SlideShare a Scribd company logo
Moira Edwards, Ellipsis Partners
Sam Farajian, Toastmasters International
IT Governance –
With Great Power
Comes Great
Responsibility
Why are you here?
WHY IS
“IT GOVERNANCE”
SO IMPORTANT?
Only four
years ago we
were
wondering if
we should let
people bring
their own
devices
http://kaboompics.com/one_foto/1000/smartphone-acer-jade-s-in-the-hands-of-a-man-on-a-background-of-yellow-flowers#
Thad Lurie, COO, Educause
“
You make the
business decisions
and we make the
technology decisions
“
audi r8 spider Maria Georgieva CC https://www.flickr.com/photos/mimoza291/8105102478/in/photostream/
WHAT IS “IT
GOVERNANCE”?
IT Governance is
defined as the
processes that
ensure the effective
and efficient use of
IT in enabling an
organization to
achieve its goals.
(Gartner)
https://www.flickr.com/photos/pagedooley/3042418642/sizes/l/in/set-72157603419233445/
ITSG - how IT should do
what it does - is
concerned with ensuring
that the IT organization
operates in an effective,
efficient and compliant
fashion, and it is primarily
a CIO responsibility.
IT Supply-side
Governance
https://www.flickr.com/photos/dumbledad/3276756426/sizes/l/in/photostream/
ITDG - what IT should work on - is the
process by which organizations ensure the
effective evaluation, selection, prioritization,
and funding of competing IT investments;
oversee their implementation; and extract
(measurable) business benefits.
IT Demand Governance
ITDG is a business investment decision-
making and oversight process, and it is a
business management responsibility.
http://startupstockphotos.com/post/100854640206/gravitate-des-moines-ia-check-out-their-website
Tailored to Fit
• People: Culture of the organization,
organizational structure
• Processes: Complexity of IT and services,
complexity of the organizational offerings
• Resources: Current level of IT Governance,
IT staff, skills, leadership
HOW: FORMAL
AND
INFORMAL
PROCESSES
• COBIT 5 (Control Objectives for
Information and Related Technology)
• ITIL (Information Technology Infrastructure
Library)
• ISO (International Organization for
Standardization) 27002
Formal
CASE
STUDY
Toastmasters International
• We empower individuals to become more
effective communicators and leaders.
• Since 1924 (90 Years)
• 350,000 members
• 16,000 Clubs
• 135 Countries
Need For Structure
• To Manage Projects/Requests
• IT Audit Process
Providing the Structure
• Wanted to adopt a framework
• Selected COBIT5
– ISACA (Information System Audit and Control Association)
• Boiled the Ocean
• Start Small, But Start
Cascading Framework
Cascading Framework
Cascading Framework
Cascading Framework
BAI 09: Manage Assets
• Purpose:
Account for all IT assets and optimize the value they provide.
• Process Description:
Manage IT assets through their life-cycle to make sure they:
– deliver value at optimal cost
– remain operational
– are accounted for & physically protected
– are reliable and available, particularly those that are critical
Manage software licenses to ensure:
– optimal number are acquired, retained and deployed as dictated by
business need
– software is installed in compliance with license agreements.
BAI 09: Manage Assets
Key Management Practices
BAI09.01 Identify and record current assets
BAI09.02 Manage critical assets
BAI09.03 Manage the asset life cycle
BAI09.04 Optimize asset costs
BAI09.05 Manage licenses
BAI09.01: Identify and record current assets
Activities
Maintain up-to-date and accurate record of all IT assets required to deliver
services.
1. Identify all owned assets in a register that records current status.
2. Identify legal, regulatory or contractual requirements that need to be
addressed when managing this asset.
3. Perform regular physical and logical inventory checks and reconciliation,
including use of software discovery tools.
4. Verify that assets are fit for purpose (i.e. in a usable and useful condition)
5. Review on a regular basis to determine if each asset provides value and if
so, expected useful life.
6. Ensure accounting for all assets.
• Don’t lose sight of your goals.
• It’s not about doing everything
listed, do what’s right, and
excluding that which doesn’t
make sense or apply.
• The advantage of COBIT 5 is
that when used as a resource,
you don’t have to worry about
missing anything.
• Its about being EFFECTIVE!
COBIT5
5 principles
7 enablers
2 domains
37 processes
17 goals
Demo
• SharePoint Environment
• IT Management practices
• Documents and forms
What worked well
• Helping the organization how to initiate a
project
• Build our first Roadmap
• Proper documentation
– Business Case
– Program Charter
– Project Plan
Challenges
• Where to start
• Who else needs to know
• Time consuming
• Boring!
INFORMAL IT
GOVERNANCE
The patient doesn't care how much
you know until they know how much
you care.
Kyle Vickers, CIO - National Quality Forum
“
Listening is a key IT
Governance Tool
Common
Understanding
of Priorities
Regular meetings
of Senior Staff
More frequent
meetings with
Departmental
Staff
Daily
conversations
with
stakeholders
everywhere
An Informal Framework
• Involve senior people
• Have regular meetings
• Avoid existing meetings
• Reach out broadly for the details
• Build relationships one-on-one
An Informal Framework
Be Transparent
ppmexecution.com
Shadow IT
https://www.flickr.com/photos/timypenburg/6204547832/sizes/l/in/photostream/
Staff want things!
http://startupstockphotos.com/post/95693282436
It’s OK to have well managed silos of
technology purpose built for a
specific need.
Bill Bruce, CTO - AAOS
“
• Exercise SOME Control
• Find ways to meet Needs
• Ensure Security
• Make it a Management Issue
• Make it a Performance Issue
Managing Shadow IT
Your direction will be
questioned
Take the organizational
perspective
TYING IT ALL
TOGETHER
Summary
• Technology and business are intertwined
• Formal methods are needed to manage
great complexity
• Informal methods help build trust
• Collaboration and transparency are key in
both approaches
WRITE DOWN
THREE THINGS
YOU WILL DO
WHEN YOU GET
BACK TO YOUR
OFFICE
What would work for you?
Sam Soheil Farajian
Chief Information Officer
Toastmasters International
sfarajian@toastmasters.org
Moira H. Edwards, MS, CAE
President
Ellipsis Partners LLC
medwards@ellipsispartners.com
Contact Us

More Related Content

What's hot

Mobile Device Management (MDM) & BYOD
Mobile Device Management (MDM) & BYOD  Mobile Device Management (MDM) & BYOD
Mobile Device Management (MDM) & BYOD
juliannacole
 
Unleashing the power of machine learning for it ops management
Unleashing the power of machine learning for it ops managementUnleashing the power of machine learning for it ops management
Unleashing the power of machine learning for it ops management
Jason Bloomberg
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity
Community IT Innovators
 
Byod
ByodByod
Bring your own device
Bring your own deviceBring your own device
Bring your own device
C/D/H Technology Consultants
 
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
Daniel Rivas
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and RewardChris Haddad
 
BYOD
BYODBYOD
Infra-ops Agility
Infra-ops AgilityInfra-ops Agility
Infra-ops Agility
Dushyanth Harinath
 
IT in the Cloud
IT in the CloudIT in the Cloud
IT in the Cloud
Ivanti
 
MT99Dell OCIO: How we're integrating IT for the largest merger in tech history
MT99Dell OCIO:  How we're integrating IT for the largest merger in tech historyMT99Dell OCIO:  How we're integrating IT for the largest merger in tech history
MT99Dell OCIO: How we're integrating IT for the largest merger in tech history
Dell EMC World
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
Chief Optimist
 
4 Ways Intranets Improve Business
4 Ways Intranets Improve Business4 Ways Intranets Improve Business
4 Ways Intranets Improve Business
Accounting Link Technologies
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
Logicalis Australia
 
InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...
InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...
InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...
Agile India
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
RES
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
RES
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 

What's hot (20)

Mobile Device Management (MDM) & BYOD
Mobile Device Management (MDM) & BYOD  Mobile Device Management (MDM) & BYOD
Mobile Device Management (MDM) & BYOD
 
Unleashing the power of machine learning for it ops management
Unleashing the power of machine learning for it ops managementUnleashing the power of machine learning for it ops management
Unleashing the power of machine learning for it ops management
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity
 
Byod
ByodByod
Byod
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
BYOD
BYODBYOD
BYOD
 
Infra-ops Agility
Infra-ops AgilityInfra-ops Agility
Infra-ops Agility
 
IT in the Cloud
IT in the CloudIT in the Cloud
IT in the Cloud
 
MT99Dell OCIO: How we're integrating IT for the largest merger in tech history
MT99Dell OCIO:  How we're integrating IT for the largest merger in tech historyMT99Dell OCIO:  How we're integrating IT for the largest merger in tech history
MT99Dell OCIO: How we're integrating IT for the largest merger in tech history
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
4 Ways Intranets Improve Business
4 Ways Intranets Improve Business4 Ways Intranets Improve Business
4 Ways Intranets Improve Business
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...
InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...
InfraOps Agility - A Sysad's Perspective by Dushyanth Harinath at #AgileIndia...
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 

Viewers also liked

Dimension didactica
Dimension didacticaDimension didactica
Dimension didactica
taideeeeeeee
 
Presentation1 psychology
Presentation1 psychologyPresentation1 psychology
Presentation1 psychology
Karthikagopan234
 
Financial Model Flowchart
Financial Model FlowchartFinancial Model Flowchart
Financial Model FlowchartRushil Zutshi
 
ES2015 and React
ES2015 and ReactES2015 and React
ES2015 and React
Stepan Parunashvili
 
SECOP NACIONAL
SECOP NACIONALSECOP NACIONAL
SECOP NACIONAL
Esap Quibdo
 
Edwin perez, Resume, 1-11-16
Edwin perez, Resume, 1-11-16Edwin perez, Resume, 1-11-16
Edwin perez, Resume, 1-11-16
Edwin Perez
 
Vivente-Executive-Leadership-Coaching
Vivente-Executive-Leadership-CoachingVivente-Executive-Leadership-Coaching
Vivente-Executive-Leadership-CoachingPeter Ivett
 
Youtube & Instagram - ESCS - LCAD - 2015/16
Youtube & Instagram - ESCS - LCAD - 2015/16Youtube & Instagram - ESCS - LCAD - 2015/16
Youtube & Instagram - ESCS - LCAD - 2015/16
Carlos Rafael Vasconcelos
 

Viewers also liked (12)

Dimension didactica
Dimension didacticaDimension didactica
Dimension didactica
 
About pulsetip
About pulsetipAbout pulsetip
About pulsetip
 
pulsetipusecases
pulsetipusecasespulsetipusecases
pulsetipusecases
 
Presentation1 psychology
Presentation1 psychologyPresentation1 psychology
Presentation1 psychology
 
Final Project Report
Final Project ReportFinal Project Report
Final Project Report
 
Financial Model Flowchart
Financial Model FlowchartFinancial Model Flowchart
Financial Model Flowchart
 
ES2015 and React
ES2015 and ReactES2015 and React
ES2015 and React
 
Resume alt
Resume altResume alt
Resume alt
 
SECOP NACIONAL
SECOP NACIONALSECOP NACIONAL
SECOP NACIONAL
 
Edwin perez, Resume, 1-11-16
Edwin perez, Resume, 1-11-16Edwin perez, Resume, 1-11-16
Edwin perez, Resume, 1-11-16
 
Vivente-Executive-Leadership-Coaching
Vivente-Executive-Leadership-CoachingVivente-Executive-Leadership-Coaching
Vivente-Executive-Leadership-Coaching
 
Youtube & Instagram - ESCS - LCAD - 2015/16
Youtube & Instagram - ESCS - LCAD - 2015/16Youtube & Instagram - ESCS - LCAD - 2015/16
Youtube & Instagram - ESCS - LCAD - 2015/16
 

Similar to IT Governance

Community IT Webinar Leveraging IT for Success
Community IT Webinar Leveraging IT for SuccessCommunity IT Webinar Leveraging IT for Success
Community IT Webinar Leveraging IT for Success
Community IT Innovators
 
Getting Data Quality Right
Getting Data Quality RightGetting Data Quality Right
Getting Data Quality Right
DATAVERSITY
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
HelpSystems
 
OCW mutual materials.pptx
OCW mutual materials.pptxOCW mutual materials.pptx
OCW mutual materials.pptx
AuraPlayer
 
OCW mutual materials (2).pptx
OCW mutual materials (2).pptxOCW mutual materials (2).pptx
OCW mutual materials (2).pptx
AuraPlayer
 
The Data Axioms lecture-overview-big data-usama-9-2015
The Data Axioms lecture-overview-big data-usama-9-2015The Data Axioms lecture-overview-big data-usama-9-2015
The Data Axioms lecture-overview-big data-usama-9-2015
CMR WORLD TECH
 
How Mutual Materials Achieved a New Look and Feel
How Mutual Materials Achieved a New Look and FeelHow Mutual Materials Achieved a New Look and Feel
How Mutual Materials Achieved a New Look and Feel
AuraPlayer
 
Simplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachSimplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachp6academy
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Inside Analysis
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Hao Tran
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?
Precisely
 
CobiT Foundation Free Training
CobiT Foundation Free TrainingCobiT Foundation Free Training
CobiT Foundation Free Training
EnterpriseGRC Solutions, Inc.
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ
ServiceRocket
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 
Fisher Practice Areas 2012
Fisher Practice Areas 2012Fisher Practice Areas 2012
Fisher Practice Areas 2012
fish1960
 
Power Platform Governance Webinar
Power Platform Governance WebinarPower Platform Governance Webinar
Power Platform Governance Webinar
Runpipe
 
Using strategy to drive ICT innovation – One not-for-profit's journey - Paul ...
Using strategy to drive ICT innovation – One not-for-profit's journey - Paul ...Using strategy to drive ICT innovation – One not-for-profit's journey - Paul ...
Using strategy to drive ICT innovation – One not-for-profit's journey - Paul ...Connecting Up
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013Jim Sutter
 
Best Practices for Managing SaaS Applications
Best Practices for Managing SaaS ApplicationsBest Practices for Managing SaaS Applications
Best Practices for Managing SaaS Applications
Correlsense
 

Similar to IT Governance (20)

Community IT Webinar Leveraging IT for Success
Community IT Webinar Leveraging IT for SuccessCommunity IT Webinar Leveraging IT for Success
Community IT Webinar Leveraging IT for Success
 
Getting Data Quality Right
Getting Data Quality RightGetting Data Quality Right
Getting Data Quality Right
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
OCW mutual materials.pptx
OCW mutual materials.pptxOCW mutual materials.pptx
OCW mutual materials.pptx
 
OCW mutual materials (2).pptx
OCW mutual materials (2).pptxOCW mutual materials (2).pptx
OCW mutual materials (2).pptx
 
The Data Axioms lecture-overview-big data-usama-9-2015
The Data Axioms lecture-overview-big data-usama-9-2015The Data Axioms lecture-overview-big data-usama-9-2015
The Data Axioms lecture-overview-big data-usama-9-2015
 
How Mutual Materials Achieved a New Look and Feel
How Mutual Materials Achieved a New Look and FeelHow Mutual Materials Achieved a New Look and Feel
How Mutual Materials Achieved a New Look and Feel
 
Simplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachSimplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approach
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?
 
CobiT Foundation Free Training
CobiT Foundation Free TrainingCobiT Foundation Free Training
CobiT Foundation Free Training
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Fisher Practice Areas 2012
Fisher Practice Areas 2012Fisher Practice Areas 2012
Fisher Practice Areas 2012
 
Power Platform Governance Webinar
Power Platform Governance WebinarPower Platform Governance Webinar
Power Platform Governance Webinar
 
Using strategy to drive ICT innovation – One not-for-profit's journey - Paul ...
Using strategy to drive ICT innovation – One not-for-profit's journey - Paul ...Using strategy to drive ICT innovation – One not-for-profit's journey - Paul ...
Using strategy to drive ICT innovation – One not-for-profit's journey - Paul ...
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
Best Practices for Managing SaaS Applications
Best Practices for Managing SaaS ApplicationsBest Practices for Managing SaaS Applications
Best Practices for Managing SaaS Applications
 

IT Governance

  • 1. Moira Edwards, Ellipsis Partners Sam Farajian, Toastmasters International IT Governance – With Great Power Comes Great Responsibility
  • 2.
  • 3. Why are you here?
  • 5. Only four years ago we were wondering if we should let people bring their own devices http://kaboompics.com/one_foto/1000/smartphone-acer-jade-s-in-the-hands-of-a-man-on-a-background-of-yellow-flowers# Thad Lurie, COO, Educause “
  • 6. You make the business decisions and we make the technology decisions “ audi r8 spider Maria Georgieva CC https://www.flickr.com/photos/mimoza291/8105102478/in/photostream/
  • 8. IT Governance is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. (Gartner) https://www.flickr.com/photos/pagedooley/3042418642/sizes/l/in/set-72157603419233445/
  • 9. ITSG - how IT should do what it does - is concerned with ensuring that the IT organization operates in an effective, efficient and compliant fashion, and it is primarily a CIO responsibility. IT Supply-side Governance https://www.flickr.com/photos/dumbledad/3276756426/sizes/l/in/photostream/
  • 10. ITDG - what IT should work on - is the process by which organizations ensure the effective evaluation, selection, prioritization, and funding of competing IT investments; oversee their implementation; and extract (measurable) business benefits. IT Demand Governance
  • 11. ITDG is a business investment decision- making and oversight process, and it is a business management responsibility. http://startupstockphotos.com/post/100854640206/gravitate-des-moines-ia-check-out-their-website
  • 12. Tailored to Fit • People: Culture of the organization, organizational structure • Processes: Complexity of IT and services, complexity of the organizational offerings • Resources: Current level of IT Governance, IT staff, skills, leadership
  • 14. • COBIT 5 (Control Objectives for Information and Related Technology) • ITIL (Information Technology Infrastructure Library) • ISO (International Organization for Standardization) 27002 Formal
  • 16. Toastmasters International • We empower individuals to become more effective communicators and leaders. • Since 1924 (90 Years) • 350,000 members • 16,000 Clubs • 135 Countries
  • 17. Need For Structure • To Manage Projects/Requests • IT Audit Process
  • 18. Providing the Structure • Wanted to adopt a framework • Selected COBIT5 – ISACA (Information System Audit and Control Association) • Boiled the Ocean • Start Small, But Start
  • 23.
  • 24.
  • 25. BAI 09: Manage Assets • Purpose: Account for all IT assets and optimize the value they provide. • Process Description: Manage IT assets through their life-cycle to make sure they: – deliver value at optimal cost – remain operational – are accounted for & physically protected – are reliable and available, particularly those that are critical Manage software licenses to ensure: – optimal number are acquired, retained and deployed as dictated by business need – software is installed in compliance with license agreements.
  • 26. BAI 09: Manage Assets Key Management Practices BAI09.01 Identify and record current assets BAI09.02 Manage critical assets BAI09.03 Manage the asset life cycle BAI09.04 Optimize asset costs BAI09.05 Manage licenses
  • 27. BAI09.01: Identify and record current assets Activities Maintain up-to-date and accurate record of all IT assets required to deliver services. 1. Identify all owned assets in a register that records current status. 2. Identify legal, regulatory or contractual requirements that need to be addressed when managing this asset. 3. Perform regular physical and logical inventory checks and reconciliation, including use of software discovery tools. 4. Verify that assets are fit for purpose (i.e. in a usable and useful condition) 5. Review on a regular basis to determine if each asset provides value and if so, expected useful life. 6. Ensure accounting for all assets.
  • 28.
  • 29. • Don’t lose sight of your goals. • It’s not about doing everything listed, do what’s right, and excluding that which doesn’t make sense or apply. • The advantage of COBIT 5 is that when used as a resource, you don’t have to worry about missing anything. • Its about being EFFECTIVE! COBIT5 5 principles 7 enablers 2 domains 37 processes 17 goals
  • 30. Demo • SharePoint Environment • IT Management practices • Documents and forms
  • 31. What worked well • Helping the organization how to initiate a project • Build our first Roadmap • Proper documentation – Business Case – Program Charter – Project Plan
  • 32. Challenges • Where to start • Who else needs to know • Time consuming • Boring!
  • 34. The patient doesn't care how much you know until they know how much you care. Kyle Vickers, CIO - National Quality Forum “
  • 35. Listening is a key IT Governance Tool
  • 36. Common Understanding of Priorities Regular meetings of Senior Staff More frequent meetings with Departmental Staff Daily conversations with stakeholders everywhere An Informal Framework
  • 37. • Involve senior people • Have regular meetings • Avoid existing meetings • Reach out broadly for the details • Build relationships one-on-one An Informal Framework
  • 38.
  • 42. It’s OK to have well managed silos of technology purpose built for a specific need. Bill Bruce, CTO - AAOS “
  • 43. • Exercise SOME Control • Find ways to meet Needs • Ensure Security • Make it a Management Issue • Make it a Performance Issue Managing Shadow IT
  • 44. Your direction will be questioned Take the organizational perspective
  • 46. Summary • Technology and business are intertwined • Formal methods are needed to manage great complexity • Informal methods help build trust • Collaboration and transparency are key in both approaches
  • 47. WRITE DOWN THREE THINGS YOU WILL DO WHEN YOU GET BACK TO YOUR OFFICE
  • 48. What would work for you?
  • 49. Sam Soheil Farajian Chief Information Officer Toastmasters International sfarajian@toastmasters.org Moira H. Edwards, MS, CAE President Ellipsis Partners LLC medwards@ellipsispartners.com Contact Us