014

47
More Information
Alan McSweeney
http://ie.linkedin.com/in/alanmcsweeney

January 27, 2014

48

More Related Content

What's hot

Translating Big Raw Data Into Small Actionable Information
Translating Big Raw Data Into Small Actionable InformationTranslating Big Raw Data Into Small Actionable Information
Translating Big Raw Data Into Small Actionable InformationAlan McSweeney
 
Solution Architecture And User And Customer Experience
Solution Architecture And User And Customer ExperienceSolution Architecture And User And Customer Experience
Solution Architecture And User And Customer ExperienceAlan McSweeney
 
Digital Transformation And Solution Architecture
Digital Transformation And Solution ArchitectureDigital Transformation And Solution Architecture
Digital Transformation And Solution ArchitectureAlan McSweeney
 
Practical Cloud - Stephen Betts (Avanade)
Practical Cloud - Stephen Betts (Avanade)Practical Cloud - Stephen Betts (Avanade)
Practical Cloud - Stephen Betts (Avanade)Spiffy
 
Design Science and Solution Architecture
Design Science and Solution ArchitectureDesign Science and Solution Architecture
Design Science and Solution ArchitectureAlan McSweeney
 
Investing Intelligently In The IT Function
Investing Intelligently In The IT FunctionInvesting Intelligently In The IT Function
Investing Intelligently In The IT FunctionAlan McSweeney
 
Maximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureMaximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureAlan McSweeney
 
Capital Planning And Investment Management And Control In Information Technology
Capital Planning And Investment Management And Control In Information TechnologyCapital Planning And Investment Management And Control In Information Technology
Capital Planning And Investment Management And Control In Information TechnologyAlan McSweeney
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Alan McSweeney
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process ManagementAlan McSweeney
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapAlan McSweeney
 
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Alan McSweeney
 
Designing An Enterprise Data Fabric
Designing An Enterprise Data FabricDesigning An Enterprise Data Fabric
Designing An Enterprise Data FabricAlan McSweeney
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataAlan McSweeney
 
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...Alan McSweeney
 

What's hot (20)

Translating Big Raw Data Into Small Actionable Information
Translating Big Raw Data Into Small Actionable InformationTranslating Big Raw Data Into Small Actionable Information
Translating Big Raw Data Into Small Actionable Information
 
Solution Architecture And User And Customer Experience
Solution Architecture And User And Customer ExperienceSolution Architecture And User And Customer Experience
Solution Architecture And User And Customer Experience
 
Digital Transformation And Solution Architecture
Digital Transformation And Solution ArchitectureDigital Transformation And Solution Architecture
Digital Transformation And Solution Architecture
 
Practical Cloud - Stephen Betts (Avanade)
Practical Cloud - Stephen Betts (Avanade)Practical Cloud - Stephen Betts (Avanade)
Practical Cloud - Stephen Betts (Avanade)
 
Design Science and Solution Architecture
Design Science and Solution ArchitectureDesign Science and Solution Architecture
Design Science and Solution Architecture
 
Are you ready for the transformation
Are you ready for the transformationAre you ready for the transformation
Are you ready for the transformation
 
Investing Intelligently In The IT Function
Investing Intelligently In The IT FunctionInvesting Intelligently In The IT Function
Investing Intelligently In The IT Function
 
Outsourcing & Cloud Computing
Outsourcing & Cloud ComputingOutsourcing & Cloud Computing
Outsourcing & Cloud Computing
 
Maximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureMaximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise Architecture
 
Capital Planning And Investment Management And Control In Information Technology
Capital Planning And Investment Management And Control In Information TechnologyCapital Planning And Investment Management And Control In Information Technology
Capital Planning And Investment Management And Control In Information Technology
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
 
Solution Design Services An Overview
Solution Design Services  An OverviewSolution Design Services  An Overview
Solution Design Services An Overview
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability Models
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And Roadmap
 
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
 
Designing An Enterprise Data Fabric
Designing An Enterprise Data FabricDesigning An Enterprise Data Fabric
Designing An Enterprise Data Fabric
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart Data
 
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
 

Viewers also liked

Complexity and Solution Architecture
Complexity and Solution ArchitectureComplexity and Solution Architecture
Complexity and Solution ArchitectureAlan McSweeney
 
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...Alan McSweeney
 
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT WorldThe Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT WorldAlan McSweeney
 
Process Oriented Architecture
Process Oriented ArchitectureProcess Oriented Architecture
Process Oriented ArchitectureAlan McSweeney
 
Code Review Checklist
Code Review ChecklistCode Review Checklist
Code Review ChecklistNitin Bhide
 
Microservices: Lessons Learned
Microservices: Lessons LearnedMicroservices: Lessons Learned
Microservices: Lessons LearnedWeaveworks
 
Integrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement ModelIntegrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement ModelAlan McSweeney
 
Supplier And Service Provider Governance
Supplier And Service Provider GovernanceSupplier And Service Provider Governance
Supplier And Service Provider GovernanceAlan McSweeney
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementAlan McSweeney
 
The First 100 Days for a New CIO - Using the Innovation Value Institute IT Ca...
The First 100 Days for a New CIO - Using the Innovation Value Institute IT Ca...The First 100 Days for a New CIO - Using the Innovation Value Institute IT Ca...
The First 100 Days for a New CIO - Using the Innovation Value Institute IT Ca...Alan McSweeney
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept WorkshopAlan McSweeney
 
Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1Alan McSweeney
 
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...Alan McSweeney
 
Data Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyData Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyAlan McSweeney
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureAlan McSweeney
 
The Myth Of Requirements
The Myth Of RequirementsThe Myth Of Requirements
The Myth Of RequirementsAlan McSweeney
 
Business process analysis and design – importance of having a common language...
Business process analysis and design – importance of having a common language...Business process analysis and design – importance of having a common language...
Business process analysis and design – importance of having a common language...Alan McSweeney
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity ModelsAlan McSweeney
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution ArchitectureAlan McSweeney
 
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsSolution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsAlan McSweeney
 

Viewers also liked (20)

Complexity and Solution Architecture
Complexity and Solution ArchitectureComplexity and Solution Architecture
Complexity and Solution Architecture
 
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
 
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT WorldThe Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
 
Process Oriented Architecture
Process Oriented ArchitectureProcess Oriented Architecture
Process Oriented Architecture
 
Code Review Checklist
Code Review ChecklistCode Review Checklist
Code Review Checklist
 
Microservices: Lessons Learned
Microservices: Lessons LearnedMicroservices: Lessons Learned
Microservices: Lessons Learned
 
Integrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement ModelIntegrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement Model
 
Supplier And Service Provider Governance
Supplier And Service Provider GovernanceSupplier And Service Provider Governance
Supplier And Service Provider Governance
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service management
 
The First 100 Days for a New CIO - Using the Innovation Value Institute IT Ca...
The First 100 Days for a New CIO - Using the Innovation Value Institute IT Ca...The First 100 Days for a New CIO - Using the Innovation Value Institute IT Ca...
The First 100 Days for a New CIO - Using the Innovation Value Institute IT Ca...
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept Workshop
 
Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1
 
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
 
Data Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyData Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data Strategy
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise Architecture
 
The Myth Of Requirements
The Myth Of RequirementsThe Myth Of Requirements
The Myth Of Requirements
 
Business process analysis and design – importance of having a common language...
Business process analysis and design – importance of having a common language...Business process analysis and design – importance of having a common language...
Business process analysis and design – importance of having a common language...
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity Models
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution Architecture
 
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsSolution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
 

Similar to Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment

InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle MollotInterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle MollotIBM Events
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyDenodo
 
Réinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de DenodoRéinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de DenodoDenodo
 
IoT Manufacturing Solutions For Industry-4.0
IoT Manufacturing Solutions For Industry-4.0IoT Manufacturing Solutions For Industry-4.0
IoT Manufacturing Solutions For Industry-4.0Rahul Singh
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
Evolving from Process Excellence to Innovation: Supporting Digital Agenda
Evolving from Process Excellence to Innovation: Supporting Digital AgendaEvolving from Process Excellence to Innovation: Supporting Digital Agenda
Evolving from Process Excellence to Innovation: Supporting Digital AgendaSSFIndia1
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Matt Stubbs
 
ASL and BiSL Introduction Eng 2009
ASL and BiSL Introduction Eng 2009ASL and BiSL Introduction Eng 2009
ASL and BiSL Introduction Eng 2009lucillevanderhagen
 
ASL & BiSL introduction ENG
ASL & BiSL introduction ENGASL & BiSL introduction ENG
ASL & BiSL introduction ENGVosmeer
 
Demand & Supply Management in a Multi-Sourcing Environment
Demand & Supply Management in a Multi-Sourcing EnvironmentDemand & Supply Management in a Multi-Sourcing Environment
Demand & Supply Management in a Multi-Sourcing EnvironmentJean-Pierre Beelen
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Basics of Digital - how to imbibe it into business
Basics of Digital - how to imbibe it into businessBasics of Digital - how to imbibe it into business
Basics of Digital - how to imbibe it into businessNBC Bearings
 
Big Data Driven Transformations
Big Data Driven TransformationsBig Data Driven Transformations
Big Data Driven TransformationsPiyush Malik
 
Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08niklaus
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 

Similar to Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment (20)

InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle MollotInterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data Strategy
 
Réinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de DenodoRéinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de Denodo
 
IoT Manufacturing Solutions For Industry-4.0
IoT Manufacturing Solutions For Industry-4.0IoT Manufacturing Solutions For Industry-4.0
IoT Manufacturing Solutions For Industry-4.0
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Evolving from Process Excellence to Innovation: Supporting Digital Agenda
Evolving from Process Excellence to Innovation: Supporting Digital AgendaEvolving from Process Excellence to Innovation: Supporting Digital Agenda
Evolving from Process Excellence to Innovation: Supporting Digital Agenda
 
Digital Innovation for the Intelligent Enterprise - How digital investments i...
Digital Innovation for the Intelligent Enterprise - How digital investments i...Digital Innovation for the Intelligent Enterprise - How digital investments i...
Digital Innovation for the Intelligent Enterprise - How digital investments i...
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
 
ASL and BiSL Introduction Eng 2009
ASL and BiSL Introduction Eng 2009ASL and BiSL Introduction Eng 2009
ASL and BiSL Introduction Eng 2009
 
Abf Introduction Eng 2009
Abf Introduction Eng 2009Abf Introduction Eng 2009
Abf Introduction Eng 2009
 
ASL & BiSL introduction ENG
ASL & BiSL introduction ENGASL & BiSL introduction ENG
ASL & BiSL introduction ENG
 
Demand & Supply Management in a Multi-Sourcing Environment
Demand & Supply Management in a Multi-Sourcing EnvironmentDemand & Supply Management in a Multi-Sourcing Environment
Demand & Supply Management in a Multi-Sourcing Environment
 
Roger Woodward, Managing Director, EMEA - Tridium
Roger Woodward, Managing Director, EMEA - TridiumRoger Woodward, Managing Director, EMEA - Tridium
Roger Woodward, Managing Director, EMEA - Tridium
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Basics of Digital - how to imbibe it into business
Basics of Digital - how to imbibe it into businessBasics of Digital - how to imbibe it into business
Basics of Digital - how to imbibe it into business
 
Big Data Driven Transformations
Big Data Driven TransformationsBig Data Driven Transformations
Big Data Driven Transformations
 
Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
01 big dataoverview
01 big dataoverview01 big dataoverview
01 big dataoverview
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 

More from Alan McSweeney

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdfAlan McSweeney
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfAlan McSweeney
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Alan McSweeney
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Alan McSweeney
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution SecurityAlan McSweeney
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security ArchitectureAlan McSweeney
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsAlan McSweeney
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationAlan McSweeney
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Alan McSweeney
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Alan McSweeney
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureAlan McSweeney
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual ChartsAlan McSweeney
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Alan McSweeney
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataAlan McSweeney
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureAlan McSweeney
 
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Alan McSweeney
 
Agile Solution Architecture and Design
Agile Solution Architecture and DesignAgile Solution Architecture and Design
Agile Solution Architecture and DesignAlan McSweeney
 
Creating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyCreating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyAlan McSweeney
 

More from Alan McSweeney (20)

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdf
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdf
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security Architecture
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation Solutions
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata Harmonisation
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation Architecture
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual Charts
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In Data
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference Architecture
 
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
 
Agile Solution Architecture and Design
Agile Solution Architecture and DesignAgile Solution Architecture and Design
Agile Solution Architecture and Design
 
Creating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyCreating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology Strategy
 

Recently uploaded

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 

Recently uploaded (20)

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 

Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment

  • 1. Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment Alan McSweeney
  • 2. Business View Of IT Trends Vs. IT View Of Trends • AICPA – Survey of members from 2001 on initiatives in IT that are of concern to their nearly 400,000 members − http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLO GY/RESOURCES/TOPTECHNOLOGYINITIATIVES/TOP10TECHNOLO GIESARCHIVE Gartner – well known analyst company • Two very different views of information technology trends • − Business-oriented − Technology-oriented • IT tends to be concerned with technology trends for themselves rather than their application to business – internal focus January 27, 2014 2
  • 3. Business And IT Disconnect – Speaking A Different Language Business You are not listening to me I want: January 27, 2014 You are not listening to me IT You need: 3
  • 4. AICPA IT Initiatives Survey 2011-2013 Results 2013 Managing And Retaining Data 1 2 3 4 5 6 7 8 9 10 2012 2011 Securing The IT Environment Control And Use Of Mobile Devices Securing The IT Environment Managing And Retaining Data Information Security Managing Vendors And Service Managing Risk And Data Retention Policies And Providers Compliance Structure Managing IT Risks And Compliance Ensuring Privacy Remote Access Ensuring Privacy Leveraging Emerging Staff And Management Technologies Training Managing System Implementations Managing System Process Documentation And Implementation Improvements Preventing And Responding To Enabling Decision Support And Saving And Making Money Computer Fraud Managing Performance W/Technology Governing And Managing IT Investment Governing And Managing IT Technology Cost Controls And Spending Investment/Spending Enabling Decision Support And Preventing And Responding To Budget Processes Analytics Fraud Leveraging Emerging Technologies Managing Vendors And Service Project Management & Providers Deployment Of New Systems January 27, 2014 4
  • 5. Gartner View of IT Trends 2009-2014 2014 2013 2012 2011 Media Tablets and Cloud Computing Cloud Computing 1 Mobile Device Battles Beyond 2 Mobile Applications and HTML5 3 Personal Cloud 4 Enterprise App Stores 5 The Internet of Things 6 Hybrid IT and Cloud Computing 7 Strategic Big Data 8 Actionable Analytics 9 In Memory Computing 10 Integrated Ecosystems January 27, 2014 2010 2009 Virtualization Green IT Mobile-Centric Mobile Advanced Applications and Applications and Cloud Computing Analytics Interfaces Media Tablets Social Contextual and Servers — Beyond Social User Communications Client Computing Blades Experience and Collaboration Web-Oriented Internet of Things Video IT for Green Architectures App Stores and Next Generation Reshaping the Enterprise Marketplaces Analytics Data Center Mashups Next-Generation Specialized Social Analytics Social Computing Analytics Systems Social Software In-Memory Context-Aware Security – Activity and Social Computing Computing Monitoring Networking Storage Class Unified Big Data Flash Memory Memory Communications Extreme LowUbiquitous Virtualization for Business Energy Servers Computing Availability Intelligence Fabric-Based Mobile Cloud Computing Infrastructure and Green IT Applications Computers Unified Communications Business Process Modeling Metadata Management Virtualization 2.0 Mashup & Composite Apps Web Platform & WOA Computing Fabric Real World Web Social Software 5
  • 6. Business And IT View Of Technology • • • • Business views technologies as means to an end and not as ends in themselves IT views technologies as solutions rather than as components of an overall business solution IT technology trends are very variable and depend on the everchanging new next best thing Business view of the importance of technology application remains quite constant: − − − − − − Security Data Delivery Value Data Managing Suppliers January 27, 2014 6
  • 7. AICPA Top 10 IT Initiatives 2005-2013 2013 2012 1 Managing And Retaining Data Securing The IT Environment 2 Securing The IT Environment Managing And Retaining Data Information Security 3 Managing Vendors And Service Providers Managing Risk And Compliance Data Retention Policies And Structure 4 Managing IT Risks Ensuring Privacy And Compliance Remote Access Leveraging Emerging Technologies 2011 Control And Use Security Of Data Of Mobile Devices Staff And Management Training 5 Ensuring Privacy 6 Managing System Managing System Implementations Implementation 7 Preventing And Responding To Computer Fraud 8 Governing And Managing IT Investment And Spending 9 Enabling Decision Support And Analytics Preventing And Responding To Fraud Budget Processes 10 Leveraging Emerging Technologies Managing Vendors And Service Providers Project Management & Deployment Of New Systems January 27, 2014 2010 Process Documentation And Improvements Enabling Decision Saving And Support And Making Money Managing W/Technology Performance Governing And Technology Cost Managing IT Controls Investment/ Spending Connectivity and Communications 2009 2008 2008 Information Security Management Information Security Management Privacy Management IT Governance Information Security Management Identity And Access Management Business Conforming To Backup, Disaster Secure Data File Continuity Assurance And Storage, Recovery/ Management And Compliance Transmission And Business Disaster Recovery Standards Exchange Continuity Planning Business Process Improvement, Privacy Privacy Secure Electronic Work Flow And Management Management Collaboration Process Exception Alerts Business Process Disaster Recovery Planning And Improvement, Mobile And Document Business Workflow And Remote Management and Continuity Process Exception Computing Workflow Management Alerts 2006 2005 Information Security Information Security Assurance And Compliance Applications Electronic Document Management Disaster And Business Continuity Planning Data Integration IT Governance Spam Technology Privacy Management Disaster Recovery Collaboration And Messaging Technologies Laptop Security / Encryption Training And Competency Identity And Access Management IT Governance Digital Identity And Authentication Technologies Small Business Software Identity And Access Management Conforming To Assurance And Compliance Standards Securing And Controlling Information Distribution Wireless Technologies Wireless Technologies Mobile Devices Improved Application And Data Integration Business Intelligence Mobile And Remote Computing Application And Data Integration Authentication Technologies Tax Software Document, Forms, Content And Knowledge Management Mobile And Remote Computing Electronic Archiving And Data Retention Paperless Digital Technologies Storage Technologies Document, Forms, Content And Knowledge Management Document, Content And Knowledge Management Spyware Detection And Removal Learning And Training Competency Server Electronic Data Virtualization And Retention Strategy Consolidation 7
  • 8. Importance of Security, Privacy, Continuity 2013 2012 1 Managing And Retaining Data Securing The IT Environment 2 Securing The IT Environment Managing And Retaining Data Information Security 3 Managing Vendors And Service Providers Managing Risk And Compliance Data Retention Policies And Structure 4 Managing IT Risks Ensuring Privacy And Compliance Remote Access 5 Ensuring Privacy 6 Managing System Managing System Implementations Implementation 7 Preventing And Responding To Computer Fraud 8 Governing And Managing IT Investment And Spending 9 Enabling Decision Support And Analytics Preventing And Responding To Fraud Budget Processes 10 Leveraging Emerging Technologies Managing Vendors And Service Providers Project Management & Deployment Of New Systems January 27, 2014 Leveraging Emerging Technologies 2011 2010 Control And Use Security Of Data Of Mobile Devices Staff And Management Training Process Documentation And Improvements Enabling Decision Saving And Support And Making Money Managing W/Technology Performance Governing And Technology Cost Managing IT Controls Investment/ Spending Connectivity and Communications 2009 2008 2008 Information Security Management Information Security Management Privacy Management IT Governance Information Security Management Identity And Access Management Business Backup, Disaster Secure Data File Conforming To Continuity Recovery/ Assurance And Storage, Management And Business Compliance Transmission And Disaster Recovery Continuity Standards Exchange Planning Business Process Improvement, Secure Electronic Privacy Privacy Work Flow And Collaboration Management Management Process Exception Alerts Business Process Disaster Recovery Improvement, Planning And Mobile And Document Workflow And Business Remote Management and Process Exception Continuity Computing Workflow Alerts Management 2006 2005 Information Security Information Security Assurance And Compliance Applications Electronic Document Management Disaster And Business Continuity Planning Data Integration IT Governance Spam Technology Privacy Management Disaster Recovery Collaboration And Messaging Technologies Laptop Security / Encryption Training And Competency Identity And Access Management IT Governance Digital Identity And Authentication Technologies Small Business Software Identity And Access Management Conforming To Assurance And Compliance Standards Securing And Controlling Information Distribution Wireless Technologies Wireless Technologies Mobile Devices Improved Application And Data Integration Business Intelligence Mobile And Remote Computing Application And Data Integration Authentication Technologies Tax Software Document, Forms, Content And Knowledge Management Mobile And Remote Computing Electronic Archiving And Data Retention Paperless Digital Technologies Storage Technologies Document, Forms, Content And Knowledge Management Document, Content And Knowledge Management Spyware Detection And Removal Learning And Training Competency Server Electronic Data Virtualization And Retention Strategy Consolidation 8
  • 9. Importance of Data 2013 2012 1 Managing And Retaining Data Securing The IT Environment 2 Securing The IT Environment Managing And Retaining Data Information Security 3 Managing Vendors And Service Providers Managing Risk And Compliance Data Retention Policies And Structure 4 Managing IT Risks Ensuring Privacy And Compliance Remote Access Leveraging Emerging Technologies 5 Ensuring Privacy 6 Managing System Managing System Implementations Implementation 7 Preventing And Responding To Computer Fraud 8 Governing And Managing IT Investment And Spending 9 Enabling Decision Support And Analytics Preventing And Responding To Fraud 10 Leveraging Emerging Technologies Managing Vendors And Service Providers January 27, 2014 2011 2010 Control And Use Security Of Data Of Mobile Devices Staff And Management Training Connectivity and Communications 2009 2008 2008 Information Security Management Information Security Management Privacy Management IT Governance Information Security Management Identity And Access Management Business Backup, Disaster Secure Data File Conforming To Continuity Recovery/ Storage, Assurance And Management And Business Transmission And Compliance Disaster Recovery Continuity Exchange Standards Planning Business Process Improvement, Privacy Privacy Secure Electronic Work Flow And Management Management Collaboration Process Exception Alerts Business Process Disaster Recovery Planning And Document Improvement, Mobile And Business Management and Workflow And Remote Continuity Workflow Process Exception Computing Management Alerts 2006 2005 Information Security Information Security Assurance And Compliance Applications Electronic Document Management Disaster And Business Continuity Planning Data Integration IT Governance Spam Technology Privacy Management Disaster Recovery Collaboration And Messaging Technologies Laptop Security / Encryption Training And Competency Identity And Access Management IT Governance Digital Identity And Authentication Technologies Small Business Software Identity And Access Management Conforming To Assurance And Compliance Standards Securing And Controlling Information Distribution Wireless Technologies Wireless Technologies Mobile Devices Improved Application And Data Integration Business Intelligence Mobile And Remote Computing Application And Data Integration Authentication Technologies Budget Processes Tax Software Document, Forms, Content And Knowledge Management Mobile And Remote Computing Electronic Archiving And Data Retention Paperless Digital Technologies Storage Technologies Project Management & Deployment Of New Systems Server Virtualization And Consolidation Electronic Data Retention Strategy Document, Forms, Content And Knowledge Management Document, Content And Knowledge Management Spyware Detection And Removal Learning And Training Competency Process Documentation And Improvements Enabling Decision Saving And Support And Making Money Managing W/Technology Performance Governing And Technology Cost Managing IT Controls Investment/ Spending 9
  • 10. Importance of Cost and Implementation 2013 2012 1 Managing And Retaining Data Securing The IT Environment 2 Securing The IT Environment Managing And Retaining Data 2011 Control And Use Security Of Data Of Mobile Devices Information Security 3 Managing Managing Risk Vendors And And Compliance Service Providers Data Retention Policies And Structure 4 Managing IT Risks Ensuring Privacy And Compliance Remote Access 5 6 7 8 Ensuring Privacy Leveraging Emerging Technologies Managing System Managing System Implementations Implementation Staff And Management Training Process Documentation And Improvements Enabling Decision Saving And Support And Making Money Managing W/Technology Performance Governing And Governing And Technology Cost Managing IT Managing IT Controls Investment/ Investment And Spending Spending Preventing And Responding To Computer Fraud 9 Enabling Decision Support And Analytics Preventing And Responding To Fraud 10 Leveraging Emerging Technologies Managing Vendors And Service Providers January 27, 2014 2010 Budget Processes Connectivity and Communications 2009 2008 2008 Information Security Management Information Security Management Privacy Management IT Governance Information Security Management Identity And Access Management Business Conforming To Backup, Disaster Secure Data File Continuity Assurance And Storage, Recovery/ Management And Compliance Transmission And Business Disaster Recovery Standards Exchange Continuity Planning Business Process Improvement, Privacy Privacy Secure Electronic Work Flow And Management Management Collaboration Process Exception Alerts Business Process Disaster Recovery Planning And Improvement, Mobile And Document Business Workflow And Remote Management and Continuity Process Exception Computing Workflow Management Alerts 2006 2005 Information Security Information Security Assurance And Compliance Applications Electronic Document Management Disaster And Business Continuity Planning Data Integration IT Governance Spam Technology Privacy Management Disaster Recovery Collaboration And Messaging Technologies Laptop Security / Encryption Training And Competency Identity And Access Management IT Governance Digital Identity And Authentication Technologies Small Business Software Identity And Access Management Conforming To Assurance And Compliance Standards Securing And Controlling Information Distribution Wireless Technologies Wireless Technologies Mobile Devices Improved Application And Data Integration Business Intelligence Mobile And Remote Computing Application And Data Integration Authentication Technologies Tax Software Document, Forms, Content And Knowledge Management Mobile And Remote Computing Electronic Archiving And Data Retention Paperless Digital Technologies Storage Technologies Document, Content And Knowledge Management Spyware Detection And Removal Learning And Training Competency Project Document, Forms, Server Management & Content And Electronic Data Virtualization And Deployment Of Knowledge Retention Strategy Consolidation New Systems Management 10
  • 11. Difference Between How The Business Feels IT Should Spend Budget And How The Budget Is Actually Spent • Business view of how it wants the proportion of IT expenditure to be allocated and how spending is actually allocated What the Business Wants What the Business Gets 25% 5% 50% 35% 15% Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business January 27, 2014 70% Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business 11
  • 12. Difference Between How The Business Feels IT Should Spend Budget And How It Is Actually Spent • Reasons for differences lie with both sides • Each side does not fully understand the other or explain itself properly to the other January 27, 2014 12
  • 13. Spending - Maintain The Momentum Of The Business Through Existing Business Systems • • Business has unrealistic view of how much it costs to keep IT function operational IT does not automate operations to drive operational costs down What the Business Wants What the Business Gets 25% 5% 50% 35% 15% Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business January 27, 2014 70% Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business 13
  • 14. Contribute To Improving Business Results • • IT is poor at delivery and proactive provision of advice and consulting Business expects too much without understanding the resource consequences of these expectations What the Business Wants What the Business Gets 25% 5% 50% 35% 15% 70% Maintain The Momentum Of The Business Through Existing Business Systems Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business Provide IT Direction And Management That Is Aligned To The Needs Of The Business January 27, 2014 14
  • 15. Provide IT Direction And Management That Is Aligned To The Needs Of The Business • • IT is not providing the leadership and direction the business feels it wants Business has unrealistic expectation of the amount of IT spending should be or needs to be allocated to leadership and direction What the Business Wants What the Business Gets 25% 5% 50% 35% 15% Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business January 27, 2014 70% Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business 15
  • 16. Continuing Disconnect Between IT And Business • IT’s role is to mediate between the business and technologies and suppliers • Needs to maintain an external focus on fulfilling business needs and requirements • IT needs to act as a lens focussing business needs on appropriate technology and supplier solutions • Gulf is between business and IT seems to be getting wider January 27, 2014 16
  • 17. IT Needs To Deliver Business-Oriented Solutions IT Supplier Ecosystem Business Technology Landscape 27 January 2014 IT Needs to Mediate Between the Business and Suppliers/ Technologies, Acting as a Lens Focussing Business Needs on Appropriate Solutions IT Needs To Focus Appropriate Services on Appropriate Suppliers and Technologies 17
  • 18. Bringing The Gap Between IT And The Business • Both business and IT must work to close the gap January 27, 2014 18
  • 19. AICPA Technology Initiatives Survey 2012 2012 Lack of business confidence in getting the basics of IT governance, management and delivery right 62% 1 - Securing The IT Environment 61% 2 - Managing And Retaining Data 65% ← Priority → 3 - Managing Risk And Compliance 62% 4 - Ensuring Privacy 34% 5 - Leveraging Emerging Technologies 52% 6 - Managing System Implementation 7 - Enabling Decision Support And Managing Performance 46% 8 - Governing And Managing IT Investment/Spending 56% 60% 9 - Preventing And Responding To Fraud 10 - Managing Vendors And Service Providers 56% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% ← Confidence in Level of Achievement → January 27, 2014 19
  • 20. AICPA Technology Initiatives Survey 2013 2013 55% 1 - Managing And Retaining Data 51% 2 - Securing The IT Environment ← Priority → 3 - Managing Vendors And Service Providers 47% 4 - Managing IT Risks And Compliance 47% Continuing lack of business confidence in getting the basics of IT governance, management and delivery right 45% 5 - Ensuring Privacy 6 - Managing System Implementations 44% 7 - Preventing And Responding To Computer Fraud 44% 8 - Governing And Managing IT Investment And Spending 38% 9 - Enabling Decision Support And Analytics 37% 27% 10 - Leveraging Emerging Technologies 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% ← Confidence in Level of Achievement → January 27, 2014 20
  • 21. Managing Suppliers - 2012 Only average view of the performance of the key role of managing suppliers 2012 62% 1 - Securing The IT Environment 61% 2 - Managing And Retaining Data 65% ← Priority → 3 - Managing Risk And Compliance 62% 4 - Ensuring Privacy 34% 5 - Leveraging Emerging Technologies 52% 6 - Managing System Implementation 7 - Enabling Decision Support And Managing Performance 46% 8 - Governing And Managing IT Investment/Spending 56% 60% 9 - Preventing And Responding To Fraud 10 - Managing Vendors And Service Providers 56% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% ← Confidence in Level of Achievement → January 27, 2014 21
  • 22. Managing Suppliers - 2013 Importance of supplier management increasing and level of confidence decreasing 2013 55% 1 - Managing And Retaining Data 51% 2 - Securing The IT Environment ← Priority → 3 - Managing Vendors And Service Providers 47% 4 - Managing IT Risks And Compliance 47% 45% 5 - Ensuring Privacy 6 - Managing System Implementations 44% 7 - Preventing And Responding To Computer Fraud 44% 8 - Governing And Managing IT Investment And Spending 38% 9 - Enabling Decision Support And Analytics 37% 27% 10 - Leveraging Emerging Technologies 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% ← Confidence in Level of Achievement → January 27, 2014 22
  • 23. Delivering IT Innovation - 2012 2012 Important but very low confidence of delivery 62% 1 - Securing The IT Environment 61% 2 - Managing And Retaining Data 65% ← Priority → 3 - Managing Risk And Compliance 62% 4 - Ensuring Privacy 34% 5 - Leveraging Emerging Technologies 52% 6 - Managing System Implementation 7 - Enabling Decision Support And Managing Performance 46% 8 - Governing And Managing IT Investment/Spending 56% 60% 9 - Preventing And Responding To Fraud 10 - Managing Vendors And Service Providers 56% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% ← Confidence in Level of Achievement → January 27, 2014 23
  • 24. Delivering IT Innovation - 2013 2013 Lower level of importance but even lower confidence of delivery 55% 1 - Managing And Retaining Data 51% 2 - Securing The IT Environment ← Priority → 3 - Managing Vendors And Service Providers 47% 4 - Managing IT Risks And Compliance 47% 45% 5 - Ensuring Privacy 6 - Managing System Implementations 44% 7 - Preventing And Responding To Computer Fraud 44% 8 - Governing And Managing IT Investment And Spending 38% 9 - Enabling Decision Support And Analytics 37% 27% 10 - Leveraging Emerging Technologies 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% ← Confidence in Level of Achievement → January 27, 2014 24
  • 25. Business Intelligence - 2012 2012 After years of BI and related technologies being available and implemented, there is still a low level of confidence 62% 1 - Securing The IT Environment 61% 2 - Managing And Retaining Data 65% ← Priority → 3 - Managing Risk And Compliance 62% 4 - Ensuring Privacy 34% 5 - Leveraging Emerging Technologies 52% 6 - Managing System Implementation 7 - Enabling Decision Support And Managing Performance 46% 8 - Governing And Managing IT Investment/Spending 56% 60% 9 - Preventing And Responding To Fraud 10 - Managing Vendors And Service Providers 56% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% ← Confidence in Level of Achievement → January 27, 2014 25
  • 26. Business Intelligence - 2013 Level of confidence reducing 2013 55% 1 - Managing And Retaining Data 51% 2 - Securing The IT Environment ← Priority → 3 - Managing Vendors And Service Providers 47% 4 - Managing IT Risks And Compliance 47% 45% 5 - Ensuring Privacy 6 - Managing System Implementations 44% 7 - Preventing And Responding To Computer Fraud 44% 8 - Governing And Managing IT Investment And Spending 38% 9 - Enabling Decision Support And Analytics 37% 27% 10 - Leveraging Emerging Technologies 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% ← Confidence in Level of Achievement → January 27, 2014 26
  • 27. Generic Structure Of An IT Function IT Governance IT Strategy Business Relationship and Engagement Business Relationship Management Business Analysis and Consulting Solution Architecture IT Enterprise Architecture management Business Readiness and Organisation Change January 27, 2014 IT Service and Sourcing Strategy IT Financial Management IT Security Management Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management Design Realisation Takeover and Management Test Co-ordination and Risk Management Operations Service and Solution Support Transition to Production Infrastructure and Communications Implementation Design Realisation Test Management Service Operations Solution Design, Development, Implementation and Integration Analysis Infrastructure, Networks Management Acquisition, Sourcing and Supplier Management Technology Selection and Management Service and Solution Delivery Data, Information, Knowledge Management Service Planning IT Innovation Management IT Management Analysis Demand Management IT Governance and Leadership Operations Management Support Function Monitoring and Alerting Test Incident Management Service Request Management Problem Management Service and Solution Support Facilities and Device Management Service Lifecycle Management Service Catalog Management Configuration Management Change Management Continuity and Availability Management Capacity Management Service Level Management Release Management 27
  • 28. Generic Structure Of An IT Function • • Generalised and idealised view of the structure, organisation and set of logical sub-functions within an IT function Organisational view rather than capability view − Capabilities must reside in organisation functions • • • • • • Actual optimum implementation depends on the size and profile of the organisation Not all sub-functions relevant to all organisations Not all sub-functions have the same importance for all organisations Not all sub-functions are at the same level of operational effectiveness for all organisations Logical sub-functions can be combined or split further A model that explicitly includes proactive linkage to the business and the delivery of business requirements January 27, 2014 28
  • 29. Matching Key IT Skills and Capabilities To Organisation Functions Capability IT Business IT Service Service Service Governance Relationship Management and Operations Lifecycle and Solution Management Engagement Delivery IT Leadership and Governance Strategic and Business Planning Demand and Supply Management, Capacity Forecasting and Planning Sourcing and Supplier Management, Acquisition, Procurement Innovation Accounting, Funding, Financing, Budgeting and Planning Programme Management, Portfolio Management, Project Management Relationship Management and Business Engagement Organisation Design and Planning Enterprise Architecture Infrastructure, Networks and Communications Business and Process Analysis and Design Solution Architecture and Design Benefits Assessment and Realisation Service Provisioning, Service Delivery and Service Management Testing Security, Continuity and Disaster Recovery Solution Development and Delivery People Asset Management Data, Information, Knowledge Asset Management User Experience Design Change and Change Management January 27, 2014 29
  • 30. Sub-Function Importance To Organisation IT Governance IT Strategy Business Relationship and Engagement Business Relationship Management Business Analysis and Consulting Solution Architecture IT Enterprise Architecture management Business Readiness and Organisation Change 27 January 2014 IT Financial Management IT Service and Sourcing Strategy IT Security Management Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management Design Realisation Takeover and Management Test Co-ordination and Risk Management Operations Service and Solution Support Transition to Production Infrastructure and Communications Implementation Design Realisation Test Management Service Operations Solution Design, Development, Implementation and Integration Analysis Infrastructure, Networks Management Acquisition, Sourcing and Supplier Management Technology Selection and Management Service and Solution Delivery Data, Information, Knowledge Management Service Planning IT Innovation Management IT Management Analysis Demand Management IT Governance and Leadership Operations Management Support Function Monitoring and Alerting Test Incident Management Service Request Management Problem Management Service and Solution Support Facilities and Device Management Service Lifecycle Management Service Catalog Management Configuration Management Change Management Continuity and Availability Management Capacity Management Service Level Management Release Management 30
  • 31. View Of Importance Of Sub-Functions = Very Important = Important = Less Important • Use this as a view of what areas you to prioritise getting better at January 27, 2014 31
  • 32. External IT and Business Alignment Business-facing sub-functions Business Relationship and Engagement IT Governance IT Management Service and Solution Delivery Service Operations Service Lifecycle Management January 27, 2014 32
  • 33. Internal IT and Business Alignment Business-facing sub-functions mediate between business and technology and service delivery and operation Business Relationship and Engagement IT Governance IT Management Service and Solution Delivery Service Operations Service Lifecycle Management January 27, 2014 33
  • 34. IT Function Structure And Alignment Alignment is not just about being aligned at the Business Relationship and Engagement and IT Governance levels Business Relationship and Engagement IT Governance IT Management Service and Solution Delivery Service Operations Alignment means following through throughout the IT function Service Lifecycle Management January 27, 2014 34
  • 35. IT Function Structure And Alignment • Real IT and business alignment needs to pervade the entire IT function • IT must embed business alignment in the way it operates to ensure it remains relevant to the business • Otherwise the business will bypass IT and go straight to suppliers and service providers • Disintermediation of IT is central to the business plans of many internet-based service providers • Failure to systematise alignment will expose IT to the danger of becoming irrelevant
  • 36. IT Governance Sub-Functions Defines strategy for IT function for both the IT function and how IT delivers on the overall business strategy Manages the definition and maintenance of overall enterprise IT architecture including systems and application standards and operational framework Implements IT governance and maintains leadership of the IT function IT Governance IT Strategy IT Enterprise Architecture management IT Governance and Leadership IT Financial Management IT Service and Sourcing Strategy IT Innovation Management IT Security Management Manages the IT budget, finances, financial reporting and control standards, cost-benefit analysis Manages the process for defining how services and solutions should be acquired and managed Manages the process for bringing new ideas to an appropriate implementation to generate value Manages IT application and infrastructure security standards January 27, 2014 36
  • 37. Business Relationship and Engagement SubFunctions Business Relationship and Engagement Business Relationship Management Manages the relationship with the business and escalations , the identification of work, helps the business navigate IT processes and acts as the voice of the business to IT Business Analysis and Consulting Offers business analysis and consulting services to translate business needs into a structured set of requirements to enable the business understand its needs Solution Architecture Defines business-oriented solutions based on structured business requirements that comply with IT delivery and operational standards Demand Management Manages the demand from the business for resources and ensures the business can accommodate the associated change Business Readiness and Organisation Change Ensures the organisation is ready and able to accept the changes required of new or changed application 27 January 2014 37
  • 38. IT Management Sub-Functions Manages data, defines data standards Operations Management Service Planning Manages the IT operation Data, Information, Knowledge Management Infrastructure, Networks Management Plans for the introduction of new services IT Management Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management Technology Selection and Management Acquisition, Sourcing and Supplier Management Test Management Manages IT infrastructure Manages testing Manages and implements service and supplier acquisition Manages process for selecting suitable technologies Manages IT assets and software licenses Manages IT people resources, induction, training, development, standards Ensures quality of IT processes Manages delivery of programs and projects, manages standards and ensures consistency 27 January 2014 38
  • 39. Service Lifecycle Management Sub-Functions Manages catalog of IT services Manages configuration of installed assets Manages the delivery of change Service Lifecycle Management Service Catalog Management Configuration Management Change Management Continuity and Availability Management Capacity Management Service Level Management Release Management Manages business continuity, disaster recovery and system and application availability Ensures capacity of IT assets Implements and manages network of service level agreements Manages and implements release to production process 27 January 2014 39
  • 40. Service and Solution Delivery Sub-Functions Designs, develops and implements new solutions and changes and ensures integration with existing systems Service and Solution Delivery Solution Design, Development, Implementation and Integration Analysis Design Realisation Test Service and Solution Support Designs, develops and implements IT infrastructure and communications networks Infrastructure and Communications Implementation Analysis Design Realisation Test Transition to Production Transitions new systems and changes to production and manages handover to support, ensures new systems are operable and supportable Service and Solution Support Implements support arrangements for new services and solutions 27 January 2014 40
  • 41. Service Operations Sub-Functions Takes over the support and operation of new systems and applications, implements support arrangements Service Operations Takeover and Management Operations Co-ordination and Risk Management Support Function Monitoring and Alerting Resolves recurring problems to improve support efficiency Incident Management Service Request Management Operates application and infrastructure support function and processes Problem Management Facilities and Device Management Manages and operates IT infrastructure, equipment and communications network 27 January 2014 41
  • 42. View Of Status Of Sub-Functions IT Governance IT Strategy Business Relationship and Engagement Business Relationship Management Business Analysis and Consulting Solution Architecture IT Enterprise Architecture management Business Readiness and Organisation Change January 27, 2014 IT Financial Management IT Service and Sourcing Strategy IT Security Management Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management Design Realisation Takeover and Management Test Co-ordination and Risk Management Operations Service and Solution Support Transition to Production Infrastructure and Communications Implementation Design Realisation Test Management Service Operations Solution Design, Development, Implementation and Integration Analysis Infrastructure, Networks Management Acquisition, Sourcing and Supplier Management Technology Selection and Management Service and Solution Delivery Data, Information, Knowledge Management Service Planning IT Innovation Management IT Management Analysis Demand Management IT Governance and Leadership Operations Management Support Function Monitoring and Alerting Test Incident Management Service Request Management Problem Management Service and Solution Support Facilities and Device Management Service Lifecycle Management Service Catalog Management Configuration Management Change Management Continuity and Availability Management Capacity Management Service Level Management Release Management 42
  • 43. View Of Status Of Sub-Functions = Fully Implemented and Operational = Partially Implemented and Operational = Not Implemented and Operational • Use this as a view of what areas you need to get better at • Match with importance to identify high priority functions to address first January 27, 2014 43
  • 44. Sample View - What IT Is Good At IT Governance IT Strategy Business Relationship and Engagement Business Relationship Management Business Analysis and Consulting Solution Architecture IT Enterprise Architecture management Business Readiness and Organisation Change January 27, 2014 IT Financial Management IT Service and Sourcing Strategy IT Security Management Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management Design Realisation Takeover and Management Test Co-ordination and Risk Management Operations Service and Solution Support Transition to Production Infrastructure and Communications Implementation Design Realisation Test Management Service Operations Solution Design, Development, Implementation and Integration Analysis Infrastructure, Networks Management Acquisition, Sourcing and Supplier Management Technology Selection and Management Service and Solution Delivery Data, Information, Knowledge Management Service Planning IT Innovation Management IT Management Analysis Demand Management IT Governance and Leadership Operations Management Support Function Monitoring and Alerting Test Incident Management Service Request Management Problem Management Service and Solution Support Facilities and Device Management Service Lifecycle Management Service Catalog Management Configuration Management Change Management Continuity and Availability Management Capacity Management Service Level Management Release Management 44
  • 45. Sample View - What IT Is Average At IT Governance IT Strategy Business Relationship and Engagement Business Relationship Management Business Analysis and Consulting Solution Architecture IT Enterprise Architecture management Business Readiness and Organisation Change January 27, 2014 IT Financial Management IT Service and Sourcing Strategy IT Security Management Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management Design Realisation Takeover and Management Test Co-ordination and Risk Management Operations Service and Solution Support Transition to Production Infrastructure and Communications Implementation Design Realisation Test Management Service Operations Solution Design, Development, Implementation and Integration Analysis Infrastructure, Networks Management Acquisition, Sourcing and Supplier Management Technology Selection and Management Service and Solution Delivery Data, Information, Knowledge Management Service Planning IT Innovation Management IT Management Analysis Demand Management IT Governance and Leadership Operations Management Support Function Monitoring and Alerting Test Incident Management Service Request Management Problem Management Service and Solution Support Facilities and Device Management Service Lifecycle Management Service Catalog Management Configuration Management Change Management Continuity and Availability Management Capacity Management Service Level Management Release Management 45
  • 46. Sample View - What IT Is Poor At IT Governance IT Strategy Business Relationship and Engagement Business Relationship Management Business Analysis and Consulting Solution Architecture IT Enterprise Architecture management Business Readiness and Organisation Change January 27, 2014 IT Financial Management IT Service and Sourcing Strategy IT Security Management Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management Design Realisation Takeover and Management Test Co-ordination and Risk Management Operations Service and Solution Support Transition to Production Infrastructure and Communications Implementation Design Realisation Test Management Service Operations Solution Design, Development, Implementation and Integration Analysis Infrastructure, Networks Management Acquisition, Sourcing and Supplier Management Technology Selection and Management Service and Solution Delivery Data, Information, Knowledge Management Service Planning IT Innovation Management IT Management Analysis Demand Management IT Governance and Leadership Operations Management Support Function Monitoring and Alerting Test Incident Management Service Request Management Problem Management Service and Solution Support Facilities and Device Management Service Lifecycle Management Service Catalog Management Configuration Management Change Management Continuity and Availability Management Capacity Management Service Level Management Release Management 46
  • 47. Summary • • • • • • • • • • Low confidence in IT by business stills exists IT delivery of what the business wants is poor IT does not explain itself well Business can have unrealistic expectations IT needs to structure itself for business alignment and delivery Real IT and business alignment needs to pervade the entire IT function IT must embed business alignment in the way it operates to ensure it remains relevant to the business Otherwise the business will bypass IT and go straight to suppliers and service providers Disintermediation of IT is central to the business plans of many internet-based service providers Failure to systematise alignment will expose IT to the danger of becoming irrelevant January 27, 2014 47