Gartner IAM Maturity Scale

Size: px
Start display at page:

Download "Gartner IAM Maturity Scale"

Transcription

1 Gartner IAM Maturity Scale Many large organizations have tried to reduce the levels of complexity within IAM and address compliance issues through technology projects. These projects are often poorly coordinated, focusing on checkbox compliance, rather than reducing risks and improving resiliency. The organization then finds itself struggling with another layer of complexity without realizing clear business value.

2 What level of maturity is your IAM program at and how do you ensure successful implementation and improved business value? IAM leaders and security and risk management professionals should use Gartner's maturity assessment for IAM to assess the maturity of their organizations' IAM programs and define the steps necessary to improve maturity. This will enable them to determine which aspects of a maturity level are most important to them and understand how to advance to the next level. This is a crucial exercise, because immature IAM programs are likely to be inefficient, ineffective and unable to deliver their full business value. The Maturity Phases These are built based on key indicators of maturity, which encompass management of processes, personnel as well as organization, technology, and business culture. Gartner has identified five maturity levels that represent increasing capabilities: Phase 1: Initial Phase 2: Developing Phase 3: Defined Phase 4: Managed Phase 5: Optimizing Governance is ad hoc and informal Tactical priorities set based on certain business drivers An IAM governance structure is defined Projects are aligned with vision and roadmap IAM performance targets are actualized Performance is continuously monitored Transformational value Tools put in place on a piecemeal basis Technology redundancy is likely The IAM PMO is established IAM architecture aligned with EA The IAM program is dynamic and adaptive to changes in business conditions Business value is tactical An IAM architecture is defined Responsibilities are poorly defined Discrete technology projects An IAM vision is defined Key stakeholders are actively involved in the IAM program Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 2 DO YOU KNOW WHERE YOU ARE ON THE IAM MATURITY SCALE Gartner have provided insight into what the various IAM principals such as governance, process, technology, infrastructure and business value looks like at each phase. This is then coupled with key recommendations on how you can transition to the?next ideal phase of maturity.

3 PHASE 1: JUST GETTING YOUR IAM PROGRAM STARTED At this level of maturity, IAM activity is unfocused and embraces diverse operational tasks within multiple silos. is ad hoc and informal, with no executive sponsorship. At best, responsible managers and administrators have only a conceptual awareness of IAM and its capabilities. IAM PROCESSES are ad hoc and informal, varying across silos, and have minimal automation. IAM activity is driven by the immediate needs of specific business problems and tasks, although competent managers and administrators may achieve some consistency in the way IAM activities are performed. Basic roles may have emerged informally, but responsibilities are poorly defined and scattered across the organization. Consequently, IAM activity has no measurable business value stakeholders are concerned only if actions are tardy or erroneous. Identify business drivers. Align efforts with the vision and mission of information security, specifically addressing any IAM relevant controls arising from policy. Identify processes, especially those for administering identity and entitlements. Seek effective sponsorship for technology projects, such as sponsorship by security or BU leadership. Establish liaisons between BUs, project teams and information security. Inventory IAM skills, at least on a per-project or per-process basis. Inventory IAM technologies; identify functional overlaps and redundancies; and look for opportunities to rationalize and consolidate IAM investment and to synchronize between silos. Identify opportunities for improved efficiency and if necessary for regulatory compliance for improved effectiveness. 3

4 PHASE 2: DEVELOPING YOUR IAM PROGRAM CISOs and other responsible managers are beginning to recognize IAM as a discipline in its own right, requiring development to be better integrated into IT management processes. is likely subsumed with information security governance, but within that, IAM might not be sufficiently clearly addressed to ensure good decision making. Responsible managers have identified certain business drivers and set tactical priorities for IAM focused on individual business units (BU); however, it is unlikely that there has been a check for coherence across those silos. IAM PROCESSES are semiformal, driven by a top-down approach, and tied to individual BUs and target systems. Operational processes focus on discrete parts of IAM, particularly the administration of identity and coarse-grained entitlements. Individual projects will have CISO or BU management sponsorship and their own project teams. A liaison between BUs, project teams and information security is informal. An informal inventory of IAM skills is initiated on a perproject and per-process basis. The IAM leader defines a high-level organization chart showing roles and links between IAM and business decision makers, as well as links within IT for IAM. IAM TECHNOLOGIES have been selected and implemented independently by individual BUs or for discrete target systems. No formal infrastructure design has been created. Technology redundancy is likely, in some cases, with multiple instances of the same class of product. No provisions are made for growth or change consistent with business objectives or history. CISOs may embark on infrastructure projects such as single sign-on (SSO) or identity governance and administration (IGA) product selection and implementation, still reflecting an ITdriven initiative and focus. is tactical and tied to specific processes. Efficiency improvements are commonly identified as goals, but performance targets are poorly defined. In some cases, failed audits or new regulatory compliance initiatives may have prompted hasty investments in technology to provide effectiveness improvements. Direct business value is typically low. It may slightly improve processes (for example, improved user experience); however, this will be difficult to translate into increased revenue or cost savings. Inordinate attention is paid to the justification of technology products based on IT drivers, rather than business drivers. Define and seek acceptance for an IAM governance structure. This may be congruent with the information security governance structure. However, for this period in the maturity cycle, it is likely to require separate focus, especially in larger organizations. Seek an executive sponsor for IAM. (Again, this may be wholly or partly subsumed by sponsorship for information security.) Define an IAM vision aligned with stakeholder needs to establish program objectives and priorities. Define and seek acceptance for a roadmap of investments and projects that cover program objectives according to priorities in a manner that is consistent with the organization s typical planning horizon. Formalize IAM processes, and seek consistency across BUs and target systems. Establish an IAM program management office (PMO), with a charter to manage the IAM program. (As for governance, this role may be wholly or partly subsumed within the information security PMO.) Define IAM program roles (that is, the participants within all IAM management, project and operational activities), and begin populating the responsible, accountable, supportive, consulted and informed (RASCI) matrix. Define participants skills, and identify training needs. Define a technology-focused IAM architecture (within the context of the organization s information security architecture). Rationalize and consolidate IAM investments. Select and implement new IAM technologies, as set out in the roadmap. Define interfaces between the IAM infrastructure and the information security and IT service and support management (ITSSM) infrastructures. Define IAM performance targets. Identify quantifiable improvements in efficiency and effectiveness; tie effectiveness improvements to information security and the organization s critical business imperatives to manage governance, risk and compliance (GRC). Look for ways of using IAM to drive increased revenue or cost savings for the organization. 4

5 PHASE 3: TRANSITION FROM DEVELOPMENT TO DEFINED At this level of maturity, CISOs and other responsible managers have identified the need for a common approach to IAM. An IAM leader and an IAM architect (not necessarily full-time or discrete positions) have been identified. structure is defined and accepted. This may be wholly or partly independent of the information security governance structure; the key thing is that IAM is recognized as a distinct initiative to be governed. There is an executive sponsor for IAM. The CISO or IAM leader has defined an IAM vision based on stakeholder needs. A roadmap has been defined and accepted. Initial investments are being made to implement the roadmap. TECHNOLOGY-FOCUSED IAM architecture (within the context of the organization s information security architecture) has been defined. Comprehensive IAM processes are formalized and consistent across BUs and target systems. The IAM PMO has been established, with a charter to manage the IAM program. IAM ROLES are defined; however, the RASCI matrix may not yet be fully accepted and embraced by all stakeholders. Participants skills and training needs are defined. Resource allocation planning is established to meet new operational and project needs in the coming years. INFRASTRUCTURE DESIGN (aligned with the architecture) is defined. Projects to rationalize and consolidate earlier IAM investments are underway, along with new IAM technology selection and implementation as set out in the roadmap. IAM performance targets are defined and achieved. There are sustained, quantifiable improvements in efficiency and effectiveness tied to information security and the organization s critical business imperative to manage GRC. is typically moderate providing incremental, but significant, improvements to existing processes that will result in increased revenue or cost savings for an organization. Refine the IAM governance structure to improve decisionmaking processes. Establish strategic planning and budgeting for IAM across the whole organization. Begin continual reviews of the IAM vision and roadmap to ensure continued alignment with the organization s strategic business goals. Review and (if necessary) refactor multiyear technology and other initiatives to align with the current vision. Integrate IAM processes across all BUs and target systems, and align them with relevant IT, business and partner processes. Seek the active involvement of key stakeholder in the IAM program, and establish the PMO as the liaison between different parts of the organization. Get stakeholder commitment to the RASCI matrix. Establish processes for continuous revision as organizational change occurs and capability expands. Establish proactive skill development for IAM participants. Add business and information views to the IAM architecture, and seek alignment with the enterprise architecture. Create a catalogue of standard technologies and artefacts within the architecture. Refine IAM performance targets as needed, as IAM coverage grows. Measure quantifiable improvement in support of multiple business-critical imperatives. Look for ways to use IAM to drive significantly increased revenue or cost savings for the organization. 5

6 PHASE 4: MANAGE YOUR IAM PROGRAM At this level of maturity, IAM programs are firmly established, and their business value is widely recognized. IAM PLANNING IAM TECHNOLOGY IAM ARCHITECTURE is fulfilled and refined and budgeting are performed across the entire organization at a strategic level. The IAM leader continually reviews the IAM vision and roadmap to ensure alignment with the organization s strategic business goals. Multiyear technology and other initiatives are reviewed and (if necessary) refactored to align with the current vision. has technology, information and business views, and is fully aligned with the enterprise architecture. From an enterprise architecture perspective, the architecture has an IAM viewpoint. IAM is architected for choice, with a catalog of standard technologies and artifacts. IAM PROCESSES IAM PROGRAM IAM INFRASTRUCTURE are integrated across BUs and target systems, and they are fully aligned with relevant IT, business and partner processes. has active involvement of key stakeholders, and the PMO functions as a liaison between information security, data center operations, application development, HR, finance, legal and compliance, and all lines of business. IAM roles are well-defined and aligned across the enterprise, and the RASCI matrix is fully populated. Organization charts accurately reflect the roles of IAM-relevant personnel within IT and across the enterprise. Proactive skill development is underway. vision. is smoothly integrated with the information security infrastructure to ensure highly effective use of complementary technologies, such as security information and event management (SIEM), user and entity behaviour analytics, segregation of duties (SOD) controls monitoring, and data access governance and the IAM infrastructure. IAM performance targets are actualized and refined. There are sustained, quantifiable improvements tied to GRC management, as well as all of the organization s critical business imperatives, to attract and retain customers; build an innovative and agile organization; maximize performance, profitability and competitiveness; and so on. is typically high IAM enables new ways of performing horizontal or vertical applications that will result in significantly increased revenue or cost savings for the organization.to align with the current vision. Optimize the IAM governance structure. Continually review and optimize the IAM vision and roadmap. Establish IAM processes as business processes, and continually optimize. Continually optimize the work of the PMO. Continually review and refine the RASCI matrix. Embed the IAM architecture within the enterprise architecture. Review standard technologies and artifacts, and remove or replace suboptimal choices. Optimize the value IAM delivers to information security, GRC management and other critical business imperatives. Continually monitor IAM performance targets, and institute changes as needed to promote business agility and competitive advantage. Look for ways to use IAM to enable new ways of doing business 6

7 PHASE 5: ENSURE CONTINUOUS OPTIMIZATION OF YOUR IAM PROGRAM At this level of maturity, IAM programs are integral to the business strategy and are continually reviewed and refined to cater to changes in technology, organizational dynamics or business requirements (i.e., optimized). Programs at this level are dynamic and adapt to changes in business conditions, even radical changes, and support even transformative business plans. structures are continually optimized. The IAM leader continually reviews and optimizes the vision and roadmap. IAM ARCHITECTURE is likely to be embedded in the enterprise architecture. Standard technologies and artifacts are continually reviewed, and suboptimal choices are removed or replaced. IAM PROCESSES are established as business processes and continually optimized. The work of the PMO is continually optimized. The RASCI matrix and skill development program are continually reviewed and refined. IAM INFRASTRUCTURE design is continually reviewed, and suboptimal elements are removed or replaced. The value IAM delivers to information security, GRC management and other critical business imperatives is continually optimized. Performance is continuously monitored by the leadership team, and changes are instituted, as needed, to promote business agility and competitive advantage. is potentially transformational IAM enables new ways of doing business across industries that will result in major shifts in industry dynamics. Further improvement is impossible; however, continued effort must be invested in the actions listed in the previous level s recommended actions for improvement to maintain this level of maturity. Many organizations fall into a hysteresis loop between this level and Level 4 (Managed). Relaxing the optimizing effort may have no measurable impact for some time, but processes and capabilities will eventually deteriorate. Sustained effort is required to return to Phase 5 (Optimizing). 7

8 Ensure IAM Going Forwards You should continuously perform an IAM maturity assessment on a quarterly or, at least, an annual basis to track improvements and gaps in maturity. The results can be used to: Gain increased visibility into the organization's approach to IAM and its IAM program maturity. Establish priorities, and inform budgeting and spending decisions. Discover program and control gaps. Demonstrate the progress of maturity initiatives. Adjust organizational structures or inform outsourcing decisions. Communicate with different audiences for example, the IT organization, users, business executives and the board of directors. IAM leaders should adopt the following steps to improve the maturity of their IAM programs: Assess the Current State. To increase maturity levels, an organization must understand its overall maturity level, as well as that of each indicator, and use this as a foundation to increase IAM program maturity. Understanding the current level of IAM maturity enables IAM leaders to recognize how this level constrains what can be achieved and to set expectations accordingly. Identify Gaps. Here, the IAM leader works to identify the program deficiencies preventing the IAM program from reaching its full potential. In many cases, the maturity of the IAM program is unbalanced across the indicators listed here. For example, having a well-developed set of operational processes and controls won't ensure a positive impact, unless they are supported by well-defined roles and well-understood (and accepted) responsibilities. Set Maturity Targets. Once the gap analysis is complete, maturity target setting defines specific goals for improvement. The maturity target is not a "blue sky" activity; it must be grounded in reality, recognizing business priorities, required resources, program change capacity, and the prevailing organizational personality, corporate culture and maturity. The IAM leadership team can define two levels of targets: Desired state: The strategic goal vision and roadmap components of strategy, including goals for maturity, may be lacking below Level 3. Planned state: The objective to be achieved within a given time interval at high levels of maturity, a planned state could coincide with the desired state. 4 5 Plan Improvements. Improvement planning identifies the gaps between the current and the desired states, and the transitional steps required to fill these gaps. (A planned state that is more than one maturity level above the current state is unlikely to be achieved in a single project. "Half-step" projects typically have a greater chance of success.) The program improvement plan must define the improvement projects that will be undertaken to fulfil the plan. The improvement plan defines the necessary details (e.g., the scope, objectives, deliverables, resources, costs and schedule) to initiate improvement projects. The projects can be prioritized based on budget, schedule, impact, resource availability and time to value that is, the time between project initiation and when it begins to deliver value. In many cases, not every maturity improvement project will be completed during the same year. Continuously Improve. As with other key activities, a continuous improvement program should be put in place for IAM. Gartner recommends reviewing IAM maturity and improvement goals on at least an annual basis, as part of the IAM program planning activity. IAM program maturity assessment is a cyclical activity. Subsequent assessments will evaluate now-current states (a measure of the success of any maturity improvement projects), re-evaluate the desired states and define new planned states. At Level 3 (Defined) or above in management processes, the desired states are likely to flow from strategic planning. Whether you are at the beginning phase of your IAM program, looking to shift into the next gear or planning for the future, 2018 Gartner Identity & Access Management Summit will be covering all of these stages in more detail. Offering practical and actionable insight into how you can update and refine your IAM program based on leading-edge research and renowned analyst insight. Find out more 8

Federal Segment Architecture Methodology Overview

Federal Segment Architecture Methodology Overview Federal Segment Architecture Methodology Background In January 2008, the Federal Segment Architecture Working Group (FSAWG) was formed as a sub-team of the Federal CIO Council s Architecture and Infrastructure

More information

MBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and

MBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and Enterprise Architecture is a holistic view of an enterprise s processes, information and information technology assets as a vehicle for aligning business and IT in a structured, more efficient and sustainable

More information

Agile Enterprise Architecture. Presented by Russell Bryant March 4, 2009

Agile Enterprise Architecture. Presented by Russell Bryant March 4, 2009 Agile Enterprise Architecture Presented by Russell Bryant March 4, 2009 The Rise of Agile Architecture Traditional Enterprise Architecture maturing Demands of IT and business require agility, adaptability

More information

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2 Passit4Sure.OG0-093.221Questions Number: OG0-093 Passing Score: 800 Time Limit: 120 min File Version: 7.1 TOGAF 9 Combined Part 1 and Part 2 One of the great thing about pass4sure is that is saves our

More information

Developing a Business Architecture Practice in a Large Organization

Developing a Business Architecture Practice in a Large Organization Developing a Practice in a Large Organization One Company s Experience so far Randal Chenard, October 2012 1 Developing a Practice Overview Ø Defining Ø The Architect role versus the practice Ø What does

More information

Enterprise Architecture: A Governance Framework

Enterprise Architecture: A Governance Framework Enterprise Architecture: A Governance Framework Part I: Embedding Architecture into the Organization Sohel Aziz, Thomas Obitz, Reva Modi and Santonu Sarkar Introduction Enterprise Architecture, the holistic

More information

Enterprise Monitoring Management

Enterprise Monitoring Management White Paper Application Delivery Management Enterprise Monitoring Management Key steps and components of a successful solution Table of Contents page Executive Summary... 1 Setting the Goal: Establishing

More information

Proactively Managing ERP Risks. January 7, 2010

Proactively Managing ERP Risks. January 7, 2010 Proactively Managing ERP Risks January 7, 2010 0 Introductions and Objectives Establish a structured model to demonstrate the variety of risks associated with an ERP environment Discuss control areas that

More information

TOGAF Foundation Exam

TOGAF Foundation Exam TOGAF Foundation Exam TOGAF 9 Part 1 (ESL) Time Limit 90 minutes Number of questions 40 Pass-through 22 1. Which of the following best describes the meaning of "Initial Level of Risk" in Risk Management?

More information

Creating an Agile PMO via Scrum

Creating an Agile PMO via Scrum Creating an Agile PMO via Scrum Deliver PMO Value Early and Often Utilize Scrum to be Operationally Effective and Efficient Paul Thomas Gilchrest; CSM, ITIL v3, PMP COO & Principal PMO Managing Director

More information

Microsoft REJ Framework: Step by Step

Microsoft REJ Framework: Step by Step Microsoft REJ Framework: Step by Step Quantifying the Business Value of Information Technology (IT) Investments Abstract IT managers today face challenges of delivering products to markets faster, making

More information

Exam Questions OG0-091

Exam Questions OG0-091 Exam Questions OG0-091 TOGAF 9 Part 1 https://www.2passeasy.com/dumps/og0-091/ 1. According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of an overall

More information

4/26. Analytics Strategy

4/26. Analytics Strategy 1/26 Qlik Advisory As a part of Qlik Consulting, Qlik Advisory works with Customers to assist in shaping strategic elements related to analytics to ensure adoption and success throughout their analytics

More information

Gaining and Maintaining IT & Business Alignment. presented by Robert Sheesley for PMI Pittsburgh Chapter

Gaining and Maintaining IT & Business Alignment. presented by Robert Sheesley for PMI Pittsburgh Chapter Gaining and Maintaining IT & Alignment presented by Robert Sheesley for PMI Pittsburgh Chapter Agenda The Dynamics: Not an Accidental Love Triangle The Problem: The Vicious Cycle of Alignment Aligning

More information

WHITE PAPER. The Business Architecture Practice. February Whynde Kuehn, S2E Consulting Inc., USA

WHITE PAPER. The Business Architecture Practice. February Whynde Kuehn, S2E Consulting Inc., USA WHITE PAPER February 2017 The Business Architecture Practice A practical approach to establish and mature your internal practice Whynde Kuehn, S2E Consulting Inc., USA Audience This white paper is designed

More information

Data Governance Implementation

Data Governance Implementation Service Offering Implementation Leveraging Data to Transform the Enterprise Benefits Use existing data to enable new business initiatives Reduce costs of maintaining data by increasing compliance, quality

More information

I. Governance 1. Governance for State Agency Technology Projects

I. Governance 1. Governance for State Agency Technology Projects I. Governance 1 Introduction & Overview: While Governance is far from being a panacea or a stand-alone solution for improving the Program & Project Management, it is a first and critically important element

More information

TOGAF 9.1 Phases E-H & Requirements Management

TOGAF 9.1 Phases E-H & Requirements Management TOGAF 9.1 Phases E-H & Requirements Management By: Samuel Mandebvu Sources: 1. Primary Slide Deck => Slide share @ https://www.slideshare.net/sammydhi01/learn-togaf-91-in-100-slides 1. D Truex s slide

More information

On the road(map) again. Balancing the emerging regulatory requirements in the Middle East public sector

On the road(map) again. Balancing the emerging regulatory requirements in the Middle East public sector On the road(map) again Balancing the emerging regulatory requirements in the Middle East public sector 38 Deloitte A Middle East Point of View Fall 2014 Public Sector Final destination Governments in the

More information

CORROSION MANAGEMENT MATURITY MODEL

CORROSION MANAGEMENT MATURITY MODEL CORROSION MANAGEMENT MATURITY MODEL CMMM Model Definition AUTHOR Jeff Varney Executive Director APQC Page 1 of 35 TABLE OF CONTENTS OVERVIEW... 5 I. INTRODUCTION... 6 1.1 The Need... 6 1.2 The Corrosion

More information

Maximizing value from your lines of defense

Maximizing value from your lines of defense Insights on governance, risk and compliance December 2013 Maximizing value from your lines of defense A pragmatic approach to establishing and optimizing your LOD model Contents Introduction Are you getting

More information

Module 1: Service Management as a Practice. ITIL Foundation v V1

Module 1: Service Management as a Practice. ITIL Foundation v V1 Module 1: Service Management as a Practice When designing a service or a process, it is imperative that all the roles are clearly defined. A trademark of high-performing organizations is the ability to

More information

IT Strategic Plan Portland Community College 2017 Office of the CIO

IT Strategic Plan Portland Community College 2017 Office of the CIO IT Strategic Plan Portland Community College 2017 Office of the CIO 1 Our Vision Information Technology To be a nationally recognized standard for Higher Education Information Technology organizations

More information

IT Strategic Plan Portland Community College 2017 Office of the CIO

IT Strategic Plan Portland Community College 2017 Office of the CIO IT Strategic Plan Portland Community College 2017 Office of the CIO 1 Our Vision Information Technology To be a nationally recognized standard for Higher Education Information Technology organizations

More information

How Analytics Will Transform Internal Audit

How Analytics Will Transform Internal Audit How Analytics Will Transform Internal Audit Do you have something to say about this article? Visit the Journal pages of the ISACA website (www.isaca. org/journal), find the article and click on the Comments

More information

IIA ERM Summit. August 22, 2010

IIA ERM Summit. August 22, 2010 IIA ERM Summit August 22, 2010 Key market drivers have created a perfect storm for risk transformation Trends Challenges Opporties SEC rule changes requiring additional disclosures in proxy and information

More information

Business Architecture Fundamentals

Business Architecture Fundamentals Course Description 3 day - expert led hands-on In this turbulent and increasingly competitive global economy, and the rapid pace of change in business models involving changing technology and customer

More information

IRM s Professional Standards in Risk Management PART 1 Consultation: Functional Standards

IRM s Professional Standards in Risk Management PART 1 Consultation: Functional Standards IRM s Professional Standards in Risk PART 1 Consultation: Functional Standards Setting standards Building capability Championing learning and development Raising the risk profession s profile Supporting

More information

Moving to a Service-Oriented Architecture

Moving to a Service-Oriented Architecture Tijdschrift voor Economie en Management Vol. L, 4, 2005 Moving to a Service-Oriented Architecture by K. VANHOLST, J. WILMAERS and J. CATTERSEL Kris Vanholst Inno.com, Beersel Jan Wilmaers Inno.com, Beersel

More information

INTERNAL AUDIT DIVISION REPORT 2018/105. Audit of strategic support to the global humanitarian inter-agency coordination mechanisms

INTERNAL AUDIT DIVISION REPORT 2018/105. Audit of strategic support to the global humanitarian inter-agency coordination mechanisms INTERNAL AUDIT DIVISION REPORT 2018/105 Audit of strategic support to the global humanitarian inter-agency coordination mechanisms The Emergency Relief Coordinator needed to formulate a vision, mission

More information

Agile Essentials Track: Business Services

Agile Essentials Track: Business Services Agile Essentials Track: Business Services Presenter: Mark Thomas Synopsis Are you a victim of building the wrong solutions slowly? If so, you re not alone, and considering an Agile approach may be the

More information

ISACA Systems Implementation Assurance February 2009

ISACA Systems Implementation Assurance February 2009 ISACA Pressures Today Pressure to increase realization of value from IT spending Pressure to deliver on IT projects at a time when resources/budgets are constrained Pressure from risk of technology-based

More information

Toolbox for Architecture Framework Discussions at The Open Group. SKF Group, February 2018

Toolbox for Architecture Framework Discussions at The Open Group. SKF Group, February 2018 Toolbox for Architecture Framework Discussions at The Open Group SKF Group, February 2018 Toolbox Overview Components in our Enterprise Architecture Management: APPROACH FRAMEWORK CONTENT TOOLBOX Architecture

More information

Identity & Access Management Unlocking the Business Value

Identity & Access Management Unlocking the Business Value Identity & Management Unlocking the Business Value Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Unlocking the Value of Identity and Management Defining the IAM challenge

More information

TOGAF 9.1 in Pictures

TOGAF 9.1 in Pictures TOGAF 9. in Pictures The TOGAF ADM Cycle Stage Set up an EA team and make sure it can do its work The ADM is about understanding existing architectures and working out the best way to change and improve

More information

Chicagoland Learning Leaders' Copy

Chicagoland Learning Leaders' Copy How the New Workplace Analytics Will Revitalize Your Organization 2012 Harvard Business School Publishing Corporation Adapted by permission of Harvard Business School Publishing Corporation ISBN: 978-1-4221-6639-0

More information

RSA Solution for egrc. A holistic strategy for managing risk and compliance across functional domains and lines of business.

RSA Solution for egrc. A holistic strategy for managing risk and compliance across functional domains and lines of business. RSA Solution for egrc A holistic strategy for managing risk and compliance across functional domains and lines of business Solution Brief Enterprise Governance, Risk and Compliance or egrc is an umbrella

More information

Collaborative Planning Methodology (CPM) Overview

Collaborative Planning Methodology (CPM) Overview Collaborative Planning Methodology (CPM) October 2012 of the Collaborative Planning Methodology Planning is done to effect change in support of an organization s Strategic Plan, and the many types of planners

More information

UN-HABITAT ENTERPRISE RISK MANAGEMENT IMPLEMENTATION GUIDELINES

UN-HABITAT ENTERPRISE RISK MANAGEMENT IMPLEMENTATION GUIDELINES UN-HABITAT ENTERPRISE RISK MANAGEMENT IMPLEMENTATION GUIDELINES April 2015 1 P a g e UN-Habitat ERM Implementation Guidelines April 2015 UN-HABITAT ENTERPRISE RISK MANAGEMENT IMPLEMENTATION GUIDELINES

More information

PORTFOLIO MANAGEMENT Thomas Zimmermann, Solutions Director, Software AG, May 03, 2017

PORTFOLIO MANAGEMENT Thomas Zimmermann, Solutions Director, Software AG, May 03, 2017 UNLEASH YOUR DIGITAL VISION #WITHOUTCOMPROMISE Innovation in Business & IT Transformation PORTFOLIO MANAGEMENT Thomas Zimmermann, Solutions Director, Software AG, May 03, 2017 2017 Software AG. All rights

More information

Integration Competency Center Deployment

Integration Competency Center Deployment Service Offering Integration Competency Center Deployment Achieve Higher Levels of Performance & Capability Benefits Experienced Informatica Professional Services managers provide invaluable insight Lower

More information

Enterprise Management Frameworks & TOGAF 9

Enterprise Management Frameworks & TOGAF 9 Enterprise Management Frameworks & TOGAF 9 Presented By: Mr. Robert (Bob) Weisman MSc, PEng, PMP, CD CEO/Principal Consultant, Build The Vision Inc. Robert.weisman@buildthevision.ca www.buildthevision.ca

More information

Architecting IT is Different Than Architecting the Business

Architecting IT is Different Than Architecting the Business Architecting IT is Different Than Architecting the Business Presented by Tim Westbrock Managing Director, EAdirections The Open Group Architecture Practitioners Conference February 2, 2010 twestbrock@eadirections.com

More information

elevating the role of finance at Mary Lanning Healthcare

elevating the role of finance at Mary Lanning Healthcare CASE STUDY REPRINT November 2013 Amanda Hoffman Jay Spence healthcare financial management association hfma.org elevating the role of finance at Mary Lanning Healthcare One central Nebraska hospital sought

More information

The Course Modules for TOGAF Online Certification Training: 1. Introduction. TOGAF Structure. 2. Core Concepts

The Course Modules for TOGAF Online Certification Training: 1. Introduction. TOGAF Structure. 2. Core Concepts The Course Modules for TOGAF Online Certification Training: 1. Introduction An introduction to TOGAF TOGAF Structure 2. Core Concepts Definition of key concepts and terms Architecture Framework 3. ADM

More information

PMO In A Box. Prepared for UBS

PMO In A Box. Prepared for UBS PMO In A Box Prepared for UBS Roadmap Why PMO In A Box? Establish PMO Governance Standardize Methodology Create a Stakeholder Partnership Plan 2 PMOs Are In Transition 3 CEB PMO Executive Council pmo in

More information

Identity and Access Management. Program Primer

Identity and Access Management. Program Primer Identity and Access Program Primer Executive Summary The role of identity in the modern enterprise has been steadily growing in importance over the last decade. As the enterprise technology stack continues

More information

UNF Finance and Audit Committee January 15, 2013

UNF Finance and Audit Committee January 15, 2013 Item 7 UNF Finance and Audit Committee January 15, 2013 Issue Office of Internal Auditing Audit Planning Methodology Proposed Action Report Background Information The purpose of this item is to present

More information

Applying Architecture to Business Transformation and Decision-Making

Applying Architecture to Business Transformation and Decision-Making QPR Software Customer Case Study: Applying Architecture to Business Transformation and Decision-Making Authors: Patrik Maltusch, Aalto University and Virpi Nieminen, QPR Software, Plc Finnish Aalto university

More information

Management Accounting Concepts

Management Accounting Concepts 1 First Issued February 1989 Revised March 1998 Management Accounting Concepts CONTENTS Paragraphs Introduction... 1-6 Evolution and Change in Management Accounting... 7-20 Management Accounting and the

More information

The Communications Audit NEVER MORE RELEVANT, NEVER MORE VALUABLE:

The Communications Audit NEVER MORE RELEVANT, NEVER MORE VALUABLE: WHITE PAPER The Communications Audit NEVER MORE RELEVANT, NEVER MORE VALUABLE: VALUE PROPOSITION OBJECTIVES METHODOLOGY BY GARY DOLZALL CHIEF COMMUNICATIONS OFFICER I. INTRODUCTION: THE VALUE PROPOSITION

More information

Planview Enterprise One

Planview Enterprise One Data sheet Planview Enterprise One Accelerate strategic execution enterprise-wide across all work and resources Savvy business leaders aspire to confidently drive change that advances their strategic objectives,

More information

Strategic & Agile Project Portfolio Management

Strategic & Agile Project Portfolio Management Welcome Transforming your Project Portfolio Management Processes 1. Portfolio Management Sara Nuñez 2. Project Management Ali Forouzesh Objetive Bring awareness of the transformational needs of the project

More information

Best Practices for EA and PPM Integration Toward Improved Business Value Outcomes

Best Practices for EA and PPM Integration Toward Improved Business Value Outcomes G00237525 Best Practices for EA and PPM Integration Toward Improved Business Value Outcomes Published: 24 September 2012 Analyst(s): R. Scott Bittler When enterprise architecture and project and portfolio

More information

Information Management Strategy

Information Management Strategy Information Management Strategy What You Need To Know! David Pierce & Lascelles Forrester 1 Copyright 2010 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks

More information

Elevating an Enterprise Architect s Strategic Impact in Transforming the Business Six recommendations to develop your strategic edge

Elevating an Enterprise Architect s Strategic Impact in Transforming the Business Six recommendations to develop your strategic edge Elevating an Enterprise Architect s Strategic Impact in Transforming the Business Six recommendations to develop your strategic edge Based on the 2017 The Role of the Enterprise Architect Study Conducted

More information

How a project approach will build change management capability across your organization

How a project approach will build change management capability across your organization capability across your How a project approach will build change management capability across your Prosci Webinar How a project approach will build change management Enterprise Change Management Organizational

More information

A Vision of an ISO Compliant Company by Bruce Hawkins, MRG, Inc.

A Vision of an ISO Compliant Company by Bruce Hawkins, MRG, Inc. A Vision of an ISO 55000 Compliant Company by Bruce Hawkins, MRG, Inc. ISO 55000 refers to a series of three standards outlining the purpose, requirements, and implementation guidance for an Asset Management

More information

The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ]

The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ] s@lm@n The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ] https://certkill.com Topic break down Topic No. of Questions Topic 1: Volume A 100 Topic 2: Volume B 134 2 https://certkill.com

More information

The Enterprise SOA Implementation Lifecycle Explained

The Enterprise SOA Implementation Lifecycle Explained The Enterprise SOA Implementation Lifecycle Explained Applies to: Enterprise Architects, Business Process Experts Summary Enterprise SOA implementation has been mysterious to many. It can be demystified

More information

Creating a Project Management Office (PMO)

Creating a Project Management Office (PMO) Creating a Project Management Office (PMO) By Jane Walton Managing Director, Clarity Decisions LLC Table of Contents Executive Summary... 3 Creating a PMO... 4 The Foundation Understand the Cultural Context...

More information

The Future of Business Analysis. October 2013

The Future of Business Analysis. October 2013 The Future of Business Analysis October 2013 Discussion Points! Why have Roles?! Why do Business Analysis?! History of Business Analysis! Changing Business Realities! Business Analysis in the Organization!

More information

BA25-Managing the Agile Product Development Life Cycle

BA25-Managing the Agile Product Development Life Cycle BA25-Managing the Agile Product Development Life Cycle Credits: 28 PDUs / 4 Days Course Level: Intermediate/Advanced Course Description: This 4-day course explores how adapting Agile values and principles

More information

CHANGE MANAGEMENT IN PROCUREMENT TRANSFORMATION. Bloomberg. Page 1

CHANGE MANAGEMENT IN PROCUREMENT TRANSFORMATION. Bloomberg. Page 1 CHANGE MANAGEMENT IN PROCUREMENT TRANSFORMATION Bloomberg Page 1 Agenda and Objective Defining the challenges we faced Creating the business case Building the change management playbook Setting the strategy

More information

At the Heart of Rationalizing Application Portfolio

At the Heart of Rationalizing Application Portfolio At the Heart of Rationalizing Application Portfolio Cut the Bloat: Right-Size Your Application Portfolio Continuous assessment and maintenance of applications is key to rationalization opportunities Abstract

More information

Initiative Mapping Fundamentals

Initiative Mapping Fundamentals Initiative Mapping Fundamentals The Business Architecture Summit Sparx Services North America www.sparxsystems.us About Sparx Services North America Align information technology and systems engineering

More information

BIM. the way we see it. Staying Informed. A BI Service Center is vital for delivering your overall Information Strategy

BIM. the way we see it. Staying Informed. A BI Service Center is vital for delivering your overall Information Strategy Staying Informed A BI Service Center is vital for delivering your overall Information Strategy Introduction The last decade has seen forward-thinking organizations lead the way, in part, through a more

More information

WHITE PAPER. The Foundation of a Successful ITAM Program - In 5 Not So Easy Steps

WHITE PAPER. The Foundation of a Successful ITAM Program - In 5 Not So Easy Steps WHITE PAPER The Foundation of a Successful ITAM Program - In 5 Not So Easy Steps The Foundation of a Successful ITAM Program - In 5 Not So Easy Steps If anyone ever tells you It s easy to establish a successful

More information

The Role of Architecture in Enterprise Processes

The Role of Architecture in Enterprise Processes Journal of Applied Business and Economics The Role of Architecture in Enterprise Processes Charles W. Butler Colorado State University This paper defines a strategy for implementing enterprise architecture

More information

IT MANAGER - BUSINESS & TECHNOLOGY APPLICATIONS (12235) ( )

IT MANAGER - BUSINESS & TECHNOLOGY APPLICATIONS (12235) ( ) GENERAL DESCRIPTION OF WORK IT MANAGER - BUSINESS & TECHNOLOGY APPLICATIONS (12235) (31000275) Positions in this banded class are responsible for supervisory and managerial work in directing a designated

More information

Project Planning and Management (PPM) V2.0. WBS Dictionary

Project Planning and Management (PPM) V2.0. WBS Dictionary Project Planning and Management (PPM) V2.0 WBS Dictionary Software as a Service (SaaS) Version 1.0 August 2014 1 Table of Contents PPM V2.0 Work Breakdown Structure (WBS) Dictionary 1 Project Type: Software

More information

White Paper Describing the BI journey

White Paper Describing the BI journey Describing the BI journey The DXC Technology Business Intelligence (BI) Maturity Model Table of contents A winning formula for BI success Stage 1: Running the business Stage 2: Measuring and monitoring

More information

TDT4252 Modelling of Information Systems Advanced Course

TDT4252 Modelling of Information Systems Advanced Course 1 TDT4252 Modelling of Information Systems Advanced Course Sobah Abbas Petersen Adjunct Associate Professor sap@idi.ntnu.no 2 Today s lecture Introduction to, Zachman s EA Framework Based on slides from

More information

Banner Executive Steering Committee (BESC) Governance Charter

Banner Executive Steering Committee (BESC) Governance Charter Banner Executive Steering Committee (BESC) Governance Charter November 11, 2016 Purpose The Banner Executive Steering Committee is responsible for the oversight and delivery of the overall strategic direction

More information

Welcome to the postmodern era for public sector ERP

Welcome to the postmodern era for public sector ERP Welcome to the postmodern era for public sector ERP Time to update your public sector enterprise resource planning (ERP)? Consider a postmodern strategy to address your unique requirements. Welcome to

More information

( %)'* + 7# (&)*)')%&&+)*)-.)/##############################################################!

( %)'* + 7# (&)*)')%&&+)*)-.)/##############################################################! "$%&'% ( %)'* + " $%&'(&)*)')%&&+), " (&)*)')%&&+)(&-( "" (&)*)')%&&+)*)-.)/0 " (&)*)')%&&+)*)-.)/$1 + '%, - "%&&%. 0 /(.(.&%(&)*)'23-(&%2-+()'4 0 &%5&((&)*)'()-(/(&4 / 0$%'% 1 -+'(.-(6.(/(&6&-((26&3&-/*6/(&,

More information

Enterprise Data Strategy and Governance

Enterprise Data Strategy and Governance Project Charter DATE: 9/20/2017 VERSION 1.0 Prepared By: Melany Leavitt and Paul Given Page 1 Document Revision History Version Number Date Description.01 5/25/2017 Draft Charter.02 9/1/2017 Draft for

More information

PAS 181:2014. Smart city framework Guide to establishing strategies for smart cities and communities. Executive summary.

PAS 181:2014. Smart city framework Guide to establishing strategies for smart cities and communities. Executive summary. PAS 181:2014 strategies for smart cities and communities Page 1 of 11 1 Introduction The smart city framework (SCF) is a guide intended for use by leaders, at all levels and from all sectors, of smart

More information

Enabling a Successful Multisourcing Model: An NTT DATA Services Insight

Enabling a Successful Multisourcing Model: An NTT DATA Services Insight Enabling a Successful Multisourcing Model: An NTT DATA s Insight NTT DATA welcomed Dell s into the family in 2016. Together, we offer one of the industry s most comprehensive services portfolios designed

More information

IT MANAGER - BUSINESS & TECHNOLOGY APPLICATIONS (12235) ( )

IT MANAGER - BUSINESS & TECHNOLOGY APPLICATIONS (12235) ( ) GENERAL DESCRIPTION OF WORK Positions in this banded class are responsible for supervisory and managerial work in directing a designated team of computer applications analysts and applications programmers

More information

CGEIT Certification Job Practice

CGEIT Certification Job Practice CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge

More information

The Business Architecture Spectrum: The Art and Science of Architecture

The Business Architecture Spectrum: The Art and Science of Architecture The Business Architecture Spectrum: The Art and Science of Architecture Midwest Architecture Collaboration Community (MACC) Conference University of Minnesota, MacNamara Center November 13, 2014 By Mindy

More information

TOGAF 9.1. About Edureka

TOGAF 9.1. About Edureka Course Curriculum: Your 31 Module Learning Plan TOGAF 9.1 About Edureka Edureka is a leading e-learning platform providing live instructor-led interactive online training. We cater to professionals and

More information

LEAN ENTERPRISE TRANSFORMATION

LEAN ENTERPRISE TRANSFORMATION LEAN ENTERPRISE TRANSFORMATION SONJA KRESOJEVIC @SONJAK18 @MYSPINNAKERCO SPINNAKER SONJA KRESOJEVIC Co-founder of Spinnaker, NY based consultancy focused on enterprise transformation. Senior executive

More information

Themes for Architecture Success

Themes for Architecture Success Sponsorship Common Themes for Architecture Success William Koscho wkoscho@gmail.com William Ries bill@ries.org The SEI Architecture Technology User Network (SATURN) 2011 May 16-20 The above named individuals

More information

Evaluating and Building Portfolio Management Maturity

Evaluating and Building Portfolio Management Maturity Evaluating and Building Portfolio Management Maturity Hostetter and Norris, UMD PM Symposium 2016 Evaluating and Building Portfolio Management Maturity Susan Hostetter and Sherri Norris U.S. Census Bureau,

More information

An Overview of the AWS Cloud Adoption Framework

An Overview of the AWS Cloud Adoption Framework An Overview of the AWS Cloud Adoption Framework Version 2 February 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes

More information

Building a Roadmap to Robust Identity and Access Management

Building a Roadmap to Robust Identity and Access Management Building a Roadmap to Robust Identity and Access Management Elevating IAM from Responsive to Proactive From cases involving private retailers to government agencies, instances of organizations failing

More information

Governance for GIS Esri International User Conference 2018

Governance for GIS Esri International User Conference 2018 Governance for GIS Esri International User Conference 2018 Matthew Lewin Practice Manager, Management Consulting Esri Canada July 2018 What is Governance? Governance refers to an organization s system

More information

Architecting an On Demand Enterprise with the Federal Enterprise Architecture (FEA) Andras R. Szakal Chief Architect, IBM Federal Software, S&D

Architecting an On Demand Enterprise with the Federal Enterprise Architecture (FEA) Andras R. Szakal Chief Architect, IBM Federal Software, S&D Architecting an On Demand Enterprise with the Federal Enterprise Architecture (FEA) Andras R. Szakal Chief Architect, IBM Federal Software, S&D Agenda? What is driving organizations toward an On Demand

More information

G11: Convergence of Security and Compliance - An Integrated Approach to Information Risk Management Larry A. Jewik and Ramy Houssaini, Kaiser

G11: Convergence of Security and Compliance - An Integrated Approach to Information Risk Management Larry A. Jewik and Ramy Houssaini, Kaiser G11: Convergence of Security and Compliance - An Integrated Approach to Information Risk Management Larry A. Jewik and Ramy Houssaini, Kaiser Permanente The Convergence of Security and Compliance -- An

More information

Strategic Asset Management Plan

Strategic Asset Management Plan Strategic Asset Management Plan Prepared for Town of Oakville December 2017 CH2M HILL Canada Limited 245 Consumers Road Suite 400 Toronto, ON M2J 1R3 CA Contents Section Page Acronyms and Abbreviations...

More information

ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE. Sample Paper 2, version 5.1. To be used with Case Study 1 QUESTION BOOKLET

ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE. Sample Paper 2, version 5.1. To be used with Case Study 1 QUESTION BOOKLET ITIL Qualification: MANAGING ACROSS THE LIFECYCLE (MALC) CERTIFICATE Sample Paper 2, version 5.1 To be used with Case Study 1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style, Complex

More information

PROCESS LED TRANSFORMATION & SUSTAINABILITY

PROCESS LED TRANSFORMATION & SUSTAINABILITY PROCESS LED TRANSFORMATION & SUSTAINABILITY BUSINESS PROCESS MANAGEMENT USE CASE IMPRIVA Inc. 101A Clay St. #196 San Francisco, CA 94111 877.838.9714 www.impriva.com US Content Pain Point 3 Key Terms 3

More information

Becoming agile A guide to elevating internal audit s performance and value. Part 1: Understanding agile internal audit

Becoming agile A guide to elevating internal audit s performance and value. Part 1: Understanding agile internal audit Becoming agile A guide to elevating internal audit s performance and value Part 1: Understanding agile internal audit The time for change is now Internal Audit groups are continually challenged to provide

More information

IT Management Maturity Model

IT Management Maturity Model IT Management Model In support of the implementation of the Federal Information Technology Acquisition Reform Act (FITARA) Published September 2015 Version 1 Advancing Government Through Collaboration,

More information

Data Governance People & Processes Supported by Technology

Data Governance People & Processes Supported by Technology Data Governance People & Processes Supported by Technology Larisa Vladinova Adastra Bulgaria Georgi Ganev IBM Bulgaria 18 th Finance Tech Forum 14 April 2016, Sofia 1 Data Governance Overview Data Governance

More information

Analytics: The Widening Divide

Analytics: The Widening Divide Neil Beckley, FSS Leader, IBM Growth Markets Analytics: The Widening Divide How companies are achieving competitive advantage through analytics What you will take away from this session 1 Understand Why

More information

State of Minnesota IT Governance Framework

State of Minnesota IT Governance Framework State of Minnesota IT Governance Framework April 2013 rev. February 2014 Table of Contents Table of Contents... 2 Introduction... 4 IT Governance Overview... 4 Process for Developing the New Framework...

More information

PART 1: INTRODUCTION. Purpose of the BIZBOK Guide. What is Business Architecture?

PART 1: INTRODUCTION. Purpose of the BIZBOK Guide. What is Business Architecture? PART 1: INTRODUCTION Purpose of the BIZBOK Guide A Guide to the Business Architecture Body of Knowledge (BIZBOK Guide) provides an industry standard framework for business architecture practitioners and

More information