Enter Members Area
Remember Me!
 
IMF Members Click Here
to Request a Login ID
IMF Reports

Members have access to hundreds of reports that are generated from presentations given by top IT executives on a variety of subject matter. Looking for a particular topic? Try our Keyword Search.
Currently showing 629 results.
Presented On: Tue Feb 28, 2017
Ralph Quarles , Operational Risk Consultant , IMF Fellow
Details (hide)

 In this report, our good friend Ralph Quarles shares his thoughts on IT security in a pragmatic and understandable way.  Ralph has 30 years as a cyber security expert, most recently in the Federal Intelligence community and currently with Wells Fargo. I think you will find his approach to the subject to be understandable and enlightening.



Presented On: Thu Sep 29, 2016
Harold Bolton , Manager , United Parcel Service
Details (hide)

The IT Finance and Accounting Training is a report based on a presentation given by Harry Bolton at the ITFM Fall meeting in September 2016.  Harry and his team led an effort to train UPS IT experts on financial management strategies and components.  In this report Harry details the process, the goals, and the benefits of the training.  



Presented On: Fri Jun 17, 2016
Davind Maharaj , Vice President , McKesson
Details (hide)

The Reinvention of McKesson’s Remote Hosting Business is a report based on a presentation given by Davind Maharaj at an IMF Forum earlier this year. The Hosting and Strategy Services Department at McKesson has recently taken a different approach to remote hosting services. Davind Maharaj gives readers an inside look at the process of reinventing this sector. He also explains why the change needed to happen in regards to McKesson’s goals, culture and customers.  



Presented On: Thu Jun 16, 2016
Brian Parks , Director for IT Workforce Strategy , USAA
Details (hide)

Retaining Top IT Talent is a report based on a presentation from the 2016 IMF Information Summit in Atlanta, GA. Brian Parks, an IT Director in the IT Workforce Strategy Department at USAA, takes us through his new recruiting process step by step. He gives us insight to some of the challenges that arise when looking for new talent, as well as solutions for narrowing down the best possible candidates for the IT Department. Brian and his team have transformed their hiring process into an effective and efficient system. USAA’s IT workforce hires approximately 250 of the 500 new employees annually. Having a productive hiring process is essential in such an expanding comapany, and USAA’s new employees reflect very well on the hiring strategies recently implented by the IT Department. 



Presented On: Fri Feb 10, 2017
Brendan Woods , Travelers Corporation
Kyle Chagnon , Travelers Corporation
Details (hide)

IT Supplier Management and Governance is a report based on a presentation given by Brendan Woods and Kyle Chagnon at an IT Finance Managers meeting. Brendan and Kyle explain the strict, yet effective, supplier management structure at Travelers by sharing its framework. The model focuses heavily on supplier relationships and monitoring processes. Because of this framework, the supplier management division at Travelers was, is and continues to be successful. 



Presented On: Thu Feb 25, 2016
Brad Gibson , Vice President , IBM
Details (hide)

Deploying Agile and Measuring Throughput is a report based on a presentation given by Brad Gibson, Director of Finance and Operations at IBM, during the ITFM First Quarter Meeting in February. Brad explains the larger story behind IBM’s decision to transition fully to Agile and goes into detail when describing the logistics that come along with implementing significant changes.  



Presented On: Fri Oct 28, 2016
Details (hide)

Command Center Best Practices is based on an IMF Connect discussion between IMF members on strategies for organizing andmanaging domestic and global command centers. Members participating in this Connect discussed the fundamental make-up of their command centers and shared their insight on best practices, strategies and procedures. 



Presented On: Mon Oct 10, 2016
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Getting Ahead of the (Revenue) Curve is a report based on a presentation by Michael Bender, Chief of Staff to the CIO at VMware.In this report, Michael emphasizes the importance of IT’s role in revenue growth in the form of internally-made applications. He gives examples of innovations that both his company and others have created and explains the impact they have on businesses today. Michael reminds readers that building something for external users is a tactful strategy and has the potential to generate a large amount of IT revenue. 



Presented On: Thu Jun 2, 2016
Girish Israni , Controller, IT Infrastructure and Desktop , VMware
Details (hide)

Tech Bars: Are They Worth the Investment? is a report based on a presentation by Girish Israni, Controller in IT Infrastructure atVMware. Girish introduces the company’s newest workplace installation called the Oasis Center. This unqiue on-campus tech bar concept is revolutionizing the way VMware handles IT help desk mattres, including saving company time and increasing efficiency. 



Presented On: Thu Jun 16, 2016
David Lee , Hewlett-Packard
Details (hide)

SunTrust’s Innovation Programs is a report based on a presentation given by David Lee, Director ofInnovation Programs at SunTrust during the 2016 IMF Innovation Summit in Atlanta, GA. Mr. Lee shares how Innovation Programs aims to change culture and enables for all kinds of innovation to happen in every corner of the company. The team delivers a series of innovation contests, grassroots change programs and cultural exposure efforts to help people see the possibilities. Mr. Lee discusses why this model has been successful, examples of the efforts lead and lessons learned for future approaches.



Presented On: Thu Jun 16, 2016
Jennifer Pearce , BI Team Lead , Milliken & Company
Details (hide)

Use of Dashboards to Drive IT Performance is a report based on an IMF Summit Presentation by Jennifer Pearce,Business Intelligence Team Lead at Milliken & Co. In this report, Jennifer explains how dashboards are beneficial from both an IT and business perspective by breaking down the system into categories. She expands on these dashboard categories, which include IT projects & Help Desk, Internal Phishing, Health Checks and Licenses & Assets. Examining each of these dashboards individually shows just how much data can be shared and easily accessed within a large company. The development of modern data collection tools has benefitted Milliken in a number of ways.



Presented On: Mon Feb 22, 2016
Michael Rimmey , Manager, IT QA , ITG Brands
John Dyson , Director, Sales Technology , ITG Brands
Details (hide)

Mergers and Acquisitions – Managing the Transformation is a report based ona presentation given by                                       Michael Rimmey and John Dyson during the 2016 IMF Senior Executive Spring Roundtable in Orlando, FL. The two discuss how Lorillard Tobacco Company successfully managed through its own transformation into ITG Brands as a result of a multi-company acquisition/asset purchase agreement. They will share challenges of the transaction as it relates to IT governance, project management and infrastructure in addition to reviewing the critical success factors that guided a successful transformation. 



Presented On: Tue Feb 23, 2016
David Sullivan , AVP – GTO Planning & Effectiveness , MetLife
Details (hide)

Rightsizing the IT Organization is a report based on a presentation given by David Sullivan during the 2016 IMF Senior Executive Spring Roundtable in Orlando, FL. In this report, Mr. Sullivan will walk us through Metlife’s organization and their efforts to have the right people in the right jobs and proper personnel counts to enable a flexible and agile organization. He will discuss their challenges in developing systems and balancing budgets against time to market.

 

 

 

 

 



Presented On: Mon Oct 12, 2015
Richard Bankes , Vice President, Information Technology , Canadian Tire
Details (hide)

Driving Agile Through the IT Organization is a report based on a presentation given by Rick Bankes, Vice President, Information Technology, FGL Sports and Mark’s (Divisions of Canadian Tire Company) during the 2015 Fall IMF Senior Executive Forum in Coral Gables FL. Mr. Bankes shares how his company adapted analysis and architecture to drive agile across the organization, not only in application development but in multiple functions.

 

 

 

 

 



Presented On: Mon Feb 22, 2016
Fletcher Previn , Vice President and CIO , IBM
Details (hide)

The Real and Anticipated Benefits of the IBM – Apple Alliance is a report based on a presentation from the IMF Senior Executive Spring Roundtable in Orlando, FL. Fletcher Previn, VP of Workplace as a service at IBM, shows readers how the new alliance aims to redefine the way work gets done and sparks a true mobile-led business change. He speaks on the unique IBM cloud services optimized for iOS including the new class of more than 100 industry‐specific enterprise solutions.

 

 

 

 

 



Presented On: Tue Feb 23, 2016
Brian Smith , Director , VMware
Details (hide)

Internal Private Cloud Operations is a report based on a presentation given by Brian Smith during the 2016 IMF Senior Executive Spring Roundtable in Orlando, FL. Smith shares the growth VMware has experienced over the past few years in terms of its private cloud. The organizational structure and timeline are detailed in addition to tips and tricks for implementing a successful private cloud.

 

 

 

 

 



Presented On: Mon Jun 15, 2015
Paul Kincaid , Information Security , VMware
Details (hide)

 

Network Virtualization in the Software Defined Data Center is a report based on a presentation given by Paul Kincaid during the IMF IT Security Summit in June 2015. In this report, Mr. Kincaid discusses the “modern attack" and describes the context/isolation trade-off. He explains how moving from a perimeter-centric focus to an internal-centric focus can be beneficial and how the infrastructure is one of the key building blocks to a secure environment.

 

 

 

 

 



Presented On: Mon Oct 12, 2015
Craig Brice , CIO Canada , PricewaterhouseCoopers LLP
Details (hide)

 

The Transformation to a Leadership Development Experience is a report based on a presentation from the 2015 Fall IMF Senior Executive Forum in Coral Gables, FL. With more than 208,000 staff worldwide, PwC invests heavily in staff development. Craig Brice, Director, UK/US IT Enablement, takes readers through the innovation behind developing high-quality staff. Brice discusses the difference between millennials and non-millennials in addition to detailing PwC’s new Leadership Development Experience.

 

 

 

 



Presented On: Wed Nov 18, 2015
Details (hide)

 Service Desk Best Practices is based on an IMF Connect discussion. In this report, members share their experience using various service desk and self-support services and discuss how ITIL and analytics play into the service picture. Members also converse over best practices and discuss what gives a person VIP status regarding help tickets.

 

 

 

 

 



Presented On: Tue Jun 16, 2015
James Campbell , Distinguished Military Professor for Character Education , U.S. Naval Academy
Details (hide)

Ethical Decision-Making and Leadership is a report based on a leadership discussion given by US Naval Academy Captain James Campbell at the IT Security Summit in Annapolis, MD in June 2015. 

Captain Campbell presents on how ethical decision-making is a core component of organizational leadership. The report features case studies as a basis for interactive discussion. He asks “What’s right, and how do you decide?”

 

 

 

 



Presented On: Tue May 5, 2015
Details (hide)

IT Cost Transparency: Journey and Lesson Learned is a report based on a presentation from an ITFM quarterly meeting. The presenter shares how her company adapts to ever-changing technology, their implications on IT, and chargeback opportunities and challenges. She also speaks about the importance of accountability and good data.

 

 

 

 



Presented On: Tue May 5, 2015
Details (hide)

Building a Business Case for Analytics is based on a presentation from an ITFM quarterly meeting. In this report, the presenters discuss their new enterprise analytics team that helps enable their company’s business areas through data and analytics. Their guidelines, benefits and master data management (MDM) discipline is broke down.

 

 

 

 



Presented On: Tue May 5, 2015
David Sullivan , AVP – GTO Planning & Effectiveness , MetLife
Details (hide)
 

Business Value from MetLife’s New North Carolina Technology Campus is based on a presentation given by David Sullivan, Global RAD Vice President of Planning and Effectiveness at MetLife, during an ITFM quarterly meeting in May 2015. In this report, Mr. Sullivan examines the new MetLife campus located in the Research Triangle in North Carolina. Mr. Sullivan discusses what inspired the relocation and reflects on what made the new technology hub a success. 

 

 

 

 



Presented On: Mon Feb 9, 2015
Brad Gibson , Vice President , IBM
Details (hide)
 
Bring Your Own Device (BYOD) for Mobile and Laptops is a report based on a presentation given by Brad Gibson, Director of Finance and Planning at IBM, during an ITFM quarterly meeting in Feb. 2015. In this report, Mr. Gibson outlines the benefits of allowing IBM employees to bring their own personal devices to work. They have found that employee productivity and satisfaction has increased by adopting a BYOD policy. Mr. Gibson also
discusses the development of a successful BYOD policy, and costs and risks associated with this tech-savvy approach.
 
 
 
 
 
 
 
 


Presented On: Mon Jun 15, 2015
Sheryl Hanchar , Director of Information Security , Broadcom
Details (hide)

The Evolving Landscape of Cybersecurity

 

The Evolving Landscape of Cybersecurity is a report based on two presentations given by Sheryl Hanchar, Director of Information Security for Broadcom Corporation at the IMF Senior Executive Forum and an IT Finance Managers Meeting in 2015.

Sheryl outlines the evolution of hackers and types of attacks, as well as highlights areas of significance in planning for and mitigating cyber attacks. She also shares ways companies can share intel to learn from previous hacks and put in place stronger security measures in preparation for the future.

 

 



Presented On: Tue Feb 10, 2015
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

 Structuring an Optimal IT Workforce is based on a presentation given by Michael Bender, Senior Finance Director of Operations and IT at VMware, during an ITFM quarterly meeting in Feb. 2015. In this report, Bender explains that there is no simple way to create a perfect IT workforce, but there are formulas available that can help companies determine what works best for their workforce. Bender discusses how VMware created their unique strategy by focusing on aiming to reach their goals. This was achieved by assessing their current workforce, defining mission-critical activities and developing a location strategy.
 
 
 
 
 
 
 
 


Presented On: Mon Feb 23, 2015
Craig Brice , CIO Canada , PricewaterhouseCoopers LLP
Details (hide)

Outsourcing IT at PwC Report CoverOutsourcing IT at PwC is a report based on an IMF Senior Executive Forum presentation by Craig Brice, Director of US/UK IT Enablement at PwC.

Brice discusses the path to outsourcing and offshoring for PwC IT US, staffing challenges and opportunities, outcomes and results and future outlook for PwC US IT.

Over a period of years, PwC began the process by outsourcing ad hoc and moved to full outsourcing - multi-sourced with three vendors - in 2011.

This case study provides excellent background for others looking to outsource par of or entire IT functions.

 

 



Presented On: Mon Feb 23, 2015
Richard Bankes , Vice President, Information Technology , Canadian Tire
Details (hide)

Insourcing IT Within Canadian Tire Company Report CoverInsourcing IT Within Canadian Tire Company is based on an IMF Senior Executive Forum presentation by Richard Bankes, Vice President of Information Technology for Mark's Work Wearhouse, a division of Canadian Tire Company.

Rick outlines the history of the company and its previous outsourcing agreements in two acquired divisions: Mark's Work Wearhouse and The Forzani Group Ltd. (FGL). Following the decision to insource IT, Rick outlines the process, its challenges and results of insourcing.

 

 

 

 



Presented On: Mon Oct 13, 2014
Geoffrey Knoerzer , Vice President and CIO , IMF Fellow
Details (hide)

Benefits of Cloud Services for IT and Businesses Report CoverBenefits of Cloud Services for IT and Business is based on an IMF Senior Executive Forum presentation by Geoffrey Knoerzer, Vice President and CIO at Afni. In this report, Geoffrey leads a discussion on his organization’s work in cloud services, explores if cloud technology is beneficial for IT, and examines the risks and benefits of cloud services from a business perspective.

Geoffrey shares the steps his organization has taken to enter the cloud services space, and discusses the best early candidates for cloud deployment at the enterprise level as well as selecting and working with third part vendors for services, barriers to adoption, practical reasons to explore deployments, and future work in the cloud space.

 

 

 



Presented On: Mon Feb 23, 2015
William Miller , Chief Information Officer , NetApp
Details (hide)

Debunking Common IT Myths CoverDebunking Common IT Myths is based on an IMF Senior Executive Forum discussion led by Bill Miller, Chief Information Officer for Broadcom.

In this report, a group of IMF member companies debate the merits of several modern IT trends in an interactive IMF workshop.

Members participating in this discussion shared their experiences on:

  • Cloud’s effects on modern IT, 
  • Mobility, 
  • Always-connected workforces, 
  • Innovation in IT, 
  • The role of ERP systems, and more.

 



Presented On: Mon Feb 23, 2015
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Employee Attrition and Retention IMF Report In this IMF Report, Michael Bender of VMware discusses:

  • Attrition management objectives
  • Competition for candidates
  • Tools to attract talented workers
  • Strategies for attrition and retention

The report is based on the presentation Michael shared at the IMF Senior Executive Forum held February 2015 in Laguna Beach.

 

 



Presented On: Thu Mar 26, 2015
Details (hide)

Apptio Implementation Strategies is based on an IMF Connect discussion between IMF members on strategies for implementing Apptio IT finance management services. Members participating in this Connect discussed overall implementation strategies, timelines and implementation project length, project manager assistance, data connectivity, and more.

 

 

 

 

 

 



Presented On: Mon Oct 13, 2014
Phillip Hirschel , Director , PricewaterhouseCoopers LLP
Details (hide)

Risk and Security in Cloud Services is based on an IMF Senior Executive Forum presentation by Phil Hirschel, Director for IT Risk Management at PwC. In this report, Phil explores how cloud services have opened new opportunities to reconsider how IT supply chain risks are being managed.

Phil discusses the need to take a broader look at the cloud definition as part of supply chain management programs and developing a better understanding of where data is being hosted, the responsibilities of the service provider and the retained responsibilities of the customer when utilizing infrastructure as a service, the need to determine how to apply internal risk programs within the context of modern cloud services, and much more.
 
 
 
 
 
 


Presented On: Thu Aug 7, 2014
Jon Birdsall , WW IT Controller , IBM
Details (hide)

Cloud Experiences: Workloads Matter is based on an IT Finance Managers group presentation by Jon Birdsall, IT Finance Controller at IBM. In this report, Jon discusses his organization’s work in the cloud, including cloud benefits for workload, the cost of moving applications to the cloud, and the transformation of the service portfolio to address new demand for applications using cloud-based solutions.

 
Jon explores the future of cloud implementations for large enterprises, the use of private cloud implementations versus public cloud implementations, the adoption of infrastructure, platform, and software cloud models, and more. 
 
 
 
 
 
 
 


Presented On: Mon Oct 13, 2014
Chip Ward , Director, Global IS , Milliken & Company
Details (hide)

Showback and Chargeback Implementation is based on an IMF Senior Executive Forum presentation by Chip Ward, Director of Global Information Services at Milliken & Company. In this report, Chip discusses his organization’s implementation of a chargeback and showback process for IT services. Milliken & Company has created their system in a phased approach spanning multiple years. 

Chip explores how the showback and chargeback processes have changed division behavior as it relates to IT service usage, how his phased approach has eased organization wide adoption of the process across divisions, and what types of services are charged for across help tickets and projects within his organization. 
 


Presented On: Tue Jun 24, 2014
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)

Best Practices for Creating a Multi-Domain Delivery Team is based on an IMF Web Forum presentation by Hans Eckman, GVP Security Services Workstream Manager at SunTrust. In this report, Hans explores methods for creating a capability based delivery team serving multiple business needs. 

 
Hans discusses traditional role based team hierarchy and single domain support, including pros and cons of the traditional model; current role levels and capabilities by level; building a team to serve multiple domains at the execution level; and capability leads with knowledge and experience in serving a particular business need.


Presented On: Tue Jun 10, 2014
Trace Fooshee , Business Intelligence and Analytics Manager , SunTrust Bank
Details (hide)

Fraud Prevention through Detection Algorithms is a report based on an IMF Forum presentation by Trace Fooshee, Business Intelligence and Analytics Manager at SunTrust bank. In this report, Trace discusses the challenge of combating bank deposit fraud from a technology perspective, including the tools and procedures his team uses to catch fraudsters.

 
Trace shares his team’s efforts to build fraud detection algorithms based on large data sets. He presents how his team has conglomerated big data to create an integrated view of fraud - a high variety view of massively large volumes of observations of fraudulent and non-fraudulent events that has enabled his team to model a way to optimize true positive/false positive rates, resulting in a substantial increase in fraud prevention within his organization.
 


Presented On: Thu Dec 4, 2014
Details (hide)

Strategies for Lync Implementation is based on an IMF Connect discussion between IMF members on the process of implementing Microsoft Lync communication services at a large scale, enterprise level. Topics discussed include utilizing third party consultants to assist in Lync implementation, performing the implementation in-house without outsourced assistance, support options for Lync services, online and classroom training options for administration, phased rollouts for new services, and more.



Presented On: Mon Dec 1, 2014
Details (hide)

Apptio Implementation and Best Practices is based on an IMF Connect discussion between IMF members on the process of adopting and implementing Apptio IT finance management services. Members participating in this Connect discussed service costing, planning and forecasting, benchmarking, potential pitfalls in new and early implementations, reporting, customer access, improving communication between IT and business partners in terms of finance management, and the productivity, transparency, and financial benefits of a service implementation. 



Presented On: Thu Jun 12, 2014
Rizwan Patel , Director, IT , Caesars
Brad Karnafel , Director IT , Caesars
Details (hide)

Big Data Applications at Caesars is a report based on an IMF Big Data Forum presentation by Rizwan Patel and Brad Karnafel, IT Directors at Caesars Entertainment. In this report, Brad and Rizwan share details on Caesars’ new approach to big data and how an open source platform has allowed their organization to explore new avenues of customer service through an expanded big data presence.  

Rizwan and Brad discuss the path that led Caesars’ IT to adopt a new method for processing large volumes of customer data for marketing purposes and some practical applications for big data in their industry, including location and hospitality alerts through GPS and other communication technologies, social media analysis, voice and video data analysis, and the process of analyzing web data and clickstream data for design and customer experience improvements.
 


Presented On: Mon Oct 20, 2014
Details (hide)

The Role of a PMO in an SAP Environment is based on an IMF Connect discussion between IMF members on best practices for project management, planning, and approval within an SAP environment. Members participating in this Connect discussed the scope of services an IT PMO manages in such an environment, how to determine the number of project managers needed to support an implementation, the types of governance mechanisms used to manage project intake and scheduling, and more.



Presented On: Fri Sep 26, 2014
Details (hide)

Telecom Expense Management Solutions is based on an IMF Connect discussion between IMF members on managing enterprise wide telecom spend for wireline communications and mobile devices. Members participating in this discussion discussed telecom expense management tools, strategies for contract negotiation and management, procurement best practices, inventory management for devices and open lines, and more.  



Presented On: Tue May 20, 2014
Details (hide)

Content Management and Sensitive Data is based on an IMF Connect discussion between IMF members on best practices and strategies for storing sensitive data and effective content management. Members participating in this Connect discussed scanning and storing old internal human resources documents, effective security processes for multifunctional devices, limiting system administrator access to content through encryption, secure search and discovery, and IT tools for effective content management.



Presented On: Thu Feb 20, 2014
Richard Bankes , Vice President, Information Technology , Canadian Tire
Details (hide)

The Case for Insourcing is a report based on an IMF presentation given at a 2014 IMF Senior Executive Forum by Mark’s Work Wearhouse and FGL Sports Vice President of Information Technology, Rick Bankes. In this report, Bankes discusses the change drivers that led to the decision to insource a large portion of the work performed by a number of primary and secondary vendors. He shares the approach followed to execute the overall change, and provide insights into the risks related to the completion of the strategy. 

Some of the topics discussed in his presentation include potential cost savings through insourcing, benefits of pursuing insourced labor as opposed to outsourced services, strategies for ensuring a smooth transition from outsourced positions to in-house managed services, and risks associated with making such a change within an enterprise.
 


Presented On: Wed Jul 2, 2014
Details (hide)

IT Service Catalog Implementation and Best Practices is based on an IMF Connect discussion. An IMF member requested to speak with other members on the benefits of IT service catalog implementation, and best practices for planning and creating a robust, effective service catalog. Members participating discussed motivations for creating a service catalog, consultant assistance and outsourced vs. insourced implementation, tools for managing a new service catalog, the scope of initial implementations, the use of chargeback and/or showback in IT, and how the implementation of a catalog has affected internal IT operations. 



Presented On: Thu Apr 3, 2014
Details (hide)

Using Lync in an Existing CallManager Environment is based on an IMF Connect discussion. An IMF member requested to speak with other members on the implementation of Microsoft Lync services, with specific interest in deploying those services into an environment with an existing Cisco CallManager infrastructure. Members participating in this Connect discussed performance issues, capacity, stability in mobile clients, comparisons between collaboration tools, best practices, and lessons learned.  



Presented On: Mon Oct 7, 2013
Allen Greathouse , Vice President, Enterprise Information Services , Harris Corporation
Details (hide)

MDM and BYOD in the Enterprise is based on a presentation given at a 2013 IMF Senior Executive Forum by Allen Greathouse, Vice President, Enterprise Information Services for Harris Corporation.  In this report, Greathouse discusses effective mobile device management and Harris Corporation’s own experiences in implementing a bring your own device (BYOD) policy.  

Greathouse outlines effective security strategies for personally owned devices, best practices for device support plans, the future of BYOD implementation, using BYOD as a method for cost savings, and more.
 


Presented On: Thu Feb 20, 2014
Details (hide)

Wireless and BYOD Best Practices is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of managing employee wireless devices and implementing bring your own device programs. Members discussed possible cost savings of such a program, security concerns and mobile device management platforms, attracting talent with innovative BYOD programs, limitations placed on deployed BYOD implementations, and stipends versus employee paid programs.  



Presented On: Mon Feb 10, 2014
Charles Paelinck , SVP & CTO , IMF Fellow
Details (hide)

Big Data Innovations at Caesars is a report based on an IMF Executive Forum presentation by Charly Paelinck, CIO of Caesars’ Entertainment. 

In this report, Paelinck discusses an ongoing big data implementation project at Caesars, and how a small team of engineers have successfully revamped the organization’s big data processing efforts, dramatically reducing the processing time of complex marketing campaigns. 
 
Paelinck discusses the decision to select Hadoop, an open source platform, to drive Caesars’ big data efforts, the benefits of an open source platform, the investment necessary to begin such an implementation, system components, challenges faced, and the architecture of their Hadoop big data system.
 


Presented On: Tue Mar 25, 2014
Details (hide)

Macs in the Enterprise is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of the use of Macintosh computers in a large scale setting. Participants discussed steps necessary to begin offering Macintosh computers for users as alternatives to Windows machines, including infrastructure hurdles, user support, overall cost, security issues, and procurement challenges.  



Presented On: Thu Dec 12, 2013
Brandon Lee , Director , USAC
Charles Dean , Manager of Applications Delivery , USAC
Rexhina Marjani , IT Enterprise Application Delivery Manger , USAC
Details (hide)

Breaking Down Departmental Silos is a report based on an IMF Web Forum presented by USAC’s Brandon Lee, Director of IT; Rexhina Marjani, IT Application Delivery Manager; and Charles Dean, Manager of Applications Delivery. 

In this report, Brandon, Rexhina, and Charles discuss USAC’s efforts to rebuild communication and collaboration avenues for its IT division after a rapid period of growth left the organization unorganized and inconsistent. They share effective strategies for fostering creativity and consistency in working toward an organization’s operational goals.
 
Some of the topics discussed in this report include growing communication avenues, change management, horizontal collaboration across IT, bettering collaboration between IT and business operations, and more.
 


Presented On: Thu Aug 1, 2013
Ed Hayman , Apptio
Details (hide)

The Costs and Benefits of IT Service Catalogs is based on a Web Forum given by Ed Hayman, Technology Business Management Architect & Practice Director at Apptio. In this report, Hayman discusses the benefits versus the cost of implementing service catalogs for IT organizations.

 
Too often, IT organizations take on a limited view of how their services and products should be presented, opting to present those services with a technical focus, concentrated on hardware and software figures instead of the overall value of the service. Hayman encourages his audience to consider viewing their service offerings through a customer’s perspective. 
 
Hayman presents a sample design of an IT service catalog listing, demonstrating what type of business language those product listings should feature, and what types of information should be prominently displayed  in a service catalog. 
 


Presented On: Mon Feb 10, 2014
Details (hide)

IT Project Cost Modeling is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of IT project cost modeling. Members discussed project management issues that arise from the funding process, best practices and strategies for accurate forecasting, financial accountability and project ownership, IT finance management tools, project estimation, and managing and allocating funds for upcoming IT projects. 



Presented On: Mon Apr 21, 2014
Details (hide)

Remote Server Virtualization Technologies and Strategies is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of servers that reside outside of the traditional data center in an effort to centralize infrastructure through remote server virtualization. Some of the topics discussed by the members on this call included budgeting for such a project, security, convincing leadership on the value of remote server virtualization, the possible timeline for project implementation, and the maintenance and depreciation costs of physical hardware.

 


Presented On: Thu Mar 20, 2014
Details (hide)

Establishing an Effective Change Advisory Board is based on an IMF Connect discussion. In this report, IMF members share their experiences in the creation, and ongoing management of an internal change advisory board (CAB). Some of the topics discussed in this report include CAB ownership, strategies for increasing participation, reasons to establish set change schedules, standard changes, and tools that can be used to calculate risk level. 



Presented On: Mon Oct 7, 2013
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Benefits of Internal Cloud Deployment is based on a presentation by VMware Senior Finance Director, Corporate Functions, IT and Operations Michael Bender at an IMF Senior Executive Forum. In this report, Bender outlines VMware’s internal transition from many segmented divisional data centers and technologies to one cloud service.

Bender discusses the cost savings of the effort, challenges faced, strategies for pushing adoption throughout the organization, and additional productivity and agility benefits found in adopting an internal cloud system.



Presented On: Thu Aug 15, 2013
John Crary , Chief Information Officer , American Red Cross
Details (hide)

Moving Enterprise Email to a Cloud-Based Platform is based on a presentation by American Red Cross CIO John Crary at an IMF IT Planning Forum in 2013. In this report, Crary outlines a massive Red Cross IT project to unify 40,000 users under a single cloud-based email platform for the first time in the organization's existence.

The American Red Cross successfully transitioned more than 40,000 staff to the Microsoft Office 365 email solution. This included users at national headquarters, blood services regions, and more than 600 chapter organizations. The effort consolidated more than 400 different email domains. 

Crary examines the benefits of going cloud, including improved services, features, and annual cost savings in excess of $1.5 million. He explains his organization’s approach to the vendor selection process and how to overcome several common migration obstacles. 



Presented On: Wed Sep 25, 2013
Details (hide)

Hadoop Implementation Experiences is based on an IMF Connect discussion. In this report, IMF members share their experiences around Hadoop implementation at large IT operations, including planned and unforeseen benefits, recruitment and internal development techniques, and metrics for measuring implementation success. Members participating in the call discussed vendor selection, future Teradata use, data security and administration within Hadoop, benefits and known issues with the Hadoop platform, and metadata.



Presented On: Fri Aug 30, 2013
Details (hide)

IT Finance Management Software is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of IT finance management applications, such as tools offered by Apptio, VMware, and Nicus and using those tools for expense transparency. Other members who use these tools participated in the discussion. Some of the topics addressed include resources assigned to the tools, community support, future updates, and the pros and cons of current available finance management applications.



Presented On: Thu Aug 15, 2013
John Kennedy , Senior Director , Kaiser Permanente
Maggie Williams , Member Service Manager , The IMF
Details (hide)

Bridging Generational Gaps is a report based on two IMF presentations: one originally given by Global Information Partners Senior Consultant John Kennedy at a 2013 IMF IT Planning Forum, and a Web Forum presentation given by Principal Consultant Maggie Williams on the same subject. In this report, Kennedy and Williams discuss not only the new, rapidly growing generation of workers in their 20s and early 30s, but also the traits of every generation currently occupying the workforce and strategies for helping ever employee to work together.

Some of the topics discussed in these presentations include preventing generation clashes, the changing workplace demographic, and strategies for adapting management approaches for a new generation of employees. Kennedy and Williams discuss the importance of, the traits, and attitudes of Generation Y.



Presented On: Thu Aug 15, 2013
Robert Fields , IMF Fellow
Details (hide)

Telepresence Implementation at Loews is based on an IMF Web Forum presentation given by Bob Fields, CIO of Loews Corporation. In this report, Fields speaks on how Loews has successfully implemented Telepresence on a global scale across their diverse subsidiaries. Their slow and cautious approach resulted in a cost-effective, working solution on which the organization can grow and continue to develop.

Every organization struggles while juggling costs, compatibility, and vendor selection at some point in their videoconferencing efforts. Loews Corporation is no different – but their strategies managed to see a complex videoconferencing initiative through to success. Use Loews’ experiences as a guide for overcoming the struggle with expensive, complicated videoconferencing plans, and learn new ideas that can be put into action.



Presented On: Thu Aug 15, 2013
Cathy Kirch , SM Process Architect , Allstate Insurance
Details (hide)

Using an ITIL Service Delivery Framework for Planning is based on a presentation by Allstate IT Service Manager Cathy Kirch at an IMF IT Planning Forum in 2013. In this report, Kirch, a longtime technical leader within infrastructure services, shares several strategies and best practices for the implementation of the ITIL service framework and the use of the framework around planning.

Kirch shares her thoughts around IT service management and how it should be approached, challenges that might be encountered, and proven practices based on years of IT service leadership. She discusses the benefits of ITIL implementation, roles, ITIL goals, and why service management is key to the future of effective IT.

Kirch has spoken on the subject of ITSM best practices to many audiences and at many different venues around the world.


Presented On: Thu Aug 29, 2013
Details (hide)

Reviewing and Modifying Project Status Dashboards is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of Project Status Dashboards, seeking efficient but effective methods of IT project reporting to organization management. Some of the topics discussed during the Connect discussion include best KPIs to track, proprietary dashboard solutions, closed and open dashboards, risk management, and tools for implementing digital project tracking.



Presented On: Fri Jan 31, 2014
Details (hide)

Designing a Bring Your Own Device Policy is based on a Jan. 2014 IMF Connect. An IMF member requested to speak with other members on the subject of BYOD policies, strategies for initial planning and construction of a device policy and best practices for ensuring that a policy remains effective. Some of the topics discussed during the Connect discussion include policy scope, the types and operating systems of devices permitted under a BYOD policy, cost savings, restrictions, and policy evolution.



Presented On: Thu Jan 30, 2014
Details (hide)

PCI Compliance Metrics is based on a Jan. 2014 IMF Connect.  A IMF member requested to speak with other members on the subject of Payment Card Industry (PCI) compliance, including strategies for achieving compliance and metrics for tracking compliance projects. Some of the topics discussed during the Connect discussion included Qualified Security Assessor firms, alternative routes to PCI compliance, segmenting compliance tasks, and ideas for reducing the number of applications in-scope.

 


Presented On: Wed Aug 28, 2013
Details (hide)

Transitioning to Tangoe Telecom Expense Management  is based on a 2013 IMF Connect.  An IMF member requested to speak with other members about the transition from Symphony telecom expense management software to Tangoe telecom expense management software. Some of the topics discussed in this IMF call included auditing, platform support, device tracking, reporting, and contract management. 

 


Presented On: Thu Aug 8, 2013
Christian Torres , Product Line Marketing Manager , VMware
Details (hide)

How Microsoft Tracks BYOD Policies is based on a presentation given by Christian Torres, Senior Finance Manager at VMware, during an ITFM quarterly meeting in Aug. 2013. In his presentation, Torres outlined a few approaches for an organization looking to tackle the ‘Bring Your Own Device’ dilemma. 

 
BYOD is indicative of a growing trend of change in the IT industry, an important part of the balance between IT control and user empowerment. Torres argues that IT organizations must learn to embrace and leverage BYOD policies as a way to entice new talent, while also seeking methods to ensure best security practices. Learn the four different categories for device policy, strategies for implementing different BYOD policies, and why IT departments should expand their focus beyond just budget.
 


Presented On: Tue Nov 12, 2013
Details (hide)

 Cisco ELA Best Practices is based on a Nov. 2013 IMF Connect.  A IMF member requested to speak with other members around audio conferencing technology trends. This includes Technologies as well as use of Company IP fabric (WAN and LAN) as carrier alternative to PSTN. They are considering migrating to a company wide IP fabric and are looking for best practices or experiences other have had. 

 
A Connect is a member requested open, roundtable online discussion among an ad hoc group of IMF members on a specific topic. Connect particpants are asked to contribute, ask questions, and challenge their own ideas. 
 


Presented On: Thu Oct 10, 2013
Brad Karnafel , Director IT , Caesars
Rizwan Patel , Director, IT , Caesars
Details (hide)

Big Data Implementation at Caesars is based on a Web Forum presentation given by Rizwan Patel and Brad Karnafel, IT Directors at Caesars Entertainment. In this report, Patel and Karnafel discuss the nuts and bolts of a massive big data technology project undertaken by Caesars Entertainment over the last year.

Big Data implementation can be challenging for any organization, especially one as large and diverse as Caesars Entertainment. Patel and Karnafel present their Big Data implementation approach, discussing strategies for how to overcome several obstacles along the journey. They also offer best practices and actionable advice based on their experiences in the Big Data realm.

Patel and Karnafel go into details on specific hardware and application choices taken by their organization, the thought process behind those choices and problems encountered as a result. Their experience serves as a guide for other organizations contemplating a similar move into big data processing, storage, and application.



Presented On: Fri Jun 7, 2013
Details (hide)

The Insider Threat is based on a Forum presentation given by Ralph Q, a CIA Cyber Security Officer. In this presentation, Ralph focuses on the rise of the insider threat and its harmful impact on the CIA and other organizations alike. He explains that rigorous security vetting cannot singlehandedly thwart these clandestine attacks. His advice to other organizations – examine their users and the access they're given.

This report identifies specific groups of users at risk and provides solutions companies can use now to prevent, detect and mitigate the insider threat. The reader will learn about factors that contribute to the risk, allowing them to better manage their security measures. Other solutions include: creating a counter-intelligence center, automating actions, providing IT security training, providing cross-training opportunities and conducting rigorous log management, auditing and monitoring.



Presented On: Fri Jun 7, 2013
Flavio Villanustre , Vice President of Products and Infrastructure , LexisNexis
Details (hide)

Security and Privacy in a Big Data World is based on a Forum presentation given by Dr. Flavio Villanustre, VP of Information Security & Lead for the HPCC Systems open source initiative for LexisNexis at an IMF Security Forum in Washington, D.C. in June 2013.

Big data is a relatively new and exponentially growing problem for modern enterprise. More user created content is being produced than ever before through social online services, and more devices are generating data every day. Companies must have effective processes and technology for processing and sorting this new influx of information.

Beyond the challenge of simply processing this data, organizations face new security and privacy challenges as information tables grow and become more diverse. In this report, Dr. Villanustre outlines several strategies that have been implemented by his organization for handling this very modern problem, including technology systems and organization operations to ensure that sensitive customer data remains secure and protected. Also, view a few examples of when big data anonymization features go wrong, and sensitive data becomes jeopardized.


Presented On: Thu Jun 6, 2013
Nalneesh Gaur , Partner , PricewaterhouseCoopers LLP
Details (hide)

How to Build and Govern a Security Operating Model is based on a Forum presentation given by Nalneesh Gaur, a director with PwC's health care practice.

Organizations are increasingly establishing the role of the Chief Information Security Officer (CISO). In fact, PwC's Global Information Systems Security Survey finds that 42% of the surveyed organizations have established a CISO role. Experience shows that the CISO role is not a purely technology oriented role; instead it is a role where the function must foster relationships with both business and technology.

Additionally, CISOs must also think through how security is governed, what skills and talents they need, and how they interface with business, especially in a large global company. This presentation will focus on the specifics of designing a CISO operating model and what considerations come into play. In this report, Gaur presents four key questions an organization must ask before constructing or improving an information security operation.


Presented On: Mon Feb 25, 2013
Kandy White , ADP
Michael Flanagan , Verizon
Details (hide)

 Lean Six Sigma: How Process Engineering Works at Verizon is based on a Forum presentation given by Kandy White from Verizon. The reader will get a comprehensive "big picture" look at Lean Six Sigma. There are five focus areas:

1. WHY do Lean Six Sigma?

2. WHAT is VLSS?

3. WHAT is the basic idea behind Lean Six Sigma?

4. HOW does Lean Six Sigma work?

5. Roles and Responsibilities

 

Based on Verizon's studies, companies often fail in their Six Sigma pursuit due to a lack of leadership support. This is why the company actively incorporates their credo into everyday communications. The credo plays an integral role in strategic alignment too, which is necessary to establish a rigorous framework for process improvement.

Read about the four pillars driving shareholder value: Revenue Growth, Operating Margin,  Asset Efficiency, and Expectations. Lean Six Sigma plays positively impacts those pillars through expense reduction. This is accomplished by platform consolidation, process improvements, and organizational realignment.

Take a brief but interesting look back at the rich history of Process Excellence and the Lean Six Sigma approach. Find out how it has shaped Verizon's current Lean Sigma methodology. Learn about the various process deployment roles, from VLSS Leader to Green Belt, and the levels of training these roles require.

Finally, we'll get into the process itself and how it works. This means looking at the three phases of work: value-added work, incidental work, and pure waste. Discover the differences between Six Sigma and Lean Sigma through illustrations and practical examples.

 

 

 

 

 



Presented On: Thu Jul 18, 2013
Marty Smith , CIO , Implantable Provider Group
Details (hide)

 

Enterprise Computing in the Public Cloud  is based on a Web Forum presentation given by Marty Smith, CIO of Implantable Provider Group (IFG).   IPG collaborates with Health Plans in partnership with Providers, Physicians, Manufacturers and Patients to develop market-based solutions that deliver tangible value in the implantable Device Benefit Management (DBM) space.  Assisting payers and providers with managing the cost of implanting a medical device into the human body, IPG has demonstrated saving healthplans over 20%.  

 
This report gives you an overview of the advantages and challenges IPG and other enterprises can expect to encounter in migrating to the cloud.  Discover the scope of products they've selected and the strategic positions behind their migratory approach that added to their success.


Presented On: Thu Jun 6, 2013
Louis Magnotti , VP of IT Services and Security , Pentagon Federal Credit Union
Details (hide)

 

IT Security Succession Planning is based on a Forum presentation given by Lou Magnotti, Vice President of IT Services & Security, Pentagon Federal Credit Union.  Mr. Magnotti focuses on how security leaders in particular are facing challenges in attracting and retaining highly qualified personnel in the technical field of Information Technology (IT) Security/Information Assurance (IA).   These challenges are mostly attributed to a continuously rising compensation scale over the last decade and the overall competition for limited personnel resources in the field.

 
This report highlights the steps that the Pentagon Federal Credit Union (PFCU) took in order to achieve a working succession planning model. The reader will learn that using a 5 step method and creating a timeline to manage the effort will allow for the continuity of operations, increased opportunities and ROI.  


Presented On: Mon Jul 1, 2013
Cathy Kirch , SM Process Architect , Allstate Insurance
Details (hide)

 

Enterprise Release and Change Management is based on a IMF Connect discussion led by Cathy Kirch, an ITSM Consultant.  Ms. Kirch has many years of experience with large enterprise implementations, specifically in the insurance industry.  This report highlights the current challenges organizations face throughout the process of migrating from the approval stage of change management to the endpoint of implementation, while proposing several solutions to best navigate the terrain.  The reader will learn that developing an agile, responsive management structure is imperative for success and can be achieved through mapping defined roles, standardizing onboarding and off-boarding, measuring metrics to justify and improve methods and utilizing intuitive application tools to facilitate a seamless transition. 



Presented On: Thu Jul 25, 2013
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)

 

BA 2020: Creating a Discrete Vision and Goals to Transform Your Practice is based on a Web Forum presentation given by Hans Eckman, SunTrust GVP and Security Services Workstream Manager.  In 2007, SunTrust made a strategic investment to improve the business analyst capabilities within applications delivery.  In this presentation Mr. Eckman focuses on where SunTrust's BA maturity will be in the year 2020. 

 
This report highlights the steps SunTrust took in order to achieve continuous improvement to the BA role and processes.  The reader will learn that having a bold strategy along with quantifiable goals is critical to any organizations improvement efforts.  Walk through how this project transpired and gather some recommendations on how you can apply the model to your organization.  


Presented On: Fri Jun 7, 2013
Rick Schwarz , Communications Manager , The IMF
Kurt Lieber , Vice President, Identity & Access Management and Large Programs , Kaiser Permanente
Details (hide)

 

 

 

Identity and Access Management (IAM) is based on a Forum presentation given by Kurt Lieber, VP of IAM and Large Programs at Kaiser Permanente.  Mr Lieber is responsible for assuring appropriate workforce identity and access for all of Kaiser Permanente by providing increased security, risk reduction and identity data protection.  This report highlights KP's current inefficiencies regarding IAM that is the result of a highly complex, manual and decentralized model.  The reader will learn that transforming access management functions to serve a centralized, automated and standardized model will benefit organizations in a number of areas.  Benefits of this initiative include: streamlining access to applications, enabling productivity and performance for future business needs, and efficiently address regulatory and compliance requirements.

 

 



Presented On: Thu May 30, 2013
Michael O'Brien , Chief Information Officer , IMF Fellow
Details (hide)
The Evolution of IT Leadership for CIOs is based on a Web Forum presentation given by experienced IT leader Michael O’Brien.  The proliferation of Shadow IT, BYOD, and SaaS services in the enterprise  is having a major impact on the CIO role. CIOs are now expected to be  “Chief Change Agents,” “Chief Innovation Officers,” “Chief Intelligence Officers,” and more. In many cases, they’re also being asked to herd  technology and applications in the organization.

Shadow IT is a term that typically sparks passionate debate between the business and IT. Proponents of the idea may refer to it as “Application Outsourcing” while its detractors make snide remarks like “Cockroach Technology.” Whatever side you’re on, it’s important to remember there are positives AND negatives to shadow IT. For example, it can lead to an inconsistent approach but also free IT to focus on larger strategic challenges.

There’s no denying the balance of power is shifting from IT to business user in the enterprise. Personal devices encourage people to make their own decisions on how to improve life in and out of the office. In some cases these decisions this means bypassing IT altogether. IT departments are working with fewer resources these days, making it harder to support these new technologies and apps. Research says 35% of IT expenditures will happen outside the corporate IT budget within three years.

IT needs to update and modernize its business user engagement model to reflect the times. Perhaps it means becoming more of a service organization and enabler. This report explores how CIOs can deal with the tsunami of personal devices and apps flooding the workplace. Discover ways to embrace Shadow IT and make it work for the overall good of your organization. 
 


Presented On: Thu Apr 25, 2013
Phil Malatras , Sr. Manager , Broadcom
Story Colling , Manager , Broadcom
Details (hide)
Communicating IT Service & Value within the Enterprise is based on a Web Forum presentation given by Phil Malatras and Story Colling from Broadcom. The reader will learn about Broadcom’s current IT-Business alignment model and the pivotal role communications plays in its success. Good frontline IT communications leads to fast and efficient customer service response resulting in satisfied customers, trust, and credibility.
 
IT has evolved over the past 25 years and now the organization is expected to act as a strategic business partner. In order for your workforce to succeed, you need the right mix of technical understanding, collaboration and relationship management, communication skills, business engagement skills, and business acumen. Discover how to build and transform your current staff to meet these demands.
 
This report will show you which communication areas to focus on and what common, ineffective practices to look out for in your organization. Makeshift marketing efforts spread between technical writers, IT managers, and corporate communications teams can lead to an inconsistent message and multiple misconceptions. Some effective communication “myths” might even surprise you.
 
Find out how Broadcom successfully plans and executes their project communication strategy. We’ll examine the high level components of a corporate communication strategy. This includes:
  • Identifying and assessing your enterprise’s multiple audiences
  • Choosing the correct combination of communication tools and channels
  • Creating a plan and launch schedule
  • Building messages and collateral
  • Formal and casual feedback gathering techniques to ensure understanding


Presented On: Mon Feb 25, 2013
Rich Murr , VP of IT , Rackspace
Details (hide)
A Successful Approach to Recruiting and Retaining Top IT Talent is based on a Forum presentation given by Rich Murr from Rackspace. Without the right talent, delivering the results your organization deserves is impossible. Competition for IT talent is fierce. In this report, Mr. Murr focuses on the best ways to approach an “employees’ market.” 

Learn about the challenges leaders face and why their personal brand is often more important than the company’s brand. You reputation plays a critical role in attracting and retaining the people you need to achieve outstanding results. Historical data suggests that a good technical employee will stay with an IT services firm from three to five years, so how can you convince them to stay longer? 
 
Find out how to connect with your employees on a deeper level to drive personal and professional growth. Mr. Murr discusses the degrees of “stickiness” keeping employees in place and their motivations may surprise you. Your employees and recruits are people and individuals. There are generational differences and varying incentives you must consider. Understanding these differences takes time, so get started today! 


Presented On: Thu Mar 14, 2013
Doug Greene , Vice President, Enterprise Technology , American Red Cross
Details (hide)
Moving email to cloudMoving Enterprise Email to the Cloud is based on a Web Forum presentation given by Doug Greene from the American Red Cross. The American Red Cross successfully transitioned over 40,000 staff members to the Microsoft Office 365 email solution. This included users at in their national headquarters, Blood Services Regions, and more than 500 chapter organizations. The effort consolidated over 400 different email domains. For the first time, the organization has a single, enterprise-wide email platform. 

There were plenty of reasons for the Red Cross to make this move. For instance, moving to a cloud-based email platform offers improved services and features like 24x7 support, centralized administration, and enterprise shared calendars. Find out how an enterprise platform solution also helped the Red Cross realize annual cost savings in excess of $1.5 million.

This report gives you a pre and post-migration outlook for the Red Cross.  Discover the scope of products they’ve selected and the strategic decisions behind their migratory approach. Follow their timeline, starting with beginning stages of planning and contracting up to the last chapter migration.
 
Finally, you’ll read about some of the obstacles encountered and lessons learned along the way. For example, learn how to make your biggest critics the earliest adopters. Find out why calendar migrations and different mobile devices can be rather problematic during migration. As with any large-scale initiative though, communication is the key and the Red Cross had a plan for user awareness. 


Presented On: Thu Mar 21, 2013
Dane Ingram , Managing Director , PricewaterhouseCoopers LLP
Details (hide)
PwC Mobile Device Remote Workforce InnovationInnovating to Empower the Mobile Workforce is based on a Web Forum presentation given by Dane Ingram from PwC. The report details results from PwC’s iPad Experience program as the company searches for different ways to connect their mobile workforce. This program provided a rich opportunity to look at some of the newer, more innovative technologies available as well as address the BYOD phenomenon. 
 
A new approach meant reevaluating PwC’s core infrastructure. They needed a Managed Application Store, Single Sign-On Certificate Management, VPN on Demand, Mobile Device Management, and the ability to push VPN, WiFi, MDM, Mail Profiles, etc. Find out why they built out a separate VPN environment for mobile devices with a different set of rules and access rights.
 
Once the core infrastructure was in place, focus shifted towards deploying native email, calendaring, and contacts. In addition, they released a number of internally  developed applications like Time Recording, Expense Reporting, PwC News, and  Office Locator. PwC also identified ways to handle Word / Excel / PowerPoint files, manage secure file sharing, and support instant messaging and video connectivity. 
 
PwC has adopted a mentality of “one size doesn’t fit all” when it comes to application development. Discover the reasoning behind this approach and why it’s important to look at apps on an individual basis. There are factors like app type, use frequency, user type you must consider during the development process. Above all though, user experience should be your top priority. If an app doesn’t make completing tasks easier or quicker for employees, don’t bother with it.
 


Presented On: Mon Feb 25, 2013
Morgan Gothard , Enterprise Security Architect , Quanta Services Inc.
Details (hide)
The Anatomy of Modern Malware Threats is based on a Forum presentation given by Morgan Gothard from Quanta Services. The IT Security landscape has changed drastically over the last few years. New vulnerabilities are being discovered every day and basic defense tactics are no longer good enough. 

This report shares some alarming statistics regarding malware and attacks. For example, 1 in 239 emails contain a virus and more than 80,000 new malware strains are created each day. That’s just the tip of the iceberg. Find out who’s being targeted and why nobody is immune.

From organized crime syndicates to political “hacktivists,” learn about the diverse groups and individuals behind these attacks. Why are they doing it? How are they  doing it? We’ll explore several motives and methods, along with the black market economy associated with those threats. Examples of recently well-publicized attacks on companies like Sony, RSA, Yahoo, LinkedIn, and more are included to show how they fit a rapidly growing trend. 

Speaking of troubling trends, mobile malware increased tenfold from 2011 to 2012. Discover which mobile platforms present the most risk. You’ll read about the capabilities associated with this kind of malware, such as tracking users, collecting data, and sending content.

Mr. Gothard gives you a comprehensive look at the six stages of a malware attack: Lure, Redirect, Exploit Kit, Dropper File, Call-home, and Data Theft/Destruction. Plus, he’ll reveal what makes today’s malware different from past versions. How can you avoid being the victim? Basic security measures still apply but this report will uncover new tactics and emerging technologies you can deploy to defend your organization. Some of the tools and activities we focus on include “anywhere” content filtering, virtual execution, network traffic replay, and mobile antivirus. 



Presented On: Thu Feb 21, 2013
Lynnee Jimenez , Program Manager , VMware
Details (hide)
Cost and Process Efficiency Gains Using RFID Technology is based on a Web Forum presentation given by Cisco’s Lynnee Jimenez. Cisco has employed RFID technology to improve the tracking of their fixed assets. In this report, you’re going to find out why and how they decided on an RFID solution. It was a cross-functional team effort that required careful planning, constant communication, and a consistent approach. Their hard work paid off too, earning them an award for “Best RFID Implementation” in 2012.

Cisco took into account a number of considerations with regards to people, process, and technology. For instance, how many people needed to be trained? Do you tag existing assets or just newly acquired ones? Should you outfit all sites with RFID readers or just the largest ones? RFID has been around for a long time but is not that common in a metal/cable dense lab environment. Find out how Cisco leveraged external benchmarking in a relatively immature space to forge new ground in that area.

It is critical that you examine your asset process as a whole, from purchase all the way to disposal. Never underestimate the importance of having a consistent process across the board for your environments. Even the something as simple as the positioning of a RFID tag needs to be consistent. Discover the benefits of having an asset management system serve as your single source of truth for asset-related data, such as a one-stop shop for reusable assets.

The report also provides an in-depth look at RFID technology and its supporting elements. There are several factors for deployment like location, obstructions, and mounting space. Learn how Cisco uses fixed RFID read points and takes advantage of handheld readers in certain scenarios. The tag designs themselves can make or break your RFID initiative. However, the lessons shared here will help make this a successful venture for your organization. 



Presented On: Thu Jan 31, 2013
Daniel Spratlen , Director , Rackspace
Details (hide)
Moving Internal Applications to the Public Cloud is based on a Web Forum presentation given by Rackspace’s Daniel Spratlen. Rackspace is in the process of moving some their internal applications to the public cloud by way of open source software known as OpenStack. This is a work in progress and with any endeavor of this scope you’re going to run into challenges along the way. The report dives into their experiences, focusing mainly on the non-technical aspects like organization culture, compliance and security, as well as financial implications. 

Find out what makes a good candidate for cloud migration and the factors you must consider if you hope to be successful. Learn about the kinds of organizational changes you can expect from such shifts. This impacts your QA teams, infrastructure teams, system administrators, and developers to name a few.

Security and compliance are always a primary concern when dealing with cloud technologies. Fortunately there are ways to move your applications in a secure manner and remain compliant. Some of these pre-cautions, like encrypting sensitive data, should’ve already been taken but the cloud will make them mandatory.

From a financial perspective, a cloud shift will obviously affect your budget so you need to know what to look out for in order to plan ahead. How are you going to handle capacity planning and chargeback? Rackspace was even able to shift what were historically considered CAPEX costs to OPEX. Thinking outside the box, discover why “speed to impact” can be a more important metric than cost savings. 

 



Presented On: Thu Jan 24, 2013
Jennifer Philage , Wireless Carrier Program Manager , Quanta Services Inc.
Details (hide)
Best Practices for Conducting In-House Telecom Management is based on a Web Forum presentation given by Jennifer Philage from Quanta Services. Jennifer is Quanta’s Wireless Carrier Program Manager. Mobile communication devices (cell phones, aircards, mifis) are necessities of everyday business. Without monitoring, the expense associated with these devices can prove to be much greater than originally budgeted. Ever changing usage patterns, employment status, outdated plans, and the management of such a program can overwhelm an office manager already burdened with a multitude of responsibilities.
 
With TEM (Telecom Expense Management) vendors calling daily, Quanta opted to pull away from their third-party consultant and bring this management in-house. The company has experienced tremendous success over the last 12 months with their new in-house telecom management program. During this time, the program has helped the company save over $1.5 million dollars in cost prevention and reduction. To put that kind of success in perspective, Quanta’s average monthly cell bills amount to roughly $600,000.
 
This report identifies best practices used to develop a centralized in-house telecom management program created to support multiple office locations. Read and discover the following:
  • Structure and approach of establishing the initial program
  • Preventative measures that can be taken to minimize and avoid high overages 
  • Types of carrier provided data (exported from the carrier websites) that can be analyzed monthly for potential cost reduction 

 



Presented On: Thu Dec 13, 2012
Caleb Masland , The IMF
Details (hide)
A Simple Approach for Optimizing Your Environment to Save Costs is based on a Web Forum presentation given by Caleb Masland. This report focuses on leveraging quantitative data to save money in your environment but it’s really more about how to approach measurement in general. This is something a lot of companies struggle with and we perform on a daily basis. Here you’ll learn about an approach you can take back and use in your own environment. 
 
The report covers three major areas. First is a general framework for measurement in the IT organization. The second part highlights choosing effective measures. Finally, you’ll find out how to leverage your collected data for improvement. The ultimate goal is getting actionable information to improve costs in your IT organization. You can use data and metrics for a variety of reasons in the organization. However, as a frame of reference for this report, they are used for cost optimization.

 



Presented On: Tue Sep 25, 2012
Jeff O'Dell , Vice President, Engineering and Product Management , The Hartford
Details (hide)
A New Compute Model: Lessons Learned from Cloud Migration is based on a Forum presentation given by Jeff O'Dell. Mr. O'Dell is the Vice President of Enterprise Architecture for the Property and Casualty line at The Hartford Financial Services Group. The Hartford is a leading provider of life insurance, group and employee benefits, automobile and homeowners insurance, and business insurance. 

Like many major companies, they had technology issues to address in the forms of simplifying a complex environment and introducing a more variable cost model. As a result, the New Compute Model was created to simplify their processing platforms through standardization, processes automation, and establishing a more variable cost structure using cloud computing. They were able to gain efficiencies by introducing Standard Service Tiers and updating their IT Service
Management processes.

In this report you'll read about the importance of strategically aligning your hosting centers and the role cloud plays in that alignment. Find out how capacity utilization and Office automation fit into the journey to "cloudiness." Also, what factors should you consider in the application migration process? What stays and what goes? Finally, Mr. O'Dell takes us through some of the lessons they have learned so far during this endeavor. These deal with highly debatable topics like public vs. private cloud, vertical and horizontal integration, and just how much change is really necessary.
 


Presented On: Thu Nov 8, 2012
Monty Hamilton , CEO , Rural Sourcing, Inc.
Details (hide)
Rural Sourcing: IT’s Onshore Alternative is based on a Web Forum presentation given by Monty Hamilton. Mr. Hamilton is the Chief Executive Officer of Rural Sourcing Inc. Rural sourcing is quickly picking up steam as a cost-effective alternative to offshore outsourcing. 
 
This report takes a look at some cost comparisons and how using an onshore resource helps your bottom line. Learn about the rural sourcing market in terms of size and what companies are involved around the country. Find out what IT, consumer, and global economic factors are contributing to this growing trend. Discover some additional domestic sourcing benefits, on top of lower costs, like quicker times to market, time zone advantages, and reduced compliance risk.
 
 
Some other areas of focus in this report include:
  • What is “rural sourcing”
  • Geographical breakdown of domestic sourcing providers
  • How companies like IBM, HP, and ADP created jobs using onshore resources
  • Four changing landscapes impacting the outsourcing industry
  • Case study on cost comparison between offshore and onshore
  • Four areas where rural and domestic sourcing has an advantage
 


Presented On: Thu Jun 7, 2012
John Holmblad , Principal Information Security Services Specialist , U.S. Senate
Details (hide)
Innovation in Cyber-Security Threat Avoidance is based on a Forum presentation given by John Holmblad. Mr. Holmblad is a Principal Information Security Services Specialist for the United States Senate. The U.S. Senate has recently re-competed their Cyber-Security Services contract. This enabled them to update their Statement of Work in order to reflect the current environment and threats. It also provided great insight into how the market for these services has changed since 2007. In this report, you will learn what to look for in a cyber-security services contract in terms of program management, SOC supervision, network security monitoring, and more.
 
Another major focus is the Senate’s cyber-security approach. This includes how they use relevant concepts that are also incorporated into the Department of Defense’s Active Defense Doctrine. The volume
of global cyber-attacks is up 81% from 2010 to 2011 according to one
report. Find out what services the Office of the Sergeant at Arms offers
Senate customers to combat these rising threat levels and more sophisticated attacks.
 
Some other areas of focus in this report include:
  • Office of the Sergeant at Arms (SAA) overview
  • Size and scope of SAA’s IT Operations
  • “Five Stages of Attack” for Advanced Persistent Threats
  • More sophisticated malware, i.e. W32.Flamer
  • Cyber-security tools such as Intrusion Detection, Log File Analysis, SIEM, etc.
  • Cyber-security services contract structure, including key performance indicators
  • The contract solicitation process
 


Presented On: Thu Sep 20, 2012
Rizwan Patel , Director, IT , Caesars
Swithin George , IT Manager , Caesars
Details (hide)
Application Performance Management and Monitoring is based on a Web Forum presentation given by Rizwan Patel and Swithin George from Caesars. They play integral roles in Caesars’ IT Common Services Group. This report focuses on the group’s successful journey in influencing and implementing monitoring and management across Enterprise Services. 

The effects of their enterprise monitoring initiative spread across technologies like TIBCO BW, BE, EMS, RV, and Java. It also includes infrastructure components like pSeries, iSeries, VMWare, and Wintel. You will read about the challenges, implementation, benefits, and extension of the framework with references to the Five Dimensions of APM (Application Performance Management) Functionality.

Some other areas of focus in this report include:
  • Composition of new monitoring framework and .NET application
  • Filling in your monitoring gaps
  • Enterprise monitoring initiatives
  • Caesars’ vendor selection approach
  • Application monitoring solution features like deep dive analytics
  • Infrastructure monitoring solution features like inbuilt workflow management

 



Presented On: Thu Aug 16, 2012
Chris Bennett , Director , EMC Corporation
Details (hide)
Emerging Trends in Enterprise Storage is based on a Web Forum presentation given by Chris Bennett. Mr. Bennett is the Director of Enterprise Storage Services at Cox Communications. Approximately every four years, a disruptive technology shift occurs in Enterprise Storage Systems. This report focuses on how these new technologies are impacting storage environments. You’ll read about the effects on Operational scale, scope and practice. The following technologies are highlighted:
  • FCoE / Converged networking
  • SSD / Flash
  • Automated workload management
  • Reducing the disruptive nature of data mobility
  • Converged storage (file, block, object)

Some other areas of focus in this report include:
  • IT competes by investing in transformation
  • Virtualization
  • Traditional vs. Converged Networking
  • Manual vs. Automated Data Placement
  • Federation and global scale
  • Data protection
  • The advent of Big Data
  • Massively scalable modern storage systems
  • Organizational shifts around Big Data and IT Consumerization

 



Presented On: Mon Sep 24, 2012
Geoff Aranoff , CISO , Western Digital Corporation
Details (hide)
Cyber-Security and Intellectual Property Protection is based on a Forum presentation given by Geoff Aranoff. Mr. Aranoff is the Chief Information Security Officer for Broadcom. This report looks at strategy and tactics for securing advanced computing environments to protect against malicious threats. There’s an emphasis placed on intellectual property (IP). 
 
The number of cyber incidents per year is increasing, as is the number of records  compromised. Most of these cyber-attacks are opportunistic in nature and, even worse, continually evolving. Information Security teams need to take the proper steps to mitigate these risks. Find out how Broadcom built its Information Security organization practically from the ground-up and how they approach risk management. Read about different IP protection practices like data
classification, executive reporting, and DLP. Learn the importance of
defining your organization’s cyber-threat tiers.
 
Some areas of focus here include:
  • Same threats, different applications
  • Cyber-attack facts and figures
  • Possible compromise through mergers and acquisitions
  • How IP protection helps your cyber-security strategy
  • Broadcom’s Information Security program
  • Elements of IP protection, including basic and advanced techniques
  • Creating a “cyber-focused” strategy

 



Presented On: Thu Oct 11, 2012
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)
Digital Cities, Open Data, and Applications is based on a Web Forum presentation given by Dr. Jonathan Reichental. Dr. Reichental is CIO for the City of Palo Alto, California. We have reached a point in the U.S. where reinventing how local government is delivered is not only necessary, but also possible. This is the result of significant new technology capabilities available in communities. The City of Palo Alto is leading the way in exploring and building completely new ways of delivering services and engaging civic participation. Their vision is to build and enable a leading digital city. 

Deeply embedded within this strategy is the need to innovate across all local government functions while engaging the community and private sector in a partnership. This report looks at their journey and how early lessons might apply in the private sector too. You’ll learn how to deliver innovative solutions more quickly and at a lower cost.

Some areas of focus here include:
  • Local government’s challenges in 2012
  • Organizational structure of a digital city
  • The benefits of asking “why?”
  • Doing things differently in a “new world”
  • Case study– local collaboration leads to quicker results
  • Scaling solutions and open data in action
  • A lean startup approach emphasizing the basics and speed

 



Presented On: Thu Sep 27, 2012
Steve Martin , Manager IT Security , ITG Brands
Details (hide)
Secure Cloud Computing: Resources to Assist with Vendor Assessment is based on a Web Forum presentation given by Steve Martin. Steve is the IT Security Manager for Lorillard Tobacco. Data stored within the Cloud presents unique challenges to information security. It is often difficult, if not impossible, to ascertain whether or not a cloud service provider has implemented security controls that align with an organization's security strategy and compliance efforts.

This report looks at some of the key questions your organization should be asking with regards to data security. Whether you’re moving to the cloud or already there, it is important to address key points such as where your data resides, who is touching it, and what happens if there’s a breach. For those companies evaluating cloud service providers, you’ll find information on existing and emerging resources available to help you assess cloud provider security.

Some areas of focus here include:
  • Cloud deployment and service models
  • Data residence considerations
  • Data breach laws
  • Bringing data back from the cloud
  • IT security audit standards
  • Cloud Security Alliance resources
  • STAR Registry
  • FedRAMP
  • Shared Assessments


Presented On: Thu Aug 23, 2012
Rob Beistline , Transition Leadership Team Lead , Milliken & Company
Details (hide)
Successfully Managing a Multi-Year IT Initiative is based on a Web Forum presentation given by Rob Beistline. Rob is the Transition Leadership Team Lead at Milliken & Company. Companies attempt a number of initiatives every year and many of them are abandoned for various reasons before completion. Others may be completed with less than predicted outcomes, culminating in countless time, money, and energy lost trying to resolve the situation. 
 
Over the last 5 years, Milliken & Company has successfully implemented SAP globally throughout the company on time, on budget, and without business interruption. This report looks at how managing your organizational structure, developing a strategic implementation plan, and committing to change management can guide you to successfully managing a multi-year initiative.  

Some areas of focus here include:
  • Milliken’s challenges reasons behind selecting a SAP solution
  • Five steps to a successful multi-year implementation
  • Project team composition
  • Developing a realistic implementation plan
  • The SAP project roadmap and Milliken’s ERP five year layout
  • Change management responsibilities
  • Importance of end-user ownership and how to improve it

 



Presented On: Thu Jul 26, 2012
Bryan Steward , Sr. IT Manager , U.S. Senate
Details (hide)
The Benefits of Upgrading to Exchange 2010 is based on a Web Forum presentation given by Bryan Steward. Bryan is a Senior IT Manager for the Office of the United States Senate Sergeant at Arms CIO Division, overseeing System Architecture and Integration. This report takes a look at the Senate’s recent upgrade to Exchange 2010. 
 
The move enabled them to adopt cheaper storage, significantly increase mailbox sizes, convert their Symantec ILM archiving over to the native Exchange archive, and virtualize a majority of their infrastructure. You will read about the challenges they encountered during the upgrade process and the consequent lessons that were learned as a result.

Some of the highlighted areas in this report include:
  • The Senate’s design goals for Exchange 2010
  • Comparison of  old and new Exchange environments
  • Considerations and selections for Exchange 2010 storage, archiving, and architecture
  • Migration approach
  • Exchange 2007 and 2010 solution overviews
  • Why storage design still matters
  • Importance of planning roles carefully
  • Determining the right balance between virtualization and consolidation

 



Presented On: Thu Jun 14, 2012
Mark Guidi , Senior Vice President
Details (hide)
Driving Business Value Through Technology: Historical Lessons and Future Implications is based on a Web Forum presentation given by Mark Guidi, Senior Vice President of Corporate Strategy for LPL Financial. Throughout history, societies have demonstrated time and time again how technology can be a strategic advantage. In the modern world, that same premise holds true for businesses. This report focuses on the three main components of technology: Innovation, Adaptability, and Quality. 

Mr. Guidi hypothesizes that performing well in those three areas can generate value, which will further drive business and society at large. For each component, you will read about an ancient culture who mastered in that area followed by some more modern examples. The report looks at how some of these newer technologies are changing the world and driving new business models for organizations. 

Some of the topics touched on in this report include:
  • Ancient China’s Song Dynasty and their innovative contributions
  • Modern innovation
  • How Ancient Rome improved a civilization by adapting
  • Apple’s “innovation” vs. “adaptation”
  • Globalization’s effect
  • Quality unlocks value
  • Looking ahead at technology in the mobile, virtualization, and video spaces
  • Business and societal implications
  • Education is key

 



Presented On: Thu Jul 19, 2012
Diane Martin , Director of Corporate Software Development , IMF Fellow
Mary Rasmussen , Director of Program Software Development , USAC
Details (hide)
From Waterfall to Agile: One Company's Journey is a report based the Web Forum presentation given by Diane Martin and Mary Rasmussen from the Universal Service Administrative Company (USAC). Agile software development practices continue to gain popularity in the IT industry. Is agile really the silver bullet? According to the Standish Group's 2011 CHAOS Manifesto, agile projects are successful three times more often than non-agile projects.
 
This report takes a look at USAC's journey from waterfall to an agile methodology and the "Scrum" framework in particular. You will read about the challenges, pitfalls, and results from this company's transition. The report also focuses on factors USAC found critical for successful agile implementation.
 
Some of the topics covered in this report include:
  • Overview of agile and its values
  • Scrum basics, including roles and meetings
  • USAC's IT organization pre and post agile implementation
  • Establishing new metrics for agile development
  • Lessons learned from USAC's agile transition
  • Future outlook 

 



Presented On: Fri Jun 8, 2012
John Stasko , Director , Georgia Institute of Technology
Details (hide)

Visual Analytics and Information Visualization: Bringing Your Data to Life is based on a Forum presentation given by Dr. John Stasko from the Georgia Institute of Technology. Investigators have an ever-growing suite of tools available for analyzing and understanding their data. While techniques such as statistical analysis, database queries, machine learning, and data mining all have benefits, this report explains how visualization can add much needed benefit to the mix.

Visualization brings capabilities for exploring data when one does not know which questions to initially ask. The report looks at why visualization is so powerful, how it helps people in data analysis, and provides some provocative examples of visualization techniques and systems. 

 

 

 



Presented On: Fri Jun 8, 2012
Flavio Villanustre , Vice President of Products and Infrastructure , LexisNexis
Details (hide)

Innovation with Big Data and Total Cost Ownership is based on a Forum presentation given by Dr. Flavio Villanustre from LexisNexis Risk Solutions. It looks at how Big Data and a Big Data processing platform helped transform LexisNexis Risk Solutions from $0 to $1.4 billion in 10 years. There is a case study presented showing that Total Cost of Ownership (TCO) of Big Data can catapult innovation, product delivery, and overall competitiveness in your organization.

This particular case study focuses on acquisition integration and includes ways to cut costs while increasing your capacity to scale for growth and innovation. Readers will get an in-depth look at the technology involved in LexisNexis’s High Performance Computing Cluster (HPCC) Systems and the benefits of this platform.

 

 

 



Presented On: Thu Jun 7, 2012
Adrian Gardner , CIO, Director of the Information, Technology, and Communications Directorate , FEMA
Details (hide)

Building a Future-Ready Digital Government is based on an IT Innovation Forum presentation given by Adrian Gardner from NASA’s Goddard Space Flight Center. Nobody can deny that the global mobile landscape is rapidly changing. As a result, Federal CIO Steven VanRoekel declared 2012 as the "Year of Mobile Government." This report details the complex approach involved with becoming a more future-ready digital government. You will read about the three strategic layers of this approach: presentation, production, and information.

Mr. Gardner provides great insight on how to make your organization more information and customer-centric while placing high value on innovation and collaboration. The report then shifts its focus to Virtual Desktop Infrastructure and the role it plays in a Bring-Your-Own-Device model. There are specific examples used from Mr. Gardner's experiences with NASA and Goddard in order to illustrate key points related to those concepts as well as Mobile Device Management.

 

 

 



Presented On: Thu May 24, 2012
Casey Bishop , Sr. IT Specialist , U.S. Senate
Claudette Archambault , Principal IT Specialist , U.S. Senate
Details (hide)
 
Transitioning from Waterfall to Agile: UX Opportunities and Challenges is based on a Web Forum presentation given by Casey Bishop and Claudette Archambault from the U.S. Senate. Agile isn’t necessarily a new concept but at the same time there's not much out there on how to make it work, best practices, etc. There is even less information available on how to make it work with UX integrated into the development phases. This report takes you through the Senate’s transition from a waterfall to agile methodology, specifically dealing with a lightweight, agile framework known as SCRUM.
 
Casey dives into the scrum process, including its roles, goals, and the importance of meetings. Claudette highlights the lessons they learned from the transition. Some of these include shifting scope, balancing current and future sprint goals, and design continuity. Then you’ll read about good ways to get this transition off the ground. Recognizing that it’s both a change in process and mindset as well as building the right kind of team will go a long way in determining success.
 
 


Presented On: Thu May 10, 2012
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)
Quality Improvements for Your IT Project Portfolio is based on a Web Forum presentation given by Michael Bender, an IT Financial Management Consultant. Mr. Bender has many years of  experience as an IT Finance lead and this report captures some of his brilliant insights. There are a lot of questions around project ROI and many IT executives don’t know how to translate their project’s value to the business. Business cases are critical in terms of IT Portfolio Management and you’re going to discover how to properly build one in a way that gets your project recognized.  

Now it’s not enough to have a business case. A case study used in this report shows the correlation between quality business cases and IT project spend at an industry leading tech company. Unfortunately, many organizations struggle with culture, process, and consistency issues relating to IT project ROI tracking. Find out why these challenges stifle innovation in your enterprise and how you can change course.

In order to improve the quality of your IT project portfolio, you must have solid assessment processes and scoring mechanisms in place. Mr. Bender details some of his best practices for measuring risk and value, including scorecards and educational materials. Finally, he lays out IT Portfolio Management adoption approaches for small, mid-size, and larger companies so you can select the best fit for your organization.
 
 


Presented On: Thu Apr 12, 2012
Alex Miyagi , U.S. Senate
Jim Lane , Senior Information Security Services Specialist , U.S. Senate
Details (hide)
 
Leading Change: System Management and Vulnerability Assessment Services is based on a Web Forum presentation given by Alex Miyagi and Jim Lane from the U.S. Senate. The Senate provides enterprise-wide SMS and vulnerability assessments on an “opt-in” basis. This report looks at how they convinced offices to subscribe to these services and what was learned during the endeavor. First you’ll read about the hard and soft benefits of technology as we try to answer the question: is it a people problem or a technology issue?
 
The report focuses on the Senate’s culture and how that contributed to early adoption failures. Then we find out how they made it work through several actionable items like organizational alignment, guiding coalitions, and short-term victories. Finally the report details challenges related to both your technology team and customers, followed up by ways to enable success, such as relationship building and process redesign.
 
  
 
 


Presented On: Thu Mar 15, 2012
Peter Ehrhard , IT Chief Architect , IMF Fellow
Craig Masters , Chief Mobility Architect , Harris Corporation
Details (hide)
 
Mobile Device Management is a report based on Peter Ehrhard and Craig Masters' Web Forum presentation. They are Chief Architects within the CIO Organization at Harris Corporation. This report presents an overview of Harris's mobility strategy, which is driven by a "Bring Your Own Devices" (BYOD) approach. It includes sections focusing on mobile security and management, necessary infrastructure upgrades, and application development methodologies. Finally, you will read about the company's Zenprise implementation experience and the tool's critical role in securing mobile devices that consume Harris data. 
 
 
 
 
 


Presented On: Wed Mar 21, 2012
Monty Hamilton , CEO , Rural Sourcing, Inc.
Details (hide)
 
Rural Sourcing: IT's Onshore Alternative is a report based on ITFM's March Call presentation given by Monty Hamilton, CEO for Rural Sourcing, Inc. Rural sourcing is quickly picking up steam as a cost-effective alternative to offshore outsourcing. This report touches on the cost comparisons and why using an onshore resource helps your bottom line. You will read about some of the driving forces behind this concept, the progress that has been made, and challenges that still exist. Case studies are provided to illustrate how rural sourcing can benefit an organization in a variety of ways. 
 
 
 
 
 
 
 
 


Presented On: Thu Mar 22, 2012
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)
 
"IT Software Asset Management" is a report based on the Web Forum presentation given by Michael Bender, Management Consultant for Silicon Valley Bank. Software asset management (SAM) is a business practice that involves managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. This report looks at SAM's potential benefits for your organization. You will read about the implementation process and its tactical nature, focused specifically on balancing the number of software licenses purchased with the number of actual copies installed. Learn how SAM can serve many different functions within organizations, depending on your software portfolios, IT infrastructures, resource availability, and business goals.
 
 
 
 
 


Presented On: Tue Feb 28, 2012
Jack Lewis , Manager PMO , Macy’s
Details (hide)
 
"Security & Privacy Standards for Outsourcing" is a report based on Jack Lewis' presentation at the IMF Sr. Executive Retreat. Jack is the Vice President for Global Workforce Strategies at Ceridian. His organization has chosen an international staffing model to support its global business footprint. Read about the various safeguards and practices Ceridian has implemented to enforce the Security and Privacy policies that govern their business model, both domestically and overseas. The following security measures are detailed in this report:

- Physical Security
 
- Information Security and Data Privacy
 
- Systems Security
 
- Network Security
 
- Personnel Pre-employment Screening  
 
 

 



Presented On: Mon Feb 27, 2012
Ann Jacobs-Long , Group Vice President , SunTrust Bank
Details (hide)
 
Implementing an Enterprise Program Management Office is based on a presentation given by Ann Jacobs-Long at The IMF Sr. Executive Retreat. Ann is a Group Vice President for SunTrust Bank. The banking industry’s unprecedented change and operating pressures will require SunTrust to manage a massive portfolio of performance improvement and regulatory reform projects. SunTrust has implemented an Enterprise PMO and Project Management Model to deliver the right projects, at the right time, for the right costs in the right way. This report looks at the value of an EPMO with regards to things like organizational strategy alignment. It walks the reader through a deployment approach focusing on three phases: Intent, Implementation, and Realization. You will also get an in-depth look at the particular EPMO model SunTrust selected as well as some background around those particular decisions.
 
 
 


Presented On: Thu Feb 9, 2012
Mark Guidi , Senior Vice President
Details (hide)
 
"Developing Capability Roadmaps" is based on a Web Forum presented by Strategy and Planning Executive Mark Guidi. The roadmapping process identifies critical customer needs and the capabilities, technologies, and skills that will meet those needs. It also helps a planning team set a strategic approach in a future oriented competitive context. This identifies gaps in meeting customers’ needs and helps define plans to fill the gaps. In this report, you will read about how roadmaps connect and balance the drivers of customer needs (“customer pull”) and technology innovation (“technology push”). It looks at different approaches, traps to avoid, lessons learned, and roadmap integration. Also included in the report is a case study taking you through the roadmap process.
 
 
 


Presented On: Thu Jan 19, 2012
Allen Greathouse , Vice President, Enterprise Information Services , Harris Corporation
Details (hide)
 
"IT Governance: Supply & Demand" is a report based on a Web Forum presented by Allen Greathouse, Director of Corporate IS Governance, Architecture, and Policy at Harris Corporation. It looks at the keys to success in achieving your governance goals, such as understanding your environment and strong PMO discipline. Potential pitfalls are examined, like poor resource management and strategic alignment. Readers will learn about the difference between "doing things right" (Supply) versus "doing the right thing" (Demand). Find out how those two elements play a pivotal role in your organization's IT Governance.  
 
 
 
 
 
 
 


Presented On: Tue Jan 10, 2012
Rick Schwarz , Communications Manager , The IMF
Details (hide)
 
This report is based on an IMF member initiated Connect call focusing on “Centralized Cellular Device Management.” A member company with 10k devices had just centralized and wanted to ensure they had the proper controls and policies in place. At the same time they had to be responsive to the field. Here you will read about various views on issues like:
 
- Contract negotiations, including billing plans
 
- Using vendors as an extension of your staff
 
- Different device implementation models, like stipends and tiers
 
- Emphasizing service over hardware
 
- Internal improvements
 
 


Presented On: Thu Jan 12, 2012
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)
 
This report is based on a Web Forum presentation given by Hans Eckman, former Principal (Senior Consultant) for xpanxion (consulting and dedicated offshore IT firm). It focuses on best practices when working with offshore and distributed IT services. Challenges can be magnified with distance. Many companies consider their offshore initiatives as under delivering on expected ROI or in some cases complete failures. Read this report to learn about the best practices, tricks, and pitfalls for adapting activities to optimize projects that work with offshore and distributed project teams. 


Presented On: Thu Dec 1, 2011
Rick Schwarz , Communications Manager , The IMF
Details (hide)
 
This report is based on an IMF member initiated Connect call focused on “Middleware & Application Integration.” It addresses how other companies are handling application integration into their environment while utilizing a middleware toolset (BizTalk, AIA, etc.). Find out how organizations create SOA or Middleware policies and how they enforce those policies. Learn about the individuals involved in this process and the challenges it presents. You will also read several other elements including:
  • How to gain upper management buy-in
  • Demonstrating the benefits of the service

  •  ROI measurements

  • Technologies used for Application Integration
     
  • Size and reporting structure for an Application Integration team 


Presented On: Tue Nov 1, 2011
Rick Schwarz , Communications Manager , The IMF
Details (hide)
 
An IMF member initiated this Connect to discuss Fraud Prevention and Management Practices. Their goal was to gain insight into how other IMF member companies are approaching the matter. This report looks at the various aspects of an organization's fraud management framework and best practices. You will also read about: 
 
  • The relationship between the Fraud Team(s) and your company’s leadership team
  • Pain-points regarding fraud and how to work through them
  • Balancing the need to have fraud prevention with other business priorities
  • Measures of success
  • Technology and tools used in a fraud prevention strategy
  • Core CBA selling features that promote further investment in the Fraud Team(s)


Presented On: Thu Nov 10, 2011
Doug Burton , Senior Manager , Allstate Insurance
Greg LaVigne , Platform Architect , Allstate Insurance
Details (hide)

“Virtual Desktop Deployment: Lessons Learned & Mistakes to Avoid” is a report based on a Web Forum presentation given by Doug Burton and Greg LaVigne from Allstate. They are two years into an enterprise-wide virtual desktop initiative, targeting over 30,000 employees. One year after going live with the technology solution, 100+ applications and 2,000+ users have been converted.  This report looks at their approach to this initiative, with a focus on the people, processes, and technology lessons learned.
 
 
 
 
 


Presented On: Thu Nov 3, 2011
Rob Murphy , Program Manager , U.S. House of Representatives
Details (hide)
 
"Flexibility During Project Implementation" is a report based on a Web Forum presentation by Rob Murphy, CAO for Enterprise Applications at the U.S. House of Representatives. The House is in the process of implementing a Financials ERP. It is a project they have decided to rollout in phases. This report takes a look at what the project team has been able to accomplish while going in-depth on some of the issues that drove internal project decisions. You will read about instances of schedule adjustment, different approaches to customization, and staffing resources that can be utilized throughout the project lifecycle. 
 
 
 
 
 


Presented On: Tue Oct 4, 2011
Michael Higgins , Director of Information Security and Chief Information Security Officer , Harris Corporation
Details (hide)

“Security Architecture: Living in a World of Compromise” is a report based on a presentation given at our Fall Sr. Executive Forum by Michael Higgins, CISO for Harris Corporation. It looks at different types of threats companies face, specifically with regards to Advanced Persistent Threats. You will read about how these threats typically materialize and how to create friction for your adversaries because “unless you disconnect from the Internet you are going to be compromised.” This report shows what changes have taken place over the past couple of years in Information Security and where you should focus your efforts today. 


Presented On: Thu Oct 27, 2011
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)
 
“Enterprise Portfolio Management” is a report based on a Web Forum presentation given by IMF consultant Mike Bender. It focuses on a brief case study of how Cisco implemented a new Enterprise Portfolio Management approach with the objective to coordinate and improve the overall value of Cisco's key cross-functional (Finance, IT, Operations, Manufacturing, HR, etc.) enterprise transformation investments. Specific topics covered in the report include investment selection, monitoring, benefit tracking, architecture roadmaps, and the change management needed to implement this approach.
 
 
 


Presented On: Mon Oct 3, 2011
Nalneesh Gaur , Partner , PricewaterhouseCoopers LLP
Details (hide)
 
“Security Considerations for Being Social & Mobile While Riding the Cloud” is based on a presentation from our Sr. Executive Forum in Baltimore. Nalneesh Gaur, a Director for PricewaterhouseCoopers, discusses the three key technologies driving business innovation today: cloud, social media, and mobile. Consumerization of these technologies is one reason they appeal to businesses. Savvy technology leaders welcome the opportunity and are working with individual businesses to drive their transformation at a faster pace than ever. But the trend raises security concerns. This report takes a look at the cyber-security risks, focusing on the key questions and considerations for advancing a business agenda that relies on one or a combination of these three critical technologies. 
 
 
 


Presented On: Thu Oct 13, 2011
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)
This report is based on a Web Forum presentation given by Dr. Jonathan Reichental, CIO for the City of Palo Alto, CA. Social media at one time was considered more of an option for companies but it is quickly becoming a requirement.  The usage rates for blogs and mainstream sites like Twitter and Facebook are absolutely staggering. Consumerization has played a major part in this shift of focus. Here we will look at social media’s impact on the business from a variety of standpoints, such as innovation and collaboration. The journey towards a social enterprise can be difficult but this report provides an outline for changing your organization’s culture and gaining executive support.


Presented On: Mon Oct 3, 2011
N. Derek Wilkinson , Managing Director , Boyden
Details (hide)
This report is based on a Forum presentation led by Derek Wilkinson, the Managing Director for Boyden Global Executive Search. It focuses on how candidates can better position themselves with recruiters. Executive recruiters work for the hiring company and in a tough job market they are often overwhelmed with high quality executives endeavoring to advance their careers. The report will take a look at this dilemma, where the job market is heading, and what individuals can do separate themselves from the pack.


Presented On: Mon Oct 10, 2011
Rick Schwarz , Communications Manager , The IMF
Details (hide)
 
This report is based on a member initiated IMF Connect discussion focusing on “Change Management.” The member company is moving to a more integrated environment and wanted to find out what the business response is to handling configurations for different software. In particular, they were interested to see how other companies assign responsibilities in change management.  Here you will read several views on these issues from companies who are in or have gone through similar situations. They provide their perspectives and best practices. Other areas of focus for this report include:
 
- When a business unit wants to change to a business process that is automated by one or more IT systems, who leads the change management process, the business unit or IT?
 
- In a successful change management process, what roles and responsibilities are the business unit’s vs. IT’s?


Presented On: Mon Oct 3, 2011
Brent Conran , CISO , McAfee
Details (hide)
 
"Advanced Persistent Threats to Mobility" is a report based on a Forum presentation given by Brent Conran a tour Fall Sr. Executive Forum in Baltimore. Mr. Conran is the CIO and CISO for the U.S. House of Representatives. This report focuses on security operations today and battling the "new threat landscape." It also provides some counter measures that your organization should be practicing to combat these threats. We will look at some of the sources and methods these cyber-criminals are using, such as malicious code, root kits, and different data mining tools. The characteristics of these attacks and attack groups are another issue touched upon in the report. 



Presented On: Thu Sep 22, 2011
Jonathan Asher , Group Finance Manager , Microsoft Corporation
Jason Cowan , Group Finance Manager , Microsoft Corporation
Details (hide)
Planning & Budgeting at Microsoft” is based on a Web Forum presentation by Jason Cowan and Jonathan Asher from Microsoft. This report looks at MSIT’s process for planning and operationalizing its annual strategic plan and budget. It takes a real in-depth look at target setting and the key steps in that process from both a financial and infrastructure perspective. Microsoft utilizes several funding models to various degrees and those are focused on as well. Learn about how the IT Finance team supporting Microsoft’s Worldwide IT Infrastructure and Services team operationalizes those dollars once they are allocated to the organizations.
 
 
 
 
 
 


Presented On: Mon Sep 26, 2011
Rick Schwarz , Communications Manager , The IMF
Details (hide)
 
Performance Management Reporting” is based on a Connect initiated by one of our member companies. That company recently experienced a reorganization that placed their service desk and field services organizations under a single executive. They are now evaluating performance management reporting for this newly consolidated end user services operation. The goal is to develop a cascading set of aligned metrics that measure not only the performance of the individual technicians and teams, but also provide insight into the end-to-end customer experience. This report covers the discussion between several member companies on how they have handled this situation and several best practices they have established.
 
 
 
 


Presented On: Tue Sep 20, 2011
Mark Masenhimer , Senior Finance Manager , Microsoft Corporation
Details (hide)
This report is based on a presentation given for the ITFM September Call. Mark Masenhimer is part of the IT Finance Infrastructure team at Microsoft and he spoke about the budgeting process at MSIT, specifically with regards to bottom-up budgeting. Here you will read a methodology comparison for top-down versus bottom-up budgeting and how MSIT views these methods. The advantages and disadvantages to bottom-up budgeting are explored. While it may be traditionally more accurate, there is usually more time and expense involved. Mark focuses on the target setting phase of the budgeting process and explains what they include in those targets or goals. We will also look at the steps MSIT is taking towards building a better foundation so it can reap the benefits of bottom-up budgeting. There are specific requirements they are putting in place to achieve those budgeting objectives and those will be detailed.
 


Presented On: Thu Sep 15, 2011
Caleb Masland , The IMF
Details (hide)
 
A consistent focus area for IMF benchmarking clients over the past year or so has been more robust implementations of utility models for storage. We’ve all seen the charts in meetings showing exponential growth of storage footprints year over year, and seen storage become a bigger and bigger piece of the IT cost pie. This report will provide insights into how far companies are actually getting down the StaaS road as observed by The IMF’s Managing Director of Information Exchange, Caleb Masland. You will read about issues such as:
 
- Storage Utilization differences observed in utility model environments
 
- Actual targets observed for Storage Virtualization, Thin Provisioning, Data Deduplication, Storage Auto provisioning, etc.
 
- Expected and actual Cost Differences across various delivery models
 
- Current trends in the usage of SAN, NAS, DASD, and Virtual vs. Physical Tape


Presented On: Wed Sep 7, 2011
Rick Schwarz , Communications Manager , The IMF
Details (hide)
 
Remote Workforce Transition” is a Connect Report based on an IMF Connect initiated by one of our member companies interested in transitioning to a remote workforce. They were looking to move some of their home office employees to remote status. In this report you will read about how different companies determine potential benefits to their customers and define the success of their remote workforce. Learn about working with the business side to determine proper metrics and the benefits of using third party resources to handle your work-from-home employees. Some of the other issues approached in this report include training your leadership and using a “manage the process, not the people” method for your remote workers.  


Presented On: Thu Aug 18, 2011
Cathy Kirch , SM Process Architect , Allstate Insurance
Details (hide)
 
Best Practices in Release Management” is based on a Web Forum presentation by Cathy Kirch, a Process Architect for Infrastructure Services at Allstate. It focuses on best practices for pursuing an Enterprise Release Management Process (ERM). In this report you will read about how the process was rolled out at Allstate to first gain compliance and then for continual service improvement. There were plenty of challenges and lessons learned along the way. The report also looks at common language, release phases, release types, integrating with Change Management, and basic metrics out of the gate.


Presented On: Sun Aug 28, 2011
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)
On Lock-Down: Requirements Change Management” is based on a Web Forum presentation by Hans Eckman, Vice President and Enterprise Business Analyst for SunTrust. It focuses on how the remediation cost of changes and defects increases significantly during the project lifecycle and post implementation. BA’s often struggle on projects and with project team members trying to manage scope, changes to requirements, and clarifications. By reading this you can learn how to use some of the fundamental principles of project and release management to create an iron clad requirements management process.


Presented On: Thu Jun 9, 2011
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)
Enterprise Architecture Innovations Team” is based on a Forum presentation by Hans Eckman, Vice President and Enterprise Business Analyst for SunTrust. This takes a look at SunTrust’s unique Innovations Team. Companies often have teams to manage technology standards and approve software use, but who is working to help leverage these systems and emerging technologies to solve disparate business challenges?  Find out how the Innovations Team engagement model can be leveraged in your organization to replicate solutions across multiple organizational needs, develop proof of concept systems, evaluate emerging technologies, and transition work to projects or business units.


Presented On: Wed Jul 6, 2011
Details (hide)
 
This report looks at the pressure points and risk assessments associated with the public cloud through the eyes of several IMF member companies. They address the IT structure and configuration needed to use a public cloud. Other areas of focus include: cloud security; determining which applications are best suitable for cloud migration; and how to deal with vendors regarding contracts and SLA’s. There is also some debate around what actually defines the cloud.
 
 
 
 
 
 


Presented On: Thu Jun 30, 2011
Cassandra Van Gelder , Senior Technical Writer , Caesars
Details (hide)
Here you will learn about the benefits of having properly trained technical writers and satisfactory documentation. Whether it is time or money, bad documentation habits will cost your organization more than you probably think somewhere down the line. There is an experiment provided to give you a brief snapshot of just how much time you may actually be wasting while trying to look over documents. Alas, there is a better way and this report will take you through the 8 steps necessary to improve your documentation practices.
 
 
 
 


Presented On: Thu Jun 2, 2011
Details (hide)
                                                                                                                                                                           Here you will learn about the capacity and performance management strategies of several IMF member organizations. You will learn about what capacity metrics these companies are using for their forecasting purposes as well as how implementing chargebacks can help control system growth. We will also look at “stress testing” and the differences between capacity management versus performance monitoring. There is detailed discussion included on Configuration Management Databases and the push for virtualizing your environments.

 



Presented On: Mon Jun 13, 2011
Details (hide)
                                                                                                                                                                        This report looks at managing data center workloads. It focuses on the scenario of having two main data centers with the thought of switching over to one primary data center and a secondary backup. You will also read about the idea of splitting development and production between the data centers as well as the option of moving certain applications and systems to the cloud. Data replication methods and practices are expanded upon and the importance of properly mapping your solution chain is examined.

 

 

 
 


Presented On: Wed May 25, 2011
Details (hide)
 
Here you will learn about the strategies several companies have deployed to surrounding batch job management. You will read about the different ways to handle incident and change management, including managing different environments. We broach the topics of workload scheduling and process automation as well. On top of that we will take a look at what key metrics and measurements other companies use in their evaluation process.
 
 


Presented On: Tue May 24, 2011
Details (hide)
 
In this report we will focus on an IT organization searching for answers on how other IT departments handle the challenges presented by corporate email on their employees’ personal devices. You will see how other companies deal with several issues like written policies, employee eligibility, and corporate vs. individual liable information. Also included is a rather in-depth look at the biggest threat on people’s minds: security. Find out other organizations’ concerns and what they are doing to solve the puzzle.


Presented On: Thu Jun 2, 2011
Cama Piccini , Human Resources Business Partner , Harris Corporation
Details (hide)
 
This report focuses on Harris Corporation’s IT Rotation Leadership and Development Program. The program was developed  to ensure Harris recruits, hires, and develops successful future IT leaders. It is a fast track rotation and development program for high potential employees that provides job enrichment and career broadening for early IT professionals and new graduates. Read about the program's success and how you can incorporate something like this into your organization.
 
Here is a sample about some of the benefits of these rotation programs:
"This program gives participants in-depth exposure across the corporation. Harris has become a larger international presence with many different divisions. Employees need a broader view of their position in the company. These rotations let them see how operations within their respective divisions affect the company as a whole.
Networking is another driving force behind the leadership and development programs. Getting things done in a big company can be difficult for a variety of reasons. Rotations allow employees to venture out into the different divisions and network within those groups as part of a project team. As a result, they become familiar with various groups and individuals, making it easier to accomplish their tasks in a timely manner.
 
This is real life on the job training employees are receiving while participating in their rotations. It maximizes their learning experiences at Harris..."


Presented On: Thu May 19, 2011
Michael Podemski , Manager, Advisory Services , Ernst & Young
Details (hide)
 
In this report we will focus at the key steps and processes for planning and executing a comprehensive technology audit. It dives into several different types of technology audits. We will also look at some approaches to performing risk assessments and the various frameworks that can be used as part of the audit. The benefits of these different approaches will also be addressed, as well as the issues to keep in mind.
 
Below is an excerpt on different frameworks provided from ISACA:
 
A majority of the frameworks Michael Podemski uses come from ISACA because of his IT audit background and the purpose of the organization. COBIT 4.1 is the IT governance framework they use followed by the IT Assurance Guide using COBIT. This is where he obtains most of his test procedures or guidance for test procedures. Val IT is an enterprise governance framework of IT. Using this is like looking into IT from a business perspective. For instance, in looking at IT portfolio management you are focusing on how the company is investing their money into IT projects and operations. Podemski has used Val IT in the past to assess how Allstate has done funding on projects. It has a lot of the valuable information you need in a framework.
He will also utilize the mappings of ITILv3 to COBIT 4.1, TOGAF 8.1 to COBIT 4.0, and PMBOK to COBIT 4.0. If you are not familiar with ITIL, it is an IT service management framework. Version 3 is more comprehensive than Version 2. Version 3 talks about the identification of a service that is going to enable your business using technology through the design, deployment, operation, and eventually retirement of that service…”


Presented On: Thu May 5, 2011
Patricia Lee , Lead Architect , Caesars
Details (hide)
 
This report looks at Casears’ enterprise architecture framework and shares some of its successes.  Also included in the report is an overview of Caesars’ architecture review process.  You will then see how the EA team works to ensure the integrity of solutions without assigning architects to the projects and the various architecture domains. 
 
Below is an excerpt from the report talking a little bit about Caesars’ Architecture Review Board process…
 
Based on the overview, Caesars expects to have the project scope defined with some of the known constraints. The stakeholder impact is looked at from the business side, staff side, and, when vendors are engaged, the vendor management perspective. A functional overview uses business terms to show what applications are involved and which pieces are being delivered by each area. It describes the overall solution and key integration points. Next is a high level technical overview. This is basically the same layout as the functional overview. However, instead of utilizing business terminology, the presenter overlays it with the transport mechanisms, data bases, and perhaps data center locations involved. It indicates these aspects as new, changed, or removed and if regulated. The highlights point out interesting functional or technical components that are new and unique with this project compared to all of the others. What makes it stand out, essentially?
 
Being in a highly regulated industry like gaming with multiple regulatory agencies, Caesars places a lot of emphasis on ensuring compliance. This is where the commonly missed items and regulatory topics come into play. For Caesars, this can be areas like: responsible gaming; gaming regulatory; infrastructure; design reviews; and vendor solutions. These are there to avoid a situation where a development lead does not know to ask about the critical areas. A lot of times individuals mean no harm but some things are just missed due to ignorance. While the regulations may be different from industry to industry, it still happens all the same. It is the age old challenge: you do not know what you do not know…”  


Presented On: Thu Apr 21, 2011
Nick Malik , Enterprise Architect , Microsoft Corporation
Details (hide)
 
When managing the portfolio of projects in organizations, many of the core concepts of traditional IT demand management fail to deliver on one of the key demands of CIOs: IT-Business Alignment.  This report focuses on the meaning and value of Alignment and how it can be measured. Furthermore, it will show you how to find projects that are misaligned, what to do when you find one, and how to include alignment in the overall demand management process.
 
Here is a brief excerpt from the report on supporting innovation…
 
There is no real ROI for disruptive change because quite frankly most disruptive change fails, especially if your company is trying to lead and get out in front. If that is the case, the goal should be to get out in front as fast as possible, fail as fast as possible, learn as fast as possible, and do it again. In this case, using ROI to decide what makes the cut list of funded projects can have an adverse effect.
Every year Business Week lists 50 of their most innovative companies which typically includes companies like Apple, Google, Microsoft, IBM, and Toyota. The question becomes what are these companies doing and, more interestingly enough, do you want your company on that list? If you do, the internal processes in your company have to support innovation. In order to support innovation you have to support failure and in order to support failure you cannot have ROI as the primary mechanism for prioritization and demand management. The same holds true for any change project. ROI will not take you where you want to go from an innovation standpoint. ROI based planning can actually stifle innovation…”


Presented On: Thu Apr 14, 2011
Jill Allen , GVP , SunTrust Bank
Details (hide)
 
Throughout the recession, employee morale has been a challenge due to layoffs, increased workload and other factors brought on by an uncertain market. SunTrust has successfully worked to combat these challenges. This report will take a look at some of the strategies they have implemented to ensure they retain the best and brightest “teammates.” It will also focus on the creation of a Professional Development Manager role and the positive impact this has made on SunTrust’s organization as a whole.
 
Here is a brief excerpt on teammate feedback:
 
“…SunTrust Bank has always found teammate feedback critical for improvement. Generally they utilize employee surveys. An outside organization is asked to perform these surveys in order to gauge the pulse of SunTrust’s teammates. The goal is to find out how individuals felt about the organization and whether or not current procedures were working. In late 2005, in response to teammate surveys, the bank embarked on an effort to change the landscape of how its teammates are measured for performance, goals monitored, feedback provided, and growth within the organization. This gave way to the Professional Development Management model. To facilitate this change, leadership behavior needed to change and the organization needed a redesign…”  
 


Presented On: Thu Mar 24, 2011
Chris Hildenbrand , Senior Director, Information Security and Risk Management , Microsoft Corporation
Price Oden , Principle Security Architect , Microsoft Corporation
Mark Estberg , Senior Director of Information Security Risk Management and Compliance , Microsoft Corporation
Details (hide)
 
As more and more organizations begin moving their programs and applications to the cloud, security becomes a hot button issue. Microsoft’s internal IT Security and Compliance team recently led a discussion on its strategy for building applications to run securely in the cloud. This report focuses on that strategy and its governance model. Their risk-based acceptance strategy of future projects planned for cloud deployment is also looked at in-depth.
 
Here is a brief excerpt on cloud security challenges:
 
“...The first is a growing interdependence among cloud service providers and cloud consumers. There are mutual expectations that platform services and hosted applications must be secure and available. That web of interdependency can become complex. At Microsoft, they spent a lot of time on the following: understanding those dependencies on interdependent cloud services; ensuring they have solid reliability plans; setting clear expectations about the availability of their cloud services.
The second challenge is meeting compliance obligations. If you work for international organizations you can experience ambiguous regulations as well as conflicting regulations. This is an area Microsoft has invested heavily in to ensure they can meet their compliance obligations in business ventures around the world. 
Another issue is security methods keeping up with evolving technologies. Virtualization is clearly an example of this challenge…”

 



Presented On: Mon Mar 7, 2011
John Crary , Chief Information Officer , American Red Cross
Details (hide)
 
Social media policies vary according to organization type and size, and there is no blueprint for implementation and integration. This report focuses on how the American Red Cross is utilizing social media to help meet its initiatives and the unique lessons they have learned through disaster scenarios. It also touches on the fine line between public and private information and the security problems that can arise due to this conflict.


Presented On: Thu Mar 17, 2011
Maru Flores , Manager, Digital Worker Programs , Ford Motor Company
Details (hide)
 
Ford Motor Company’s Digital Worker program was set up to enable global employee collaboration.  With the One Ford plan, Ford understands its success is increasingly dependent on employees collaborating around the world.  The ultimate goal is to provide the tools and services that connect people and data, anytime and anywhere. This report focuses on some of the strategies that have been deployed to ensure this program is successful and meets the needs of a growing global organization.

                                                           



Presented On: Thu Feb 17, 2011
John Toner , Associate Director, Data Centers , Verizon Wireless
Details (hide)
 
Over the last few years Verizon Wireless has made energy conservation initiatives at its data centers a top initiative. Their efforts have brought them recognition and awards for their success in both cost and energy savings. This report outlines their strategy, process, and the benefits reaped from the energy efficient improvements.



Presented On: Thu Feb 24, 2011
Caleb Masland , The IMF
Details (hide)
 
Previous discussions about application development benchmarking at IMF events have tended to devolve into contentious debates about the merits or shortcomings of function point analysis. After seeing the same debate go nowhere time and again, IMF’s benchmarking group took a step back and asked themselves, “Is there a comparable and effective way to compare application development and maintenance that is simple enough for any organization?” This report will explain the method The IMF has been using with their benchmarking clients in recent months and how it’s yielded actionable results without the headaches (and costs) associated with a detailed function point study.


Presented On: Wed Apr 6, 2011
Details (hide)
 
In the first quarter, member initiated connects revolved around testing applications, software licensing standards, and website capitalization.
 
In order to improve its existing processes, one IMF member wanted to see what best practices other companies were using relative to software licensing. They came across one standard and were trying to see if anybody else was using that particular standard and how they are implementing it.
 
Another IMF company was interested understanding how other companies go about capitalizing portions of their website. They want to move to a more frequent capitalization and creation of a fixed asset for this work they are doing with their website. Also they would like to find out how other teams go about putting together the different portions of website development into phases.
 
As an organizational improvement, another IMF Connect involved a member company’s desiring to discuss viewpoints other IT organizations have for Industry best practices for testing applications.  They wanted to know what do best in class testing areas measure (KPIs), and what percent of the SDLC dollars are spent on testing, among other issues. 


Presented On: Thu Jan 13, 2011
Matt Carothers , IT Security , Cox Communications
Details (hide)
 
Digital crime is more sophisticated and prevalent than ever.  IT organizations must work to stay ahead of these type attacks.  This report will focus on some best practices utilized by Cox Communications to ensure digital crime is effectively addressed. It looks at different techniques in correlation to the different types of Spam that are out there today.


Presented On: Thu Dec 9, 2010
Max White , Portfolio Manager, Business & Information Management , Pacific Northwest National Laboratory
Details (hide)

This report takes a look at the implementation and success behind the award winning technology, Project Central, a software application designed by PNNL Information Management Services. It provides a central service-oriented framework for managing project lifecycle information from beginning to end.



Presented On: Thu Nov 18, 2010
Dustin Fennell , CIO , Scottsdale Community College
Details (hide)
 
Scottsdale Community College was recently awarded CIO Magazine’s Innovation Award Driving Future Business with Technology Innovation after successfully virtualizing its computing infrastructure. This report takes a look at the IT environment prior to this project and the success they have seen after moving to a more virtualized environment, including a savings of $250,000 annually.


Presented On: Thu Nov 4, 2010
Walton Smith , Booz Allen Hamilton
Details (hide)
 
For most organizations outlook is the de facto knowledge management and collaboration tool, however it is not searchable or scalable. In this report, learn how Booz Allen Hamilton leveraged a wide range of Enterprise 2.0 tools to unlock the explicit and tacit knowledge within its growing worldwide consulting firm.


Presented On: Thu Jan 27, 2011
Caleb Masland , The IMF
Details (hide)

This is a sample benchmarking report put together by The IMF's Managing Director of Information Exchange, Caleb Masland. It focuses on 3 areas of study: Intel & MidRange Servers, Enterprise Storage, and Mainframes. 



Presented On: Thu Jan 27, 2011
Caleb Masland , The IMF
Details (hide)

This is a sample benchmarking report focusing on Application Development.



Presented On: Thu Oct 28, 2010
Scott Laliberte , Managing Director , Protiviti Inc.
Details (hide)
 
Data leakage is an increasing problem facing companies today. Each day individuals put sensitive data at risk by improperly emailing, transmitting, copying or otherwise losing the data. Data Loss (leakage) Prevention (DLP) can be an effective way to help limit this risk. DLP has also become a popular buzz word with many products claiming to provide DLP capability while not really delivering true DLP protection. This report discusses the need for DLP, risk DLP mitigates, types of DLP available, Pro's and Con's of DLP technology, and considerations when assessing and deploying DLP technology.


Presented On: Thu Oct 14, 2010
Sandra Slaughter , Professor, College of Management , Georgia Tech
Details (hide)

This report, “Soft Skills and Their Place in Project Management,” is presented by Dr. Sandra Slaughter, a professor at Georgia Tech. It talks about the skills needed for effective project management in global software projects. While project managers need technical, domain, and project management expertise, they also need “softer” skills like practical intelligence and cultural intelligence to effectively manage global project teams. The report discusses what these soft skills are and how they can be utilized for better project management. Also included in the report are project examples and a case study Dr. Slaughter and her team performed.



Presented On: Thu Oct 7, 2010
Rodney Tosten , Gettysburg College
Details (hide)

This report covers the development of an on-line, real-time Graduation Requirements Tracking System and a Recognition and Participation Tracking System that is available through Gettysburg College’s PeopleSoft ERP. These newly developed systems replaced a paper based systems and ended up saving 2000 fewer hours in data management. Included are some of the process changes as well as successes that came about along the way.



Presented On: Thu Sep 30, 2010
Carl Herberger , Vice President , Evolve IP
Details (hide)

Managing the security of critical information has proven a challenge for businesses and organizations of all sizes. Even companies that invest in the latest security infrastructure and tools soon discover that these technology-based “solutions” are short-lived. Attackers are constantly changing their tactics and strategies to make their attacks and scams as damaging as possible. This report covers 10 key information security activities your company may want to be aware of come the New Year.



Presented On: Thu Sep 23, 2010
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)

 

This report highlights some best practice techniques in managing IT Innovation for business value.  The report also describes the role of IT innovation in an organization today and 5 ways to make IT innovation work for your company.


Presented On: Thu Aug 26, 2010
David Sanek , Group Vice President and CPMO Competency Manager , SunTrust Bank
Details (hide)
 
For the first time in history, the workplace is a generational melting pot comprised of four generations that bring with them contrasting values, attitudes, expectations and viewpoints. To be successful, every organization and every leader must learn to effectively manage the diversity of each generation in order to enable creative and successful teams. This report details the different generations, what they think, and why they think that way. It also focuses on reality versus perception in regards to the “generation gap.”


Presented On: Thu Jul 29, 2010
Tom Guthrie , Vice President , IMF Fellow
Details (hide)

In moving from head of infrastructure to head of Enterprise Architecture for Cox Communications Tom Guthrie had many challenges. He built a very pragmatic model to assess the opportunities for improvement and moved quickly into the implementation phase. This report will discuss the challenges he uncovered and the perspectives he gained in the new role.



Presented On: Thu Aug 5, 2010
Arnold Coleman , Sr Consultant of Business Operations Support , Verizon
Tony Dragoni , Vice President of IT Consumer and Mass Business Billing , Verizon
Details (hide)

This report centers around the success Verizon has had with its Student Mentoring Program.  Several Verizon employees walk through the steps that were taken to establish the program, some of the issues and concerns that arose and are ongoing, and how both the students and mentors were coached to ensure a meaningful and healthy mentorship was created.



Presented On: Tue Jul 13, 2010
Shelly Nichols , Project & Process Quality Director , PricewaterhouseCoopers LLP
Details (hide)

This report focuses on the business perspective and impact of transitioning to an outsourced managed services model for the support and development of the Firm's financial systems. You will see how IT managed the transition, the impacts to the Finance organization and the changes the Finance PMO has had to implement in order to support the new model.



Presented On: Tue Jul 13, 2010
Sumeet Sanghani , SVP, Global Outsourcing , SunTrust Bank
Details (hide)
 
In this report, we will take a look at some of SunTrust’s success and the key strategic steps it took to avoid many of the difficulties other financial institutions have faced during this economic downturn. It will also touch on some Mr. Sanghani’s experiences in managing Global Outsourcing at SunTrust, including the changing nature of outsourcing and the challenges and guiding principles of a successful outsourcing strategy.


Presented On: Tue Jul 13, 2010
Jo Ann Sheppard , LexisNexis
Details (hide)

Over the past three years, project management at LexisNexis has played a key role in the integration of Choicepoint into LexisNexis.  From migrating to new platforms, sun-setting technologies, to bringing DR in-house, the last few years have been significantly challenging. This report details some of those key milestone migrations and how Project Management assisted in transition management.  



Presented On: Wed Jul 14, 2010
Tracy Bleam , Director of Project Management , FHLBank Atlanta
Details (hide)

 

In response to the need for better project management of two of the largest projects ever undertaken at FHLBank Atlanta, the bank decided to build a Project Management Office.  Their goal in doing so was to improve processes and build their bottom line by giving these and other projects an improved chance of success.  This report takes a look at that process including the key steps taken in development, benefits received, and how this endeavor contributed to the success of both projects.


Presented On: Tue Jul 20, 2010
Lisa Ercoli , Director - IT Strategy and Planning , Verizon
Details (hide)

Collaboration among project management teams has become increasingly important as more and more companies turn to virtual teams, accommodating multiple locations in various geographical areas. Difficulty with communicating, working together, and producing high-quality, on-time results is typically heightened by distance. This report will reveal some best practices in collaboration among remote teams and explain some of the challenges associated with virtual teaming.



Presented On: Thu Jul 8, 2010
Rich Razon , Co-founder , PureShare
Details (hide)

This report is an introduction to best practices in deploying ITSM performance metrics. Irrespective of tools available, it will guide you to move from being in a constant state of fire-fighting to a more productive, proactive state with metrics.  



Presented On: Thu Jun 10, 2010
Andrew Filev , CEO , Wrike
Details (hide)

Collaboration among project management teams has become increasingly important as more and more companies turn to virtual teams, accommodating multiple locations in various geographical areas.  Difficulty with communicating, working together, and producing high-quality, on-time results is typically heightened by distance.  Andrew Filev, CEO at Wrike, Inc., has successfully implemented best practices in collaboration among teams. This report shares some of the challenges and success associated with remote collaboration. 

 



Presented On: Thu Jun 24, 2010
Kevin Hyatt , IT Innovation , Walt Disney Company
Details (hide)

IT Innovation is costly and, even though the ROI is not always readily apparent, it must be done to move the business forward. What are some of the strategies used by successful, innovative companies? In this report documents some of the methods Disney uses for communication to cut back on costs. This includes videoconferencing and an interesting look into the growing popularity of telepresence. 
 



Presented On: Thu May 13, 2010
Srinivasa Kalapala , Sr. Manager - VZT Architecture , Verizon
Details (hide)

Srinivasa Kalapala, Senior manager of Enterprise architecture spoke on the growth and implementation of enterprise architecture at Verizon. He will touches on the challenges faced in planning and designing enterprise applications that are spread across business and geographies as well as developing architects to think at enterprise level.



Presented On: Thu May 6, 2010
Paul Moran , Information Security Analyst , Automotive Resources International
Scott Laliberte , Managing Director , Protiviti Inc.
Details (hide)

Over the last few years, a greater emphasis has been placed on separation of IT duties across all IT functions, especially security.  Most organizations are now realizing responsibilities must be assigned to individuals in such a way as to mandate checks and balances within the system and minimize the opportunity for unauthorized access and fraud, among other things.  But, how does a security organization do this while ensuring all security needs are met and the process runs effectively and efficiently?  This report will discuss the benefits and challenges created by these separation of duties, as well as how their organizations have addressed security issues.



Presented On: Thu Mar 11, 2010
Nick Schneider , Consultant , newScale
Details (hide)

The Service Catalog is the heart of the Front Office of IT which enables key Front Office processes such as Service Portfolio Management, Demand Management and Financial Management. Together these capabilities enable an organization to experience a broad range of benefits from rationalizing services to optimizing demand to controlling service consumption and managing fulfillment. This report will explore these concepts in more detail with practical examples.


 



Presented On: Thu Jan 14, 2010
Michael Hitson , Project Program Manager , Verizon
Details (hide)

Dr. Michael Hitson, whose academic work and research centers on team leadership within virtual environments, offers a presentation centered on leadership process and methodology within virtual teams who are oftentimes transitory in member orientation.



Presented On: Mon Jan 25, 2010
Christopher Corrado , Senior Vice President, Technology Products , Asurion
Details (hide)

Designing a company’s IT and Business strategy is a familiar task for many organizations, but managing to that strategy proves to be another feat in itself. Chris Corrado, Senior Vice President of Technology Products at Asurion, will discuss how his organization designs and executes using an enterprise architecture methodology. He will also lead us through the design of a proper and scalable operational platform which reaches across all aspects of the business including IT to support and guide revenue growth. 



Presented On: Mon Jan 25, 2010
Matt Manzella , Director of Strategy & Innovation Services , Allstate Insurance
Details (hide)

Manzella and his team are leading an effort to drive innovation through a deeply traditional, risk-averse corporate environment.  He will discuss how they have utilized social media and ideation technologies to engage employees in an effort to shift the culture from one focused on incremental operational improvements to one where disruptive change is explored and embraced early. Manzella will share the successes, lessons learned and continuing challenges of Allstate's journey to transform itself.



Presented On: Thu Jan 7, 2010
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

There was a time when vendor management was simply contract negotiations and finding the best price for the best solution.  With the emphasis on running core operations in many companies the role of vendor manager  has evolved into a critical role in managing strategic assets of the organization.  One must build a relationship with the vendor, understand the vendor, and work to ensure they understand you you become a strategic partner with your organization.



Presented On: Mon Apr 5, 2010
Details (hide)

In the first quarter, member initiated connects revolved around web mail solutions, severity levels of incidents, and corporate mentoring programs.

In order to improve its existing processes, one IMF member was interested in exploring how other IT organizations defined their severity levels of incidents reported. This organization already had a service desk process in place, and though it what been working well, the organization desired to reassess the process in order to adjust to changing business requirements.
Another IMF company was interested in beginning a corporate mentoring program for high school students. The organization already had an internal mentoring program in place, but wanted to design an external program to help youths in their community. They also wanted to examine challenges that are often encountered, legality, and other best practices for establishment of these types of programs.

As an organizational improvement, another IMF Connect involved a member company sharing their experience of migrating from Microsoft to a web mail solution. Key drivers for this change were driven by cost savings and scalability. Currently, the organization is still in the process of completing the transition.

We encourage all members to review active connects on a regular basis for opportunities to leverage knowledge and experiences from other IT experts. If you are interested in initiating a connect, please visit our website: www.theimf.com
 



Presented On: Tue Oct 6, 2009
Ron Baklarz , Chief Information Security Officer , Amtrak
Details (hide)

Ron Baklarz, CISO at Amtrak, provides insight into the role of the CISO and discusses his particular experiences with the different facets of responsibilities while during his time at MedStar Health. In his presentation, Baklarz presents the CISO role in three main categories which include: "Chief Risk Officer," "Chief Hacking Officer," and "Chief Investigative Officer."



Presented On: Tue Nov 3, 2009
Martin Gardocki , Business Development , IMF Fellow
Details (hide)

 

In this IMF web forum, Martin Gardocki from Rural America Onshore Sourcing, discussed the rural alternative in the total cost of outsourcing. Rural America Onshore Sourcing is responsible for finding and aggregating rural talent to provide customers with contract assistance as required for their businesses.
 
The different types of outsourcing that exist include:
· USA Urban Outsourcing (domestic, urban firms contracted to provide a service)
· Offshoring (contracting with firms in places such as India and China)
· Nearshoring (outsourcing to firms in Central and South America)
· USA Rural Onshoring (domestic firms in rural communities or distributed rural teams contracted to provide a service)
 
There are 4 basic costs associated with outsourcing which include the following:
1. Labor (cost of personnel and source of savings generated through arbitrage)
2. Transition (cost of identifying, negotiating, and moving work to the outsourcer,
3. Operation (ongoing cost of the relationship)
4. Management reserve (cost of managing the unexpected)
 
Gardocki explains that the evolution of outsourcing began with contracting with urban vendors where good work came at a premium price. With offshore sourcing there was significant cost savings in comparison to urban vendors, but the overhead costs of governance, communication and lost productivity dilutes these savings. Gardocki states, “As people have become more comfortable with the offshore model and companies become more global, the whole concept of having captive offshore development centers has crept up over the last 5-10 years. You avoid the middle man markup and [do] it yourself.” In Gardocki’s own experiences, he has known many owners of small to medium sized business where low cost providers did not necessarily work out and their productivity dropped dramatically for every transition which delays the promise of ongoing benefits and a wealth of capability and capacity. According to Gardocki, what is more alarming is the effect on the customers because “they feel the pain in delayed delivery, they feel the pain in increased costs, and basically you’re the one who has to tell them why,” Gardocki explains. As a result, people look for other areas in which they can reduce some overhead of the operation and still get some of the savings. The Rural Alternative involves domestic firms in rural communities or distributed rural teams contracted to provide a service. There are millions of people willing and able to work from their homes or local offices with strong work ethic and speak the same language. They are technically skilled to meet the demands of today’s information technology and business process outsourcing environment.
 
The “3 Ps” of rural onshoring include:
· Proximity to broadband (access to internet at speed capable of sustained operation)
· Population Density (depending on the skill and number of personnel required, you can work in a single community or require personnel across multiple regions or states)
Process disciple (dispersed or remote teams require process rigor to ensure efficient operation. This includes the infrastructure to support


Presented On: Thu Jul 30, 2009
Ashu Bhatia , Director of Delivery , Ciber
Details (hide)

Enterprise architecture is typically driven by business strategies. The company needs to know where they are going and how their dynamics are changing. Once the strategies are clarified, that is what drives enterprise architecture and enables business strategy. Alignment ensures tight linkages between today's business strategies and technology priorities and initiatives. It also focuses on where IT can deliver the most impact and where it can deliver impact to the business.



Presented On: Mon Dec 28, 2009
Details (hide)

 

 
Initiated connects included discussions focused on topics that are not easy to deal with, but are sometimes a necessary aspect of running any organization, such as migrating to a new service delivery strategy, working through stress and burnout in the organization, and renegotiating license agreements with vendors. However, companies also have been focusing on their strategies for growth following the recession, such as building the right organization structure for HR management, implementing a service management or service catalog toolset, and improving capacity management.
 
Through discussions with IMF members, a common theme has been the determination of companies to use the current financial climate as a tool for long-term improvement. Rather than accepting spending cuts for short-term survival, companies are instead focusing their efforts intelligently, such that their organizations can gain a competitive advantage while positioning for growth.
 
IMF members continue to leverage the experiences of their peers through the IMF Connect service more and more. In addition to the discussions that have made it into this quarterly report in summary form, many other requests were fulfilled in real-time through anonymous means.
 
IT organizations have responded by increasing their use of outsourced services, by creating alternative work programs, and by centralizing and restructuring their architecture groups, among other activities. The unique benefit of the IMF is the ability to bring companies together that are just starting down the path with those that have already made significant progress. In this way, each organization may have something to learn from others as well as something to share with others.
 
 
Other initiated connects centered around new challenges and decisions that companies faced including:
 
-What does Cloud Computing really mean for organizations?
-Is Social Media a fit for the Workplace?
-What are the important things to consider when selecting an outsourcing partner?
 
We encourage all members to review upcoming connects on a regular basis, share your experiences with others, and submit your questions and issues. Our goal is to be the best source for unbiased information, and this is accomplished through IMF facilitating the networking power of IT colleagues in other member organizations.
 
 
 
 


Presented On: Tue Oct 6, 2009
Dr. Kenneth Brancik , Principal Architect , The Northrop Grumman Corporation
Details (hide)

 

Enterprise Security Architecture (ESA) is an elusive topic for many organizations, with only a minimal level of guidance in terms of industry sound and best practices. Dr. Brancik will discuss an on-going project he has been involved in to place a science around the topic of ESA.
 
The primary goal of this interactive session was to engage and enable the attendees to think about the topic and to freely share their thoughts and ideas on both the theoretical and practical aspects for creating viable solutions to strengthen ESA practices. The general framework for the open discussions may include, but not be limited to the following areas of ESA risk: Architecture User Requirements and Design, Integrating governance, Risk Management and Compliance (iGRC) considerations, Cyber Security risks and controls, Threat Modeling and architectural implementations to name a few. 
 


Presented On: Tue Oct 6, 2009
Paul Moran , Information Security Analyst , Automotive Resources International
Details (hide)

 

Paul Moran, CISSP, CISA, CGEIT, is responsible for managing the operation and effectiveness of security-related programs and initiatives.  He assesses the cost of potential threats relative to cost of solutions required to eliminate, minimize, or mitigate threats. Paul is also responsible for the development and communication of information security policies and procedures.  He works closely with all departments to ensure integrity of security procedures, systems, and policies.  In his presentation, Paul will be sharing his expertise on how security is an important role in any sales process. 
 


Presented On: Tue Oct 6, 2009
Clint Kreitner , President and Chief Executive Officer , IMF Fellow
Details (hide)

 

In his presentation at the October IT Security Summit, Clint Kreitner, Senior Advisor at The Center for Internet Security (CIS), discussed the need for the information security community to come to a consensus on what constitutes success and how to measure it. In addition, Kreitner addressed the need for a feedback learning loop to enable measurable and continued improvement in protecting information.
 
Kreitner states that although there is a lot of money being spent in information security, there is a lack of ability to answer questions such as:
 
· Are we more secure than we were last year?
· Are we spending the right amount on security?
· Which of our security investments are yielding the most cost-effective results?
· How do we compare to our peers?
 
Kreitner states, “Currently, much of what we are doing in security involves risk assessment scenarios that hypothesize what various outcomes might be.”
 
Crucial elements that are missing in the area of information security include a widely accepted definition of success, clearly established definition of goals, and a set of consensus metrics. The CIS Security Metrics document contains a list of 20 metrics in specific business functions such as incident management, vulnerability management, patch management, application security management, configuration management, and financial management. It was compiled by over 100 expert participants from various sizes and types of public and private sector enterprises and representing various professional backgrounds.
 


Presented On: Tue Sep 22, 2009
Buck Woody , Program Manager , Microsoft Corporation
Details (hide)

Buck Woody, a SQL Server Technical Specialist discussed the conflicting environment between DBAs and developers. According to Woody, this conflict is divided into three main categories which include:

·        Conflicting requirements
·        Conflicting Customers
·        Conflicting Ideologies
 
In order to understand the reasons behind why this conflict exists, it is important to define each role. Woody defines a developer as, “someone who uses various tools and software methodologies usually within a team and is charge of particular duties” while “pure DBA’s” refer to those who own the data stack from beginning to end.”
 
In his presentation Woody takes a closer look at the source of the conflict by highlighting the different requirements of each role and the effect of conflicting customers and conflicting ideologies. Woody also offers his advice on how to successfully overcome these conflicts and bring teams together. According to Woody, “The first step in bringing the team together is to let the team know that there may be some shared resources available.”


Presented On: Thu Nov 5, 2009
Dale Seavey , Director of Architecture/Design/Engineering , Cisco Systems, Inc.
Details (hide)

At an IMF web forum, Dale Seavey, Director of Architecture Design and Engineering at Cisco IT offered insight into cloud computing and stated that it is part of the responsibility of IT professional’s to take away the veil of uncertainty around the cloud concept.

At Cisco, Seavey and his team are responsible for setting the computing direction for the IT organization for the next three years and putting actions in place that will help them accomplish the initiatives they have established. The three fundamental design pillars determined by the group include:
 
1)      Immediacy
2)      Smaller computing platforms
3)      User experience being key while computing environment and platform are irrelevant.
 
In his presentation, Seavey discussed the history behind Cisco’s email architecture, defined the cloud concept, and offered his predictions on the future of cloud. Seavey defines cloud as an evolution of technologies, or an updated computing paradigm that is a massively scalable and elastic environment. In reference to security for cloud, Seavey states that we are still in the infancy stages of this technology, but maturity and eventual reduction of threat will come.
 
Seavey and his team’s predictions include the idea that the desktop will become irrelevant, the user experience will come through a browser with shared services, software needs to work in a distributed environment. What this means for Cisco and other companies is that organizations will be less likely to implement software without a consistent look and feel, more inclined to look at other desktop operating systems, applications will become more cloud compliant, and the idea that systems who utilize shared elastic services will be implemented.
 


Presented On: Tue Oct 6, 2009
Louis Magnotti , VP of IT Services and Security , Pentagon Federal Credit Union
Details (hide)

 

At the IMF October IT Security Forum, Louis Magnotti, Chief Information Officer of the U.S. House of Representatives, discussed his own career development and the steps and best practices that have made him the successful IT Executive he is today. He outlines the building blocks that allowed him a successful career in Information Technology which includes time at the Department of Defense 9 years as CISO, and since November 2008, as CIO of one of the nation’s oldest institutions, the U.S. House of Representatives. In describing his career progression Magnotti states, “My career has kind of been like a trip without luggage. I sort of knew where I was going, but when I got there, my stuff wasn’t with me.”
 


Presented On: Tue Oct 6, 2009
Brandi Landreth , Director, Continuity Management & Data Center Strategy , Allstate Insurance
Details (hide)

 

The data center strategy began with a movement to consolidate Allstate’s existing footprint from four data centers to two. Some of the reasons for this movement were centered on economies of scale, operations efficiency, simplifying the environment, and improving availability and recoverability. Through the execution of this strategy it became evident that there were some additional opportunities around energy efficiency that provided a different perspective on the construction of the data center, but also in the operation of the existing IT infrastructure.
 
These additional opportunities stemmed from the Green IT movement which has been receiving much attention in the last couple of years. Reports from the Environmental Protection Agency (EPA) indicate that data centers are growing energy consumers. Taking this into consideration, Allstate began thinking differently while working through the data center strategy which was initiated three years ago. Earlier this year, the first phase of this strategy was completed and a new data center was built and an existing center was upgraded. The organization is currently in a migration phase which involves taking all equipment in the existing data centers and moving them into new facilities.
 


Presented On: Thu Feb 5, 2009
Robert Shaw , Manager, Software Engineer Process Group , Time Customer Service
Details (hide)

In his presentation, Bob Shaw, Manager of the Software Engineering Process Group at Time Customer Service, delved into real world problems of managing IT Projects using metrics versus feelings. He addressed useable metrics of the real world and why it is important to measure accurately and in real time. In addition, Shaw presented the keys for success he has developed through Time Customer Service’s new project management process and the specific measurements that are used to track and forecast EAC (Estimate At Completion). Shaw has spent several months creating and implementing this process which has been successful in creating more visibility for senior management to ensuring that all projects are on track and visible.



Presented On: Tue Oct 6, 2009
Linda Hooker , Professional Development Manager , SunTrust Bank
Details (hide)

In an October IT Workforce forum at the U.S. Pharmacopeia facilities, Linda Hooker provided insight into how the SunTrust team has smoothed transition as employees face changes due to outsourcing while maintaining a focus on career growth.

Many companies are choosing outsourcing or are making significant changes to their IT organization due to three factors which include: cost savings, an increased focus on the core business, and cost restructuring and quality improvement. In 2005, SunTrust began an off-shoring program in the IT applications development area.



Presented On: Tue Oct 6, 2009
Ron Baklarz , Chief Information Security Officer , Amtrak
Details (hide)

Ron Baklarz, Chief Information Security Officer (CISO) at Amtrak provides insight into the role of the CISO and discusses his particular experiences with the different facets of responsibilities while during his time at MedStar Health. In his presentation Baklarz presents the CISO role in three main categories which include: “Chief Risk Officer,” “Chief Hacking Officer,” and “Chief Investigative Officer.”



Presented On: Tue Oct 6, 2009
Laura Viehmyer , VP Human Resources , U.S. Pharmacopeia
Details (hide)

When Laura Viehmyer joined US Pharmacopeia (USP) as the Vice President of Human Resources, she found that the human resources department (HR) was very understaffed. No functional organization or centralized processes and systems existed in HR, and though the organization had a considerable global presence, there was no one on staff with global expertise. In addition, there was no central training initiative as well as a lack of emphasis on employer relations. After receiving advice from a senior executive, Viehmyer began to talk to individuals and embarked on the most significant orientation she ever experienced in her career.



Presented On: Mon Nov 10, 2008
Mark Weischedel , Vice President and Division Chief Information Officer , Covance
Details (hide)

Mark Weischedel, CIO of the American Red Cross, discusses the organization's IT Transformation strategy. He outlines his initiatives including application portfolio rationalization, infrastructure optimization, and modernization, upgrading human capital, and strengthening governance, quality, compliance, and controls.



Presented On: Thu Aug 27, 2009
John Olmstead , Senior Project Manager , Cox Communications
Details (hide)

 This presentation by John Olmstead offers an overview of Cox Communications delivery and methodology for project development and infrastructure delivery.   CCI’s Enterprise Solutions Group consists of six sub-groups each working on various projects, many of which crossed groups. Each group was conducting project management and SDLC their own way. The Delivery Management Organization (DMO) (one of the six groups) devised a common frame work so everyone would work off of the same play book. This Assured framework allows all groups to think and work alike allowing for better quality, cross functionality and the ability to augment each other’s teams. Along with Assured, gating functionality was introduced to audit quality and stop the implementation of projects until problems and issues are rectified.

 


Presented On: Thu Sep 10, 2009
Rizwan Patel , Director, IT , Caesars
Patricia Lee , Lead Architect , Caesars
Details (hide)

Not having a data strategy or having one that is so high level as to make the strategy non-existent is a recipe for disaster. The situation is prime for each department to make its own choices on how to use the products, leading to design and implementation decisions that are data centric – a proliferation of fragile (data driven) implementations that are a management and tuning nightmare. Additionally, this situation gives free reign for departments to introduce and try new technologies and tools adding to an already chaotic scenario. The situation also lends well to departments introducing redundant data sources with the intent of having control of data within their "territory".

During the discussion Harrah's Entertainment discuss how a well defined Data Strategy minimizes the one-off solutions leading to a more streamlined organization by substantially improving success rate of projects. Discussion will also incorporate how divergences from the strategy, if initiated are handled by the Governance board (aka Architecture Review Board) – a cross-functional Governance board established with the backing of top management to oversee the implementation of an enterprise data strategy.
 



Presented On: Tue Jun 16, 2009
Kevin Brennan , Director of Network Support & Security , Cox Communications
Details (hide)

Cox Communications’ network is composed of the backbone customer network and the internal enterprise network. Brennan will review the backbone network as the foundation for the Enterprise network. Then he will show how the enterprise network is able to leverage it to achieve business requirements of network reliability, predictability, capacity & growth, and along with connectivity leveraging the CISCO suit of solutions.

 


Presented On: Tue Jun 16, 2009
Kevin Brennan , Director of Network Support & Security , Cox Communications
Details (hide)

In this report, Kevin Brennan, Lead Network Architect for Cox Communications, speaks about Cox's backbone network. He discusses the where they were a short time ago, where they are, and how far they hope to go.



Presented On: Tue Mar 24, 2009
William Miller , Chief Information Officer , NetApp
Details (hide)

William Miller, CIO at Harris Corporation will lead a discussion on IT’s role in driving Corporate Initiatives and assisting in the strategy discussion. This report is a part of the series of meetings from the 2009 Spring Senior Executive Forum in March 2009 in Melbourne, FL.



Presented On: Tue Jun 16, 2009
Thomas Stanley , Senior Director Platform Services , LexisNexis
Details (hide)

Tom Stanley will discuss the automated inventory system developed by the LexisNexis Infrastructure team to collect, correlate and report on system configuration information that would allow them to rebuild the system for Disaster Recovery. The system allows them to collect all the key information about the servers on a daily basis and store that in a database for not only disaster recovery but administration. He will describe in detail why they chose to build these tools and how they work, as well as the benefits these tools have provided LexisNexis.



Presented On: Thu Jul 30, 2009
Ashu Bhatia , Director of Delivery , Ciber
Details (hide)

In this report, Ashu Bhatia will discuss some approaches and examples of how Enterprise Architecture can help an organization achieve IT Operational Excellence and help the business complete value targeting, using levers such as Application Rationalization/Consolidation, emerging technology management, etc. This report will walk through a structured approach of how Enterprise Architecture can enable their firm’s business initiatives and create value. A case example will be used from the pharmaceutical industry, showing how holistic enterprise architecture planning can help channelize specific IT investments towards strategic impacts to your business.



Presented On: Thu May 21, 2009
Dominic Calvert-Lee , Apptio
Details (hide)

Traditionally Finance has had a significant impact vendor costs and price per unit. However, IT Finance professionals often find that after competitive pricing has been negotiated, another challenge arises from continuing internal pressure due to ever increasing demand. What are the key demand drivers and how does each affect cost? On this Web Forum, Dominic Calvert Lee, Finance Director, IT Finance of Microsoft, will discuss how Finance can impact the quantity or demand side of the IT cost equation. 

 


Presented On: Tue Jun 16, 2009
Eric Jackson , Development Manager , Rollins
Details (hide)

Eric Jackson of Rollins will lead a discussion on their journey toward agile development. He will address why Rollins decided to implement Agile and Scrum and how they have tailored each to fit their organization. He will also discuss specific examples of their successes, mistakes, and pitfalls in moving from a non-iterative methodology to Agile.



Presented On: Thu Feb 12, 2009
Benjamin Tomasini , Assistant Vice President and Application Developer , Bank of America
Details (hide)

Ben Tomasini at Bank of America will present solid, common sense approaches to strategic software design, team communication, and project process that development teams can adopt today to deliver project faster and with greater quality. He will also discuss the strategic challenges that software development organizations face.



Presented On: Tue Jun 16, 2009
Michael Taylor , CEO , Merge Agency
Details (hide)

As tough times continue with rampant cutbacks and more layoffs, IT has a hard focus on doing more with less and executing flawlessly. Although those are exactly the right instincts, most IT organizations fail at one of the most critical success factors of IT success or failure: communication. In this seminar Michael Taylor, CEO of Merge, will show why IT’s perception has much to do with reality (ex. job security) as the technology execution and why good communication is one of the biggest success tools one has. Taylor will show some simple techniques that can be used right away to turn perception into your favor.



Presented On: Mon Aug 24, 2009
Details (hide)

Over the past few months, IMF Connect Services has grown significantly.   While we used to average one connect every other week, we now manage a few Connect requests per week. We are thrilled to see this increase in interest, as we see connects as one of the most valuable services IMF offers.

The second quarter connects centered around new challenges and decisions that companies faced. 
        What does Cloud Computing really mean for organizations? 
  Is Social Media a fit for the Workplace?
 
  What are the important things to consider when selecting an outsourcing partner?
 
Next Quarter’s Connect report will include best practice focus groups including: Source Code Management, SAS and its alternatives, best practices for mass eMarketing, along with a number of topics that continue to shape the IT landscape.
We encourage all members to review upcoming connects on a regular basis, share your experiences with others, and submit your questions and issues. Our goal is to be the best source for unbiased information, and this is accomplished through IMF facilitating the networking power of IT colleagues in other member organizations.


Presented On: Thu Aug 20, 2009
Details (hide)

Download this document to view a list of recently published IMF Reports.

For more information on IMF Reports or other IMF services please contact: 770.455.0070.

*This list includes newly published reports up until August 20, 2009. See published reports section for entire list of newly published reports available for download.



Presented On: Tue Mar 24, 2009
Tom Guthrie , Vice President , IMF Fellow
Details (hide)

Tom Guthrie will discuss his team’s adoption infrastructure technology including virtualization and open systems solutions to allow the enterprise to position for growth while reducing expense. This report is a part of a series of presentations during the March 2009 Senior Executive Forum in Melbourne, Florida.

 


Presented On: Tue Mar 24, 2009
Robert Fields , IMF Fellow
Details (hide)

Robert Fields will discuss the opportunities and cost savings of Loews’ new data center move, including virtualization and upgrades. This report is a part of the series of meetings from the 2009 Spring Senior Executive Forum in March 2009, in Melbourne FL.

 


Presented On: Thu Mar 5, 2009
Denise Peek , Manager, Human Performance Development , NASCO
Details (hide)

 Succession planning and career path management ensure that there are highly qualified people in all positions, not just today, but tomorrow, next year, and five years from now. In the past, succession planning typically targeted only key leadership positions. In today’s organizations, it is important to include key positions in a variety of job categories. Developing a clear communication strategy, creating the right assessment and selection tools, and identifying gaps in current employees and candidate competency levels are just a few of the necessary steps one needs to take to ensure successful succession and career path management. Denise Peek, Manager of Human Performance Development at NASCO, will discuss these steps along with others.

 


Presented On: Wed Jan 21, 2009
Thomas Stanley , Senior Director Platform Services , LexisNexis
Details (hide)

This report will feature an interactive discussion on the issues that IT infrastructure management teams are grappling with today. Thomas Stanley of LexisNexis will share the journey that he and his team went through at ChoicePoint (a LexisNexis company) to consolidate and optimize their data centers and increase their use of Server Virtualization. The group will also have the opportunity to share their own experiences with one another to uncover common practices that lead to success and setbacks.

 


Presented On: Thu Mar 12, 2009
Details (hide)

 As communication technologies improve, employees often exchange ideas and information with distant colleagues. When virtual teams are formed, team members often will not meet in person during an entire project life cycle, but are required to work very closely together to produce project deliverables. Virtual teams make sense in today’s workplace environment. However, they create unique challenges for managers and team members. This report will focus on some of these challenges, and how to effectively manage and engage team members to ensure successful results.

 


Presented On: Tue Mar 24, 2009
James McCabe , Director , IMF Fellow
Details (hide)

In this report Jim McCabe will discuss Milliken’s SAP journey, including the cost justification upfront, the unexpected issues that arose, and its benefits to IT and the business. This report is part of a series of meetings from the March 2009 Senior Executive Forum held in Melbourne, Florida.



Presented On: Wed Mar 25, 2009
James McCabe , Director , IMF Fellow
Details (hide)

This report chronicles the tale of a Spartanburg, South Carolina based textile company's SAP journey. Jim McCabe, Director of Information Services for Milliken and Company, takes you for a ride among the trials and tribulations of such a grueling, yet ultimately rewarding process.



Presented On: Tue Mar 24, 2009
Mike Macedonia , Vice President , Forterra Systems Inc
Details (hide)

In this report, Jeff Cooper and Mike Macedonia will discuss reducing travel expenses through videoconferencing, virtual reality, and social networking. They will discuss cost effective methods deployed to move the organization forward while reducing expense in a tough economy. This report is part of a series of presentations during hte March 2009 Senior Executive Forum held in Melbourne, Florida.



Presented On: Thu Jul 30, 2009
Ashu Bhatia , Director of Delivery , Ciber
Details (hide)


Presented On: Wed Nov 12, 2008
Cama Piccini , Human Resources Business Partner , Harris Corporation
Details (hide)

 

Harris Corporation, like many high-performing organizations, has a dedicated sourcing team as part of its recruiting model. In this presentation, Piccini outlines their sourcing model and discusses its roles and responsibilities, some of the resources and tools that are used, and explains how Harris' sourcing model has been successful in its recruiting efforts.   
 


Presented On: Thu Apr 30, 2009
Lori Furman , Innovation Consultant, Social Media , Chevron
Details (hide)

Social computing applications are moving quickly into the enterprise space and fast becoming main stream. What applications truly benefit the organization and how? This Web Forum, led by Lori Furman, Innovation Consultant at Chevron, will take you beyond the basics of social technologies and explain the challenges faced with enterprise adoption and the consequences of doing nothing. The following topics will be discussed:

· Social computing overview
· Opportunities to drive business value
· Social tools in action
· Potential obstacles
· Recommendations
 
 


Presented On: Thu Jan 22, 2009
Clint Kreitner , President and Chief Executive Officer , IMF Fellow
Details (hide)

In this report, Kreitner will discuss the progress that has been made toward standard security metrics. The following points will also be addressed:

  • Why incident metrics/outcome metrics are so important to advance the field
  • A Consensus security metrics initiative update
  • Survey
  • CIS Consensus Metrics Document and how to obtain it


Presented On: Thu Dec 11, 2008
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)

Social Networking has created a number of new and difficult challenges for Workforce professionals. Dr. Jonathan Reichental from PricewaterhouseCoopers will discuss some of the key points he has learned and how other are addressing new issues around social networking.



Presented On: Mon Sep 29, 2008
Gregory York , Senior Manager, Corporate IT Security , Abbott
Details (hide)

Over time, corporate security programs have shifted from a reactive to a proactive mindset, focusing more on risk management and less on fear, uncertainty and doubt in order to facilitate good business decisions. Inherent, but not formally addressed in risk management, is the concept of the "normal accident" - an inevitable failure driven by the complexity of a system. Greg York will discuss highlights of Abbott's IT Security program and ongoing efforts at this 25 billion dollar pharmaceutical, medical devices and nutritional products company. He will focus on the principles of accident theory as they relate to Information Security (IS), and how these principles are being applied at Abbott in order to identify the most important issues to address.

 


Presented On: Mon Nov 10, 2008
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Mike Bender will discuss Cisco’s vendor management strategy including risk assessment and contingency plans. Mike will also discuss Cisco’s ongoing development of a strategy for evaluating the sustainability of key vendors and their approach to building back up plans that support business partners but protect the business.

Keywords

  • Vendor Management
  • Procurement
  • Governance
  • Outsourcing
  • Third Party Vendor
  • Manufacture
  • Engineering
  • Business Intelligence
  • Single Source
  • Risk
  • Vendor Metrics
  • Dual Vendor Strategy


Presented On: Tue Jul 15, 2008
Details (hide)

This report contains an overview of XBRL and review the expectations for compliance with the related SEC programs. Through electronic polling of the forum audience, the discussion will interactively navigate the presentation through the internal process considerations applicable to the audience, and reveal the candid positions on XBRL that the forum participants bring to the table.



Presented On: Wed Nov 12, 2008
Barbara Ring , Principal , AXA Equitable
Details (hide)

Barbara Ring discusses how Chubb is addressing the changes in the workforce. From the aging existing workforce to the challenges brought about by the new generation workforce, Barbara will outline the research and analysis Chubb has done to better understand these changes and the initiatives they have undertaken to ensure Chubb retains and continues to hire top talent.

Keywords

  • Mainframe Systems
  • Workforce
  • Call Center
  • Mainframe Programming
  • Outsource
  • Infrastructure
  • Offshore
  • Outsourcing
  • Onshore
  • Access
  • Risk Mitigation Plan
  • Phased-In Retirement
  • Succession
  • Performance Guidelines
  • Performance Management
  • Legacy Systems
  • Knowledge Transfers
  • Job Rotation Program
  • Succession Planning
  • Telecommute


Presented On: Wed Oct 29, 2008
Details (hide)

Learn how the Business Intelligence Center of Excellence (BI COE) has developed an enterprise BI strategy and how the BI COE has helped them to drive the full benefits through the organization. Hear how they approached centralization versus decentralization issues, governance, simplification, standardization through retirement of old solutions, and development standards. This is the best practices and strategy for successfully managing BI projects and enterprise-wide standards.



Presented On: Wed Apr 29, 2009
Details (hide)

The first quarter of 2009 showed continued focus on the economic climate from IMF members. Members initiated Connects on a variety of topics that are directly linked to dealing with a recession.

Discussions focused on topics that are not easy to deal with, but are sometimes a necessary aspect of running any organization, such as migrating to a new service delivery strategy, working through stress and burnout in the organization, and renegotiating license agreements with vendors. However, companies also have been focusing on their strategies for growth following the recession, such as building the right organization structure for HR management, implementing a service management or service catalog toolset, and improving capacity management.

Through discussions with IMF members, a common theme has been the determination of companies to use the current financial climate as a tool for long-term improvement. Rather than accepting spending cuts for short-term survival, companies are instead focusing their efforts intelligently, such that their organizations can gain a competitive advantage while positioning for growth.

IMF members continue to leverage the experiences of their peers through the IMF Connect service more and more. In addition to the discussions that have made it into this quarterly report in summary form, many other requests were fulfilled in real-time through anonymous means.

IT organizations have responded by increasing their use of outsourced services, by creating alternative work programs, and by centralizing and restructuring their architecture groups, among other activities. The unique benefit of the IMF is the ability to bring companies together that are just starting down the path with those that have already made significant progress. In this way, each organization may have something to learn from others as well as something to share with others.

The IMF Connect service is an included part of your IMF membership. These best practice focus groups bring together the networking power of the IMF with the expertise of your colleagues in other IMF member organizations. Whether your issue requires an immediate response or a longer discussion process, the IMF team is ready to help you connect with your peers. Please contact us anytime you find an issue that is suited for discussion in this forum.
 

Connects included in this report are:

  • Managing Stress in the IT Organization    
  • IT HR Functions and Organizational Structures   
  • Company BlackBerry/PDA/Cell Phone Policies
  • Building Model Changes from
  • Mainframe Enterprise License Vendors 
  • Service Catalog Tool Implementation
  • Computer to Computer Telephony
  • Capacity Management
  • Server Incident Throughout
  • the Asset Lifecycle
  • Senior Executive Roundtable Discussions


Presented On: Thu Feb 19, 2009
Details (hide)

With budgets under pressure, adept IT leaders need to know how to make every penny count and the cost of acquiring and supporting IT equipment can account for a significant savings in the IT Budget.  Successfully tracking IT assets—and understanding which applications are on devices—has become increasingly difficult.  So how can IT leaders ensure that their attempts to manage assets are worth the effort? How does an effective IT asset management strategy improve the bottom line? And what are the core components of an effective strategy?  This report addresses these issues and provide you advice on asset and configuration management strategies that work.



Presented On: Tue Mar 24, 2009
Tom Guthrie , Vice President , IMF Fellow
Details (hide)

Tom Guthrie, VP of Operations and Information Technology at Cox Communications, will discuss his team's adoption infrastructure technology including virtualization and open systems solutions to allow the enterprise to position for growth while reducing expense. 



Presented On: Mon Feb 23, 2009
Details (hide)

The IMF Connect process puts you in touch with the top knowledge source in IT, your peers!  Simply call IMF or initiate an IMF Connect by visiting www.theIMF.com and IMF will start the process.

IMF will:

  • Find others who are interested in discussing their successes on the same issue
  • Write a Connect Charter to capture the issue
  • Schedule and facilitate a web conference or meeting
  • Write up the results for future reference

Most research in IT begins with the users, why not cut out the middleman and any potential for bias?

IMF members understandably turned inward during the last quarter of a rough 2008.  As a result, the overall activity within the

IMF Connect service was below normal levels.  For those members that still reached out to their peers through IMF, the discussions were focused on initiatives that were either for regulatory compliance (PCIDSS), to uncover potential cost reduction opportunities (IT Spending Compared to Revenue), or to optimize investments for long-term savings (SAP and Exchange Best Practices).  Clearly, the IT industry is being asked to bear a significant portion of the cost reduction load.

Connects Included:

Virtualizing the Exchange 2007 Environment

SAP Implementations

IT Spending Metrics

PCI Scanning Tools



Presented On: Tue Jul 15, 2008
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Due to the success of products like Macintosh's, iPhones and consumer based PCs, Business Units and IT users are demanding more and different devices due to this "consumerization" impact on IT services. Unfortunately Corporate IT has been traditionally tasked with standardization which drives efficiency (maximize TCO) which is in conflict with what users are demanding. Mike Bender discussed the approach Cisco is taking to manage/optimize the CFO/shareholder TCO impact versus the needs/wants of the users.  



Presented On: Tue Jan 13, 2009
Details (hide)

The IMF Connect process puts you in touch with the top knowledge source in IT, your peers! Simply call IMF or initiate an IMF Connect on our website and IMF will start the process.

IMF will:

  • Find others who are interested in discussing their successes on the same issue
  • Write a Connect Charter to capture the issue
  • Schedule and facilitate a web conference or meeting
  • Write up the results for future reference

Most research in IT begins with the users, why not cut out the middleman and any potential for bias?

This report contains a summary of several IMF Connects that were initiated in the third quarter of 2008. In addition to the information provided in each of the Connects, this report also provides a look into the key issues for IMF member organizations.

  • IT Intern Programs
  • Training the IT Workforce
  • Enterprise Collaboration
  • Project Management Curricula
  • Rewarding for Innovation
  • Unit Costs for Application Code Line Development
  • Project Effort Estimations
  • Storage Management
  • Chargeback Practices


Presented On: Tue Apr 22, 2008
Jack Lewis , Manager PMO , Macy’s
Details (hide)

Strategic sourcing is an institutional procurement process that continuously improves and re-evaluates the purchasing activities of a company. During this session, Jack Lewis will present a case study on two global sourcing strategies applied by two different organizations. You will learn why these organizations selected the approaches they did and how these sourcing efforts compare and contrast. Both strategic plans designed and implemented represent great success, yet could benefit in various ways from one another’s strategy.



Presented On: Tue Sep 16, 2008
Details (hide)

Allstate Insurance was interested in benchmarking their IT intern program against other companies.  They were  interested in discussing the following issues:

 

How long have their internship programs been in existence?
What are the goals of their program, how are they doing relative to their goals?
How many interns are included in this summer’s program?
How is the program(s) funded?  Is there one internship program, or many?  (please explain)
How satisfied are their interns? What do the interns feel is working well and what could be improved in terms of the program?
How satisfied are their managers in regards to the internship program?
Are they getting solid, qualified candidates? 
Are these interns meeting their goals?
What’s working well, and what could be improved from the manager’s perspective
How do they recruit their interns? (please describe)  Is this method effective? 
(please explain)
How much are they paying their interns?  What is the pay based on?
Do they offer subsidized housing and transportation?  (please explain) 
What events do they offer and are they subsidized? 
How many interns on average typically get hired?



Presented On: Tue Apr 15, 2008
Sabyasachi Mitra , Associate Professor of IT Management , Georgia Institute of Technology
Details (hide)

In recent years, companies have increasingly outsourced and offshored many elements of their Information Technology function. There has also been an increased focus on the use of packaged software, rather than developing proprietary in-house systems. Service Oriented Architectures (SOA) is also likely to increase the use of outsourcing and offshoring in the future. These changes have caused a shift in the roles, responsibilities and job functions of IT Managers in technology consuming companies in the U.S. This presentation focused on the type of skills that are necessary for IT Managers to survive, thrive and take advantage of the global economy, how to develop these skills in yourself and your employees and the role of universities and corporate training programs to build a globally competitive IT workforce.



Presented On: Mon Dec 8, 2008
Details (hide)

IMF members continue to leverage the experiences of their peers through the IMF Connect service more and more. In addition to the discussions that have made it into this quarterly report in summary form, many other requests were fulfilled in real-time through anonymous means.  Many of the topics covered in the second quarter of 2008 focus on strategic planning and transformation issues. Due to a financially tightened business climate, companies have asked their IT organizations to centralize, innovate, and otherwise find opportunities to reduce expense while still improving services. IT organizations have responded by increasing their use of outsourced services, by creating alternative work programs, and by centralizing and restructuring their architecture groups, among other activities. The unique benefit of the IMF is the ability to bring companies together that are just starting down the path with those that have already made significant progress. In this way, each organization may have something to learn from others as well as something to share with others.

Included Connects:

  • Desktop Delivery - Common Practices
  • The Corporate Business Intelligence Function
  • Application Development Programmer Productivity
  • Training Investments in the IT Organization
  • Information Security Support Organizations
  • Building a "Right Sourcing" Program
  • Office 2007 Upgrades


Presented On: Thu Sep 18, 2008
Matt Manzella , Director of Strategy & Innovation Services , Allstate Insurance
Details (hide)

Allstate Insurance Company has recently developed an Innovation Service and an associated Innovation Lab within their technology organization. The intent of the Lab is to provide a place where employees can expose their early stage ideas in a safe and open environment, while utilizing social networking tools like blogs, wikis and other networking forums to provide feedback and input through an idea network. During this Web Forum, Matt Manzella and his team will speak about some of the early efforts and successes of the Innovation Lab. One of the concepts the team is exploring is the use of Virtual Worlds (such as Second Life®). The team will discuss how Allstate is leveraging these worlds to improve collaboration at Allstate, while also taking advantage of some unexpected capabilities.



Presented On: Tue Mar 11, 2008
Rick Nordtvedt , IMF Fellow
Details (hide)

Rick Nordtvedt discusses a four-year study he recently completed and published, which draws on the opinions and practices of senior executives from organizations across many industries, including several IMF members. His research examines the relationship between Information Technology (IT) Governance and Organizational Flexibility and their combined effects on responsiveness to business requirements. Results suggest that IT organizations can become more flexible and more responsive to their businesses through governance standardization and that such standardization also results in better business outcomes.

 

• Governance
• Return on Assets
• IT Flexibility
• IT Execution
• IT Decision-Making
• Prioritization Process
• Resource Allocation
• Centralized
• Formalized
• Standardized
• Performance
• Project Prioritization
• Flexibility
• Standardized Toolsets
• Standardized Processes
• Budget
• Systems Integration
• Implementation
• Standardization
• Sarbanes-Oxley
• SOX
• Management Information Systems
• MIS
• Customer Relationship Management
• CRM
• Infrastructure
• Alignment



Presented On: Thu Aug 7, 2008
Details (hide)


Presented On: Tue Apr 15, 2008
Stuart Kressel , Atlanta Practice Leader , Watson Wyatt
Details (hide)

 

 

 

 

While employers state that their best employees are leaving because of pay issues, top performing employees report that the number one reason for leaving an organization is stress levels. What does this mean to the rapidly changing workforce of the 21st Century? How do we measure stress, and what can we do to ensure that our organization is not being hurt by it?

 

 

Keywords:

  • Employee Engagement
  • Human Capital
  • Organizational Effectiveness
  • Compensation
  • Benefits
  • Retirement
  • Polling Methodology
  • Total Return to Shareholders
  • TRS
  • Employee Effectiveness
  • Work Performance
  • Turnover
  • Mergers and Acquisitions
  • M&A
  • Offshore
  • Performance
  • Rewards
  • Communication
  • Decision-making
  • Pay and Benefits
  • Teamwork
  • Work Environment
  • Integrity
  • Roles and Responsibilities
  • Career Development


Presented On: Tue Apr 15, 2008
Carlton Burroughs , Business HR Manager , Hewlett-Packard
Details (hide)

 

 

 

 

This session focuses on some practical strategies for attracting, motivating, and retaining members of Gen Y as both employees and customers. Carlton Burroughs discusses some key areas of generational difference, including cohort size, style, motivators, etc. The session also includes a strategic overview, some key concepts and linkages to motivation theory, a couple of intriguing case studies and some nuts-and-bolts recomendations.

Keywords:

  • Baby Boomers
  • Gen Y
  • Diversity
  • Facebook
  • MySpace
  • Career Management
  • Succession Plans
  • Mentoring
  • Domino
  • Security
  • Gen X
  • Work/Life Balance
  • Public Relations
  • PR
  • LinkedIn
  • Flexible Career Development
  • Job Rotation
  • Relative Performance
  • Leadership


Presented On: Wed Aug 27, 2008
Details (hide)

 

Our members at Allstate Insurance were interested in learning from other companies that have experience with implementing Enterprise Collaboration policies and practices. This Connect was an open discussion on which collaboration tools and strategies have been implemented within the participant organizations.

 



Presented On: Thu Aug 21, 2008
Details (hide)

Training your IT organization is important, especially now during some harder economic times when turnover can be of greater risk to the organization, so you need to build and retain a strong workforce. We want to focus on the tools and techniques that the participating companies are using to train their IT organizations.



Presented On: Tue Apr 15, 2008
Price Harding , Partner , CarterBaldwin
Details (hide)

 

 

 

Identifying and purposefully shaping your own corporate culture is often a difficult task. This session provides attendees with the analytical tools necessary to understand the “microcultures” that exist in any geographically dispersed organization and to build teams that can benefit from meaningful cultural interaction across multiple geographies.

 

Keywords:

 

  • Skillsets
  • Methodology
  • Power Structure
  • Cultural Metric
  • Sales Force
  • Workforce
  • Dispersed Workforce
  • Infrastructure
  • Aspirational Alignment
  • eMotionalization
  • Principles
  • Mergers and Acquisition
  • M&A

 



Presented On: Tue Mar 11, 2008
Bill Kwelty , Senior Vice President and Chief Information Officer , Automotive Resources International
Donald Reny , Chief of Information Technology , El Paso Corporation
Bruce Anderson , Vice President , TIAA-CREF
Details (hide)


Presented On: Thu Oct 18, 2007
Phillip Hibbert , IMF Fellow
James Stanley , Assistant Vice President, Human Resources , The Hartford
Details (hide)

Phil and James discuss lessons learned at The Hartford concerning divestiture of business units with a focus on personnel and staff concerns.



Presented On: Tue Jan 22, 2008
Thomas Stanley , Senior Director Platform Services , LexisNexis
Details (hide)

Tom Stanley leads a discussion on the virtualization journey at ChoicePoint. Utilizing consolidation strategies that includes VMware, Solaris 10 and Technology Refresh, ChoicePoint enjoyed a 30 percent cost reduction in data center operations. Despite a 40 percent growth in capacity, the power needs increased only 10 percent. Tom discusses tools, strategies and lessons learned for success.



Presented On: Tue Mar 11, 2008
Mark Polansky , Managing Director , Korn/Ferry International
Details (hide)

The emergence of Information Technology (IT) leadership and innovation at the "C" level has dramatically changed the role Chief Information Officers (CIOs) play in corporate America. This presentation take a looks at a historic perspective on the changing role of the CIO and provides a roadmap and operating model for 21st Century CIOs, and the “next level” of CIO impact. Read on to learn what drives the developments affecting the CIO position today and what will in the future.



Presented On: Fri Jun 6, 2008
Details (hide)

IMF members continue to leverage the experiences of their peers through the IMF Connect service more and more. In addition to the discussions that have made it into this quarterly report in summary form, many other requests were fulfilled in real-time through anonymous means.
Many of the topics covered in the first quarter of 2008 focus on strategic planning and transformation issues. Due to a financially tightened business climate, companies have asked their IT organizations to centralize, innovate, and otherwise find opportunities to reduce expense while still improving services.
IT organizations have responded by increasing their use of outsourced services, by creating alternative work programs, and by centralizing and restructuring their architecture groups, among other activities. The unique benefit of the IMF is the ability to bring companies together that are just starting down the path with those that have already made significant progress. In this way, each organization may have something to learn from others as well as something to share with others.



Presented On: Tue Jan 22, 2008
Scott Holmes , Senior Manager, Enterprise Architecture , Waste Management
Details (hide)

The beginning of a new calendar year is a natural time for reflection and planning. This presentation reviews the progress made toward the goals at Waste Management, Inc. (WMI) to the objectives communicated in the August 2007 presentation “Quantifying EA to IT Business Units." It also outlines the next steps that are planned.



Presented On: Tue Jan 22, 2008
Tom Guthrie , Vice President , IMF Fellow
Joy Guthrie , Vice President , eMediaTRADE
Details (hide)

The Six Sigma methodology has been successfully applied in many process improvement situations, and the benefits have been praised publicly as key to the success of large international corporations. The problem is that most of us are not statisticians, and many of us work in industries and businesses that are rarely addressed in Six Sigma literature. The average businessperson’s ability to apply Six Sigma to his/her situation has been limited. This presentation focuses on exactly how and why Six Sigma works as a process improvement approach to any process and uses examples from the services sector to illustrate the point.



Presented On: Tue Jan 22, 2008
Bill Peer , Director , InterContinental Hotels Group
Details (hide)

Think creating an Enterprise Architecture (EA) is tough? Try creating one for an entire industry! Bill Peer shares his experiences and personal observations as a member of an architecture workgroup doing just that: creating an architecture for the entire hotel industry. He covers interesting insights, challenges, standards generation, lessons learned, TOGAF’s applicability, espionage concerns, maintaining the company’s secret sauce and other menacing topics that surface at this echelon.



Presented On: Thu Oct 18, 2007
Denise Peek , Manager, Human Performance Development , NASCO
Details (hide)

Denise Peek from NASCO discusses the importance of having a solid talent management and succession planning strategy. She shares her experience in the development and implementation of this strategy. In addition, she highlights the importance of utilizing benchmark data, best practices and market research when developing a solid talent management and succession planning strategy.



Presented On: Thu Oct 18, 2007
Tammy Reeves , Manager, IT Workforce , Milliken & Company
Details (hide)

Information Technology (IT) recruiting techniques vary from company to company. At Milliken & Company, the Information Services (IS) department is responsible for recruiting IT professionals. The ability to adapt and readily improve recruiting techniques is vital to obtaining top college graduates year after year. Tammy Reeves shares the IS recruiting process and how it has evolved within Milliken.



Presented On: Thu Oct 18, 2007
John Tindal , Associate , Booz Allen Hamilton
Dagne Fulcher , Booz Allen Hamilton
Details (hide)

John and Dagne will discuss best practices in staffing and workforce development. They will relate them to models that the Federal Chief Information Officer’s Council and Booz Allen Hamilton have developed for assessing the capabilities of the information technology workforce.



Presented On: Tue Sep 18, 2007
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)

Dr. Jonathan Reichental will cover a variety of topics including behaviors that are core to a culture of radical innovation at PwC. Drawing on his experience of working within his company to drive innovation he will discuss designing an innovation model for your company and actions you can take now to begin or significantly improve your approach to innovation.



Presented On: Tue Oct 16, 2007
Michael Roberti , Senior Security Manager , Harris Corporation
Details (hide)

Michael Roberti is the Senior Manager in charge of Information Security at Harris Corporation. Michael and his team of 11 security professionals are responsible for ensuring the security of Harris' enterprise applications and infrastructure systems at more than 80 locations worldwide. He also sets security policy and standards for the division’s business systems. Michael has worked in the security field for more than 10 years. Prior to his present managerial position, he was the Lead Security Engineer at Harris. His duties included firewall support, network security and Unix and NT system security and auditing. In addition, he developed and implemented an identity management and access approval process that was identified by external audit as a best practice. Michael earned a Bachelor of Science Degree in Computer Studies from the University of Maryland College and a Master of Science Degree in Information Assurance at Norwich University. In addition, he has received many technical certifications including CISSP, CISM, GSEC and MCSE.



Presented On: Tue Mar 11, 2008
Chris Desoiza , Vice President , Milliken & Company
Details (hide)

Chris DeSoiza oversees Milliken's Research and Development Organization and is the owner for one of their Key Corporate Initiatives "Growth through Innovation." An Invention is the solution to a problem. An Innovation is the commercially successful use of the solution. This is why Innovation takes the successful interaction of foresight, vision, process, multi-functional collaboration and leadership. By doing these things consistently you give yourself a much greater probability of success and the ability to meet your growth objectives. For Milliken, this has resulted in an ongoing stream of new product launches each year and the development and strengthening of Technology Platforms on which to maintain and build upon. This innovation process that weaves collaboration between IT, Research, Development, Manufacturing and Business works! Hear how IT is vital to the innovation model used at Milliken. Take away key drivers to implement in your organization to achieve new growth through innovation.



Presented On: Mon Mar 10, 2008
Details (hide)

The IMF Connect Process:

What is it?
IMF Connect provides members with a means of leveraging the experience of their peers on topics of immediate interest. Complementing the existing scheduled meetings and reports, IMF Connect matches member queries with real, practical advice from other practitioners who have already blazed the trail.

How Does it Work?
A member contacts IMF with a question for peer feedback.
IMF creates and pursues the reference group for your company.
IMF completes the research gathering.
Responses come directly from peers without any skewing.
IMF will arrange follow-up discussions and produce a summary of the results for the benefit of your corporation and your department.
Informative letter outlining the Connect results sent to Senior Most of IT Department.

Quarter One

  • Software Asset Management
  • IT Talent Rotations
  • Technology Renewal
  • Chargeback Methodologies
  • Intern Programs
  • Single Sign On
  • Website Filtering

Quarter Two

  • Corporate Scorecarding
  • Microsoft’s SharePoint Collaboration Solution
  • CobiT and ITIL IT Governance Frameworks
  • Infrastructure Technical Support Resource Requirements and Forecasting
  • Developing Front-Line and Middle-Tier Managers
  • Microsoft Operating System (OS) Based Handheld Device Security
  • Next Generation Virtual Networking
  • IT Communications
  • Patch Management
  • Configuration Management and the Configuration Management Database (CMDB)
  • Payment Card Industry (PCI) Data Security Standard

Quarter Three

  • Roles-Based Access Controls
  • Information Security Strategy
  • eDiscovery Compliance for Email
  • International Payroll and Human Resources
  • Shared Services Organizations and Service Owners
  • Flexible Work Arrangements
  • Applications Development Staff Ratios
  • Customer Satisfaction Surveys
  • Application Design Processes
  • Vendor Management

Quarter Four

  • Business Intelligence (BI) and Data Warehousing (DW)
  • Capacity Planning
  • Enterprise Architecture (EA)
  • Non-Business SharePoint Sites
  • Organizational Collaboration
  • Keys to Success with Project Portfolio Management (PPM)
  • Data Governance


Presented On: Tue Jan 23, 2007
Dennis Neuger , Lead Architect , Cox Communications
Details (hide)

Dennis Neuger discusses how Cox Communications approached virtualization and turned it into a successful infrastructure strategy for consolidation and infrastructure optimization. He also discusses its role in the area of Business Continuity.



Presented On: Thu Oct 16, 2008
Steven Zagoudis , Chief Executive Officer , Meta Governance
Details (hide)

Data Governance is a necessary oversight function in all IT and business organizations today. Increasingly, regulations and other compliance requirements necessitate a real focus on the company’s data assets and uses. During this web forum, Steve Zagoudis shared his philosophy on data governance, with critical information shared from his many years of industry experience.



Presented On: Wed Jul 11, 2007
Carter Johnson , Assistant Vice President , LexisNexis
Details (hide)

Carter Johnson discusses how he has been able to control Information Technology (IT) cost along with the importance of having complete visibility into infrastructure cost and how that helps the overall control of cost. In addition, he discusses how the procedures and discipline that affect the connection between asset management, financial control and vendor management are keys to successful cost management.



Presented On: Tue Sep 18, 2007
Matt McGarvey , San Diego Government
Details (hide)

The City of San Diego’s current financial systems are a mix of technologies with critical financial data residing in numerous disparate systems. Even generating simple financial reports is often a laborious and manual process. While embarking on a long-term strategy to implement an Enterprise Resource Planning (ERP) system, the City realized the need to make immediate improvements. Using data warehousing and business intelligence to consolidate viewing and analysis of data contained in the City’s major financial systems has greatly improved the City’s ability to make better business decisions.



Presented On: Thu Aug 23, 2007
Scott Holmes , Senior Manager, Enterprise Architecture , Waste Management
Details (hide)

Scott Holmes, Senior Manager of Enterprise Architecture (EA) at Waste Management, shares some of the more important aspects of EA. Using his own philosophies, Scott discusses how to improve the value that EA can provide to an organization.



Presented On: Thu Sep 27, 2007
Phillip Burdett , Senior Director , Koch Business Services
Brad Wagner , Technical Lead , Georgia-Pacific
Michael Smela , Technical Lead, VM Operations , Georgia-Pacific
Details (hide)

This Web Forum focuses on server virtualization and consolidation, specifically VMware implementation. Brad Wagner, Mike Smela and Phil Burdett discuss VMware implementation at Georgia-Pacific and answer participants’ questions about their own varied VMware implementations.



Presented On: Thu Jan 24, 2008
Details (hide)

IMF members pursued experiential information sharing on a wide variety of topics in 2007. While Information Security saw the greatest number of Connects for the year, the focus in the fourth quarter shifted to planning initiatives for the New Year. Therefore, the overall numbers for the Workforce, Architecture, Infrastructure and Data Management communities rose. Connects are a real-time measure of the “hot-button” issues at IMF member organizations. During the fourth quarter of 2007, these issues include topics such as Organizational Collaboration, Business Intelligence and Data Warehousing Best Practices, Capacity Planning, Enterprise Architecture, Non-Business SharePoint Sites, Project and Portfolio Management and Data Governance.



Presented On: Tue May 15, 2007
Chris Porch , Associate , Booz Allen Hamilton
Ben Marglin , Senior Associate , Booz Allen Hamilton
Details (hide)

How can organizations move beyond Service Oriented Architecture (SOA) hype and tactical implementations toward a well-orchestrated, business-driven SOA strategy? As IT executives from leading businesses across private and public sectors, this roundtable provides you with a unique forum for learning how other organizations are thinking about and approaching SOA, what is and is not working and where to find true value generation for sustained SOA success. Included topics are defining the business imperative; capturing and measuring SOA value; establishing organizational controls and governance; integrating SOA into broader strategies such as Capital Planning and Enterprise Architecture; and learning from success stories and failures.



Presented On: Tue Jul 10, 2007
Rick Bell , Director , Canadian Tire
Details (hide)

Rick Bell describes how Canadian Tire’s Corporate Information Technology (IT) department has approached the tracking of critical application service levels, the Corporation’s methods for using IT operational performance metrics and the Customer Focus program followed by the IT staff. An overview of infrastructure benchmarking and Service Costing/Cost Recovery practices will also be included.



Presented On: Tue Jul 10, 2007
David Traynor , Business Excellence Manager , Southern Company
Details (hide)

David Traynor discusses the efforts undertaken at Southern Company to run Information Technology (IT) as a business with a focus on chargeback methodologies and lessons learned, benchmarking and market testing of IT products and services along with IT investment decision-making.



Presented On: Tue Jul 10, 2007
Details (hide)

Jeff Cooper discusses how The Walt Disney Company manages service delivery in a multi-vendor, outsourced environment and the importance of establishing an internal Information Technology (IT) brand. He also covers the “marketing” of IT services to internal customers through his Technical Relationship Management organization.



Presented On: Thu Apr 19, 2007
Jean Sirica , Program Director , The Hartford
Details (hide)

The eBusiness and Technology (eB&T) organization of The Hartford is in the middle of a significant transformation program to create a top-tier Information Technology (IT) organization. The depth and breadth of the changes are impacting everyone in eB&T. Jean discusses the human side of the transformation, specifically the challenges they are facing and the steps they are taking to meet these challenges.



Presented On: Thu Apr 19, 2007
Stacey Knight , Application Development Team Lead , Abbott
Details (hide)

Outsourcing and other business challenges are creating an environment that is prompting employees and employers to change. Employees need to update their skill sets and be prepared for changes in the business and in the needs of the organization. Stacey Knight discusses organizational changes and methods used to help associates accept and prepare for these career shifts.



Presented On: Tue May 15, 2007
Benjamin Tomasini , Assistant Vice President and Application Developer , Bank of America
Details (hide)

Application Development can and should be an enjoyable endeavor that emphasizes communication and teamwork. During this session, Ben Tomasini discusses some keys to consistently creating high-performance, maintainable applications in today’s rapidly changing business environment. Ben also discusses common problems teams face and explores some well-tested solutions.



Presented On: Tue Jul 10, 2007
Caleb Masland , The IMF
David Burkett , Global Information Partners
Details (hide)

As The Information Management Forum and Global Information Partners have completed a large number of benchmark studies for member organizations over the past two years, we have also gained visibility into the general trends within Information Technology (IT) operations from an efficiency, quality and cost perspective. David Burkett and Caleb Masland have analyzed the IMF/Global database and will present trends uncovered by comparing database averages from 2006 to 2007. Metrics from top-performing organizations will also be shared in an effort to highlight best practices for participating members..



Presented On: Thu Oct 18, 2007
Details (hide)

Information Security continues to be a driving force behind many of the initiatives underway throughout the IT world. As a testament to this fact, greater than one third of IMF Connects requested in 2007 have had a security focus. Connects are a real-time measure of the “hot-button” issues at IMF member organizations. During the Third Quarter of 2007, these issues included topics such as Roles-Based Access Control, Building and Executing a Long-Term Information Security Strategy and Email eDiscovery Compliance. In addition to these security issues, IMF members initiated peer-to-peer information sharing sessions on Flexible Work Arrangements, Application Design Processes, Shared Services Organization Structures, Running Payroll and HR for International Operations and many others.



Presented On: Thu Oct 18, 2007
Theresa Alsop , Director, Talent Management , Duke Energy
Details (hide)

Terri Alsop shows current statistics on the actual numbers of Baby Boomers, Generation X-ers and Baby Boomer Echos that comprise these generations. She discusses the characteristics that define each generation to help you design programs that resonate with each group, especially since the Echo generation, a group larger than the Baby Boomers, has started to graduate from college. Terri shares two programs at Duke Energy that have appeal across the generations. Current trends have somewhat reversed, and the average retirement age at Duke is moving from 58 to 60 years old. Terri focuses on what it means for your corporation that Baby Boomers have decided to stay in the workforce longer.



Presented On: Thu Jul 19, 2007
Denise Peek , Manager, Human Performance Development , NASCO
Details (hide)

Denise Peek discusses change and the various reasons people find change difficult. She covers common reactions to change, coaching people to have positive reactions to change and strategies for modeling and navigating change. Denise also discusses common barriers to change and how they can be overcome in relation to dealing with change in the 21st century.



Presented On: Thu Aug 9, 2007
Details (hide)

Periodically, companies find it important to revisit the application design processes in place to ensure that they are in line with the goals of the organization from a business perspective and beyond. Also, Information Technology (IT) organizations are always trying to stay abreast of best practices within their industry, which can also involve revisiting the current processes to ensure they meet those standards. Recently, IMF member companies indicated that they are going through initiatives to revamp the application design processes in place at their organizations. This has involved the revision or creation of new document templates, the rewriting of procedures and policies, the updating of standards, along with the rebuilding and revision of success metrics for the application organization.



Presented On: Tue Oct 16, 2007
Milind Pandit , Director , CheckFree Services Corporation
Details (hide)

As financial institutions seek to provide customers with the convenience of online financial services, they open themselves to a variety of threats. Corillian and CheckFree have long been leaders in online financial services and have built a wealth of knowledge on how to protect financial institutions and their customers. Milind Pandit, Director of Enterprise and Security Solutions at CheckFree, discusses past, present and anticipated threats along with appropriate responses by CheckFree and its customers to those threats.



Presented On: Tue May 15, 2007
Bob Hamilton , Manager, Client Systems Development , Automotive Resources International
Details (hide)

Bob Hamilton focuses on the difficult task of measuring the value of Information Technology (IT) and the tangible and intangible values that can be identified, measured and marketed. He discusses industry measurements as well as some specific practices put in place at Automotive Resources International (ARI) to track the value of IT investments and projects. Beyond measuring the value of IT, Bob also explores ways to market the value to both internal and external customers.



Presented On: Tue May 15, 2007
Timothy Braun
Wendy Niebank , The Home Depot, Inc.
Details (hide)

EarthLink’s Information Technology (IT) organization was buried in work, but was it the right work? The IT organization was delivering on all the items the business was demanding, but the business still felt the work was not getting done or done fast enough. See how transitioning to a portfolio management process helped EarthLink realign resources and partner with the business to get the important work done on schedule, creating transparency in the process. Tim and Wendy discuss the journey EarthLink took to drive optimization of the IT resource investments with business strategy and the challenges encountered along the way.



Presented On: Tue Apr 17, 2007
Steven Zagoudis , Chief Executive Officer , Meta Governance
Details (hide)

With the ever-increasing amount of information that Information Technology (IT) is asked to manage, architects must now fit this information into the larger architectural design. Governance is vital to an organization that wants to protect critical information and leverage the information assets to business advantage while mitigating business and compliance risks. Steve shares how Federal Home Loan Bank (FHLBank) of Atlanta has approached these issues.



Presented On: Tue Apr 17, 2007
Jim Matthews , Vice President , Charter Communications
Details (hide)

Jim Matthews discusses how he has developed sound architecture practices that reference the Federal Architecture Framework. By implementing these practices, Jim and the Central Management Services Information Technology (CMS IT) team were able to reduce the State of Illinois’ annual IT spend by $135 million over an 18-month period. Illinois was taken from a Capability Maturity Model (CMM) level 1 state to a managed state. As a result, it is positioned to continue controlling its spend and optimize its IT investments, as long as the governance practices are permitted to function.



Presented On: Thu Apr 19, 2007
Mary Stacey , Learning Consultant , Waterline Consulting
Marilyn Jackson , Manager , Canadian Tire
Details (hide)

Canadian Tire’s Information Technology Chief Information Officer (IT CIO) has maintained a steady focus on the people agenda through the execution of his IT Strategy. The organization now has data that tells a compelling story about how the Strategic Leadership, Career Development and Capabilities Alignment Programs have changed IT’s culture and its relationship with the business. Marilyn Jackson and Mary Stacey will provide an overview of the IT Strategy and the tangible results gained from its key initiatives.



Presented On: Thu Apr 19, 2007
Matthew Kamensky , Organization Effectiveness Consultant , Watson Wyatt
Details (hide)

Watson Wyatt’s recent WorkUSA findings indicate that companies that take steps to improve employee engagement today can expect to significantly improve their productivity and financial performance in the future. The challenge is determining which specific steps to take with your IT workforce. Matt will share recent research findings that identify the myths and misconceptions leading employers down the wrong path when it comes to building employee engagement. He will also discuss key drivers of employee engagement for IT employees and what action items organizations must take in order to increase engagement and improve financial success.



Presented On: Thu Mar 22, 2007
JP Calderon , Information Security Officer , Family Dollar Stores
Details (hide)

J.P. Calderon, Information Security Officer at Family Dollar Stores, is primarily responsible for establishing the enterprise security framework. During this Web Forum, he discusses the company’s approach to security and compliance as well as its current state. J.P. focuses on how compliance relates specifically to the realm of Information Technology (IT).



Presented On: Tue Mar 6, 2007
Bruce Anderson , Vice President , TIAA-CREF
Details (hide)

Bruce Anderson discusses the efforts undertaken at TIAA-CREF to increase the value and decrease the risk in their vendor relationships. He also covers how to move from typical business/vendor relationships to strategic partnerships.



Presented On: Tue Apr 17, 2007
David Kleba , Principal Analyst , Abbott
Milt Haynes , Director, IT Planning and Enterprise PMO , Abbott
Details (hide)

New technologies are being made available with increasing frequency. While some can be of great benefit to your organization, others may be a costly mistake. Milt and Dave discuss Abbott’s methods for evaluating new technologies to ensure selection of the right products for business and Information Technology (IT) needs.



Presented On: Mon Jun 11, 2007
Carter Johnson , Assistant Vice President , LexisNexis
Details (hide)

Our members at ChoicePoint were interested in learning from other companies that have experience with implementing Vendor Management policies and practices. This Connect was an open discussion on what steps companies are taking to better manage relationships with their vendors so that our members could discover best practices and share common issues.



Presented On: Thu May 10, 2007
Details (hide)

During this Web Forum, members shared common challenges, best practices and asked questions about the implementation of single sign on. IMF member companies are at various stages in their implementation of single sign on. Some companies are just beginning to think about whether this tool might be a useful time or money saver. Other organizations have already implemented single sign on and are managing it on an ongoing basis.



Presented On: Thu May 24, 2007
Details (hide)

This Web Forum provided an opportunity for members to discuss Information Technology (IT) satisfaction surveys as a way for the IT organization to gather data that can aid in improving how well services are delivered to business partners. Information was gathered about the types of surveys being used, the frequency with which organizations poll and the formats used to survey end-users and business partners.



Presented On: Thu Jan 25, 2007
Sandy Smith , IT Director , Hewitt Associates
Details (hide)

Sandy Smith, IT Relationship Manager for Hewitt Associates, shares with members her experiences in helping to transform the IT group to a process-based organization. The changes affected how they viewed their work and how they dealt with their customers. She will discuss lessons learned about what worked well, what didn’t work as well and what she would do differently if starting the transformation today.



Presented On: Thu Apr 19, 2007
Mark Maloof , Professor , Georgetown University
Details (hide)

The transition to a new organization, especially for recent college graduates, is one of the most important transitions employees have during their career. Allstate Protection Technology (APT) has a program in place that is specifically geared for new hires with less than two years of experience. For most of our participants, APT is their first corporate job. Dennis Ferrini and APT program participants share their experiences and how they have created a sense of community and provided a strong foundation for future career success. We peek behind the new entry curtain to see why this program has been so successful for participants, their Managers and the organization.



Presented On: Tue Dec 5, 2006
John Graham
Details (hide)

John Graham shares with members the organizational structure and governance processes that have been used successfully to manage outsourcing relationships at SunTrust Bank.



Presented On: Mon Jul 9, 2007
Details (hide)

At the end of each quarter, the IMF selects several IMF Connect summaries and compiles them in a quarterly report. This document contains eleven topics that were top of mind for IMF member companies during the second quarter of 2007. The included summaries are: • Corporate Scorecarding • CobiT and ITIL IT Governance Frameworks • Collaboration Solutions • Infrastructure Technical Resource Requirements and Forecasting • Developing Middle-Tier and Front-Line Managers • Handheld Device Security • Next Generation Virtual Networking • IT Communications • Patch Management • Configuration Management • Payment Card Industry Data Security Standard



Presented On: Tue Mar 6, 2007
Price Harding , Partner , CarterBaldwin
Details (hide)

What career steps allow one of your rookie Developers to become a Vice President (VP) of Technology? What paths might then lead to the Chief Information Officer (CIO) office or to a public company board role? Can we become so focused on doing our jobs that we forget about managing our careers? Price leads a discussion that frames answers to these questions and the discovery of what each promotion along the technology career path requires and means in terms of responsibility, rewards and career satisfaction.



Presented On: Tue Mar 6, 2007
William Miller , Chief Information Officer , NetApp
Details (hide)

Bill Miller discusses the role of the Chief Information Officer (CIO) in all aspects of Acquisition and Divestiture. He shares his experience from having been the CIO during the acquisition of companies by Harris Corporation and having led the Enterprise Acquisition Team. Bill also shares from his recent experience with the spin-off of Harris Microwave Communications Division to create Harris Stratex Networks Incorporated, a joint venture of Harris Corporation and Stratex Networks.



Presented On: Tue Apr 10, 2007
John Higgins , Director , The Hartford
Details (hide)

This is an IMF Connect on Payment Card Industry (PCI) Standards. 



Presented On: Thu Apr 12, 2007
Johnna Marcus , Director , Caesars
Details (hide)


Presented On: Thu Feb 15, 2007
Benjamin Tomasini , Assistant Vice President and Application Developer , Bank of America
Details (hide)


Presented On: Thu Jan 25, 2007
Kenneth Sparks , Director Technical Services , NCRC Technologies
Details (hide)

In today’s environment, the terms “leader” and “manager” are often interchanged. However, there is a fundamental difference between leading and managing people. Ken Sparks, Director of Technology Services at Charlotte Pipe & Foundry, shares his thoughts on the fundamental skills business leaders need and what he considers to be the distinct differences between managing and leading.



Presented On: Tue Dec 5, 2006
Michael Sullivan , Relationship Manager - NCSA , Allstate Insurance
Details (hide)

Dr. Michael Gallivan shares results from research conducted among 104 major corporations and nonprofit organizations that focused on understanding projected staffing patterns over the next two to 10 years. Areas focused on include outsourcing initiatives and areas in which companies plan to expand IT staff, as well as other areas they anticipate will be increasingly outsourced.



Presented On: Tue Jan 23, 2007
Kimball Winn , Assistant SAA and CIO , U.S. Senate
Details (hide)

Thinking of implementing VoIP? Kim Winn, Director of IT Support Services at the U.S. Senate, discusses what to look for when identifying an appropriate VoIP network and gives practical advice on how to choose a service provider.



Presented On: Thu Feb 1, 2007
Ted Buszkiewicz , Director, Enterprise Architecture Program , IMF Fellow
Details (hide)


Presented On: Tue Jan 23, 2007
Tony Ratti , Assistant Manager , Automotive Resources International
Details (hide)

Tony Ratti, Assistant Manager, Security and Communications leads a discussion on Automotive Resources International’s (ARI) creation of a high-availability environment. Elements of the plan include server virtualization, deploying tools for redundancy and backup systems. These methods have led to a very high-availability environment for ARI’s customers and employees.



Presented On: Tue Nov 7, 2006
Gordon Bass , Senior Director, Information Security , American Red Cross
Details (hide)

Gordon Bass discusses the steps the American Red Cross (ARC) has taken to define and implement an organization-wide Information Security strategy and the major issues identified in defining and selling an organization-wide solution.



Presented On: Tue Dec 5, 2006
James Harvey , Partner & Co-Chair , Hunton & Williams
Details (hide)

Jim Harvey, of Hunton & Williams, provides members an overview of typically encountered legal issues in planning for, negotiating and managing a sourcing transaction.



Presented On: Tue Dec 5, 2006
Ted Williams , Executive Director , The IMF
Details (hide)

Ted Williams discusses the many common pitfalls of measuring outsourced IT functions and explains the keys to success for effective measurement of the outsourced relationship. The presentation contains real examples from recent outsourcing evaluations.



Presented On: Tue Nov 7, 2006
Chas Birkett , Senior Security Consultant , CIBC
Details (hide)

Any decision to change the sourcing model for IT carries with it a new set of risks for Information Security. Chas Birkett discusses the risk evaluation model CIBC has used to assign risk to alternative sourcing possibilities.



Presented On: Thu Nov 8, 2007
Sonya Pelli , Manager Internet Services , City of St. Louis
Details (hide)

Sonya Pelli discusses how IT services are provided to the large, metropolitan-area government of the City of St. Louis and how IT is used to support services provided to the citizens of the community.



Presented On: Tue Apr 18, 2006
Kelly Hobbie , Director, Architecture & Engineering , Cox Communications
Details (hide)

Today at Cox Communications, IT architecture consists primarily of technology standards and processes for engineering the IT infrastructure one application at a time. Process inefficiencies, integration challenges and missed opportunities that truly impact the business are some of the drivers to put an enterprise architecture program in place. But what is the best way to do it, and what should it include? In this report, Kelly discusses the current state at Cox, along with the company’s high level goals. He also involves the group in a discussion designed to help him determine and articulate the benefits of enterprise architecture to businesses and IT leaders. Another goal is to learn how architecture will be defined at Cox and what road map to their future state should look like. The report of this discussion should also help others in the IMF community confirm their directions and determine needed adjustments.



Presented On: Tue Nov 7, 2006
Ed Caldwell , Security Analyst , Charlotte Pipe and Foundry
Details (hide)

Policies and procedures, no matter how good, are worthless if all individuals in an organization do not understand the responsibility they have to safeguard information assets. Ed Caldwell describes Charlotte Pipe & Foundry’s Information Security Awareness program and Corporate support for the program.



Presented On: Tue Nov 7, 2006
Sonya Harley , Information Security Analyst , Harris Corporation
Details (hide)

Every public and private organization has legally defined responsibilities to demonstrate compliance with regulatory requirements. Sonya Harley describes the controls put in place at Harris Corporation to ensure continuous compliance with the regulations governing their work.



Presented On: Thu Mar 8, 2007
Details (hide)


Presented On: Tue Aug 29, 2006
Gail Tedesco , Senior Director , American Red Cross
Kathleen Weiss , Director , American Red Cross
Details (hide)

Gail and Kathleen discuss how The American Red Cross structures an ongoing exchange of ideas and best practices that cover all dimensions of change management from technology to business to workforce.



Presented On: Tue Aug 29, 2006
Carolyn Pilgreen
Details (hide)

The demographics of the talent pool from which the most valuable workforce resources are drawn are rapidly changing. Carolyn Pilgreen discusses the challenges Chevron has faced in developing an effective workforce for the future.



Presented On: Tue Aug 29, 2006
Mark Maloof , Professor , Georgetown University
Details (hide)

Emerging technologies require new skills and put pressure on organizations to react quickly with training programs and new hiring requirements. How do we plan for an uncertain future? Dr. Marcus Maloof discusses what Georgetown University is doing to prepare students for the technology-based workplace of the future.



Presented On: Tue Oct 17, 2006
Marianne Lownds , Manager, IT PMO , Abbott
Jay Seifried , Senior IT Program Manager , Abbott
Details (hide)

Major changes in software support for business units often require multi-year programs consisting of many individual projects to accomplish the desired goal. Jay and Marianne share their experiences in managing major software development programs across multiple budget years and diverse elements of Abbott.



Presented On: Tue Oct 17, 2006
Craig Niermann , Project Manager , Eastman Chemical
Brian Harmon , Relationship Manager , Eastman Chemical
Details (hide)

Application Development using contract and offshore resources requires new management controls and contract provisions to ensure that projects are completed as required. Craig and Brian discuss their experiences and lessons learned from the use of contract and offshore resources for application development at Eastman Chemical Company.



Presented On: Thu Dec 14, 2006
Greig Holder , Global Information Partners
Details (hide)

Greig led a discussion in which members shared their thoughts on the various IT Service Delivery methods currently used within their organizations and the successes and issues inherent in each method.



Presented On: Tue Aug 29, 2006
Kathy Markowiak , Director, Organization Development , Sun Life Financial
Details (hide)

Kathy Markowiak shares with members a process Sun Life Financial has successfully followed to identify IT and leadership competencies and how to build an ongoing process to fill the gaps. She also focuses on developing strategies to fill future needs.



Presented On: Tue Aug 29, 2006
Nick Owens , Director , Milliken & Company
Erik Volkmar , Division Information Leader , Milliken & Company
Details (hide)

As IT leaders play a more active role in partnering with business leaders to guide the future of the organization, the role of the IT Relationship Manager changes significantly. Nick and Erik share with members how the Relationship Manager’s role is evolving within Milliken & Company.



Presented On: Wed Jun 7, 2006
Lynn Caddell , Senior Vice President and Chief Information Officer , Waste Management
Deborah Thompson
Details (hide)

Improving IT workforce capabilities at Waste Management recently became a top priority. Lynn and Deborah outline their multi-pronged strategy, which includes skills-based pay, career paths and employee engagement. Working in teams across the IT organization, they defined skill ladders with skill blocks and associated pay. They have identified each employee’s current ladder and level, and now are beginning to work with each employee, to develop their career path and how to achieve their goals. They also focus on employee engagement, using small group discussions to communicate the IT strategy, direction and get employee feedback.



Presented On: Tue Oct 17, 2006
Diane Martin , Director of Corporate Software Development , IMF Fellow
Details (hide)

In many organizations, the Project Management Office (PMO) has responsibility for overall program and project management but does not directly control the resources necessary to accomplish the project. Diane discusses how the PMO accomplishes this delicate balancing act to ensure projects are completed on time and within budget.



Presented On: Mon Sep 18, 2006
Kenneth Peffers , Associate Professor , University of Nevada, Las Vegas
Details (hide)

Many discussions have taken place among CIOs about how they can more broadly influence the use of technology across the enterprise. Ken discusses how to make effective use of knowledge around the organization and around the world for strategic IS planning and project requirements specification.



Presented On: Mon Sep 18, 2006
Cora Carmody , Senior Vice President , Jacobs Engineering
Details (hide)

The expanding need for organizations to share data both across the enterprise and with business partners has forever changed the concepts surrounding data movement. Cora Carmody addresses the policy and technical issues created by the requirement to move confidential corporate and customer data across the enterprise and with strategic business partners.



Presented On: Mon Sep 18, 2006
Details (hide)

Regionalization of workforce, outsourcing and strategic partnering and preparations for workplace disruptions such as Avian Flu outbreaks and terrorist activities have significantly changed the requirements for alternate location and secure connectivity for the workforce. Carl Eberling shares industry developments in secure remote access that facilitate workforce dispersal.



Presented On: Tue Jun 6, 2006
Minton Williams
Bob Tonnies , Relationship Manager , Eastman Chemical
Details (hide)

Relationship Managers at Eastman Chemical Company work as an extension of the CIO and are an important part of the overall IT governance process that enables IT and Business Alignment. At Eastman, the Relationship Managers have earned a seat at the table of their clients’ leadership teams and are viewed as business people who have special knowledge about IT. Minton and Bob share the evolution of this critical role, required skills and competencies, how it has been staffed, tools of the trade, a day in the life and plans for further developing this vital role.



Presented On: Tue Aug 29, 2006
Elizabeth Vales , Senior Manager , Allstate Insurance
Details (hide)

In this report, Elizabeth Vales of Allstate Insurance shares with members her experiences and challenges with change management.



Presented On: Wed May 10, 2006
Scott Geary , IS Principal Financial Analyst , Miller Brewing Company
Jeff Stroud , Manager. Finance and Controls , Miller Brewing Company
Details (hide)

A change of ownership of Miller Brewing Company several years ago brought the requirement for more rigor in IT finance. Jeff and his staff were challenged to take responsibility for managing the IT cash flow and improve the integrity, consistency and transparency of IT financial reporting. Jeff and Scott will discuss the changing role of the IT Finance organization as they assumed more responsibility and what they did to improve the credibility of the financial information they manage. They will discuss their new approach to forecasting the IT spend and how they work with the project office and other IT departments to evaluate and adjust the forecasts when needed. They will also cover how they took responsibility for vendor management, improving processes and lowering costs.



Presented On: Thu Jun 22, 2006
Marian Lucia
Details (hide)

In this report, Marian Lucia outlines her experience as a woman working in technology over the past 30 years and provides lessons she has learned during that time. She shares about her current role at Federal Home Loan Bank of Atlanta and also about effectively managing both people and processes within Information Technology.



Presented On: Wed May 10, 2006
Mark Barnard , Chief Executive Officer , Horizon Blue Cross/Blue Shield
Details (hide)

A provider of services to the insurance industry, NASCO recognizes its people as the company’s most important asset. Also, highly outsourced, NASCO views the staff of their outsourcers as part of the team. Mark shares NASCO’s succession planning strategy and how it is executed. He covers identification and development of their high potentials so they can take the next step and how the plan is rolled out into the organization. Also critical to their success is bench strength. Mark shares their approach to recruiting and retaining the talent they need and how they ensure that the talents of their outsourcer’s staff complement the skills and competencies of the NASCO employees.



Presented On: Tue Jun 6, 2006
Mike Perroni , Vice President, Application Services , Halliburton
Details (hide)

Halliburton’s Application Services organization has developed a sourcing strategy that leverages high-caliber internal IT staff, as well as onshore and offshore external resources when appropriate. A key to their success is a lean, loyal, highly skilled team of employees. Another critical factor is their approach to selecting the right work for outsourcing, balancing the capabilities of their internal staff with that of external labor. Mike discusses their strategy and how it helps keeps costs low, performance high and provides flexibility to meet planned and unplanned customer demands. He shares their approach to retaining staff and results from researching new offshore sources, such as those available in Brazil.



Presented On: Tue Jun 6, 2006
Marwan Shamaa , IT Regional Manager
Ellen Collins , Project Manager , Hewitt Associates
Details (hide)

Recent mergers, a new business model and a drive to control costs have resulted in thousands of Hewitt employees working from home offices and remote locations. This radical increase in the number of remote and mobile workers within a short time frame has compelled Hewitt’s IT organization to put a support organization in place to enable these associates to be productive and feel connected. Marwan and Ellen share their approach to putting the support organization in place. They cover some of their innovative capabilities, such as dedicated help desks, a QA process, conference calls and training. Additionally, they address the management and employee engagement challenges they are facing, as well as some of the benefits and drawbacks to this evolving workforce deployment approach.



Presented On: Tue Apr 18, 2006
Prashanth Ajjampur , Vice President, Enterprise Architecture , The Hartford
Benjamin Moreland , Director, Foundation Services , The Hartford
Details (hide)

Business has always viewed IT as chasing the latest fad. Enterprise Architecture was always pushing the new, sexy technology, sold as the new silver bullet. Is SOA just the next silver bullet that IT is chasing? Th e real point is Enterprise Architecture has always tried to leverage new technology to facilitate change, primary to meet business needs. Each new IT endeavor has moved us forward, leveraging the success of prior IT accomplishments. SOA positions us even closer to provide the fl exible and robust platform the business desires. Prashanth and Ben discuss the path that The Hartford’s Enterprise Architecture group has taken to continue to be an industry leader.



Presented On: Tue Apr 18, 2006
Tom McGuffey , Director of Information Technology , Quanta Services Inc.
Details (hide)

Successful enterprise architecture programs normally include strong principles, policies and standards. What ultimately determines success in a well-conceived enterprise architecture program is oft en how well certain key practices are tailored to the needs of the business, aligned with the culture and consistently executed. Waste Management’s enterprise architecture organization attributes their success to doing a few things very well. In this report, Tom shares their Top Ten EA Practices, including technology assessment, collaboration and documentation. He discusses the specific processes, tools and techniques of each practice and shares experiences of how these practices have made a difference, as well as created opportunities for improvement.



Presented On: Wed May 10, 2006
Donald Bagozzi , Assistant Vice President, Business Solution Consulting , Canadian Tire
Details (hide)

At Canadian Tire Financial Services the relationship with outsourcing vendors is managed jointly by IT and the business unit directly benefiting from the services provided by the vendor. Jim discusses the roles and accountabilities of IT and the business unit in managing these relationships. He covers each phase of the vendor management life cycle