Practical IT Research that Drives Measurable Results OptimizeIT Strategic Planning Bundle

Similar documents
Business Architecture Implementation Workshop

IT Strategic Planning: Making Your IT Organization Efficient and Effective

OG The Open Group OG TOGAF 9 Combined Part 1 and Part 2

Controlling the Project Pipeline: Managing Constraints to Maximize Outputs

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method

Organizational Readiness for Digital Transformation

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Objectives of the Security Policy Project for the University of Cyprus

Rethinking Information Security Risk Management CRM002

Academic Program Review at Illinois State University PROGRAM REVIEW OVERVIEW

NCSF Foundation Certification

Symantec Data Center Transformation

2 The IBM Data Governance Unified Process

Threat and Vulnerability Assessment Tool

Strength Rating. Resource & Knowledge. Leadership Support. User Knowledge. Strength Rating

How Cisco IT Improved Development Processes with a New Operating Model

Certified Information Security Manager (CISM) Course Overview

Framework for Improving Critical Infrastructure Cybersecurity. and Risk Approach

How to choose the right Data Governance resources. by First San Francisco Partners

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Department of Management Services REQUEST FOR INFORMATION

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

IBM s approach. Ease of Use. Total user experience. UCD Principles - IBM. What is the distinction between ease of use and UCD? Total User Experience

Improving Cybersecurity through the use of the Cybersecurity Framework

Developing a Model for Cyber Security Maturity Assessment

Determining Best Fit for ITIL Implementation

ENGINEERING AND TECHNOLOGY MANAGEMENT

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

Building UAE s cyber security resilience through effective use of technology, processes and the local people.

College of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, Information Technologies

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework

NCSF Foundation Certification

Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION TO 2019

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

CITY OF MONTEBELLO SYSTEMS MANAGER

Introducing Enterprise Architecture. into the Enterprise

Data Governance Quick Start

IoT & SCADA Cyber Security Services

Implementing ITIL v3 Service Lifecycle

Making the most of DCIM. Get to know your data center inside out

Solutions Technology, Inc. (STI) Corporate Capability Brief

The Quick CASP USER S GUIDE. What is the Quick CASP? Sample Quality Improvement Plan. >>> page 3. >>> page 7

Mo n t a n a S t a te Fu n d. FY 2011 Business Plan Performance September 23, 2011

STRATEGIC PLAN

The new cybersecurity operating model

AUDIT UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY. Report No Issue Date: 8 January 2014

Program Review for Information Security Management Assistance. Keith Watson, CISSP- ISSAP, CISA IA Research Engineer, CERIAS

FedRAMP Security Assessment Plan (SAP) Training

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)

Data Warehousing Fundamentals by Mark Peco

Smart Islands, Intelligent Nations. Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016

Regional TSM&O Vision and ITS Architecture Update

Government IT Modernization and the Adoption of Hybrid Cloud

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

Cisco Director Class SAN Planning and Design Service

Session ID: CISO-W22 Session Classification: General Interest

Security and Privacy Governance Program Guidelines

STRATEGIC PLAN. USF Emergency Management

to the Enterprise Brussels - Tuesday 20th April 2004 Chris Greenslade Introducing Enterprise Architecture Introducing Enterprise Architecture

IT risks and controls

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Colorado Charter School Institute. Website Design & Development Request for Proposal

Manchester Metropolitan University Information Security Strategy

THE POWER OF TECH-SAVVY BOARDS:

Maximize Your Assets Securely and Cost Effectively

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker

University of Texas Arlington Data Governance Program Charter

A guide for assembling your Jira Data Center team

Contents. List of figures. List of tables. 5 Managing people through service transitions 197. Preface. Acknowledgements.

ISACA. Certification Details for Certified in the Governance of Enterprise IT (CGEIT )

FROM TACTIC TO STRATEGY:

IT Consulting and Implementation Services

REPORT 2015/149 INTERNAL AUDIT DIVISION

Proposed Regional ehealth Strategy ( )

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015

Cloud solution consultant

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

Enabling efficiency through Data Governance: a phased approach

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx

Collaboration & Commitment

Top Five Secrets to Successfully Jumpstarting Your Cyber-Risk Program

Kent Landfield, Director Standards and Technology Policy

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

Data Curation Handbook Steps

Applying Archival Science to Digital Curation: Advocacy for the Archivist s Role in Implementing and Managing Trusted Digital Repositories

ASHRAE. Strategic Plan STARTING

Green Data Center. Approach. Sybrand de Vries Aernoud van de Graaff IBM Corporation

Framework for Improving Critical Infrastructure Cybersecurity

Ric Mims, itsmf Houston LIG and HDI Houston

NNSA Security Roadmap

How the WAN is Driving Digital Transformation. An IDC InfoBrief, Sponsored by

SAN JOSÉ FIRE DEPARTMENT. Strategic Planning

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018

Transcription:

Practical IT Research that Drives Measurable Results OptimizeIT Strategic Planning Bundle Info-Tech Research Group 1

An IT Strategy must lay out a roadmap and budget for investment to establish the systems, infrastructure and services necessary for the business to achieve long-term objectives. To assess how well current IT assets and capabilities are positioned to support college goals will reveal application, infrastructure and organizational strengths, weaknesses and gaps. Accreditation looks at both the outcome (the plan) and the process (the planning). College leaders will understand the technology priorities and how those priorities are aligned with college direction. The IT orga nization will have a clear picture of what systems and services are needed, when and how they will contribute to the success of the College. Info Tech Research Group 2

A complete set of IT Strategy tools - all in one place. The ability to pick and choose individual tools as required to meet current needs, or partially completed projects. We can rely on a documented methodology for tackling technology planning. We ll be able to assess current applications, technical infrastructure and organizational capabilities and design projects and initiatives to strengthen assets and fill gaps to meet long-term needs of the business. We can easily divide tasks to the functional groups to speed up the process. Caveat The methodology is not tailored to higher education. We need to tweek it in some places. Info Tech Research Group 3

Understand o Clearly articulate college objectives and strategies and the role IT must play in achieving them o Scan the environment for information technologies that can offer new value or competitive advantage to the company o Communicate how IT will contribute strategic value for the foreseeable future Assess o Evaluate how well current applications are positioned to meet strategic business needs o Identify gaps in application functionality that are critical to future plans o Forecast how the technical infrastructure will need to change to meet future demands o Appraise the IT organization its ability to deliver the systems and services needed to meet company priorities Info Tech Research Group 4

Plan o Define the projects and initiatives needed to strengthen and improve existing technologies and fill in strategic gaps o Link these projects to sources of business value to build the case for investment o Lay out the roadmap that determines the key commitments that IT will meet in supporting business strategies Info Tech Research Group 5

1) Business IT Strategic Alignment Stakeholder Guideline and Analysis IT Strategy and Roadmap Scope Statement Technology Monitor College Executive Interview Guide Assessing Enterprise Strategy Enterprise Strategy and Goals Key Success Factors Analysis Tool IT Imperatives IT Vision and Mission Statement Template Info Tech Research Group 6

2) Application Direction Application Topology Business Function and Application Assessment Tool Application Direction Migration Strategy Guide Application Improvement Opportunity 3) Technical Infrastructure Development Infrastructure Components Network Diagram Primer Network Diagram Template Infrastructure Assessment Technical Infrastructure Direction Infrastructure Improvement Opportunity Infrastructure Prioritization Info Tech Research Group 7

4) IT Organization Direction IT Staffing Worksheet IT Skills Inventory Irregular IT Staff Inventory Staff Level Allocation IT Skills Inventory Tool: Light Version IT-Business Interaction Model IT Service Model Alignment IT Organization Gaps Statement of Organization and Capability Direction Organization and Capability Improvement Opportunity Template Info Tech Research Group 8

5) IT Strategic Investment and Value Roadmap Analysis of Available Options Option Evaluation Tool Current IT Projects IT Strategy and Roadmap Scope Statement Initiative Description Template Initiative Prioritization Tool IT Strategy Budget Impact Business Case Template Communications Plan Template Strategic Plan Presentation Strategic Plan Template Info Tech Research Group 9