Service Is So Last Decade hot topics for IT management in the twenty-teens.

Slides:



Advertisements
Similar presentations
A brief for top management Prepared by the Institute of Quality Assurance Integrated Management Special Interest Group Future management is integrated.
Advertisements

Real Estate Project Regulation and Licensing Department Closeout Certification Meeting July 20, 2012 Lori Hewig, IT Director David Martinez, Project Manager.
Organising the Chaos Lynley Lee ICT Manager AsureQuality Limited.
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Best Practice User Group™ An introduction. Our Vision and Mission Best Practice User Group™ the user group for programmes, projects and risks. Our mission.
© 2006 itSMF USA. All rights reserved. ITIL v3 – Familiar Ground, New Territory David Cannon ITSM Practice Principal - HP.
Provide a platform built on security, privacy, and trust Maintain an evergreen service Offer highly configurable and scalable services.
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
New Directions for the Collections Trust Nick Poole, Chief Executive, Collections Trust.
Copyright 2005 CMMI and ITIL Alison Adams & Kieran Doyle.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
TI BISNIS ITG using COBIT &
COBIT - II.
ITIL, CMMI, MOPS, six-Sigma, LEAN.... (where to start?) A Voyage Thru the Acronyms. Methodologies for managing IT Dennis Adams a s s o c i a t e s Management.
The Cloud: Demystified Neil Cattermull Frontier Technology.
Plug and Socket Preparing IT Management for Governance Rob England v6v6.
Copyright © 2006 ps_testware ps_testware A Company Profile.
Why your clients need and whatcan do for them!
SharePoint Server 2013 Features and Scenarios for IT Professionals First Lastname, Title March, 2014 Software Assurance Planning Services.
The CIO’s response to the Global Agenda Daniel Benton, Global Managing Director IT Strategy.
Confidential | Copyright © QA Agility Technologies Our Testing DNA  Book published on Selenium by McGraw Hill  Certified Trainers on Agile Testing (ATA.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
Responsible Conduct of Research (RCR) Farida Lada October 16, 2013
IT Internal Audit Survey Overview of survey findings May 2009 IT ADVISORY ADVISORY.
PROJECT in a box PMO for under £1,000 “World Class with a global community of users” Project Manager Today April 2014.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Methodologies for managing IT A Voyage through Acronyms Dennis Adams a s s o c i a t e s UK Oracle User Group Conference 2007 Dennis Adams 4th December.
IRISLink February 2009 EUROPEAN COMMISSION SECRETARIAT-GENERAL SG-B-5 Document Management Policy Electronic records and archives management at.
Presentation Path  Introduction to Ved Consultancy and OpenText  Current Challenges  The Valued Customers and Sectors  Our Solutions  Demo. Together,
Changing global scenario of Information Security and its effects on Security testing By Anshul Abhang Founder Director, FLUXONIX CEH, CHFI, ECSA, LPT,
Overview of COBIT5 and Impact on Local Content for IT By Mrs Tokunbo Martins Director Banking Supervision (Central Bank of Nigeria)
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
SMALL BUSINESS SHOWCASE Syneren Technologies Corp. Small Business Size: 8(a), SDB, Woman owned small business Niche Areas: R&D, Hardware, Systems Engineering.
LogicaLive – sosiaalinen media liiketoiminnan tukena Logica Marraskuu 2011.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
IT Internal Audit “Hot Topics” April 2011 Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking.
Cloud Computing Presented by Alicia Wallis and Kerri Warf.
Taking your PMO through that adolescent period PROJECT in a box “World Class with a global community of users” Project Manager Today April 2014.
Sarbanes-Oxley: Corporate Governance and Agile Development Charles Leinbach Managing Partner Freshwater Partners, Inc.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
MyFloridaMarketPlace Roundtable February 25, :00 a.m. – 12:00 a.m.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
The University of Texas at Austin General Compliance Training Program Copyright Property.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Copyright: Internal Auditing: Assurance and Consulting Services, by The Institute of Internal Auditors Research Foundation, 247 Maitland Avenue, Altamonte.
Protecting your Managed Services Practice: Are you at Risk?
Tanner James… Enhancing your programme and project management capability P3 Management – Directions in Government for 2011 John Howarth Managing Director,
“ I C T a d v i s o r y s e r v i c e s ” Transforming Enterprise IT Thomas Bbosa, CISSP BitWork Consult Ltd BitWork Consult Ltd.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
THE POWER OF BEING UNDERSTOOD AUDIT | TAX | CONSULTING.
©2016 Aegate. All rights reserved. Aegate and the Aegate logo are among the trademarks or registered trademarks owned by or licensed to Aegate Limited.
Dr. Yeffry Handoko Putra, M.T
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Current ‘Hot Topics’ in Information Security Governance Auditing
Inteligente helpdeskløsninger i kundesentrene
IT and Project Management Best Practice Training
ITIL Service Transition - Invensis Learning
Information Security based on International Standard ISO 27001
ITIL® 2011 F OUNDATION C OURSE ITIL® is a registered trade mark of AXELOS Limited.
Alignment of COBIT to Botswana IT Audit Methodology
The importance of methods
What is Gestar? GESTAR is a family of collaborative solutions that allow you to handle highly interactive and integrated Business Processes. Gestar includes.
How it affects policies and procedures
Trademark, Copyright, And Patents | Get physical and paper proof
Information Technology Organization Overview RFP #220-05
Presentation transcript:

Service Is So Last Decade hot topics for IT management in the twenty-teens

cloud / virtualisation personal client big data anything by Google smart assets Semantic Web real-world integration

The IT Swami

service governance assurance

ApplicationsOperations Services COTSSSaaSCloud ServiceGovernanceAssurance

service design improvement lean outside-in social media Service

design Service

lean Service

outside-in Service

social media Service

available from itskeptic.org/shop improvement Service

improvement Service

Governance ISO38500 COBIT 5 guidance

is not Measurement, reporting, audit Management Optimisation Financial control Policy enforcement Rule Governance

ISO38500 Governance

plug and socket Governance

what does it look like? Val IT, Risk IT COBIT, ISOnnnnn, … MSP, P3O… Prince2 ???

Assurance risk security audit architecture compliance

Assurance Service Governance ApplicationsOperations Services COTSSSaaSCloud ServiceGovernanceAssurance ApplicationsOperations COTSSSaaSCloud Agile DevOps collaboration social Assurance loss of control

Controls

Assurance professionalism

People

people process technology People

Process manage, improve, automate Technology involve, contribute, inform, train, coach

familiar? Software license $350,000 Vendor services $120,000 Staff training $25,000 Vendor support $63,000p.a. People

fantasy? Software license $350,000 Vendor services $120,000 Staff training $25,000 Requirements $60,000 Process change $200,000 Test and accept $150,000 User training $120,000 Rollout $60,000 Vendor support $63,000p.a. Inhouse support $30,000p.a. User education $60,000p.a. Process improvement $20,000p.a. People

Process Technology reality People Software license $350,000 Vendor services $120,000 Staff training $25,000 Requirements $60,000 Process change $200,000 Test and accept $150,000 User training $120,000 Rollout $60,000 Vendor support $63,000p.a. Inhouse support $30,000p.a. User education $60,000p.a. Process improvement $20,000p.a.

People

assurance service governance

a urance service governance people

© Copyright 2010 Two Hills Ltd All rights reserved. "The IT Skeptic™” and "The IT Swami™" are trademarks of Two Hills Ltd. ITIL® is a Registered Trade Mark and a Registered Community Trade Mark of the UK Office of Government Commerce. ITIL® is registered in the U.S. Patent and Trademark Office. COBIT® is a Registered Trade Mark of the Information Systems Audit and Control Association and the IT Governance Institute. ISO® is a Registered Trade Mark of the International Organisation for Standardisation. All images CanStock Photo