SlideShare a Scribd company logo
Presenter: A. Yasser Alshareef
“Role of BRM in fast track achievement of ISO/IEC 20K”
v
Topics & Objectives
• BRM (Business Relationship Management) Process Overview
• Eight ISO 20K Management Principles
• Benefits of achieving ISO/IEC 20K
• Logical Approach to target Achievement of ISO/IEC 20K
• Role of BRM in Fast Track Achievement of ISO/IEC 20K
• Challenges and Guidelines for this Approach
BRM Process Overview
ITIL defines Business Relationship Management as:
“The process responsible for maintaining a positive relationship
with customers. Business relationship management identifies
customer needs and ensures that the service provider is able to
meet these needs with an appropriate catalogue of services.”
BRM Process Overview
• Ensure that the service provider understands the customer’s perspective of service
• Ensure high levels of customer satisfaction by meeting the customer’s requirements
• Establish and maintain a constructive relationship with the customer
• Identify changes to the customer environment that would impact services provided
• Identify technology trends that could potentially impact services provided
• Establish and articulate business requirements for new or changed services
• Ensure that the service provider is meeting the business needs of the customer
• Work with customers to ensure that services and service levels delivers value
• Mediate in cases there are conflicting requirements from different business units
• Establish formal complaints and escalation processes for the customer."
Objectives
BRM Process Overview
Strategic Partnership Facilitation
• BRM contribute to service provider strategic discussions
• Ensures that information about the strategic direction of the customer is
communicated to the Service Provider and into the appropriate
processes and internal stakeholders
BRM Process Overview
ITIL defines Business Relationship
Management as:
“The process responsible for maintaining a
positive relationship with customers.
Business relationship management identifies
customer needs and ensures that the service
provider is able to meet these needs with an
appropriate catalogue of services.”
BRM Role in Service Strategy Stage
• Identify stakeholders
• Define outcomes
• Specify strategic requirements and funding
• Define business case
• Validate patterns of business activity
Service
Strategy
Continual
Service
Improvement
Service
Design
Service
Transition
Service
Operation
BRM Process Overview
ITIL defines Business Relationship Management as:
“The process responsible for maintaining a positive relationship
with customers. Business relationship management identifies
customer needs and ensures that the service provider is able to
meet these needs with an appropriate catalogue of services.”
BRM Role in Service Design Stage
• Validate customer requirements
• Validate patterns of business activity
• Confirm costs and funding
• Ensure appropriate customer involvement in
design activities
Service
Strategy
Continual
Service
Improvement
Service
Design
Service
Transition
Service
Operation
BRM Process Overview
ITIL defines Business Relationship Management as:
“The process responsible for maintaining a positive relationship
with customers. Business relationship management identifies
customer needs and ensures that the service provider is able to
meet these needs with an appropriate catalogue of services.”
BRM Role in Service Transition Stage
• Coordinate customer involvement in ST
processes
• Schedule customer involvement
• Validate release schedules
• Awareness of known errors
Service
Strategy
Continual
Service
Improvement
Service
Design
Service
Transition
Service
Operation
BRM Process Overview
BRM Role in Service Operation Stage
• Communicate scheduled outages
• Updates on major incidents
• Escalation Service
Strategy
Continual
Service
Improvement
Service
Design
Service
Transition
Service
Operation
BRM Process Overview
ITIL defines Business Relationship Management as:
“The process responsible for maintaining a positive relationship
with customers. Business relationship management identifies
customer needs and ensures that the service provider is able to
meet these needs with an appropriate catalogue of services.”
BRM Role in Service Improvement Stage
• Report service performance
• Customer satisfaction surveys
• Facilitate reviews on ability to meet strategic
objectives
• Initiate service improvement plans
Eight ISO 20K Management Principles
Eight ISO 20K Management Principles
Benefits of achieving ISO/IEC 20K
Advantages of achieving ISO/IEC 20K
Logical Approaches to target ISO/IEC 20K
Logical Approaches to target ISO/IEC 20K
1- Speed of
Implementation
3- Expectations
and Scope
2- Level of maturity of
processes and controls
Logical Approach to target ISO/IEC 20K
4- Integrated approach
5- Iterative approach
1- Business approach 2- System approach
3- Systematic approach
Role of BRM in Fast Track Achievement of ISO/IEC 20K
SS Deliverables =
business needs,
customer needs,
service needs,
business case,
SLR, SAC, etc ..
Service Strategy Service Design Service Transition Service Operation
Project Board – Change Advisory Board
SD Deliverables =
SDP includes
project plan,
project control,
strategies to
manage quality,
risk, etc..
ST Deliverables =
implmented
release packages,
risks, changes,
KE, etc..
SO Deliverables =
realized services,
managed
processes and
managed
technologies,
reports, etc…
Change Management played primarily by the Board and partially by the Project Manager
Perspectives, positons, plans
and patterns
People, processes, partners
and products
Capabilities and
improvements
Services, Processes,
Products and performance
measurements
RFC RFCRFCBRMBRM BRM
Challenges & Guidelines for this Approach
Management responsibility & interested parties involvement
Alignment of Quality Assurance and Design functions
Competence, awareness and training
Governance of processes operated by other parties
Avoid the integration of new technology
Integrate the SMS into existing processes
Apply the principle of continual improvement
Designation of responsible owner (PM)
Thank You MerciGrazie
Gracias
Obrigado
Danke
Japanese
English
French
Russian
German
Italian
Spanish
Brazilian Portuguese
Arabic
Traditional Chinese
Simplified Chinese
Hindi
Tamil
Thai
Korean

More Related Content

What's hot

Bharath Kumar - ITIL Resume
Bharath Kumar - ITIL ResumeBharath Kumar - ITIL Resume
Bharath Kumar - ITIL ResumeBharath kumar
 
Sylvia shah cv july 2016
Sylvia shah cv july 2016Sylvia shah cv july 2016
Sylvia shah cv july 2016
SYLVIA NOVIANA AHMAD SHAH
 
Lean Case Study Accounts
Lean Case Study AccountsLean Case Study Accounts
Lean Case Study AccountsZachary Denny
 
ITIL : Service Lifecycle - Poster ( More ITIL Posters on: https://flevy.com/a...
ITIL : Service Lifecycle - Poster ( More ITIL Posters on: https://flevy.com/a...ITIL : Service Lifecycle - Poster ( More ITIL Posters on: https://flevy.com/a...
ITIL : Service Lifecycle - Poster ( More ITIL Posters on: https://flevy.com/a...
Ivana Nissen
 
Goal setting & performance measurement training
Goal setting & performance measurement trainingGoal setting & performance measurement training
Goal setting & performance measurement trainingPublicFinanceTV
 
Standards in facility management
Standards in facility managementStandards in facility management
Standards in facility management
Global Business Intelligence
 

What's hot (14)

Bharath Kumar - ITIL Resume
Bharath Kumar - ITIL ResumeBharath Kumar - ITIL Resume
Bharath Kumar - ITIL Resume
 
Sylvia shah cv july 2016
Sylvia shah cv july 2016Sylvia shah cv july 2016
Sylvia shah cv july 2016
 
Sylvia Shah CV July 2016 b
Sylvia Shah CV July 2016 bSylvia Shah CV July 2016 b
Sylvia Shah CV July 2016 b
 
Bob_Willis
Bob_WillisBob_Willis
Bob_Willis
 
Rohaan N Johar
Rohaan  N JoharRohaan  N Johar
Rohaan N Johar
 
Resume - Albert
Resume - AlbertResume - Albert
Resume - Albert
 
Priya Gautam
Priya GautamPriya Gautam
Priya Gautam
 
Lean Case Study Accounts
Lean Case Study AccountsLean Case Study Accounts
Lean Case Study Accounts
 
ITIL : Service Lifecycle - Poster ( More ITIL Posters on: https://flevy.com/a...
ITIL : Service Lifecycle - Poster ( More ITIL Posters on: https://flevy.com/a...ITIL : Service Lifecycle - Poster ( More ITIL Posters on: https://flevy.com/a...
ITIL : Service Lifecycle - Poster ( More ITIL Posters on: https://flevy.com/a...
 
Goal setting & performance measurement training
Goal setting & performance measurement trainingGoal setting & performance measurement training
Goal setting & performance measurement training
 
Rao CV
Rao CVRao CV
Rao CV
 
Standards in facility management
Standards in facility managementStandards in facility management
Standards in facility management
 
3 service strategy
3 service strategy3 service strategy
3 service strategy
 
CV Rahul Patel
CV Rahul PatelCV Rahul Patel
CV Rahul Patel
 

Viewers also liked

Python by ravi rajput hcon groups
Python by ravi rajput hcon groupsPython by ravi rajput hcon groups
Python by ravi rajput hcon groups
Ravi Rajput
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
PECB
 
Nmap2Nessus Presentation Slides at Black Hat Asia Arsenal 2015
Nmap2Nessus Presentation Slides at Black Hat Asia Arsenal 2015Nmap2Nessus Presentation Slides at Black Hat Asia Arsenal 2015
Nmap2Nessus Presentation Slides at Black Hat Asia Arsenal 2015
Keith Lee
 
metasploitHelper - Spiderlabs
metasploitHelper - SpiderlabsmetasploitHelper - Spiderlabs
metasploitHelper - Spiderlabs
Keith Lee
 
Manipulating the Network with PacketFu
Manipulating the Network with PacketFuManipulating the Network with PacketFu
Manipulating the Network with PacketFuKeith Lee
 
Reverse engineering by Ravi Rajput hcon groups meet
Reverse engineering by Ravi Rajput hcon groups meetReverse engineering by Ravi Rajput hcon groups meet
Reverse engineering by Ravi Rajput hcon groups meet
Ravi Rajput
 
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
Uday Bhatia
 
Maltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetMaltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the Internet
Shalin Hai-Jew
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Skycure
 
Attacking Network Infrastructure to Generate a 4 Tbs DDoS
Attacking Network Infrastructure to Generate a 4 Tbs DDoSAttacking Network Infrastructure to Generate a 4 Tbs DDoS
Attacking Network Infrastructure to Generate a 4 Tbs DDoS
mark-smith
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
ClubHack
 
Java Web Application Security - Jazoon 2011
Java Web Application Security - Jazoon 2011Java Web Application Security - Jazoon 2011
Java Web Application Security - Jazoon 2011
Matt Raible
 
Hacker tool talk: maltego
Hacker tool talk: maltegoHacker tool talk: maltego
Hacker tool talk: maltego
Chris Hammond-Thrasher
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
Group of company MUK
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
Tom Eston
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
NowSecure
 
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
44CON
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 

Viewers also liked (20)

Python by ravi rajput hcon groups
Python by ravi rajput hcon groupsPython by ravi rajput hcon groups
Python by ravi rajput hcon groups
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
 
Nmap2Nessus Presentation Slides at Black Hat Asia Arsenal 2015
Nmap2Nessus Presentation Slides at Black Hat Asia Arsenal 2015Nmap2Nessus Presentation Slides at Black Hat Asia Arsenal 2015
Nmap2Nessus Presentation Slides at Black Hat Asia Arsenal 2015
 
metasploitHelper - Spiderlabs
metasploitHelper - SpiderlabsmetasploitHelper - Spiderlabs
metasploitHelper - Spiderlabs
 
Manipulating the Network with PacketFu
Manipulating the Network with PacketFuManipulating the Network with PacketFu
Manipulating the Network with PacketFu
 
Reverse engineering by Ravi Rajput hcon groups meet
Reverse engineering by Ravi Rajput hcon groups meetReverse engineering by Ravi Rajput hcon groups meet
Reverse engineering by Ravi Rajput hcon groups meet
 
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
 
Maltego Breach
Maltego BreachMaltego Breach
Maltego Breach
 
Maltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetMaltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the Internet
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
Attacking Network Infrastructure to Generate a 4 Tbs DDoS
Attacking Network Infrastructure to Generate a 4 Tbs DDoSAttacking Network Infrastructure to Generate a 4 Tbs DDoS
Attacking Network Infrastructure to Generate a 4 Tbs DDoS
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
 
Java Web Application Security - Jazoon 2011
Java Web Application Security - Jazoon 2011Java Web Application Security - Jazoon 2011
Java Web Application Security - Jazoon 2011
 
Hacker tool talk: maltego
Hacker tool talk: maltegoHacker tool talk: maltego
Hacker tool talk: maltego
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
 
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 

Similar to PECB Webinar: Role of BRM in fast track achievement of ISO/IEC 20K

The how, why and what of ITIL® certifications
The how, why and what of ITIL® certificationsThe how, why and what of ITIL® certifications
The how, why and what of ITIL® certifications
Lora Beros
 
ITIL Service Strategy 2011
ITIL Service Strategy 2011ITIL Service Strategy 2011
ITIL Service Strategy 2011
Marvin Sirait
 
BuildingdigitalServiceswithServiceBuildingBlocks (2)
BuildingdigitalServiceswithServiceBuildingBlocks (2)BuildingdigitalServiceswithServiceBuildingBlocks (2)
BuildingdigitalServiceswithServiceBuildingBlocks (2)Helmut Steigele
 
ITIL Service Management
ITIL Service ManagementITIL Service Management
ITIL Service Management
Marvin Sirait
 
ITIL Continual Service Improvement 2011
ITIL Continual Service Improvement 2011ITIL Continual Service Improvement 2011
ITIL Continual Service Improvement 2011
Marvin Sirait
 
Apresentacao Grupo Itil
Apresentacao Grupo ItilApresentacao Grupo Itil
Apresentacao Grupo Itil
jarlei
 
ITIL Service Design 2011
ITIL Service Design 2011ITIL Service Design 2011
ITIL Service Design 2011
Marvin Sirait
 
Iso 20000 presentation
Iso 20000 presentationIso 20000 presentation
Iso 20000 presentation
Musibau Taiwo Lasisi
 
ITIL Continual Service Improvement
ITIL Continual Service ImprovementITIL Continual Service Improvement
ITIL Continual Service Improvement
Marvin Sirait
 
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised StandardLynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
itSMF UK
 
ITIL
ITILITIL
ITIL Service Transition 2011
ITIL Service Transition 2011ITIL Service Transition 2011
ITIL Service Transition 2011
Marvin Sirait
 
ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)
Axios Systems
 
Serskmanagvicedeement
SerskmanagvicedeementSerskmanagvicedeement
Serskmanagvicedeement
Anne Starr
 
Service level management
Service level managementService level management
Service level management
Yasir Karam
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecyclesagaroceanic11
 
How Your Organization Can Become ISO Certified...It's easier than you think
How Your Organization Can Become ISO Certified...It's easier than you thinkHow Your Organization Can Become ISO Certified...It's easier than you think
How Your Organization Can Become ISO Certified...It's easier than you thinkITSM Academy, Inc.
 
EEM Operations high level slide 2018_v1.pptx
EEM Operations high level slide 2018_v1.pptxEEM Operations high level slide 2018_v1.pptx
EEM Operations high level slide 2018_v1.pptx
Boris Berovic
 
ITIL 2011 Foundation All Volumes - Signed
ITIL 2011 Foundation All Volumes - SignedITIL 2011 Foundation All Volumes - Signed
ITIL 2011 Foundation All Volumes - Signed
Mohammed Sirajudeen
 
ISO 9001:2015 Requirements.pptx
ISO 9001:2015 Requirements.pptxISO 9001:2015 Requirements.pptx
ISO 9001:2015 Requirements.pptx
GelmelinaLeaLepitenH
 

Similar to PECB Webinar: Role of BRM in fast track achievement of ISO/IEC 20K (20)

The how, why and what of ITIL® certifications
The how, why and what of ITIL® certificationsThe how, why and what of ITIL® certifications
The how, why and what of ITIL® certifications
 
ITIL Service Strategy 2011
ITIL Service Strategy 2011ITIL Service Strategy 2011
ITIL Service Strategy 2011
 
BuildingdigitalServiceswithServiceBuildingBlocks (2)
BuildingdigitalServiceswithServiceBuildingBlocks (2)BuildingdigitalServiceswithServiceBuildingBlocks (2)
BuildingdigitalServiceswithServiceBuildingBlocks (2)
 
ITIL Service Management
ITIL Service ManagementITIL Service Management
ITIL Service Management
 
ITIL Continual Service Improvement 2011
ITIL Continual Service Improvement 2011ITIL Continual Service Improvement 2011
ITIL Continual Service Improvement 2011
 
Apresentacao Grupo Itil
Apresentacao Grupo ItilApresentacao Grupo Itil
Apresentacao Grupo Itil
 
ITIL Service Design 2011
ITIL Service Design 2011ITIL Service Design 2011
ITIL Service Design 2011
 
Iso 20000 presentation
Iso 20000 presentationIso 20000 presentation
Iso 20000 presentation
 
ITIL Continual Service Improvement
ITIL Continual Service ImprovementITIL Continual Service Improvement
ITIL Continual Service Improvement
 
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised StandardLynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
 
ITIL
ITILITIL
ITIL
 
ITIL Service Transition 2011
ITIL Service Transition 2011ITIL Service Transition 2011
ITIL Service Transition 2011
 
ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)
 
Serskmanagvicedeement
SerskmanagvicedeementSerskmanagvicedeement
Serskmanagvicedeement
 
Service level management
Service level managementService level management
Service level management
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecycle
 
How Your Organization Can Become ISO Certified...It's easier than you think
How Your Organization Can Become ISO Certified...It's easier than you thinkHow Your Organization Can Become ISO Certified...It's easier than you think
How Your Organization Can Become ISO Certified...It's easier than you think
 
EEM Operations high level slide 2018_v1.pptx
EEM Operations high level slide 2018_v1.pptxEEM Operations high level slide 2018_v1.pptx
EEM Operations high level slide 2018_v1.pptx
 
ITIL 2011 Foundation All Volumes - Signed
ITIL 2011 Foundation All Volumes - SignedITIL 2011 Foundation All Volumes - Signed
ITIL 2011 Foundation All Volumes - Signed
 
ISO 9001:2015 Requirements.pptx
ISO 9001:2015 Requirements.pptxISO 9001:2015 Requirements.pptx
ISO 9001:2015 Requirements.pptx
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

PECB Webinar: Role of BRM in fast track achievement of ISO/IEC 20K

  • 1. Presenter: A. Yasser Alshareef “Role of BRM in fast track achievement of ISO/IEC 20K” v
  • 2. Topics & Objectives • BRM (Business Relationship Management) Process Overview • Eight ISO 20K Management Principles • Benefits of achieving ISO/IEC 20K • Logical Approach to target Achievement of ISO/IEC 20K • Role of BRM in Fast Track Achievement of ISO/IEC 20K • Challenges and Guidelines for this Approach
  • 3. BRM Process Overview ITIL defines Business Relationship Management as: “The process responsible for maintaining a positive relationship with customers. Business relationship management identifies customer needs and ensures that the service provider is able to meet these needs with an appropriate catalogue of services.”
  • 4. BRM Process Overview • Ensure that the service provider understands the customer’s perspective of service • Ensure high levels of customer satisfaction by meeting the customer’s requirements • Establish and maintain a constructive relationship with the customer • Identify changes to the customer environment that would impact services provided • Identify technology trends that could potentially impact services provided • Establish and articulate business requirements for new or changed services • Ensure that the service provider is meeting the business needs of the customer • Work with customers to ensure that services and service levels delivers value • Mediate in cases there are conflicting requirements from different business units • Establish formal complaints and escalation processes for the customer." Objectives
  • 5. BRM Process Overview Strategic Partnership Facilitation • BRM contribute to service provider strategic discussions • Ensures that information about the strategic direction of the customer is communicated to the Service Provider and into the appropriate processes and internal stakeholders
  • 6. BRM Process Overview ITIL defines Business Relationship Management as: “The process responsible for maintaining a positive relationship with customers. Business relationship management identifies customer needs and ensures that the service provider is able to meet these needs with an appropriate catalogue of services.” BRM Role in Service Strategy Stage • Identify stakeholders • Define outcomes • Specify strategic requirements and funding • Define business case • Validate patterns of business activity Service Strategy Continual Service Improvement Service Design Service Transition Service Operation
  • 7. BRM Process Overview ITIL defines Business Relationship Management as: “The process responsible for maintaining a positive relationship with customers. Business relationship management identifies customer needs and ensures that the service provider is able to meet these needs with an appropriate catalogue of services.” BRM Role in Service Design Stage • Validate customer requirements • Validate patterns of business activity • Confirm costs and funding • Ensure appropriate customer involvement in design activities Service Strategy Continual Service Improvement Service Design Service Transition Service Operation
  • 8. BRM Process Overview ITIL defines Business Relationship Management as: “The process responsible for maintaining a positive relationship with customers. Business relationship management identifies customer needs and ensures that the service provider is able to meet these needs with an appropriate catalogue of services.” BRM Role in Service Transition Stage • Coordinate customer involvement in ST processes • Schedule customer involvement • Validate release schedules • Awareness of known errors Service Strategy Continual Service Improvement Service Design Service Transition Service Operation
  • 9. BRM Process Overview BRM Role in Service Operation Stage • Communicate scheduled outages • Updates on major incidents • Escalation Service Strategy Continual Service Improvement Service Design Service Transition Service Operation
  • 10. BRM Process Overview ITIL defines Business Relationship Management as: “The process responsible for maintaining a positive relationship with customers. Business relationship management identifies customer needs and ensures that the service provider is able to meet these needs with an appropriate catalogue of services.” BRM Role in Service Improvement Stage • Report service performance • Customer satisfaction surveys • Facilitate reviews on ability to meet strategic objectives • Initiate service improvement plans
  • 11. Eight ISO 20K Management Principles Eight ISO 20K Management Principles
  • 12. Benefits of achieving ISO/IEC 20K Advantages of achieving ISO/IEC 20K
  • 13. Logical Approaches to target ISO/IEC 20K
  • 14. Logical Approaches to target ISO/IEC 20K 1- Speed of Implementation 3- Expectations and Scope 2- Level of maturity of processes and controls
  • 15. Logical Approach to target ISO/IEC 20K 4- Integrated approach 5- Iterative approach 1- Business approach 2- System approach 3- Systematic approach
  • 16. Role of BRM in Fast Track Achievement of ISO/IEC 20K SS Deliverables = business needs, customer needs, service needs, business case, SLR, SAC, etc .. Service Strategy Service Design Service Transition Service Operation Project Board – Change Advisory Board SD Deliverables = SDP includes project plan, project control, strategies to manage quality, risk, etc.. ST Deliverables = implmented release packages, risks, changes, KE, etc.. SO Deliverables = realized services, managed processes and managed technologies, reports, etc… Change Management played primarily by the Board and partially by the Project Manager Perspectives, positons, plans and patterns People, processes, partners and products Capabilities and improvements Services, Processes, Products and performance measurements RFC RFCRFCBRMBRM BRM
  • 17. Challenges & Guidelines for this Approach Management responsibility & interested parties involvement Alignment of Quality Assurance and Design functions Competence, awareness and training Governance of processes operated by other parties Avoid the integration of new technology Integrate the SMS into existing processes Apply the principle of continual improvement Designation of responsible owner (PM)
  • 18. Thank You MerciGrazie Gracias Obrigado Danke Japanese English French Russian German Italian Spanish Brazilian Portuguese Arabic Traditional Chinese Simplified Chinese Hindi Tamil Thai Korean