SlideShare a Scribd company logo
IT management- An Introduction
Prepared by: Rakesh Nair
Agenda
🠶 IT management challenges
🠶 ITIL
🠶 Enterprise architecture
🠶 COBIT
🠶 Process automation
IT management challenges
IT management
🠶 Information technology management (IT management) is the process whereby all
resources related to information technology are managed according to an
organization's priorities and needs. This includes tangible resources like networking
hardware, computers and people, as well as intangible resources like software and
data. The central aim of IT management is to generate value through the use of
technology. To achieve this, business strategies and technology must be aligned.
IT increasing
complexity
Increasing business
complexity
IT increasing
migration speed
Increasing business
transformation
198x 199x 200x
speed
201x
New
version
available
New
version
available
New
version
available
New
version
available
Technology enablement
Business
Processes
Drivers/
Influences
Align Align
Business
Strategy
Drivers/
Influences
Business
Capabilities
Projects &
initiatives
Organization
structure
Strategy
Technology enablement
Technology evolution
Globalization Organization complexity
Competitive market
Business
Processes
Align Align
Business
Strategy
Business
Capabilities
Projects &
initiatives
Organization
structure
Drivers/
Influences
Drivers/
Influences
Strategy
IT increasing
complexity
198x 199x 200x 201x
Technology enablement
Standards enablement
1980 ITIL
1980’s EA
1996
COBIT
2002 PA
ITIL
Information Technology Infrastructure Library
ITIL
ITIL Definition
🠶 “The IT Infrastructure Library® (ITIL) is the most widely accepted approach to
IT service management in the world. ITIL is a cohesive best practice framework,
drawn from the public and private sectors internationally. It describes the
organization of IT resources to deliver business value, and documents processes,
functions and roles in IT Service Management (ITSM).” Source: UK Office of Government Commerce
🠶 ITIL is a best practice framework that has been drawn from both the public and
private sectors internationally. It describes how IT resources should be organized to
deliver business value, documenting the processes, functions and roles of IT Service
Management (ITSM).
Why ITIL?
🠶 The Business is more and more dependent on IT.
🠶 Complexity of IT constantly increases.
🠶 Customers are demanding more for less.
🠶 Global competitiveness growing at a rapid rate requiring a more flexible approach
to integration.
🠶 Stronger focus on controlling the costs of IT.
🠶 Low customer satisfaction levels.
Benefits to the Organization
🠶 Improve Resource Utilization
🠶 Be more competitive
🠶 Decrease rework
🠶 Eliminate redundant work
🠶 Improve upon project deliverables and time
🠶 Improve availability, reliability and security of mission critical IT services
🠶 Justify the cost of service quality
🠶 Provide services that meet business, customer, and user demands
🠶 Integrate central processes
🠶 Document and communicate roles and responsibilities in service provision
🠶 Learn from previous experience
🠶 Provide demonstrable performance indicators
How Is It Different?
🠶 Customer expectations have increased
🠶 work better individually and together
🠶 Some things we are doing already, but with varying approaches
🠶 Defining of processes, across IT groups
🠶 Defining of roles
🠶 Tracking requests, managing asset inventory
🠶 Ensure accountability
🠶 Ensure communications
🠶 Between IT staff and clients
🠶 Between IT staff in different locations
• Capacity, Availability,
Info Security
Management
• Service level & Supplier
Management
ITIL
• Strategy generation
• Financial management
• Service portfolio management
• Demand management
ITIL Processes
Service strategy Service Design Service transition Service operations
Continual
service
improvement
Demand management
Service catalogue
management
Knowledge
management m
Incident
nt
anageme
Service measurement
Financial management
Service
level
managemen
t
Change management m
Problem
nt
anageme
Service reporting
Strategy generation Availability management
Asset
configuration
management
Event management Service improvement
Service
portfolio
management
Service continuity
management
Release &
deployment
management
Request fulfillment
Info. security
management
Transition planning &
support
Access management
supplier management
Service validation
& testing
Operations
management
evaluation Service desk
Application
management
Technical
management
IT increasing
complexity
IT increasing
migration speed
198x 199x 200x 201x
New
version
available
New
version
available
New
version
available
New
version
available
Technology enablement
1980 ITIL
1980’s EA
1996
COBIT
2002 PA
Enterprise Architecture
What is Enterprise Architecture?
🠶 EA is a discipline that helps the Enterprise define , develop and exploit the
boundary less information flow (BIF*) capabilities in order to achieve the
Enterprise’s Strategic Intent. ”OMG”
🠶 EA is the process of translating business vision and strategy into effective
enterprise change by creating, communicating, and improving the key
principles and models that describe the enterprise’s future state and
enable its evolution. “Gartner”
Enterprise
Architecture
Technology Information
Architecture
Data Business
Processes
Business
Capabilities Architecture
Projects &
initiatives
Organization
structure
Business
Capabilities
& processes
Business
Architecture
Business
Capabilities
& processes
S
S
B
t
t
r
u
r
a
a
s
t
i
t
n
e
e
e
g
g
s
y
s
y
Strategy
How represents EA?
🠶 Connect the different layers of
architecture
🠶 Reflect the Architecture from
different perspectives
🠶 Reflect the different architecture
layers
Why do we need Enterprise Architecture?
🠶 Why do we need the architecture (map) of a building?
🠶 To have a shared view of how the building will look like
🠶 To present for customers a view to product to sell
🠶 To provide electricians, builder … material that enable them to execute
their work.
🠶 To facilitate the decision making in case of any required change
Why do we need Enterprise Architecture?
🠶 Share the same whole picture
🠶 React rapidly open environment changes
🠶 Assess the performance and harmony inside enterprise
🠶 Share different stakeholders viewpoints
🠶 Enable enterprise usage, fixing, building and further development
Benefits
🠶 Align IT with business
🠶 Efficient IT operation
🠶 Better return on existing
🠶 Reduced risk for future investment
🠶 Faster simpler and cheaper procurement
What is a EA framework?
🠶 Enterprise Architecture Framework defines how to create and use
an enterprise architecture.
🠶 An architecture framework provides principles and practices for creating
and using the architecture description of a system.
🠶 Enterprise architecture framework and strategic planning is the key to
planning, coordinating and implementing an organization's business
objectives.
🠶 It helps in the smooth functioning of different units in an organization,
both inside and outside the information systems architecture.
Enterprise Architecture framework example
🠶 Zachman framework
🠶 Established at 1987 by Zachman, Draws upon the discipline of classical
architecture to establish a common vocabulary and set of perspectives, a
framework, for defining and describing today's complex enterprise systems.
🠶 TOGAF
🠶 Established at 2003as TOGAF8; by the The Open Group Architecture
Framework (TOGAF) is a framework and detailed method for building,
maintaining, and gaining value from an enterprise architecture for an
organization.
IT increasing
complexity
Increasing business
complexity
IT increasing
migration speed
198x 199x 200x 201x
New
version
available
New
version
available
New
version
available
New
version
available
Technology enablement
1980 ITIL
1980’s EA
1996
COBIT
2002 PA
COBIT
Control Objectives for IT
What is Cobit5
🠶 COBIT 5 helps enterprises create optimal value from IT by maintaining a balance between
realising benefits and optimising risk levels and resource use.
🠶 COBIT 5 enables information and related technology to be governed and managed in a
holistic manner for the entire enterprise, taking in the full end-to-end business and
functional areas of responsibility, considering the IT-related interests of internal and
external stakeholders.
Information critical asset
🠶 Information is a key resource for all enterprises.
🠶 Information is created, used, retained, disclosed and destroyed.
🠶 Technology plays a key role in these actions.
🠶 Technology is becoming pervasive in all aspects of business and personal life.
Enterprise benefits
🠶 Maintain high quality information to support business decisions
🠶 Generate business value from IT enabled investments
🠶 Achieve operational excellence through the reliable and efficient application of
technology
🠶 Maintain IT-related risk at an acceptable level
🠶 Optimize the cost of IT services and technology
🠶 Comply with ever-increasing relevant laws, regulations, contractual agreements
and policies
Stakeholder value
🠶 Delivering enterprise stakeholder value requires good governance and
management of information and technology (IT) assets.
🠶 Enterprise boards, executives and management have to embrace IT like any other
significant part of the business.
🠶 External legal, regulatory and contractual compliance requirements related to
enterprise use of information and technology are increasing, threatening value if
breached.
🠶 COBIT 5 provides a comprehensive framework that assists enterprises to achieve
their goals and deliver value through effective governance and management of
enterprise IT.
CoBIT 5
Principals
1. Meeting
Stakeholder
Needs
2. Covering the
Enterprise end
to end
3. Applying a
single
integrated
framework
4.Enable a
Holistic
Approach
5. Separating
Governance
from
Management
CoBIT 5 Principals
Principle 1: Meeting Stakeholder Needs
🠶 Step 1.Stakeholder Drivers Influence Stakeholder Needs
🠶 Stakeholder needs are influenced by a number of drivers, e.g., strategy
changes, a changing business and regulatory environment, and new
technologies.
🠶 Step 2.Stakeholder Needs Cascade to Enterprise Goals
🠶 Stakeholder needs can be related to a set of generic enterprise goals.
These enterprise goals have been developed using the balanced
scorecard (BSC).
🠶 Step 3.Enterprise Goals Cascade to IT-related Goals
🠶 Achievement of enterprise goals requires a number of IT-related
outcomes,2 which are represented by the IT-related goals. IT-related
stands for information and related technology, and the IT-related goals
are structured along the dimensions of the IT balanced scorecard (IT BSC)
🠶 Step 4.IT-related Goals Cascade to EnablerGoals
🠶 Achieving IT-related goals requires the successful application and use of
a number of enablers
Enterprise Goals
IT – related Goals
Enabler Goals
Principle 2: Covering the Enterprise End-to-
end
Governance
Enablers
Governance
Scope
Owners and
Stakeholders
Management
Governing
Body
Operations
And
Execution
Delegate
Accountable Monitor
Roles, Activities and Relationships
Set Direction
Report
Instruct& Align
Principle 3: Applying a Single Integrated
Framework
COBIT 5 is a single and integrated framework because:
1. It aligns with other latest relevant standards and frameworks, and thus allows the
enterprise to use COBIT 5 as the overarching governance and management framework
integrator.
frameworks, standards and practices used.
guidance in a nontechnical, technology-agnostic common language.
2. It is complete in enterprise coverage, providing a basis to integrate effectively other
3. A single overarching framework serves as a consistent and integrated source of
4. It provides a simple architecture for structuring guidance materials and producing a
consistent product set.
5. It integrates all knowledge previously dispersed over different ISACA frameworks.
CoBIT 5 enablers
1.principles, policies and frameworks
2.processes
3. Organization
structure
4. Culture,
ethics and
behavior
5. information
Resources
6. services,
infrastructure
& application
7. People, skills
&
responsibilities
Principle 5: Separating Governance From
🠶 Governance ensures that
enterprise objectives are
achieved by evaluating
stakeholder needs, conditions
and options; setting direction
through prioritization and
decision making; and monitoring
performance, compliance and
progress against agreed-on
direction and objectives (EDM).
🠶 Management plans, builds, runs
and monitors activities in
alignment with the direction set
by the governance body to
achieve the enterprise objectives
(PBRM).
Governance
Management
Evaluate
Plan
(APO)
Build
(BAI)
Run
(DSS)
Monitor
(MEA)
Management
Feedback
Direct Monitor
Management
Business Needs
IT increasing Increasing business
complexity
complexity
IT increasing
migration speed
Increasing business
transformation
speed
198x 199x 200x 201x
New
version
available
New
version
available
New
version
available
New
version
available
Technology enablement
1980 ITIL
1980’s EA
1996
COBIT
2002 PA

More Related Content

Similar to IT Management Introduction pdf to BLZ (1).pptx

(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
ITIL Indonesia
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
Goutama Bachtiar
 
The Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting ServicesThe Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting Services
The Digital Group
 
Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)guestf73e68
 
TASSCC Presentation.ppt
TASSCC Presentation.pptTASSCC Presentation.ppt
TASSCC Presentation.ppt
pkumars
 
Central de Serviço e Governança de IT | Encontro de Cios CTIS e Sucesu Minas ...
Central de Serviço e Governança de IT | Encontro de Cios CTIS e Sucesu Minas ...Central de Serviço e Governança de IT | Encontro de Cios CTIS e Sucesu Minas ...
Central de Serviço e Governança de IT | Encontro de Cios CTIS e Sucesu Minas ...
sucesuminas
 
What is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAFWhat is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAF
xavblai
 
Ea As Strategy Ver1 1
Ea As Strategy Ver1 1Ea As Strategy Ver1 1
Ea As Strategy Ver1 1
Maganathin Veeraragaloo
 
Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)
Fahmi Abdul Latip
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of IT
Ayelet Baron
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013Jim Sutter
 
CGEIT Course Content InfosecTrain.pdf
CGEIT Course Content InfosecTrain.pdfCGEIT Course Content InfosecTrain.pdf
CGEIT Course Content InfosecTrain.pdf
infosec train
 
CGEIT Course Content InfosecTrain
CGEIT Course Content InfosecTrainCGEIT Course Content InfosecTrain
CGEIT Course Content InfosecTrain
ShivamSharma909
 
Max IT4IT webinar powerpoint
Max IT4IT webinar powerpointMax IT4IT webinar powerpoint
Max IT4IT webinar powerpoint
MAX Technical Training
 
Running IT as a business
Running IT as a businessRunning IT as a business
Running IT as a business
PHILIPPE CORNETTE
 
Taylor,Tammy Resume 2011 V1.4
Taylor,Tammy Resume 2011 V1.4Taylor,Tammy Resume 2011 V1.4
Taylor,Tammy Resume 2011 V1.4ttaylor88
 

Similar to IT Management Introduction pdf to BLZ (1).pptx (20)

(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
 
01 intro-cobit
01 intro-cobit01 intro-cobit
01 intro-cobit
 
The Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting ServicesThe Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting Services
 
Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)
 
TASSCC Presentation.ppt
TASSCC Presentation.pptTASSCC Presentation.ppt
TASSCC Presentation.ppt
 
Central de Serviço e Governança de IT | Encontro de Cios CTIS e Sucesu Minas ...
Central de Serviço e Governança de IT | Encontro de Cios CTIS e Sucesu Minas ...Central de Serviço e Governança de IT | Encontro de Cios CTIS e Sucesu Minas ...
Central de Serviço e Governança de IT | Encontro de Cios CTIS e Sucesu Minas ...
 
What is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAFWhat is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAF
 
20100529 johnthorp
20100529 johnthorp20100529 johnthorp
20100529 johnthorp
 
Ea As Strategy Ver1 1
Ea As Strategy Ver1 1Ea As Strategy Ver1 1
Ea As Strategy Ver1 1
 
CobiT And ITIL Breakfast Seminar
CobiT And ITIL Breakfast SeminarCobiT And ITIL Breakfast Seminar
CobiT And ITIL Breakfast Seminar
 
Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of IT
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
CGEIT Course Content InfosecTrain.pdf
CGEIT Course Content InfosecTrain.pdfCGEIT Course Content InfosecTrain.pdf
CGEIT Course Content InfosecTrain.pdf
 
CGEIT Course Content InfosecTrain
CGEIT Course Content InfosecTrainCGEIT Course Content InfosecTrain
CGEIT Course Content InfosecTrain
 
Max IT4IT webinar powerpoint
Max IT4IT webinar powerpointMax IT4IT webinar powerpoint
Max IT4IT webinar powerpoint
 
Running IT as a business
Running IT as a businessRunning IT as a business
Running IT as a business
 
Taylor,Tammy Resume 2011 V1.4
Taylor,Tammy Resume 2011 V1.4Taylor,Tammy Resume 2011 V1.4
Taylor,Tammy Resume 2011 V1.4
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

IT Management Introduction pdf to BLZ (1).pptx

  • 1. IT management- An Introduction Prepared by: Rakesh Nair
  • 2. Agenda 🠶 IT management challenges 🠶 ITIL 🠶 Enterprise architecture 🠶 COBIT 🠶 Process automation
  • 4. IT management 🠶 Information technology management (IT management) is the process whereby all resources related to information technology are managed according to an organization's priorities and needs. This includes tangible resources like networking hardware, computers and people, as well as intangible resources like software and data. The central aim of IT management is to generate value through the use of technology. To achieve this, business strategies and technology must be aligned.
  • 5. IT increasing complexity Increasing business complexity IT increasing migration speed Increasing business transformation 198x 199x 200x speed 201x New version available New version available New version available New version available Technology enablement
  • 7. Technology enablement Technology evolution Globalization Organization complexity Competitive market
  • 9. IT increasing complexity 198x 199x 200x 201x Technology enablement
  • 12. ITIL Definition 🠶 “The IT Infrastructure Library® (ITIL) is the most widely accepted approach to IT service management in the world. ITIL is a cohesive best practice framework, drawn from the public and private sectors internationally. It describes the organization of IT resources to deliver business value, and documents processes, functions and roles in IT Service Management (ITSM).” Source: UK Office of Government Commerce 🠶 ITIL is a best practice framework that has been drawn from both the public and private sectors internationally. It describes how IT resources should be organized to deliver business value, documenting the processes, functions and roles of IT Service Management (ITSM).
  • 13. Why ITIL? 🠶 The Business is more and more dependent on IT. 🠶 Complexity of IT constantly increases. 🠶 Customers are demanding more for less. 🠶 Global competitiveness growing at a rapid rate requiring a more flexible approach to integration. 🠶 Stronger focus on controlling the costs of IT. 🠶 Low customer satisfaction levels.
  • 14. Benefits to the Organization 🠶 Improve Resource Utilization 🠶 Be more competitive 🠶 Decrease rework 🠶 Eliminate redundant work 🠶 Improve upon project deliverables and time 🠶 Improve availability, reliability and security of mission critical IT services 🠶 Justify the cost of service quality 🠶 Provide services that meet business, customer, and user demands 🠶 Integrate central processes 🠶 Document and communicate roles and responsibilities in service provision 🠶 Learn from previous experience 🠶 Provide demonstrable performance indicators
  • 15. How Is It Different? 🠶 Customer expectations have increased 🠶 work better individually and together 🠶 Some things we are doing already, but with varying approaches 🠶 Defining of processes, across IT groups 🠶 Defining of roles 🠶 Tracking requests, managing asset inventory 🠶 Ensure accountability 🠶 Ensure communications 🠶 Between IT staff and clients 🠶 Between IT staff in different locations
  • 16. • Capacity, Availability, Info Security Management • Service level & Supplier Management ITIL • Strategy generation • Financial management • Service portfolio management • Demand management
  • 17. ITIL Processes Service strategy Service Design Service transition Service operations Continual service improvement Demand management Service catalogue management Knowledge management m Incident nt anageme Service measurement Financial management Service level managemen t Change management m Problem nt anageme Service reporting Strategy generation Availability management Asset configuration management Event management Service improvement Service portfolio management Service continuity management Release & deployment management Request fulfillment Info. security management Transition planning & support Access management supplier management Service validation & testing Operations management evaluation Service desk Application management Technical management
  • 18. IT increasing complexity IT increasing migration speed 198x 199x 200x 201x New version available New version available New version available New version available Technology enablement
  • 21. What is Enterprise Architecture? 🠶 EA is a discipline that helps the Enterprise define , develop and exploit the boundary less information flow (BIF*) capabilities in order to achieve the Enterprise’s Strategic Intent. ”OMG” 🠶 EA is the process of translating business vision and strategy into effective enterprise change by creating, communicating, and improving the key principles and models that describe the enterprise’s future state and enable its evolution. “Gartner”
  • 22. Enterprise Architecture Technology Information Architecture Data Business Processes Business Capabilities Architecture Projects & initiatives Organization structure Business Capabilities & processes Business Architecture Business Capabilities & processes S S B t t r u r a a s t i t n e e e g g s y s y Strategy
  • 23. How represents EA? 🠶 Connect the different layers of architecture 🠶 Reflect the Architecture from different perspectives 🠶 Reflect the different architecture layers
  • 24. Why do we need Enterprise Architecture? 🠶 Why do we need the architecture (map) of a building? 🠶 To have a shared view of how the building will look like 🠶 To present for customers a view to product to sell 🠶 To provide electricians, builder … material that enable them to execute their work. 🠶 To facilitate the decision making in case of any required change
  • 25. Why do we need Enterprise Architecture? 🠶 Share the same whole picture 🠶 React rapidly open environment changes 🠶 Assess the performance and harmony inside enterprise 🠶 Share different stakeholders viewpoints 🠶 Enable enterprise usage, fixing, building and further development
  • 26. Benefits 🠶 Align IT with business 🠶 Efficient IT operation 🠶 Better return on existing 🠶 Reduced risk for future investment 🠶 Faster simpler and cheaper procurement
  • 27. What is a EA framework? 🠶 Enterprise Architecture Framework defines how to create and use an enterprise architecture. 🠶 An architecture framework provides principles and practices for creating and using the architecture description of a system. 🠶 Enterprise architecture framework and strategic planning is the key to planning, coordinating and implementing an organization's business objectives. 🠶 It helps in the smooth functioning of different units in an organization, both inside and outside the information systems architecture.
  • 28. Enterprise Architecture framework example 🠶 Zachman framework 🠶 Established at 1987 by Zachman, Draws upon the discipline of classical architecture to establish a common vocabulary and set of perspectives, a framework, for defining and describing today's complex enterprise systems. 🠶 TOGAF 🠶 Established at 2003as TOGAF8; by the The Open Group Architecture Framework (TOGAF) is a framework and detailed method for building, maintaining, and gaining value from an enterprise architecture for an organization.
  • 29. IT increasing complexity Increasing business complexity IT increasing migration speed 198x 199x 200x 201x New version available New version available New version available New version available Technology enablement
  • 32. What is Cobit5 🠶 COBIT 5 helps enterprises create optimal value from IT by maintaining a balance between realising benefits and optimising risk levels and resource use. 🠶 COBIT 5 enables information and related technology to be governed and managed in a holistic manner for the entire enterprise, taking in the full end-to-end business and functional areas of responsibility, considering the IT-related interests of internal and external stakeholders.
  • 33. Information critical asset 🠶 Information is a key resource for all enterprises. 🠶 Information is created, used, retained, disclosed and destroyed. 🠶 Technology plays a key role in these actions. 🠶 Technology is becoming pervasive in all aspects of business and personal life.
  • 34. Enterprise benefits 🠶 Maintain high quality information to support business decisions 🠶 Generate business value from IT enabled investments 🠶 Achieve operational excellence through the reliable and efficient application of technology 🠶 Maintain IT-related risk at an acceptable level 🠶 Optimize the cost of IT services and technology 🠶 Comply with ever-increasing relevant laws, regulations, contractual agreements and policies
  • 35. Stakeholder value 🠶 Delivering enterprise stakeholder value requires good governance and management of information and technology (IT) assets. 🠶 Enterprise boards, executives and management have to embrace IT like any other significant part of the business. 🠶 External legal, regulatory and contractual compliance requirements related to enterprise use of information and technology are increasing, threatening value if breached. 🠶 COBIT 5 provides a comprehensive framework that assists enterprises to achieve their goals and deliver value through effective governance and management of enterprise IT.
  • 36. CoBIT 5 Principals 1. Meeting Stakeholder Needs 2. Covering the Enterprise end to end 3. Applying a single integrated framework 4.Enable a Holistic Approach 5. Separating Governance from Management CoBIT 5 Principals
  • 37. Principle 1: Meeting Stakeholder Needs 🠶 Step 1.Stakeholder Drivers Influence Stakeholder Needs 🠶 Stakeholder needs are influenced by a number of drivers, e.g., strategy changes, a changing business and regulatory environment, and new technologies. 🠶 Step 2.Stakeholder Needs Cascade to Enterprise Goals 🠶 Stakeholder needs can be related to a set of generic enterprise goals. These enterprise goals have been developed using the balanced scorecard (BSC). 🠶 Step 3.Enterprise Goals Cascade to IT-related Goals 🠶 Achievement of enterprise goals requires a number of IT-related outcomes,2 which are represented by the IT-related goals. IT-related stands for information and related technology, and the IT-related goals are structured along the dimensions of the IT balanced scorecard (IT BSC) 🠶 Step 4.IT-related Goals Cascade to EnablerGoals 🠶 Achieving IT-related goals requires the successful application and use of a number of enablers Enterprise Goals IT – related Goals Enabler Goals
  • 38. Principle 2: Covering the Enterprise End-to- end Governance Enablers Governance Scope Owners and Stakeholders Management Governing Body Operations And Execution Delegate Accountable Monitor Roles, Activities and Relationships Set Direction Report Instruct& Align
  • 39. Principle 3: Applying a Single Integrated Framework COBIT 5 is a single and integrated framework because: 1. It aligns with other latest relevant standards and frameworks, and thus allows the enterprise to use COBIT 5 as the overarching governance and management framework integrator. frameworks, standards and practices used. guidance in a nontechnical, technology-agnostic common language. 2. It is complete in enterprise coverage, providing a basis to integrate effectively other 3. A single overarching framework serves as a consistent and integrated source of 4. It provides a simple architecture for structuring guidance materials and producing a consistent product set. 5. It integrates all knowledge previously dispersed over different ISACA frameworks.
  • 40. CoBIT 5 enablers 1.principles, policies and frameworks 2.processes 3. Organization structure 4. Culture, ethics and behavior 5. information Resources 6. services, infrastructure & application 7. People, skills & responsibilities
  • 41. Principle 5: Separating Governance From 🠶 Governance ensures that enterprise objectives are achieved by evaluating stakeholder needs, conditions and options; setting direction through prioritization and decision making; and monitoring performance, compliance and progress against agreed-on direction and objectives (EDM). 🠶 Management plans, builds, runs and monitors activities in alignment with the direction set by the governance body to achieve the enterprise objectives (PBRM). Governance Management Evaluate Plan (APO) Build (BAI) Run (DSS) Monitor (MEA) Management Feedback Direct Monitor Management Business Needs
  • 42. IT increasing Increasing business complexity complexity IT increasing migration speed Increasing business transformation speed 198x 199x 200x 201x New version available New version available New version available New version available Technology enablement