Académique Documents
Professionnel Documents
Culture Documents
Alan McSweeney
AICPA Survey of members from 2001 on initiatives in IT that are of concern to their nearly 400,000 members
http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLO GY/RESOURCES/TOPTECHNOLOGYINITIATIVES/TOP10TECHNOLO GIESARCHIVE
Gartner well known analyst company Two very different views of information technology trends
Business-oriented Technology-oriented
IT tends to be concerned with technology trends for themselves rather than their application to business internal focus
January 27, 2014 2
IT
I want:
You need:
2012
Securing The IT Environment
2011
Control And Use Of Mobile Devices Securing The IT Environment Managing And Retaining Data Information Security Managing Vendors And Service Managing Risk And Data Retention Policies And Providers Compliance Structure Managing IT Risks And Compliance Ensuring Privacy Remote Access Ensuring Privacy Leveraging Emerging Staff And Management Technologies Training Managing System Implementations Managing System Process Documentation And Implementation Improvements Preventing And Responding To Enabling Decision Support And Saving And Making Money Computer Fraud Managing Performance W/Technology Governing And Managing IT Investment Governing And Managing IT Technology Cost Controls And Spending Investment/Spending Enabling Decision Support And Preventing And Responding To Budget Processes Analytics Fraud Leveraging Emerging Technologies Managing Vendors And Service Project Management & Providers Deployment Of New Systems
2009
Green IT Unified Communications Business Process Modeling Metadata Management Virtualization 2.0 Mashup & Composite Apps Web Platform & WOA Computing Fabric Real World Web Social Software
5
Media Tablets and Cloud Computing Cloud Computing 1 Mobile Device Battles Beyond
2 3
Mobile-Centric Mobile Advanced Applications and Applications and Cloud Computing Analytics Interfaces Media Tablets Social Contextual and Servers Beyond Social User Communications Client Computing Blades Experience and Collaboration Web-Oriented Internet of Things Video IT for Green Architectures App Stores and Next Generation Reshaping the Enterprise Marketplaces Analytics Data Center Mashups Next-Generation Specialized Social Analytics Social Computing Analytics Systems Social Software In-Memory Context-Aware Security Activity and Social Computing Computing Monitoring Networking Storage Class Unified Big Data Flash Memory Memory Communications Extreme LowUbiquitous Virtualization for Business Energy Servers Computing Availability Intelligence Fabric-Based Mobile Cloud Computing Infrastructure and Green IT Applications Computers
Business views technologies as means to an end and not as ends in themselves IT views technologies as solutions rather than as components of an overall business solution IT technology trends are very variable and depend on the everchanging new next best thing Business view of the importance of technology application remains quite constant:
Security Data Delivery Value Data Managing Suppliers
6
2011
2010
2009
Information Security Management Privacy Management
2008
Information Security Management IT Governance
2008
Information Security Management Identity And Access Management
2006
Information Security Assurance And Compliance Applications Disaster And Business Continuity Planning
2005
Information Security Electronic Document Management Data Integration
1 2 3 4 5 6 7 8 9 10
Managing And Retaining Data Securing The IT Environment Managing Vendors And Service Providers
Control And Use Security Of Data Of Mobile Devices Information Security Data Retention Policies And Structure Connectivity and Communications
Remote Access
Ensuring Privacy
Business Conforming To Backup, Disaster Secure Data File Continuity Assurance And Storage, Recovery/ Management And Compliance Transmission And Business Disaster Recovery Standards Exchange Continuity Planning Business Process Improvement, Privacy Privacy Secure Electronic Work Flow And Management Management Collaboration Process Exception Alerts Business Process Disaster Recovery Planning And Improvement, Mobile And Document Business Workflow And Remote Management and Continuity Process Exception Computing Workflow Management Alerts Laptop Security / Encryption Small Business Software Training And Competency Identity And Access Management Improved Application And Data Integration Document, Forms, Content And Knowledge Management Identity And Access Management Conforming To Assurance And Compliance Standards Business Intelligence Mobile And Remote Computing Document, Forms, Content And Knowledge Management IT Governance Securing And Controlling Information Distribution Mobile And Remote Computing Electronic Archiving And Data Retention Document, Content And Knowledge Management
IT Governance
Spam Technology
Privacy Management Digital Identity And Authentication Technologies Wireless Technologies Application And Data Integration Paperless Digital Technologies Spyware Detection And Removal
Disaster Recovery
Managing System Managing System Implementations Implementation Preventing And Responding To Computer Fraud Governing And Managing IT Investment And Spending Enabling Decision Support And Analytics Leveraging Emerging Technologies
January 27, 2014
Collaboration And Messaging Technologies Wireless Technologies Authentication Technologies Storage Technologies Learning And Training Competency
7
Enabling Decision Saving And Support And Making Money Managing W/Technology Performance Governing And Technology Cost Managing IT Controls Investment/ Spending Preventing And Responding To Fraud Managing Vendors And Service Providers Budget Processes Project Management & Deployment Of New Systems
Mobile Devices
Tax Software
2011
2010
2009
Information Security Management Privacy Management
2008
Information Security Management IT Governance
2008
Information Security Management Identity And Access Management
2006
Information Security Assurance And Compliance Applications Disaster And Business Continuity Planning
2005
Information Security Electronic Document Management Data Integration
1 2 3 4 5 6 7 8 9 10
Managing And Retaining Data Securing The IT Environment Managing Vendors And Service Providers
Control And Use Security Of Data Of Mobile Devices Information Security Data Retention Policies And Structure Connectivity and Communications
Remote Access
Ensuring Privacy
Business Backup, Disaster Secure Data File Conforming To Continuity Recovery/ Assurance And Storage, Management And Business Compliance Transmission And Disaster Recovery Continuity Standards Exchange Planning Business Process Improvement, Secure Electronic Privacy Privacy Work Flow And Collaboration Management Management Process Exception Alerts Business Process Disaster Recovery Improvement, Planning And Mobile And Document Workflow And Business Remote Management and Process Exception Continuity Computing Workflow Alerts Management Laptop Security / Encryption Small Business Software Training And Competency Identity And Access Management Improved Application And Data Integration Document, Forms, Content And Knowledge Management Identity And Access Management Conforming To Assurance And Compliance Standards Business Intelligence Mobile And Remote Computing Document, Forms, Content And Knowledge Management IT Governance Securing And Controlling Information Distribution Mobile And Remote Computing Electronic Archiving And Data Retention Document, Content And Knowledge Management
IT Governance
Spam Technology
Privacy Management Digital Identity And Authentication Technologies Wireless Technologies Application And Data Integration Paperless Digital Technologies Spyware Detection And Removal
Disaster Recovery
Managing System Managing System Implementations Implementation Preventing And Responding To Computer Fraud Governing And Managing IT Investment And Spending Enabling Decision Support And Analytics Leveraging Emerging Technologies
January 27, 2014
Collaboration And Messaging Technologies Wireless Technologies Authentication Technologies Storage Technologies Learning And Training Competency
8
Enabling Decision Saving And Support And Making Money Managing W/Technology Performance Governing And Technology Cost Managing IT Controls Investment/ Spending Preventing And Responding To Fraud Managing Vendors And Service Providers Budget Processes Project Management & Deployment Of New Systems
Mobile Devices
Tax Software
Importance of Data
2013 2012
Securing The IT Environment Managing And Retaining Data Managing Risk And Compliance
2011
2010
2009
Information Security Management Privacy Management
2008
Information Security Management IT Governance
2008
Information Security Management Identity And Access Management
2006
Information Security Assurance And Compliance Applications Disaster And Business Continuity Planning
2005
Information Security Electronic Document Management Data Integration
1 2 3 4 5 6 7 8 9 10
Managing And Retaining Data Securing The IT Environment Managing Vendors And Service Providers
Control And Use Security Of Data Of Mobile Devices Information Security Data Retention Policies And Structure Connectivity and Communications
Remote Access
Ensuring Privacy
Business Backup, Disaster Secure Data File Conforming To Continuity Recovery/ Storage, Assurance And Management And Business Transmission And Compliance Disaster Recovery Continuity Exchange Standards Planning Business Process Improvement, Privacy Privacy Secure Electronic Work Flow And Management Management Collaboration Process Exception Alerts Business Process Disaster Recovery Planning And Document Improvement, Mobile And Business Management and Workflow And Remote Continuity Workflow Process Exception Computing Management Alerts Laptop Security / Encryption Small Business Software Training And Competency Identity And Access Management Improved Application And Data Integration Document, Forms, Content And Knowledge Management Electronic Data Retention Strategy Identity And Access Management Conforming To Assurance And Compliance Standards Business Intelligence Mobile And Remote Computing Document, Forms, Content And Knowledge Management IT Governance Securing And Controlling Information Distribution Mobile And Remote Computing Electronic Archiving And Data Retention Document, Content And Knowledge Management
IT Governance
Spam Technology
Privacy Management Digital Identity And Authentication Technologies Wireless Technologies Application And Data Integration Paperless Digital Technologies Spyware Detection And Removal
Disaster Recovery
Managing System Managing System Implementations Implementation Preventing And Responding To Computer Fraud Governing And Managing IT Investment And Spending Enabling Decision Support And Analytics Leveraging Emerging Technologies
January 27, 2014
Collaboration And Messaging Technologies Wireless Technologies Authentication Technologies Storage Technologies Learning And Training Competency
9
Enabling Decision Saving And Support And Making Money Managing W/Technology Performance Governing And Technology Cost Managing IT Controls Investment/ Spending Preventing And Responding To Fraud Managing Vendors And Service Providers Budget Processes Project Management & Deployment Of New Systems
Mobile Devices
2011
2010
2009
Information Security Management Privacy Management
2008
Information Security Management IT Governance
2008
Information Security Management Identity And Access Management
2006
Information Security Assurance And Compliance Applications Disaster And Business Continuity Planning
2005
Information Security Electronic Document Management Data Integration
1 2 3 4 5 6 7 8 9 10
Control And Use Security Of Data Of Mobile Devices Information Security Data Retention Policies And Structure Connectivity and Communications
Remote Access
Ensuring Privacy
Business Conforming To Backup, Disaster Secure Data File Continuity Assurance And Storage, Recovery/ Management And Compliance Transmission And Business Disaster Recovery Standards Exchange Continuity Planning Business Process Improvement, Privacy Privacy Secure Electronic Work Flow And Management Management Collaboration Process Exception Alerts Business Process Disaster Recovery Planning And Improvement, Mobile And Document Business Workflow And Remote Management and Continuity Process Exception Computing Workflow Management Alerts Laptop Security / Encryption Small Business Software Training And Competency Identity And Access Management Improved Application And Data Integration Document, Forms, Content And Knowledge Management Identity And Access Management Conforming To Assurance And Compliance Standards Business Intelligence Mobile And Remote Computing IT Governance Securing And Controlling Information Distribution Mobile And Remote Computing Electronic Archiving And Data Retention Document, Content And Knowledge Management
IT Governance
Spam Technology
Privacy Management Digital Identity And Authentication Technologies Wireless Technologies Application And Data Integration Paperless Digital Technologies Spyware Detection And Removal
Disaster Recovery
Managing System Managing System Implementations Implementation Preventing And Responding To Computer Fraud
Collaboration And Messaging Technologies Wireless Technologies Authentication Technologies Storage Technologies Learning And Training Competency
10
Enabling Decision Saving And Support And Making Money Managing W/Technology Performance Governing And Governing And Technology Cost Managing IT Managing IT Controls Investment/ Investment And Spending Spending Preventing And Responding To Fraud Managing Vendors And Service Providers Budget Processes
Mobile Devices
Tax Software
Project Document, Forms, Server Management & Content And Electronic Data Virtualization And Deployment Of Knowledge Retention Strategy Consolidation New Systems Management
Difference Between How The Business Feels IT Should Spend Budget And How The Budget Is Actually Spent
Business view of how it wants the proportion of IT expenditure to be allocated and how spending is actually allocated
What the Business Wants
50% 35%
5%
15%
Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business
70%
Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business
11
Difference Between How The Business Feels IT Should Spend Budget And How It Is Actually Spent
Reasons for differences lie with both sides Each side does not fully understand the other or explain itself properly to the other
12
Spending - Maintain The Momentum Of The Business Through Existing Business Systems
Business has unrealistic view of how much it costs to keep IT function operational IT does not automate operations to drive operational costs down
What the Business Wants What the Business Gets
25%
50% 35%
5%
15%
Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business
January 27, 2014
70%
Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business
13
IT is poor at delivery and proactive provision of advice and consulting Business expects too much without understanding the resource consequences of these expectations
What the Business Wants What the Business Gets
25%
50% 35%
5%
15%
70%
Maintain The Momentum Of The Business Through Existing Business Systems Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business Provide IT Direction And Management That Is Aligned To The Needs Of The Business
January 27, 2014 14
Provide IT Direction And Management That Is Aligned To The Needs Of The Business
IT is not providing the leadership and direction the business feels it wants Business has unrealistic expectation of the amount of IT spending should be or needs to be allocated to leadership and direction
What the Business Wants What the Business Gets
25%
50% 35%
5%
15%
Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business
January 27, 2014
70%
Maintain The Momentum Of The Business Through Existing Business Systems Contribute To Improving Business Results Provide IT Direction And Management That Is Aligned To The Needs Of The Business
15
ITs role is to mediate between the business and technologies and suppliers Needs to maintain an external focus on fulfilling business needs and requirements IT needs to act as a lens focussing business needs on appropriate technology and supplier solutions Gulf is between business and IT seems to be getting wider
16
Business
IT Needs To Focus Appropriate Services on Appropriate Suppliers and Technologies
Technology Landscape
IT Needs to Mediate Between the Business and Suppliers/ Technologies, Acting as a Lens Focussing Business Needs on Appropriate Solutions
27 January 2014
17
18
Lack of business confidence in getting the basics of IT governance, management and delivery right
62% 61% 65% 62% 34% 52% 46% 56% 60% 56%
Priority
6 - Managing System Implementation 7 - Enabling Decision Support And Managing Performance 8 - Governing And Managing IT Investment/Spending
60%
65%
70%
55% 51% 47% 47% 45% 44% 44% 38% 37% 27%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70%
4 - Managing IT Risks And Compliance 5 - Ensuring Privacy 6 - Managing System Implementations 7 - Preventing And Responding To Computer Fraud 8 - Governing And Managing IT Investment And Spending 9 - Enabling Decision Support And Analytics 10 - Leveraging Emerging Technologies
Continuing lack of business confidence in getting the basics of IT governance, management and delivery right
Priority
Only average view of the performance of the key role of managing suppliers
62% 61% 65% 62% 34% 52% 46% 56% 60% 56%
Priority
6 - Managing System Implementation 7 - Enabling Decision Support And Managing Performance 8 - Governing And Managing IT Investment/Spending
60%
65%
70%
Priority
4 - Managing IT Risks And Compliance 5 - Ensuring Privacy 6 - Managing System Implementations 7 - Preventing And Responding To Computer Fraud 8 - Governing And Managing IT Investment And Spending 9 - Enabling Decision Support And Analytics 10 - Leveraging Emerging Technologies
0% 5% 10% 15% 20% 25%
30%
35%
40%
45%
50%
55%
60%
65%
70%
Priority
6 - Managing System Implementation 7 - Enabling Decision Support And Managing Performance 8 - Governing And Managing IT Investment/Spending
60%
65%
70%
Priority
4 - Managing IT Risks And Compliance 5 - Ensuring Privacy 6 - Managing System Implementations 7 - Preventing And Responding To Computer Fraud 8 - Governing And Managing IT Investment And Spending 9 - Enabling Decision Support And Analytics 10 - Leveraging Emerging Technologies
0% 5% 10% 15% 20% 25%
30%
35%
40%
45%
50%
55%
60%
65%
70%
After years of BI and related technologies being available and implemented, there is still a low level of confidence
62% 61% 65% 62% 34% 52% 46% 56% 60% 56%
Priority
6 - Managing System Implementation 7 - Enabling Decision Support And Managing Performance 8 - Governing And Managing IT Investment/Spending
60%
65%
70%
2013
1 - Managing And Retaining Data 2 - Securing The IT Environment 3 - Managing Vendors And Service Providers
55% 51% 47% 47% 45% 44% 44% 38% 37% 27%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70%
Priority
4 - Managing IT Risks And Compliance 5 - Ensuring Privacy 6 - Managing System Implementations 7 - Preventing And Responding To Computer Fraud 8 - Governing And Managing IT Investment And Spending 9 - Enabling Decision Support And Analytics 10 - Leveraging Emerging Technologies
IT Management
Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management
Test Management
Service Operations
Takeover and Management Operations Co-ordination and Risk Management Support Function Monitoring and Alerting Incident Management Problem Management Facilities and Device Management Service Request Management
Service and Solution Support Infrastructure and Communications Implementation Analysis Design Realisation Test Transition to Production
Solution Architecture
Generalised and idealised view of the structure, organisation and set of logical sub-functions within an IT function Organisational view rather than capability view
Capabilities must reside in organisation functions
Actual optimum implementation depends on the size and profile of the organisation Not all sub-functions relevant to all organisations Not all sub-functions have the same importance for all organisations Not all sub-functions are at the same level of operational effectiveness for all organisations Logical sub-functions can be combined or split further A model that explicitly includes proactive linkage to the business and the delivery of business requirements
January 27, 2014 28
IT Management
Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management
Test Management
Service Operations
Takeover and Management Operations Co-ordination and Risk Management Support Function Monitoring and Alerting Incident Management Problem Management Facilities and Device Management Service Request Management
Service and Solution Support Infrastructure and Communications Implementation Analysis Design Realisation Test Transition to Production
Solution Architecture
31
IT Governance
IT Management
Service Operations
32
IT Governance
IT Management
Service Operations
33
IT Governance
IT Management
Service Operations
34
Real IT and business alignment needs to pervade the entire IT function IT must embed business alignment in the way it operates to ensure it remains relevant to the business Otherwise the business will bypass IT and go straight to suppliers and service providers Disintermediation of IT is central to the business plans of many internet-based service providers Failure to systematise alignment will expose IT to the danger of becoming irrelevant
IT Governance Sub-Functions
Defines strategy for IT function for both the IT function and how IT delivers on the overall business strategy Manages the definition and maintenance of overall enterprise IT architecture including systems and application standards and operational framework Implements IT governance and maintains leadership of the IT function
IT Governance
IT Strategy IT Enterprise Architecture management IT Governance and Leadership IT Financial Management IT Service and Sourcing Strategy IT Innovation Management IT Security Management
Manages the IT budget, finances, financial reporting and control standards, cost-benefit analysis Manages the process for defining how services and solutions should be acquired and managed Manages the process for bringing new ideas to an appropriate implementation to generate value Manages IT application and infrastructure security standards
January 27, 2014 36
Manages the relationship with the business and escalations , the identification of work, helps the business navigate IT processes and acts as the voice of the business to IT Offers business analysis and consulting services to translate business needs into a structured set of requirements to enable the business understand its needs Defines business-oriented solutions based on structured business requirements that comply with IT delivery and operational standards Manages the demand from the business for resources and ensures the business can accommodate the associated change Ensures the organisation is ready and able to accept the changes required of new or changed application
37
Solution Architecture
IT Management Sub-Functions
Manages the IT operation Plans for the introduction of new services
Operations Management Data, Information, Knowledge Management Infrastructure, Networks Management
IT Management
Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management Technology Selection and Management
Test Management
Manages IT infrastructure
Manages testing Manages and implements service and supplier acquisition Manages process for selecting suitable technologies Manages IT assets and software licenses Manages IT people resources, induction, training, development, standards Ensures quality of IT processes Manages delivery of programs and projects, manages standards and ensures consistency
27 January 2014 38
Manages business continuity, disaster recovery and system and application availability Ensures capacity of IT assets Implements and manages network of service level agreements
Service and Solution Support Infrastructure and Communications Implementation Analysis Design Realisation Test
Transition to Production
Transitions new systems and changes to production and manages handover to support, ensures new systems are operable and supportable
27 January 2014
40
Service Operations
Takeover and Management Operations Co-ordination and Risk Management Support Function Monitoring and Alerting Incident Management Service Request Management
Problem Management
27 January 2014
41
IT Management
Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management
Test Management
Service Operations
Takeover and Management Operations Co-ordination and Risk Management Support Function Monitoring and Alerting Incident Management Problem Management Facilities and Device Management Service Request Management
Service and Solution Support Infrastructure and Communications Implementation Analysis Design Realisation Test Transition to Production
Solution Architecture
Use this as a view of what areas you need to get better at Match with importance to identify high priority functions to address first
January 27, 2014 43
IT Management
Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management
Test Management
Service Operations
Takeover and Management Operations Co-ordination and Risk Management Support Function Monitoring and Alerting Incident Management Problem Management Facilities and Device Management Service Request Management
Service and Solution Support Infrastructure and Communications Implementation Analysis Design Realisation Test Transition to Production
Solution Architecture
IT Management
Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management
Test Management
Service Operations
Takeover and Management Operations Co-ordination and Risk Management Support Function Monitoring and Alerting Incident Management Problem Management Facilities and Device Management Service Request Management
Service and Solution Support Infrastructure and Communications Implementation Analysis Design Realisation Test Transition to Production
Solution Architecture
IT Management
Program and Project Management IT Process and Quality Management IT Resource Management Asset and License Management
Test Management
Service Operations
Takeover and Management Operations Co-ordination and Risk Management Support Function Monitoring and Alerting Incident Management Problem Management Facilities and Device Management Service Request Management
Service and Solution Support Infrastructure and Communications Implementation Analysis Design Realisation Test Transition to Production
Solution Architecture
Summary
Low confidence in IT by business stills exists IT delivery of what the business wants is poor IT does not explain itself well Business can have unrealistic expectations IT needs to structure itself for business alignment and delivery Real IT and business alignment needs to pervade the entire IT function IT must embed business alignment in the way it operates to ensure it remains relevant to the business Otherwise the business will bypass IT and go straight to suppliers and service providers Disintermediation of IT is central to the business plans of many internet-based service providers Failure to systematise alignment will expose IT to the danger of becoming irrelevant
47
More Information
Alan McSweeney http://ie.linkedin.com/in/alanmcsweeney
48