SlideShare a Scribd company logo
1 of 40
Download to read offline
| @ema_research
Real-world incident response
(management, and prevention)
Valerie O’Connell
Research Director - Digital Service Execution
Enterprise Management Associates (EMA)
Sponsored by
| @ema_research 2
Watch the On-Demand Webinar
• Real-world incident response, management, and prevention on-
demand webinar: https://info.enterprisemanagement.com/incident-
response-managemen-prevention-webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
© 2023 Enterprise Management Associates, Inc.
| @ema_research
| @ema_research
Featured Speaker
Valerie O’Connell
Research Director
Digital Service Execution
Valerie O’Connell leads the Digital Service Execution
practice at Enterprise Management Associates (EMA).
Her practice encompasses intersections and innovations
across AIOps, asset management, end-user experience,
ITSM/ESM, and business context as they interact to
deliver excellence in digital service.
Valerie came to EMA with decades of senior-level
experience in the effective marketing of technology. Her
experience ranges from VP of product marketing at
what was then CA to a successful run as an independent
practitioner, serving industry giants such as Microsoft and
EMC, as well as cutting-edge startups.
© 2024 Enterprise Management Associates, Inc. 3
| @ema_research
| @ema_research
Sponsors
© 2024 Enterprise Management Associates, Inc. 4
| @ema_research
| @ema_research
Incidents and outages:
some organizations are fighting a losing battle …
… others are taming the beast
© 2024 Enterprise Management Associates, Inc. 5
An unsurprising 82% of an early research panel characterized incidents
and outages as increasing every year (19% stated that “increased reliance
on IT guarantees continued increases”)
A fascinating 18% of the panel ran countertrend, stating that incidents and
outages have decreased due to proactive systems they’ve put in place
New research: current/desired state of incident management processes, incidents, automation, AI …. )
• 50% North America; 25% EMEA; 25% APAC
• Even mix of IT service, ITOps, and IT security
• 27% IT professionals/team lead, 47% manager/director, and 26% IT executive VP/CIO
• Even distribution of company sizes: 1,000 – 10,000+ employees
• Mix of industries: high tech, manufacturing, financial services, retail
• Automation as a priority was a qualification
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 6
If you could choose one thing to do really well,
what would have the biggest positive impact?
“Preventative monitoring is worth more than incident
response after the fact, no matter how good it might be”
“Be proactive rather than reactive. We seem to wait until
things happen before we do anything to stop it.”
“I would like to see more automation and integration of
the tools used. That would help reduce the manual effort
and human error that is typical of the incident process.”
“If I could improve one thing about my organization’s
approach to incident response it would be to try to be a
bit bolder – a bit more unconventional and try out more
innovative methods using AI and automation.”
If you could improve one thing about your
organization’s approach to incident response,
effectiveness, or tools used, what would it be?
Also mentioned: better training, fewer levels of bureaucracy, knowledge sharing,
workflow automation, and increased headcount
| @ema_research
| @ema_research
The reality vs the wish list
© 2024 Enterprise Management Associates, Inc. 7
What percentage of incidents are caught before causing an outage/user impact?
Only 18% successfully intercept more than half of incidents before they impact users.
All of that group report AIOps as strategic, mature, and implemented on an enterprise-wide platform
| @ema_research
| @ema_research
A fundamental disconnect ….. The business view and IT’s view
© 2024 Enterprise Management Associates, Inc. 8
How does your organization define an IT service?
| @ema_research
| @ema_research
The disconnect is driving organizational change
© 2024 Enterprise Management Associates, Inc. 9
Although oversimplified, how would you describe your IT’s organizational principle when it comes
to service availability/performance and incident management?
| @ema_research
Processes
| @ema_research
| @ema_research
Process definition/documentation – process effectiveness
© 2024 Enterprise Management Associates, Inc. 11
How would you rate the effectiveness of your
organization’s incident management processes?
Which statement best describes your organization’s
incident management processes?
73% of respondents say that these processes are “widely used, well understood, and frequently updated”.
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 12
Does the incident management process change during an outage?
When the incident is due to cybersecurity issues, which statement best represents your organization?
| @ema_research
| @ema_research
Detection/identification and logging
Categorization, triage, prioritization, and routing
Team engagement, incident communication and
collaboration
Response for analysis, diagnosis, and resolution
Closure and post-incident reporting
A common incident response process flow
© 2024 Enterprise Management Associates, Inc. 13
Understanding that every organization is different, does the following incident response flow reflect the incident
management flow in your organization
76% said it is a typical flow
24% responded, “Our flow is more ad hoc – it depends on the incident”
Ad hoc had
• Lower level of: platform use, effectiveness, use of automation and AI, IT quality
• Higher level of: incidents coming in through user complaints …
Not one respondent said “no.”
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 14
Which steps or phases are the most challenging or most in need of improvement? (select two)
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 15
Which phase is most time consuming – biggest contributor to MTTR? (select one)
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 16
Which phase is the least important (gets skipped, overlooked, or only done slightly)?
Note: team engagement still gets honorable mention
| @ema_research
| @ema_research
Automation and AI process observations
© 2024 Enterprise Management Associates, Inc. 17
Most automated phase is detection;
Least automated is closure followed by team engagement
AI/ML most used or applicable in detection and response phases
AI and automation use projected to grow …
…. but in the areas already used
Underserved processes are not on the investment radar
| @ema_research
Incidents
18
| @ema_research
| @ema_research
Incident prioritization
Slide
19
Does your organization prioritize IT incidents
by severity?
51% Business operations are disrupted
39% Compliance or regulations are at risk
38% Number of users impacted
36% External customers are involved
25% Revenue is at stake
11% SLA penalties
What determines the priority of an
incident? (select two)
An incident is any degradation in IT
service or availability
35% specifically include predicted or potential issues
28% specified disruption to business operations
© 2024 Enterprise Management Associates, Inc.
| @ema_research
| @ema_research
Incident basics
© 2024 Enterprise Management Associates, Inc. 20
How are incidents most often surfaced? Which statement best describes incident tracking in your
organization? “Incidents can originate from users or monitoring
systems, but they are created and tracked primarily through…”
36% A centralized ITOps or AIOps system or platform
31% Tickets in the service desk or ITSM system
31% A mix of ITSM tickets and ITOps logs
2% Decentralized DevOps/SRE “you build it, you run it”
When there is an incident, what groups are most responsible for identifying and fixing the cause? (select two)
54% ITOps 49% ITSM/service
28% DevOps 27% Engineering/dev 24% Network 15% SRE/agile teams
| @ema_research
| @ema_research
The “T” in MTTR (whatever your “R” is …. Reducing it is universally a top IT objective)
© 2024 Enterprise Management Associates, Inc. 21
Once an incident is logged, how long does it usually take to resolve it?
70% 1-4 hours
19% more than 4 hours
11% minutes
| @ema_research
| @ema_research
MTTR’s “secret” ingredient
© 2024 Enterprise Management Associates, Inc. 22
The least wasted time = mature
AIOPs and most AI/automation
What percentage of the MTTR is inactive time
spent waiting for information or response?
27% MTTR is 50% or more
wasted time
42% MTTR is 25% waste
19% MTTR is 10% waste
12% almost no wasted time
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 23
How long does it take to identify and engage the right response
teams from the time an incident is created?
Which phase is most time consuming – biggest contributor to MTTR? (select one)
Reminder: MTTR after logging
70% 1-4 hours
19% more than 4 hours
11% minutes
30% Team engagement/
communication
28% Response/resolution 25% Categorization/
prioritization/routing
Reducing time to identify and engage team looks like low-hanging fruit
| @ema_research
| @ema_research
Lack of information/insight increases MTTR
© 2024 Enterprise Management Associates, Inc. 24
What are the biggest challenges to effective incident response and management? (select two)
| @ema_research
| @ema_research
Actionable incidents/alerts cut MTTR
© 2024 Enterprise Management Associates, Inc. 25
On average, what percentage of incidents/events/alerts are actionable (turn out to be a problem
that requires a resolution and includes at least one piece of insight on how to respond)?
Most teams are reactive: 65% rapid and reactive 35% shift toward proactive and agile teams
| @ema_research
Automation and AI
26
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 27
How is predictive AI insight used for proactive action in your organization?
Note: automated proactive action increasing year over year
| @ema_research
| @ema_research
Automation and humans
© 2024 Enterprise Management Associates, Inc. 28
What is the long-term goal for automation in incident management?
ITOps has primary responsibility for automation used in incident response
followed by cybersecurity, ITSM/service and DevOps
| @ema_research
| @ema_research
The state of automation and incident management
© 2024 Enterprise Management Associates, Inc.
Without exception, the mature automation
group greatly out-performed the other
cohorts in all incident response metrics
including MTTR, reduction in incidents
and outages, cost, effectiveness, IT
productivity, and use of AI.
56% automation is a mature,
C-level strategic initiative
28% early
16% departmental
Mature, C-level:
• AIOps tends to be a strategic enterprise initiative
• Platform use predominates as opposed to siloed systems and tools
• There is a high level of well-defined/documented processes that are widely used
• Far fewer incidents come in through user complaints (24% vs 53% for lower automation priority)
• 73% of organizations that have automation as a C-level priority have reorganized to take
advantage of AI and automation.
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 30
If IT automation is “software that can replace repeatable processes, address complex processes,
and take critical actions,” what percentage of the incident response and management tasks or
processes do you estimate use automation in your organization?
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 31
What’s preventing your organization from adopting automation more broadly
for incident response and management? (select two)
| @ema_research
| @ema_research
Incident automation: drivers and results delivered = close map
© 2024 Enterprise Management Associates, Inc. 32
Top drivers of automation in incident response
and management What are the top two benefits achieved so far through
incident management automation?
Top metrics to measure investments
in incident management automation (in order) :
Reduction in:
1 MTTR, 2 events and incidents, and 3 downtime ;
4 Security and compliance metrics,
Others: SLA performance, reduction in escalations
(L2, L3), reduction in the number of trouble tickets, and
mean time to assemble response team.
93% plan increased investments in incident automation
(43% very high increase/strategic)
Reduced MTTR and
downtime
Improved user experience
IT personnel productivity
Business impact/revenue
Cost savings
Cross-functional workflows
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 33
How would you characterize the current use
of AI/ML and analytics in your organization’s
incident management processes?
Mature AI group:
• Higher degree of automation in incident management
• Incident management effectiveness 55% very effective vs
21% early
• More autonomous and proactive actions
• A high percentage of incidents caught before an outage
or user impact.
• 34% report actionable alerts at 75% or more vs 11% early
• Use AI in change management for incident response as
well as for pre-change impact.
• More likely to be in pilot with genAI and more aggressive
in a timeframe for use in production.
AI in incident response and management lags behind automation
| @ema_research
| @ema_research
GenAI in incident response and management
© 2024 Enterprise Management Associates, Inc. 34
What is your personal perception of GenAI?
“I think GenAI is …”
Interest is high in 95%
38% in research phase 57% in PoC or some form of
production
Timeframe
27% months
31% a year
25% 18 months+/-
12% 2 years or more
The main reason to delay implementation
29% regulation, data
privacy, and
compliance
24% security concerns
13% newness and unproven
value/accuracy
12% cost
| @ema_research
| @ema_research
Some hypothetical use cases for GenAI
© 2024 Enterprise Management Associates, Inc. 35
If a real-time solution could
accurately determine, in
seconds, the impact of incidents
across distributed systems and
communicate it in clear
language, the value would be…
If a real-time solution could
generate an accurate summary
of alerts and incidents that
includes incident title,
description, and possible/likely
root causes in seconds, the value
would be…
If Knowledge Base articles could
be automatically and accurately
generated/ updated and easily
searched with normal, everyday
language, what percentage of
incidents, tickets, and cases
might be deflected?
38% transformative – priority actions
could be instantly identified at
speed and scale
45% high value – all impacted
response teams could be
immediately identified
17% valuable – it would increase the
effectiveness of incident
response
27% transformative – It would cut
MTTR by at least 20-30 minutes
per incident
55% High value – It would save
10-20 minutes per incident
11% Valuable – It would save 5-10
minutes per incident
7% Useful – it would save time
25% more than half
41% as much as half
26% between 10% - 25%
8% up to 10%
| @ema_research
| @ema_research
You can’t just throw technology at incidents …
© 2024 Enterprise Management Associates, Inc. 36
How has your organization changed to improve incident management effectiveness?
| @ema_research
Concluding thoughts
37
| @ema_research
| @ema_research
© 2024 Enterprise Management Associates, Inc. 38
Where we began -- outage frequency, cost, and duration
• An unsurprising 82% characterized incidents and outages as increasing every year
(19% stated that “increased reliance on IT guarantees continued increases”)
• A fascinating 18% stated that incidents and outages have decreased due to
proactive systems they’ve put in place – 100% had enterprise-level, mature AIOps
Automation, AI, and platform use are essentials for incident
response and management
• Explore new uses of automation and AI in underserved processes to
slash MTTR. (categorization and routing, team engagement, and
collaboration; closure and post-incident reporting}
• Become more bold in use of predictive/proactive incident interception
• Think of incident automation as a competitive advantage
(or disadvantage)
• Technology is essential, but it isn’t enough – organize for automation
and collaboration
| @ema_research
| @ema_research
Current/desired state of incident management:
processes, challenges, organization, automation, AI and GenAI
© 2024 Enterprise Management Associates, Inc. 39
50% North America; 25% EMEA; 25% APAC
Even mix of IT service, ITOps, and IT security
Mix of industries: high tech, manufacturing, financial services, retail
Automation as a priority was a qualification
| @ema_research
| @ema_research
Check out the sponsor sites to learn more!
© 2024 Enterprise Management Associates, Inc. 40

More Related Content

Similar to Real-world incident response, management, and prevention

Ema itsm-summary report-symponysummitai
Ema itsm-summary report-symponysummitaiEma itsm-summary report-symponysummitai
Ema itsm-summary report-symponysummitaiSymphonySummit
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Enterprise Management Associates
 
Financial Services Automation: Taking Off the Training Wheels
Financial Services Automation: Taking Off the Training WheelsFinancial Services Automation: Taking Off the Training Wheels
Financial Services Automation: Taking Off the Training WheelsCognizant
 
The State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to AwarenessThe State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to AwarenessEnterprise Management Associates
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Trends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
Trends in Enterprise Adoption of MDM Features and Capabilities: ExcerptTrends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
Trends in Enterprise Adoption of MDM Features and Capabilities: ExcerptKelly Teal
 
Are your apps chasing users away? How to deliver superior Digital Experiences
Are your apps chasing users away? How to deliver superior Digital ExperiencesAre your apps chasing users away? How to deliver superior Digital Experiences
Are your apps chasing users away? How to deliver superior Digital ExperiencesRiverbed Technology
 
four-stage-maturity-model-for-it-automation.pdf
four-stage-maturity-model-for-it-automation.pdffour-stage-maturity-model-for-it-automation.pdf
four-stage-maturity-model-for-it-automation.pdfSuresh Babu
 
Enterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesEnterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesSudhanshuKMevat
 
Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Simplify360
 
Intelligent Automation Transition & Adoption Best Practices
Intelligent Automation Transition & Adoption Best PracticesIntelligent Automation Transition & Adoption Best Practices
Intelligent Automation Transition & Adoption Best PracticesJim Hussey
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 

Similar to Real-world incident response, management, and prevention (20)

Ema itsm-summary report-symponysummitai
Ema itsm-summary report-symponysummitaiEma itsm-summary report-symponysummitai
Ema itsm-summary report-symponysummitai
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Tomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key StrategiesTomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key Strategies
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
Financial Services Automation: Taking Off the Training Wheels
Financial Services Automation: Taking Off the Training WheelsFinancial Services Automation: Taking Off the Training Wheels
Financial Services Automation: Taking Off the Training Wheels
 
Data-Driven IT Automation: A Vision for the Modern CIO
Data-Driven IT Automation: A Vision for the Modern CIOData-Driven IT Automation: A Vision for the Modern CIO
Data-Driven IT Automation: A Vision for the Modern CIO
 
The State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to AwarenessThe State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to Awareness
 
5 AI-Powered ITSM Myths Debunked
5 AI-Powered ITSM Myths Debunked5 AI-Powered ITSM Myths Debunked
5 AI-Powered ITSM Myths Debunked
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Trends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
Trends in Enterprise Adoption of MDM Features and Capabilities: ExcerptTrends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
Trends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
 
Are your apps chasing users away? How to deliver superior Digital Experiences
Are your apps chasing users away? How to deliver superior Digital ExperiencesAre your apps chasing users away? How to deliver superior Digital Experiences
Are your apps chasing users away? How to deliver superior Digital Experiences
 
four-stage-maturity-model-for-it-automation.pdf
four-stage-maturity-model-for-it-automation.pdffour-stage-maturity-model-for-it-automation.pdf
four-stage-maturity-model-for-it-automation.pdf
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Enterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesEnterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; Opportunities
 
Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360
 
Intelligent Automation Transition & Adoption Best Practices
Intelligent Automation Transition & Adoption Best PracticesIntelligent Automation Transition & Adoption Best Practices
Intelligent Automation Transition & Adoption Best Practices
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
Empowering Workload Automation with Intelligence
Empowering Workload Automation with IntelligenceEmpowering Workload Automation with Intelligence
Empowering Workload Automation with Intelligence
 

More from Enterprise Management Associates

Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...Enterprise Management Associates
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...Enterprise Management Associates
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceEnterprise Management Associates
 

More from Enterprise Management Associates (20)

Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
AI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network ManagementAI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network Management
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Real-world incident response, management, and prevention

  • 1. | @ema_research Real-world incident response (management, and prevention) Valerie O’Connell Research Director - Digital Service Execution Enterprise Management Associates (EMA) Sponsored by
  • 2. | @ema_research 2 Watch the On-Demand Webinar • Real-world incident response, management, and prevention on- demand webinar: https://info.enterprisemanagement.com/incident- response-managemen-prevention-webinar-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch © 2023 Enterprise Management Associates, Inc.
  • 3. | @ema_research | @ema_research Featured Speaker Valerie O’Connell Research Director Digital Service Execution Valerie O’Connell leads the Digital Service Execution practice at Enterprise Management Associates (EMA). Her practice encompasses intersections and innovations across AIOps, asset management, end-user experience, ITSM/ESM, and business context as they interact to deliver excellence in digital service. Valerie came to EMA with decades of senior-level experience in the effective marketing of technology. Her experience ranges from VP of product marketing at what was then CA to a successful run as an independent practitioner, serving industry giants such as Microsoft and EMC, as well as cutting-edge startups. © 2024 Enterprise Management Associates, Inc. 3
  • 4. | @ema_research | @ema_research Sponsors © 2024 Enterprise Management Associates, Inc. 4
  • 5. | @ema_research | @ema_research Incidents and outages: some organizations are fighting a losing battle … … others are taming the beast © 2024 Enterprise Management Associates, Inc. 5 An unsurprising 82% of an early research panel characterized incidents and outages as increasing every year (19% stated that “increased reliance on IT guarantees continued increases”) A fascinating 18% of the panel ran countertrend, stating that incidents and outages have decreased due to proactive systems they’ve put in place New research: current/desired state of incident management processes, incidents, automation, AI …. ) • 50% North America; 25% EMEA; 25% APAC • Even mix of IT service, ITOps, and IT security • 27% IT professionals/team lead, 47% manager/director, and 26% IT executive VP/CIO • Even distribution of company sizes: 1,000 – 10,000+ employees • Mix of industries: high tech, manufacturing, financial services, retail • Automation as a priority was a qualification
  • 6. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 6 If you could choose one thing to do really well, what would have the biggest positive impact? “Preventative monitoring is worth more than incident response after the fact, no matter how good it might be” “Be proactive rather than reactive. We seem to wait until things happen before we do anything to stop it.” “I would like to see more automation and integration of the tools used. That would help reduce the manual effort and human error that is typical of the incident process.” “If I could improve one thing about my organization’s approach to incident response it would be to try to be a bit bolder – a bit more unconventional and try out more innovative methods using AI and automation.” If you could improve one thing about your organization’s approach to incident response, effectiveness, or tools used, what would it be? Also mentioned: better training, fewer levels of bureaucracy, knowledge sharing, workflow automation, and increased headcount
  • 7. | @ema_research | @ema_research The reality vs the wish list © 2024 Enterprise Management Associates, Inc. 7 What percentage of incidents are caught before causing an outage/user impact? Only 18% successfully intercept more than half of incidents before they impact users. All of that group report AIOps as strategic, mature, and implemented on an enterprise-wide platform
  • 8. | @ema_research | @ema_research A fundamental disconnect ….. The business view and IT’s view © 2024 Enterprise Management Associates, Inc. 8 How does your organization define an IT service?
  • 9. | @ema_research | @ema_research The disconnect is driving organizational change © 2024 Enterprise Management Associates, Inc. 9 Although oversimplified, how would you describe your IT’s organizational principle when it comes to service availability/performance and incident management?
  • 11. | @ema_research | @ema_research Process definition/documentation – process effectiveness © 2024 Enterprise Management Associates, Inc. 11 How would you rate the effectiveness of your organization’s incident management processes? Which statement best describes your organization’s incident management processes? 73% of respondents say that these processes are “widely used, well understood, and frequently updated”.
  • 12. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 12 Does the incident management process change during an outage? When the incident is due to cybersecurity issues, which statement best represents your organization?
  • 13. | @ema_research | @ema_research Detection/identification and logging Categorization, triage, prioritization, and routing Team engagement, incident communication and collaboration Response for analysis, diagnosis, and resolution Closure and post-incident reporting A common incident response process flow © 2024 Enterprise Management Associates, Inc. 13 Understanding that every organization is different, does the following incident response flow reflect the incident management flow in your organization 76% said it is a typical flow 24% responded, “Our flow is more ad hoc – it depends on the incident” Ad hoc had • Lower level of: platform use, effectiveness, use of automation and AI, IT quality • Higher level of: incidents coming in through user complaints … Not one respondent said “no.”
  • 14. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 14 Which steps or phases are the most challenging or most in need of improvement? (select two)
  • 15. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 15 Which phase is most time consuming – biggest contributor to MTTR? (select one)
  • 16. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 16 Which phase is the least important (gets skipped, overlooked, or only done slightly)? Note: team engagement still gets honorable mention
  • 17. | @ema_research | @ema_research Automation and AI process observations © 2024 Enterprise Management Associates, Inc. 17 Most automated phase is detection; Least automated is closure followed by team engagement AI/ML most used or applicable in detection and response phases AI and automation use projected to grow … …. but in the areas already used Underserved processes are not on the investment radar
  • 19. | @ema_research | @ema_research Incident prioritization Slide 19 Does your organization prioritize IT incidents by severity? 51% Business operations are disrupted 39% Compliance or regulations are at risk 38% Number of users impacted 36% External customers are involved 25% Revenue is at stake 11% SLA penalties What determines the priority of an incident? (select two) An incident is any degradation in IT service or availability 35% specifically include predicted or potential issues 28% specified disruption to business operations © 2024 Enterprise Management Associates, Inc.
  • 20. | @ema_research | @ema_research Incident basics © 2024 Enterprise Management Associates, Inc. 20 How are incidents most often surfaced? Which statement best describes incident tracking in your organization? “Incidents can originate from users or monitoring systems, but they are created and tracked primarily through…” 36% A centralized ITOps or AIOps system or platform 31% Tickets in the service desk or ITSM system 31% A mix of ITSM tickets and ITOps logs 2% Decentralized DevOps/SRE “you build it, you run it” When there is an incident, what groups are most responsible for identifying and fixing the cause? (select two) 54% ITOps 49% ITSM/service 28% DevOps 27% Engineering/dev 24% Network 15% SRE/agile teams
  • 21. | @ema_research | @ema_research The “T” in MTTR (whatever your “R” is …. Reducing it is universally a top IT objective) © 2024 Enterprise Management Associates, Inc. 21 Once an incident is logged, how long does it usually take to resolve it? 70% 1-4 hours 19% more than 4 hours 11% minutes
  • 22. | @ema_research | @ema_research MTTR’s “secret” ingredient © 2024 Enterprise Management Associates, Inc. 22 The least wasted time = mature AIOPs and most AI/automation What percentage of the MTTR is inactive time spent waiting for information or response? 27% MTTR is 50% or more wasted time 42% MTTR is 25% waste 19% MTTR is 10% waste 12% almost no wasted time
  • 23. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 23 How long does it take to identify and engage the right response teams from the time an incident is created? Which phase is most time consuming – biggest contributor to MTTR? (select one) Reminder: MTTR after logging 70% 1-4 hours 19% more than 4 hours 11% minutes 30% Team engagement/ communication 28% Response/resolution 25% Categorization/ prioritization/routing Reducing time to identify and engage team looks like low-hanging fruit
  • 24. | @ema_research | @ema_research Lack of information/insight increases MTTR © 2024 Enterprise Management Associates, Inc. 24 What are the biggest challenges to effective incident response and management? (select two)
  • 25. | @ema_research | @ema_research Actionable incidents/alerts cut MTTR © 2024 Enterprise Management Associates, Inc. 25 On average, what percentage of incidents/events/alerts are actionable (turn out to be a problem that requires a resolution and includes at least one piece of insight on how to respond)? Most teams are reactive: 65% rapid and reactive 35% shift toward proactive and agile teams
  • 27. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 27 How is predictive AI insight used for proactive action in your organization? Note: automated proactive action increasing year over year
  • 28. | @ema_research | @ema_research Automation and humans © 2024 Enterprise Management Associates, Inc. 28 What is the long-term goal for automation in incident management? ITOps has primary responsibility for automation used in incident response followed by cybersecurity, ITSM/service and DevOps
  • 29. | @ema_research | @ema_research The state of automation and incident management © 2024 Enterprise Management Associates, Inc. Without exception, the mature automation group greatly out-performed the other cohorts in all incident response metrics including MTTR, reduction in incidents and outages, cost, effectiveness, IT productivity, and use of AI. 56% automation is a mature, C-level strategic initiative 28% early 16% departmental Mature, C-level: • AIOps tends to be a strategic enterprise initiative • Platform use predominates as opposed to siloed systems and tools • There is a high level of well-defined/documented processes that are widely used • Far fewer incidents come in through user complaints (24% vs 53% for lower automation priority) • 73% of organizations that have automation as a C-level priority have reorganized to take advantage of AI and automation.
  • 30. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 30 If IT automation is “software that can replace repeatable processes, address complex processes, and take critical actions,” what percentage of the incident response and management tasks or processes do you estimate use automation in your organization?
  • 31. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 31 What’s preventing your organization from adopting automation more broadly for incident response and management? (select two)
  • 32. | @ema_research | @ema_research Incident automation: drivers and results delivered = close map © 2024 Enterprise Management Associates, Inc. 32 Top drivers of automation in incident response and management What are the top two benefits achieved so far through incident management automation? Top metrics to measure investments in incident management automation (in order) : Reduction in: 1 MTTR, 2 events and incidents, and 3 downtime ; 4 Security and compliance metrics, Others: SLA performance, reduction in escalations (L2, L3), reduction in the number of trouble tickets, and mean time to assemble response team. 93% plan increased investments in incident automation (43% very high increase/strategic) Reduced MTTR and downtime Improved user experience IT personnel productivity Business impact/revenue Cost savings Cross-functional workflows
  • 33. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 33 How would you characterize the current use of AI/ML and analytics in your organization’s incident management processes? Mature AI group: • Higher degree of automation in incident management • Incident management effectiveness 55% very effective vs 21% early • More autonomous and proactive actions • A high percentage of incidents caught before an outage or user impact. • 34% report actionable alerts at 75% or more vs 11% early • Use AI in change management for incident response as well as for pre-change impact. • More likely to be in pilot with genAI and more aggressive in a timeframe for use in production. AI in incident response and management lags behind automation
  • 34. | @ema_research | @ema_research GenAI in incident response and management © 2024 Enterprise Management Associates, Inc. 34 What is your personal perception of GenAI? “I think GenAI is …” Interest is high in 95% 38% in research phase 57% in PoC or some form of production Timeframe 27% months 31% a year 25% 18 months+/- 12% 2 years or more The main reason to delay implementation 29% regulation, data privacy, and compliance 24% security concerns 13% newness and unproven value/accuracy 12% cost
  • 35. | @ema_research | @ema_research Some hypothetical use cases for GenAI © 2024 Enterprise Management Associates, Inc. 35 If a real-time solution could accurately determine, in seconds, the impact of incidents across distributed systems and communicate it in clear language, the value would be… If a real-time solution could generate an accurate summary of alerts and incidents that includes incident title, description, and possible/likely root causes in seconds, the value would be… If Knowledge Base articles could be automatically and accurately generated/ updated and easily searched with normal, everyday language, what percentage of incidents, tickets, and cases might be deflected? 38% transformative – priority actions could be instantly identified at speed and scale 45% high value – all impacted response teams could be immediately identified 17% valuable – it would increase the effectiveness of incident response 27% transformative – It would cut MTTR by at least 20-30 minutes per incident 55% High value – It would save 10-20 minutes per incident 11% Valuable – It would save 5-10 minutes per incident 7% Useful – it would save time 25% more than half 41% as much as half 26% between 10% - 25% 8% up to 10%
  • 36. | @ema_research | @ema_research You can’t just throw technology at incidents … © 2024 Enterprise Management Associates, Inc. 36 How has your organization changed to improve incident management effectiveness?
  • 38. | @ema_research | @ema_research © 2024 Enterprise Management Associates, Inc. 38 Where we began -- outage frequency, cost, and duration • An unsurprising 82% characterized incidents and outages as increasing every year (19% stated that “increased reliance on IT guarantees continued increases”) • A fascinating 18% stated that incidents and outages have decreased due to proactive systems they’ve put in place – 100% had enterprise-level, mature AIOps Automation, AI, and platform use are essentials for incident response and management • Explore new uses of automation and AI in underserved processes to slash MTTR. (categorization and routing, team engagement, and collaboration; closure and post-incident reporting} • Become more bold in use of predictive/proactive incident interception • Think of incident automation as a competitive advantage (or disadvantage) • Technology is essential, but it isn’t enough – organize for automation and collaboration
  • 39. | @ema_research | @ema_research Current/desired state of incident management: processes, challenges, organization, automation, AI and GenAI © 2024 Enterprise Management Associates, Inc. 39 50% North America; 25% EMEA; 25% APAC Even mix of IT service, ITOps, and IT security Mix of industries: high tech, manufacturing, financial services, retail Automation as a priority was a qualification
  • 40. | @ema_research | @ema_research Check out the sponsor sites to learn more! © 2024 Enterprise Management Associates, Inc. 40