Enter Members Area
Remember Me!
 
IMF Members Click Here
to Request a Login ID
IMF Reports

Members have access to hundreds of reports that are generated from presentations given by top IT executives on a variety of subject matter. Looking for a particular topic? Try our Keyword Search.
Currently showing 678 results.
Presented On: Thu Jun 22, 2023
Andrew Duffy , Director of IT Finance , Station Casinos
Details (hide)

Executive Summary

 

With annual revenues of $1 billion-plus, Station Casinos is the leading provider of gaming and entertainment in Las Vegas, Nevada. Station’s properties are regional entertainment destinations that offer various amenities, including numerous restaurants, entertainment venues, movie theaters, bowling and convention/banquet spaces, as well as traditional casino gaming offerings such as video poker, slot machines, table games, bingo, and race and sports wagering.

 

Employing over 10,000 people, the company currently operates 19 large and small casinos throughout the Las Vegas Valley. It also manages two Indian casinos, one in Northern California and another in Michigan. In recent years, the company has taken on several multi-million dollar investments, aimed at improvements to the flagship Red Rock Resort and Green Valley Ranch Resort, specifically to upgrade various nongaming aspects of the properties such as additional restaurants and hotel rooms. The new $750 million Durango Casino and Hotel is scheduled to be opened on November 20 this year.

 

Ten years ago, Stations Casinos opted for Oracle Cloud as its preferred new computing solution. But for several years now, the Enterprise Resource Planning (ERP) implementation process had been beset by several starts and stops. The project had gone over budget and way past the target completion date. The basics of ERP implementation are planning, configuring and deploying an ERP. However, for Station Casinos, from the very beginning things started going wrong mainly due to a lack of total organizational commitment which compromised all other aspects of the implementation project.

 

The first lesson is that if a successful ERP implementation is to be achieved, an organization must fully commit to it. This means finding the trusted staff or individual group of resources to coach and guide people through the process. When necessary, also bring in external counsel to advise the in-house teams through planning, implementer identification, statement of work (SOW), and project management because it will save the organization a significant amount of time, stress and most likely, money. At one point, you could describe the situation at Station Casinos as organizational defiance or noncompliance. On other hand, in respect to the company’s most recent challenges concerning ERP implementation, no one could have foreseen the Covid-19 pandemic.



Presented On: Wed Feb 24, 2021
Details (hide)

  Implementation of Service Asset and Configuration Management (SACM)

 

Executive Summary

This particular Service Asset and Configuration Management (SACM) Program was launched in 2017 to specifically establish Governance of IT Hardware, Software and their relationships within an Ecosystem. This decision arose because of the problem of ‘an incomplete and out-of-date asset inventory which impaired the ability to protect the systems, manage Information Technology Operations and control costs. This was the company’s second attempt at SACM.

IT services are made up of many individual components including servers, software and middleware. SACM is like a warehouse supervisor and much more. The program automatically caters for the managing, reporting and auditing of the relationships and attributes of all of these components across every service in a given IT infrastructure.

In the context of SACM, an asset is something that has financial value with a depreciation rate attached to it. It has a cost and an organization uses it for its asset value calculations. However, it doesn’t have a direct impact on delivering services. Assets can be buildings, switches, routers and so on.

On the other hand, a Configuration item (CI) is a subset of service assets. These have a direct impact on delivering services. All servers, networks and applications that have an impact in day-to-day operations are known as configuration items. A building is an asset, but not a CI while a document is a CI, but not an asset. A SACM system basically oversees an up-to-date and verified database of all assets and CIs which are made available to other service management processes.

SACM uses a Configuration Management System (CMS) which contains one or more Configuration Management Databases (CMDB). The CMDB is a database that contains information associated with a CI such as supplier, cost, purchase date, renewal dates for licenses and maintenance contracts and other related documentation.

At the start of the SACM program, it wasn’t known exactly how many assets there were. However, today they are monitoring 163,000 physical and virtual devices within the enterprise.  We have 15,000 software components and 7.6 million asset relationships.  This information was not available at the onset of this program.

With SACM in place, there has been a huge improvement in life cycle management.  The hardware asset management and software asset management and the configuration management teams are now tightly integrated. For instance, in the past, they really didn’t do a very good job for the retirement of an asset whenever it would come to its natural end of life.  But today that is not the case. They are really focused on monitoring the assets that are within the system. These are assets that are either actively used or are sitting on a shelf or in a lab or somewhere else. But the difference now is they know exactly what these assets are, where to find them and why they exist. 

 

 

 

 

 

 



Presented On: Mon Apr 19, 2021
Dawn Fowx , CIO Controller , IBM
Details (hide)

Before IBM decided to change our continuous planning approach to target setting, in the past, we used something referred to as demand-based planning. This involved analyzing, evaluating and projecting the future requirements of users within an IT environment. It is basically an IT supply-chain management model to help IT administrators and managers to predict what IT resources will be needed to meet the demand. It meant going out and talking to the teams and in the process, they request all the funding that they think they are going to need or not. This includes not only their base spending, but anything else that is part of their transform spending, perhaps in the middle of a business case, or new work that they are starting to kick off. However, due to the cast-in-stone nature of this approach, the demand-based planning model is not supported by changed spending trends or exit rates and carries with it significantly higher amounts of planning workload. It also drives additional work in developing roadmaps to close gaps. Another notable disadvantage was demand-based planning or the bottoms up approach model encouraged teams to come forward and ask for materially more money than they actually can spend or need to spend. More importantly, there is little or no flexibility for teams running on tight budgets to purchase new technology, scale up and expand operations as a direct result of the changing circumstances of the business. However, Continuous Domain targeting helps us to be a little bit more flexible with the changing business needs. What we did this fall, was to switch to this model which is based on the exit rate. So, based on our fourth quarter (4Q) target and what we already knew was part of each team’s baseline spending, we took the targets from there and then projected them forward. This changed approach provides a more realistic updated view of what the teams really think they are going to spend and gives managers greater financial control of projects throughout the year, regardless of how these are executed. The target model approach also gives the Chief Information Officer (CIO) better headlights into spending and facilitates improved prioritization and optimization.Before IBM decided to change our continuous planning approach to target setting, in the past, we used something referred to as demand-based planning. This involved analyzing, evaluating and projecting the future requirements of users within an IT environment. It is basically an IT supply-chain management model to help IT administrators and managers to predict what IT resources will be needed to meet the demand. It meant going out and talking to the teams and in the process, they request all the funding that they think they are going to need or not. This includes not only their base spending, but anything else that is part of their transform spending, perhaps in the middle of a business case, or new work that they are starting to kick off. However, due to the cast-in-stone nature of this approach, the demand-based planning model is not supported by changed spending trends or exit rates and carries with it significantly higher amounts of planning workload. It also drives additional work in developing roadmaps to close gaps. Another notable disadvantage was demand-based planning or the bottoms up approach model encouraged teams to come forward and ask for materially more money than they actually can spend or need to spend. More importantly, there is little or no flexibility for teams running on tight budgets to purchase new technology, scale up and expand operations as a direct result of the changing circumstances of the business. However, Continuous Domain targeting helps us to be a little bit more flexible with the changing business needs. What we did this fall, was to switch to this model which is based on the exit rate. So, based on our fourth quarter (4Q) target and what we already knew was part of each team’s baseline spending, we took the targets from there and then projected them forward. This changed approach provides a more realistic updated view of what the teams really think they are going to spend and gives managers greater financial control of projects throughout the year, regardless of how these are executed. The target model approach also gives the Chief Information Officer (CIO) better headlights into spending and facilitates improved prioritization and optimization.



Presented On: Mon May 3, 2021
Josh Burton , Director Global AV Services , VMware
Details (hide)

Executive Summary

 

Even before the Covid-19 pandemic outbreak and the subsequent restrictions on movement and physical contact, there has been a rising interest in how virtual reality (VR) can help enterprises re-imagine the workforce. As a trendsetter, VMware created the Virtual Reality Work Service Initiative. This is a merging of advanced 3D technologies with programs that meet the demands of a modern global enterprise workforce. The goals are many and include delivering immersive learning opportunities and improved visual storytelling. In a nutshell: the ability for colleagues to experience different office environments without needing a physical office and unparalleled flexibility for team collaboration.

 

The company has been researching this space for a while now.  This joint presentation with Jai Chen, our Product Manager for Augmented Virtuality (AV) Innovation, sums up some of the research we have been doing for about two years. But more importantly, it shares some of the things that we have learned together in the partnerships that we have made across the business, to make headway in this space. AV and VR are the two principal types of immersive technologies and share many of the same qualities. VR is an interactive, computer-generated depiction of a real or artificial world or activity while AR is a real-world view with additional, computer-generated enhancements.

 

Jai (who is wearing her headsets) is a gamer, so she loves the VR space. Together, we want to show you how we are leveraging VR to connect distributed teams.  We feel that it is going to be a space that really has a pivotal role in the future work environment.  We will talk about on-boarding and training and finally about how we are going to insert this technology into some workflows and cite some examples of leveraging VR across enterprise.

 

Today, much of the onboarding done by businesses requires new employees to go through the physical process of acquiring the knowledge, skills and behavior that would make them fit into the team. Obviously there is plenty of moving up and down as well as time and money spent in getting it done right. VR can change all that. We can create the appropriate experience, which provides the necessary information that can be communicated in an immersive 360-degree environment through video content, images and multiple types of interactions.

 

When applied to training, VR can create the circumstances in which employees can train and make mistakes safely without feeling unduly pressured. Instead of building expensive real-life scale models, you can design virtual environments and conduct various simulations to test your employees more frequently. Using an immersive simulation means the training becomes more practical and more cost-effective.

 

The VR experience opens up vast opportunities for business re-organization;  a chance to rethink how work is done as well as how businesses relate to and engage with their customers. When used as both a marketing and customer service tool, VR opens new possibilities for showcasing products and services. In the manufacturing industry, VR can also help with a wide range of factors notably increasing productivity, reducing training costs and increased availability of new products to market.

 

The research and development in VR lies squarely within VMware’s scope of business. The company is a leading dynamic global workforce of the future; one where people can work from any location that accelerates their productivity to deliver the most innovative solutions for their customers. The goal of enterprise VR is to offer participants a nonintrusive experience—one that comes as close to an in-person meeting as possible—from anywhere, such as a home office. However, there is a greater benefit beyond limitless locations—community. VR enables enterprise teams to socialize and interact as if they were together in a physical space, even more so than video conferencing. Remote members don’t feel like outsiders, and every participant has an equally satisfying experience that deepens relationships and accelerates productivity.



Presented On: Thu Sep 17, 2020
Carla Maier , VP Systems Programming , United Parcel Service
Details (hide)

Next Generation Compute Platform

(United Parcel Service IT Vision 2023)

 

Executive Summary

 

United Parcel Service, better known simply as UPS, is the world's largest package delivery company based out of Atlanta, Georgia with operations in 220 countries. Founded in 1907, the company prides itself as a premier provider of global supply chain solutions with the tagline: Customer First. People Led. Innovation Driven.

 

During 2020 and in the wake of the Covid-19 pandemic, UPS delivered 6.3 billion packages, on the back of a rise in global B2C volumes as a result of a surge in consumer e-commerce. Amazon is a major client.  UPS logistics services include transportation, distribution, contract logistics, ground freight, ocean freight, air freight, customs brokerage, insurance, and financing. The company manages a fleet of more than 500 planes and 100,000 vehicles, along with many hundreds of sorting facilities, to deliver an average of about 22 million packages daily to residences and businesses across the globe.

 

Due to the nature of the business and emphasis on speed and reliability, UPS has several automated processes along with other applications that for instance integrate tracking, rating and address validation and all done in a real time.  Investment in Information Technology has been a major contributing factor for greater efficiencies.

 

Carla Maier, the Director of Cloud Platforms and Technology at UPS oversees the public cloud strategy, the PCDM (Public Cloud Design Management) group and the private cloud remote operating environment with the extension of the private cloud, Linux systems, managing file transfer and the UPS container platform.

 

The company is now in the process of gearing up its IT operations to the Next Generation Compute Platform and implementation is already underway. The UPS IT 2023 Vision envisages an organization that is agile, customer-focused, curiously innovative, technical and diverse to become an inclusive group that enables the Smart Logistics Network. It will solve complex business problems, deliver business value and support the growth of the enterprise in a secure, compliant and ethical way.



Presented On: Tue Sep 22, 2020
Lori Powers , VP Head of NA Industry Operations , Atos
Details (hide)

Executive Summary

 

The concept of an operating model can be defined as a new way of running an organization that combines digital technologies and operations capabilities in an integrated, well-sequenced way to achieve improvements in revenues, customer experience and costs. This requires that an organization undergoes a transformation and that means changes have to be made.  

 

Mention the word ‘change’ and for most people, it triggers off alarm bells, creating an uneasy sense of fuzziness about the future. In this presentation, Human Considerations during Operating Model Changes, we are going to Un-fuzzy the future. It relates to my experience with trying to get change through an organization. Change is hard-- we all know that.  People get sort of set in their ways. They have a comfortableness with the status quo and getting a team, a large team, to address change and to jump on board, is hard.

 

For the purposes of this presentation, we will begin by appreciating the importance of learning from history then tackle the psychology of change and the need for switching mindsets. In the second part, we discuss organizational culture; the values and beliefs that define an organization and why it is not easy to rid people of the common disclaimer, ‘we’ve always done it this way’. Finally, we end with what is involved in the Framework for Organizational Change Management (OCM) Strategy.



Presented On: Mon Feb 24, 2020
Charly Paelinck , CIO , Affinity Gaming
Details (hide)

Executive Summary

 

Organizations use the Enterprise Resource Planning (ERP) software solution to manage day-to-day business activities such as accounting, human resources, procurement, project management, risk management, compliance and supply-chain operations. The Cloud ERP system runs on a vendor's cloud platform as opposed to an on-premises network, allowing organizations to access these packages over the internet.

 

Charly Paelinck, the Chief Information Officer (CIO) at Station Casinos, has gone through the implementation of six ERPs and freely admits each one of them has been a ‘horrible’ experience. In his own words: “By the time I am done, it feels like I’m worn out, the organization is worn out, everybody hates each other, we can’t remember why we did it and then like six months afterwards, we are kind of glad we did it and we slowly start forgiving each other. And that is what they have all gone like. And I swore these would go differently and it hasn’t. I thought I would walk you through the mistakes I have made and the very few things I still believe in.”

 

‘The 6th Dance’ is a case study of those mistakes, largely brought on by a lack of full participation from those who should be the most invested in the successful outcome of the projects. Without first establishing clear project direction, scope and structures, the chances of later encountering significant problems can only increase exponentially which is what happened here. It also highlights the fact that every implementation comes with its own distinct problems; another reminder that there is no such thing as one-size-fits-for-all. Each implementation is like dancing to a new tune.



Presented On: Mon Feb 24, 2020
Farhan Shah , VantageRisk
Details (hide)

 

Executive Summary

 

When a company chooses transformation into cloud computing to enjoy a more exhilarating operating experience, keeping costs down at every step of the way is an overarching consideration.

 

That exhilaration is something like taking an elixir, defined as a magical potion that prolongs life indefinitely, adding some zip in computing that was perhaps absent before. Farhan Shah founded Elixr.ai to offer this experience to Digital Workforces that adopt Progressive Cloud and Financial Controllership.

 

Moving company applications and data to cloud platforms presents a huge challenge, the bigger the company the more complicated the task. You don’t want to lose anything in the process or find yourself hamstrung by vital applications being suddenly inaccessible. A progressive cloud framework is the best way to structure a cloud security evolution program and ensure data in cloud is properly secured. By progressively moving into cloud rather than making one big jump has proven to be a more effective way for companies to reduce their transformation budgets.

 

However, money is best spent when you know exactly what you want. Although the company CFO has to come up with the financing, the final decision to adopt cloud has to arise from a consensus about the cost benefits envisioned across the board. Everybody has to be in sync. Granted, you can bring in cloud, but then find all you are doing is moving the cost from a depreciated capital expense account to pure expense and at that point you are actually paying more.

 

Supported by input from the CTO and the CIO, the CFO has to embrace the cost benefit analysis (CBA) so that everybody gets it and avoid a situation of moving money from the right pocket to the left pocket, with nothing tangible being gained or accomplished from the transformation.

 

The bottom line is that in order for private cloud, public cloud or legacy to work one has to step back and come back with an altogether new series of architecture for the company. Top management has to ask itself: where exactly is the business going, then work backwards to develop a target state architecture, engineering architecture, security architecture and data architecture and then below that the hybrid cloud. The hybrid cloud would be a mixture of computing, storage and services made up of on-premises infrastructure, private cloud services and a public cloud.

 

A Progressive Cloud and Financial Controllership approach needs a clear-cut plan so that you can implement a transformation that fits the purpose rather than merely going into cloud just for the sake of it.



Presented On: Mon Sep 23, 2019
Herb Hofmann , Vice President , Loews Corporation
Shanth Subbiah , Senior Manager, Business Solutions , Loews Corporation
Details (hide)

 

 

Executive Summary

 

Loews Corporation is one of the largest diversified companies in the United States, with businesses in the insurance, energy, hospitality and packaging industries. Loews is focused on long-term value creation for its shareholders underlined by conservative financial management.

 

After an extensive process of due diligence around the future state of IT at Loews, in early 2018, the Loews executive committee accepted a proposal to adopt Cloud First as a basis for a full IT transformation of company operations. Server consolidation to a cloud system was seen as key in achieving this objective. However, in order to guarantee maximum positive impact and gain greater efficiencies, the transformation had to be simultaneous, taking in changes to people, process, software applications and infrastructure. Herb Hofmann, Vice President of Information Technology, was given the lead on the project. He was assisted by Shanth Subbiah, Senior Manager Business Solutions, the rest of the IT Leadership team and - other outside consultants. The executive committee had only one question: can it be done? Hofmann said yes.

 

Top on the agenda was to collaborate, conceive delivery support and reliable technology solutions to maximize Loews’ investments through operational excellence. Change is frequently disruptive. The IT department were consistently open and honest throughout the transformation process. Credit also goes to the Loews HR department and the close working relationship it had with the IT team at every step of the way. This helped ease tensions during the subsequent months of the conversion.

 

Today, all company applications needs are sourced from Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) cloud providers. Overhead costs have also been reduced by introduction of the Bring Your Own Device (BYOD) concept which has improved both worker mobility and productivity. The functions of the company’s data center were also moved to the cloud.

 

Loews is a fundamentally different company from that of 2018. The impact of adopting Cloud First has been that Loews is a leaner, more agile and responsive business, more able to optimize emerging investment opportunities and enhance the bottom line of those subsidiaries already on board.



Presented On: Thu Sep 26, 2019
Juan Alcala , VMware
Details (hide)

Executive Summary

 

VMware is a US-based service provider for cloud computing and virtualization. The company focuses on streamlining the journey for organizations to become digital businesses that deliver better experiences to their customers and empower employees to do their best work. The software product range spans App Modernization, Cloud, Networking and Security in addition to Digital Workspace.

 

The CEO sets out the top priorities for the company and the company aligns itself with those priorities. From time to time, there are some Research and Development (R&D) priorities that the IT department gets involved in; either setting up product or developing new platforms as a result of Mergers and Acquisitions (M&A’s).  For a fast-paced business-like VMware, tracking your spending and seeing where the money is actually going is critical, because it allows you to judge whether it is being spent wisely or not.

 

The main goal of IT financial management (ITFM) is providing an organization with an accurate and complete view of spending for all IT resources. ITFM is based on traditional enterprise financial and accounting best practices to ensure compliance, such as mandating documentation of expenses and requiring regular audits and reports. However, ITFM methods and practices are adapted to address the particular requirements of managing IT assets and resources. At VMware, IT plays a pivotal role. During any planning phase for new investments or priorities, the IT department is closely involved because it is crucial to know how the stated objectives affect the capacity of IT to deliver the desired outcomes.



Presented On: Fri Sep 27, 2019
Details (hide)

 

 

Understanding all underlying IT costs and effectively applying cost recovery methods tends to be daunting from both organizational and practical standpoints. Spend Management in IT is another area, which most running companies eventually run across. Organizations that come across a scaling problem struggle to keep a dual management system that focuses equally on running the current tasks and launching new projects.

 

For instance, if a business is spending 80% of its resources on the day-to-day tasks of generating products, serving customers, etc; may not have enough resources to start new projects. Or they might focus on bringing a change by introducing new components of the business or improving older modules; in such a case, the existing business may suffer as it gets side-tracked. It is quite a vicious cycle.

 

The concept of Run and Change is not essentially a new approach to managing the two verticals as a business. However, its popularity and efficiency remain fresh for many companies. The concept of run and change is so highly desirable because it is simple, universally applicable, and still highly effective. Very briefly, the concept suggests that all activities in a company should be divided into two principal components of Run and Change. Run, which refers to the day-to-day, planned business activities, and daily operations underlying transparent processes. On the other hand, change refers to new projects and working with uncertainties or the lack of information.

 

By studying the run and change model and the best practices of cost recovery as well as spend management used by global and leading company Chubb IT, organizations can get a better idea of the real-world applications and the nuances associated with financial management and fostering the dual-track management system of Run and change. Aligning relevant practices of spend management with different allocation methodologies, the right structure of governance, and stakeholder relationships, spend management software tools can offer a foundation for any organization to forge its own spend management strategies. It often comes down to the executive table to drive the decisions of the IT company and not the business driving the decisions of the stakeholders. It is often more about searching for the right amount of complexity and simplicity, reinforcing control at the level of the organization and the business with clear underlying principles. Additionally, maintaining basic concepts of negotiating for resources, structuring solid business cases, withholding the right structure of stakeholders, worker productivity, upgrading spend management, and allocation tools must be respected in a viable IT finance management strategy that an organization may embrace.



Presented On: Thu Sep 26, 2019
Details (hide)

Executive Summary

 

This report is focused on a healthcare organization in operation today.  As the teams manage and plan their capital projects, they are working to create the next generation of medical office buildings.  Rather than mere buildings, however, this is being planned with overall company strategy and vision in mind: to redefine and evolve the healthcare delivery system to a patient-centric, efficient, integrated experience.  Technology is at the core of many of these efforts, and building in the technology infrastructure as a central part of these facilities is only the beginning.  By analyzing what this company is doing, other organizations can learn valuable lessons about the factors and considerations that go into successful planning for their own capital projects, especially from an IT and IT finance standpoint.



Presented On: Thu Jun 20, 2019
Details (hide)

Executive Summary

 

IT budgeting has always been something of a challenge.  Setting up a standardized structure and method of cost reporting and accounting is one of the core functions of a modern IT finance organization.  Making a budget useful and valuable, instead of a chore, is an entirely different level of challenge.  Done correctly, however, it can provide valuable insights, savings opportunities, efficiencies – and ultimately lead to better business success – for your organization.  Following some core principles for streamlining the IT budget process, based on the experience of some of the largest IT-driven companies around today, provides an excellent model that you can adapt and deploy for your business. 

 

Respecting that every company is different, and their structure, existing processes, and related details can vary considerably, it’s not useful to prescribe a one-size-fits-all approach.  Rather, stressing key principles that lead to better budgets is seen as the best approach.  These principles include setting a budgeting timeline; developing processes that respect and build on existing architecture and organization; projecting and managing both run and growth or transformation initiative portions of an IT budget; an understanding of different major categories and approaches to budgeting that can come into play, such as project-based portions, operating expense portions, and so on; the need for training, tools, and documentation to make things run smoothly; and an ingrained concept in the organization that budgeting is an ongoing management process, and not a “once-and-done” each year exercise. 

 

By successfully adapting these principles to your IT and IT finance organization, to the extent practicable for your business, you can arrive at more accurate, better budgets, in a more standardized way, with good quality data and stakeholders invested in the outcome of the process.  Ultimately, that leads to realizing all of the financial, planning, governance, managerial, efficiency, opportunity, competitive, and personnel-related benefits that derive from a streamlined IT budgeting process. 



Presented On: Thu Jun 20, 2019
Jerry Wong , Executive Director of Finance , Kaiser Permanente
Details (hide)

Executive Summary

 

Many organizations are receiving a push, or multiple pushes, whether from senior management or line employees, to move as much of their IT portfolio as possible into the cloud or ‘as a service’ model.  While there are definite benefits that can be realized by doing so, any decision to migrate any portion of your portfolio should be based on sound business and financial rationales.  Proper analysis of the cost and benefits that can be provided to your organization, and whether or not such a move would be appropriate, is the only way to justify such a move, and, consequently, to realize the maximum potential benefits for your organization and stakeholders.  Looking at the cost, flexibility, and performance implications, as well as the short- and long-term financial implications of such a move, will enable IT and IT finance professionals to avoid jumping on the bandwagon for its own sake, and best position them to reap the cost savings, efficiencies, and increased capabilities associated with a move to the ‘anything as a service’ paradigm. 



Presented On: Thu Sep 26, 2019
Dawn Fowx , CIO Controller , IBM
Details (hide)

Software as a service (SaaS) has rapidly overtaken traditional software licensing and purchasing to dominate the software costs of most companies today.  Yet, like traditional software purchasing, it can be a challenge to bill out and allocate costs to the relevant business units within your organization.  SaaS has made this a bit easier in some respect, with a greater level of granular detail available on usage for most products and platforms.  Still, a coherent SaaS billing strategy is needed within the IT finance organization or CIO’s office, in order to align spending and billing with overall corporate objectives and principles.

 

By studying the SaaS billing methodology and associated principles used by world-leading tech company IBM, organizations can get a better sense of the real-world applications and considerations associated with SaaS billing.  This is often more helpful to studying purely theoretical or hypothetical frameworks.  Aligning the relevant types of SaaS agreements with the appropriate billing methodology, along with understanding the pros and cons and role of each of three primary methodologies themselves, can provide the foundation for any organization to craft their own SaaS billing strategy.  It often comes down to searching for a balance between simplicity and complexity, organization-level and business-unit-level control, and aligning responsibility and transparency with core organizational principles.  Additionally, basic concepts like negotiating power/economies of scale, worker productivity, and managing overall budgets and spending must be respected in any viable SaaS billing strategy that an organization may adopt



Presented On: Tue Feb 26, 2019
Brian Smith , Vice President , Akamai Technologies
Details (hide)


The industry-wide transformation to a Software as a Service ( SaaS) model means it is more important than ever to break down the traditional silos and barriers between development and operations (service/delivery) personnel in IT organizations.  By adopting a Production Readiness Program, VMware has created a means by which teams can gauge the maturity and production readiness of their service, working together to achieve better results.  Bridging the gap between development and operations can be achieved with this or similar processes, built upon a harmonized “build and operate” model.  Self-assessment, the development of KPIs and metrics, increased transparency and visibility, honest self-reflection, and greater cross-functional communication are the results of the process, and ultimately feed into ensuring the best-case outcomes for development and operations teams, with tangible quality, time, and cost savings in the long-term as a result.  



Presented On: Tue Feb 25, 2020
TJ Shembekar , Director,IBM Global Financing IT , Merative
Details (hide)

 Application Modernization  

TJ Shembekar, Director, IBM Global Financing IT

 

Executive Summary

 

The thought of modernizing a portfolio of dozens of legacy applications can be quite daunting.  Many major IT organizations are faced with just such a challenge.  With proper business buy-in, some planning, and a good theoretical framework, however, the process of application modernization does not need to be onerous.  In fact, it can provide significant benefits to the business, both from an IT perspective and end user perspective.  Relying on hybrid cloud, containerized application models is key.  Decomposing existing mainframes into APIs and microservices, and removing user interaction from the mainframes directly, are equally important.  Developing a strategic plan and priority list, with input from your IT teams, is often the best approach.  If properly executed, these efforts can yield substantially increased system resiliency, improved uptime, zero downtime maintenance windows, greater development and deployment cycle speed, and increased flexibility in capabilities and feature enhancements, all leading to improved business performance and results.

 

This effort was recently started at IBM Global Financing, which we will examine as a case study in the principles of application modernization, and how they can be applied with today’s existing technology and systems architecture.  



Presented On: Thu Jun 21, 2018
Details (hide)

Executive Summary

 

Security and risk management play a disproportionately large role in the IT expenses of many organizations today.  They present meaningful and real challenges for IT professionals and businesses as a whole.  The current model that exists in many organizations is one of an ever-increasing security expense – as new challenges and threats emerge, more money and more personnel to combat them are required.  This model is unsustainable in the long term.

 

Rather, the best approach is to strike a meaningful balance between security and risk management on the one side, and expenses and budgets on the other.  This means a comprehensive dialogue needs to take place, with good communication among all the relevant stakeholder groups.  Senior management, boards of directors, and shareholders need to be able to understand the risks, and provide guidance as to what level of risk is acceptable, and what risks must absolutely be mitigated.  IT professionals need to work with business units or sectors to understand their challenges, and ways in which the risks associated with doing business can be reduced or eliminated.  At the same time, the people element cannot be neglected, and sufficient, well-trained personnel need to be developed to understand, identify, and combat emerging threats and security risks.

 

Ultimately, security needs to be a part of overall investment strategy and decision-making.  Many of the trends that exist in the IT industry today present security challenges – the move to cloud storage, infrastructure-as-a-service, software-as-a-service, and so on.  But these challenges can also be excellent opportunities to build in additional security and mitigate risk for your company or organization.  Security and risk management needs to be a comprehensive part of all aspects of IT and business decision-making, and encompasses everything from architecture to regulatory/compliance policies to software and application purchase decisions.  This, too, is how risk can be managed, without exploding security expenses and budgets. 

 

Finding efficiency and value stems from defining and understanding risks, communication with all stakeholders, and determining actions, policies, purchases, and investments that can help reduce or eliminate risks, while providing and improving stakeholder experiences, system functionality, and capabilities.  This holds true with new and emerging technologies as well, which hold great promise for improved security and risk management, but also introduce new and unforeseen risks at the same time.  Balance is about weighing risk against reward, or expense against likelihood and effect, to find an optimal harmony.  You will never mitigate all risk, and there will always be risk that is unforeseen.  As an IT professional, the goal is to mitigate as much risk as possible, manage the risk that cannot be mitigated, and do so for the least amount of security-specific expense possible, without creating unnecessary burdens, policies, or hurdles for business units to succeed. 



Presented On: Thu Feb 28, 2019
Brad Gibson , Vice President , IBM
Details (hide)

 One of the classic challenges for IT finance is to manage the investment portfolio, particularly with regard to making the best choices and decisions, accurately forecasting and projecting benefits and costs over the long term, and adjusting or course-correcting based on results.  There are many different ways to approach this task, from a highly distributed business unit-level led and owned responsibility, up to a centralized, enterprise-wide management process and responsibility.  The latter has been extremely beneficial as the end state of a decade-long transition at IBM, allowing the company to realize significant cost savings and efficiencies.  The processes that have been utilized, and the principles underlying them, can easily be extended to apply to other organizations, including those of varying size and operational structures.  Implementing business case evaluation processes with associated tool support, securing consistently provided inputs and metrics from both the CIO and business organization stakeholders, and complementing that with a robust, ongoing process to manage, monitor, and adjust those investments will optimize decision making and enterprise wide financial returns.



Presented On: Fri Jun 22, 2018
Jennifer Bishop , United Parcel Service
Details (hide)

 Public vs. Private Cloud Hosting Analysis

Jennifer Bishop, UPS

 

Executive Summary

 

The current trends in the IT world are for companies to shift their mainframe or cloud hosting operations from in-house or private data centers to public hosting options.  The primary benefit of this trend of infrastructure as a service (IaaS) is supposedly financial, with a lower overall cost to the organization than when handled in-house/privately.  But is this true?  Companies should periodically refresh their run rates regardless, and through that process, can develop metrics and data to validate or inform their public vs. private cloud hosting decisions. 

 

While every organization is different, accurate accounting of costs, and allocation of those costs to appropriate applications or user groups, is essential.  Refreshing rates and re-examining cost models can help ensure the accuracy of this data.  From that, changes in system utilization and lifecycle amortization can be developed, alongside a shift to more accurate means of measuring infrastructure usage.  This data is essential for providing the basis and incentive for applications and user groups to right-size their usage.  It also forms the basis of developing cost packages that can be aligned with the offerings of outside, public hosting services, in order to complete meaningful comparisons.  This will ultimately provide the verdict on the public vs. private cloud hosting decision for your unique organization.  



Presented On: Tue Feb 27, 2018
Steven Draeger , VP and CFO, IT , Kaiser Permanente
Details (hide)

 Executive Summary

 

Kaiser Permanente, like many large organizations, is incredibly complex.  The structural, financial, and regulatory complexities translate into higher costs and greater challenge for IT expense management, and squaring the IT and business viewpoints.  The mission-critical nature of health care and related industries is also a challenge for associated IT organizations, both due to the heavy influence of legacy systems and the can’t-fail, always-on nature of much of the IT infrastructure.  This can ultimately lead to a great deal of pressure between the IT side and business side in these types of companies.

 

However, efficient and effective collaboration can be achieved.  First, IT needs to develop a strong partnership with finance.  This is especially important in complex organizations, due to many layers of structure and somewhat obscured financial controls, leaving the IT department both responsible, and at the same time not entirely responsible, for their spending.  Then, finance can serve as an intermediary, acting as an educator of both the business side with regards to costs, and the IT side with regards to business benefits.  Ultimately, this can create the kind of IT, finance, and business collaboration necessary to control IT spending and make decisions that are in the best interest of the company as a whole.  By engaging the business side in some responsibility for IT cost management, it creates a vested interest in seeing IT spend being effectively deployed. 

 

Once everyone is on the same page, projects and purchases can be evaluated as a group, with an open dialogue between IT, finance, and the business units.  This dialogue extends upward through senior management as well, incorporating the overall plans, strategies, and objectives of the company as a whole.  Through manipulating levers on the overall curve governing cost – complexity, investment, rates, and volume – the group can collectively find the solutions that optimize results at the lowest possible costs.  But it all starts with a solid relationship between IT and finance, and an understanding of the cost drivers of the organization.  Through management of procurement, business discipline, and better planning, the IT-finance and business relationship can ultimately serve as the vehicle for realizing cost savings, reducing or containing IT expenses, and making the best, data-driven decisions on IT solutions that meet business needs without breaking the bank.



Presented On: Mon Jun 17, 2019
Charly Paelinck , CIO , Affinity Gaming
Details (hide)

 Transitioning to an Agile environment is a challenging proposition for many IT development organizations. However, in today’s world, many companies see it as a necessary change. Provided that there is a sound rationale for doing so, a transition to Agile can unlock increased productivity, better teamwork, streamlined funding, happier employees, and better overall organizational results. The transition process itself can be difficult, however, with increased employee turnover, decreased productivity in the short term, and employees who struggle with finding their roles in the new structure.

Many of these challenges can be overcome, or at least made less significant, by drawing on the experiences of organizations that have already made the transition to Agile. Ensuring that senior management is fully committed to the transition and making it work is the first step. Developing and refining a team structure, and the various layers or cross-functional groups within the structure, sets the foundation to move forward. Communication is a key part of managing the transition, including coaching and mentoring. Business team buy-in and participation is also critical, as it necessarily defines milestones and work tasks as the organization moves from a project-centric development philosophy to a program-centric one. Expect trouble and difficulties in the short-term, but continue on the path, and seek periodic feedback from employees.
In the long-term, most organizations that make the shift to Agile methodology realize numerous benefits, and come out of the process stronger and better than when they went in.


Presented On: Mon Feb 25, 2019
Timothy Jackson , CIO , Diamond Offshore Drilling
Details (hide)

Data Analytics and AI

Tim Jackson, CIO, Diamond Offshore Drilling

 

Executive Summary

 

The 2010s have been a period of dramatic change for a lot of businesses and industries, particularly those that have flourished in an analog, mechanical world for quite a long time.  Transitioning these companies to a data-driven business model, and properly leveraging the data that your business creates, can make the difference between success and failure in this environment, and position your business for success in the future as well.  This can be accomplished in many ways, with the underlying goal being to streamline and gather data, put it together in a coherent way where it can be analyzed and managed, developing tools to provide visibility and monitoring for decision-makers, defining KPIs and adopting Lean or similar methodologies for operational improvements, and embracing the possibilities presented by artificial intelligence.

 

In this report, we’ll take a closer look at how data analytics and AI are being used to transform an example business, Diamond Offshore Drilling.  Specifically, we’ll look at three key initiatives that are part of the data transformation of the company – risk-based asset management, operational improvements, and data analytics – and how they provide meaningful lessons that other IT professionals can apply in their businesses and markets.  We’ll also review the logical extension of these efforts into the predictive technology and capabilities available with AI and machine learning, and discuss some of the challenges and problems that still need to be overcome in this emerging yet critical part of modern business IT today.  



Presented On: Thu Sep 27, 2018
William Miller , Chief Information Officer , NetApp
Details (hide)

NetApp’s Embrace of Current Trends in IT; a CIO-Practitioners Point of View

 

Bill Miller, SVP and CIO, NetApp

 

Executive Summary

 

The present era across the IT industry is one of immense change.  There are numerous trends taking place that will doubtless make or break many IT organizations and IT-enabled businesses over the next several years.  In order to be successful, it’s critical that IT professionals fully comprehend these trends, and develop insights into how their peers within the IT world are addressing them.  These insights will provide the critical information needed to develop a plan for your organization to capitalize on these trends; not only to survive, but to fully thrive.  In this context, we’ll look specifically at how one major technology player in the data management industry, NetApp Corporation, embraces these current trends, and how that company is leveraging them for their business.  Specifically, we’ll consider challenges that most IT organizations struggle with, including application portfolio management and rationalization, the rise and potential of AI and Machine Learning, Automation, and the rapid shift towards Next Generation Data Centers. The data center of the future comprises a mix of public hyperscaler clouds and private clouds that will dominate the way we operate into the 2020s. More importantly, according to the NetApp CIO, in the data center of the future, there is no center of data. 



Presented On: Thu Sep 28, 2017
Brad Gibson , Vice President , IBM
Details (hide)

-          * Image from Gibson PPT (Slide 6)

-          ** Slide 10

Topics:

·         IBM Spending Charging Methodology Overview

·         “Local” IT Spending Charging Methodology

·         Application Development and Maintenance – Application Services

·         Infrastructure and Provisioning Service Delivery

·         New Service Design 



Presented On: Mon Sep 24, 2018
Brian Smith , Vice President , Akamai Technologies
Details (hide)

 Executive Summary

The DevOps approach to development and operations has been gaining more and more traction in
the last decade. This runs counter to the traditionally separate groups (and even further segregated
departments) within most development organizations. A transition to DevOps can be a challenge
for any company, but it is doable, and can provide numerous benefits as a result. VMWare has
underwent this kind of transition in the past few years, and are now starting to reap the rewards.
By studying what they did, and how they did it, we can examine the principles of DevOps, and more
clearly illuminate the path that other IT companies may take to embrace DevOps methodology.


Presented On: Thu Jun 28, 2018
Harold Bolton , Global Director IT Vendor Management , United Parcel Service
Details (hide)

 

Executive Summary
In the current global business environment, outsourcing is a common solution for many businesses and their technology needs. With regard to outsourcing professional services in the IT realm, there are a number of different strategies that can be used. However, many companies fail to have a comprehensive strategy in place for their outsourcing at all, or use an oversimplified mantra like “save money.” For outsourcing to be effective, a robust program of strategy, communication, monitoring, measuring, feedback, and translating business and IT goals is necessary. In short, an outsourcing vendor management team or organization is what is needed.
There are many things for an outsourcing vendor management organization to consider, including the different types of outsourcing vendors that are available, different tiers of expertise, the added value or competitive advantage that certain vendors can provide, growing long-term partnerships with the best vendors, holding vendors (and internal stakeholders) accountable for monitoring performance, giving feedback, and adjusting spending accordingly, and ultimately making the right pairings between projects and vendors to ensure the organization’s needs are met. This can be a complicated task, but it is essential to get the most value out of any kind of outsourcing scheme, and to ensure that the right incentives are driving vendor selection decisions and outsourcing decisions for the business.


Presented On: Mon Sep 24, 2018
Michael Brady , CIO , Wells Fargo
Details (hide)

 Developing the Right Cloud Model for Your Business

Mike Brady, CTO and Transformative Technology Executive

 

Executive Summary

 

Cloud hosting is rapidly becoming the de facto standard for businesses today.  The traditional IT model has become obsolete.  But many businesses are unsure as to how to move to the cloud, what steps they should take to prepare, and what cloud solution is right for their business.  This can be a challenging and daunting task, even for the most well-resourced and knowledgeable IT leadership.  Finding the right model or mix of cloud hosting styles, along with the right host, can make or break the transition process.  It can have a profoundly negative effect on your business if you get it wrong, and a correspondingly positive effect on your business if you get it right.  It all relies on developing a vision for cloud hosting in your business, and determining the destination for your IT organization.  This can be accomplished through several logical steps and tasks, which will ultimately make the process of finding the ideal cloud options to fit your needs easier to handle, and will help ensure a positive outcome.



Presented On: Mon Jun 18, 2018
Crystal Lister , Cognito
David Reber , Frame Public Sector
Details (hide)

The modern digital world is full of threats of every shape, size, vector, and type.  Businesses and organizations, and particularly the IT groups within businesses and organizations, need to guard against threats from both outside and inside.  Too often, insider threat risks are overlooked, until a major negative event occurs.  Rather than being reactive, a pro-active approach to managing and dealing with insider threat risks is much more effective.  Establishing some clear definitions of who insiders are, and what the threats are, is a necessary first step.  Addressing the four main buckets of insider threat risks – those from people, physical, process, and technology categories – is the next way to mitigate or prevent disaster from happening.  You’ll also need to address things like complexity (and trying to remove it where possible), analyze the risks from emerging technologies, and make meaningful changes to your organization’s culture in order to effectively guard against insider threats.  Finally, you need to know how to develop metrics with regard to insider threat risk, and use those metrics and other efforts to advocate for funding, training, and resources for your organization, to make the never-ending fight against threats of all types into one you can reasonably have a chance of winning.  



Presented On: Fri Sep 28, 2018
Details (hide)
The IMF is the best source for unbiased shared information in IT. We provide the highest quality personal service for a group of select members and work to be the best value in their IT budget.
Executive Summary
A shift has begun to take place, from the statement of work (SoW) approach to software development in many complex organizations, to an order of work, or stable team approach. Rather than everything being driven and deriving from the SoWs from the business units, the stable team approach creates capacity within the software development team to then manage and tackle the work projects created by the business units. On the surface, this may not sound like a major change, but structurally and financially, it’s a huge shift. It offers numerous benefits and advantages, including greater work output and productivity, simplified accounting and budgeting, and greater control and alignment of enterprise capital spending with the overall organizational goals. It simplifies the process of organizing, planning, and executing projects and work for the development teams, and provides a more stable workflow, with the net result being that more work can get done for the same expense. Of course, this does require some shifts in the way the organization is structured and approaches software development. Incremental changes and adoption of stable teams for some portion of the business can be accomplished over a period of years, with the speed varying based on the ultimate level of stable team mix desired, and the maturity and complexity of the business with regard to its software development needs.


Presented On: Mon Jun 18, 2018
Larry Lidz , Cloud CISO , Cisco Systems, Inc.
Details (hide)
 
Executive Summary

IT controls and risk management go hand-in-hand. Regulated industries with state, federal, and other regulatory agency requirements and regular auditing require a well-documented and well-thought-out control scheme for IT processes. This can be accomplished by adopting a standard IT Process, Risk, and Control framework, and building out processes, procedures, and accountability to align with both regulatory requirements and business objectives. Effectively managing risk via IT controls also requires a definition and assignment of responsibility and accountability within the personnel structure of the different IT groups or functions that exist within the organization. Change and issue management, and an aggressive, defense-oriented posture on the part of IT management personnel can help ensure successful management and mitigation of any issues that may arise. This serves the overall purposes of decreasing audit issues, generating and preserving evidence, ensuring system integrity, financial and personal data security, and reducing overall IT risk for the business organization. 



Presented On: Mon Feb 26, 2018
William Miller , Chief Information Officer , NetApp
Details (hide)
There is an enormous sea of change happening in the area of IT infrastructure and architecture.  Current challenges and realities coupled with emerging trends, make it quite clear that a shift from traditional infrastructure to a hybrid cloud-based model is the direction for the majority of organizations. A hybrid cloud-based model provides numerous benefits in flexibility, scalability, efficiency, financial planning, and data utilization for meaningful, competitive advantages. The days of owning infrastructure, and even owning software and other traditional IT elements, are either over or rapidly coming to a close. Instead, the shift to a service-based model, that dovetails with the hybrid cloud model for infrastructure that will make up the next generation data centers. This model involves using hyper-scale cloud service providers for a majority of IT functions, coupled with

smaller, private cloud(s) for strategic and sensitive applications and data, with an overall move to approximately 90% of applications, storage, and computing power resting on the cloud in just a few years’ time. IT professionals can take advantage of these trends today by developing plans for their organization, to lead the infrastructure transition, and prepare for the architecture, application development, and service needs of the future infrastructure as a service, software as a service, and ultimately, IT as a service model. 



Presented On: Thu Feb 22, 2018
Details (hide)
The fourth quarter, and especially the last 6 weeks or so of the calendar year, you often see a massive uptick in IT investment and spending activity. This is usually the result of “found” money – money underspent to budget – and the “use it or lose it” mentality that plagues budgeting and finance. Many organizations have this problem, both in private sector and government arenas, and some elements of it are beyond control, short of a fundamental change in the way businesses operate across the board.
At the same time, looking at the facts surrounding this issue, it is clear that it is problematic – project quality and genuine ROI from projects procured in the fourth quarter tend to be far lower compared to the rest of the year. Additionally, the kind of unbridled spending that often characterizes the late fourth quarter runs contrary to the hard work and efforts of employees the rest of the year, in getting good deals, finding savings, and containing costs. So it’s clearly a problem that can use some solutions.

Fortunately, there are many things that IT finance and management professionals can do to combat this problem. Strong internal controls and governance, adjustment of contract expiry dates, minimum standards for procurement, robust vendor relationships for capacity, and a shift in how budgets vs. spending are managed, can all help reduce the impact of fourth-quarter investment activity. Likewise, innovative approaches such as allowing unspent funds to be “rolled over” into the next budget cycle can help reduce the “use it or lose it” incentive, and keep fourth quarter investment spending under control. 



Presented On: Mon Feb 26, 2018
Herb Hofmann , Vice President , Loews Corporation
Michael Sackler , Director, Business Solutions , Loews Corporation
Details (hide)

 Cyber risks have continued to increase over the last several years.  Many companies that were previously paying little attention to cyber security matters have begun to wake up to the fact that data breaches from malicious actors, or data loss from internal failures, can both be devastating events, costing millions of dollars, lost productivity, lost sales, lost shareholder value, lost reputation, and in the worst cases, even forcing companies into the grave.

 
Fortunately, all of these negatives can largely be prevented, through careful planning and risk management.  Integration of cyber risk management and IT functions with regard to risk into an overall risk management program within a company or organization is critical, especially in larger and more complex organizations.  There are many steps that can be taken, with executive management backing of IT, to ensure the most robust and secure environments for employees, without breaking the bank or IT budget.
 
At the same time, understanding the reasons for data breaches, and the avenues used, is one of the best ways to plan a reasonable defense and mitigate cyber risk.  Additionally, steps can be taken in terms of designing IT infrastructure, migration if the infrastructure to third parties such as hosting services, cloud storage, and similar, can all be used both as cost-saving and functional improvements, as well as security improvements.  
 
Working with employees to train them to be security aware, vetting third parties and vendors before giving them system access, and developing robust monitoring and reporting systems for network access are all important steps that can be taken to minimize cyber risk.  IT best practices are also important, to mitigate a commonly overlooked cyber risk – data loss or productivity loss due to equipment failures, insufficient redundant backups, or poorly implemented upgrades or migrations of software systems.  
 
Lastly, there are several risk management steps that can be taken on a regular basis to help ensure cyber risk is well-managed, including simulated attacks, penetration testing, tabletop exercises, and more.  The development of contingency plans is also extremely important, so that if the worst happens, employees know what to do, who to contact, and how to help contain and minimize any potential damage to the company.  Not all cyber risks can be prevented, but reducing the overall risk profile, and ensuring preparedness should the worst occur, is the best approach to dealing with cyber security and cyber risks in today’s digital environment.
 


Presented On: Mon Oct 16, 2017
Cindy Hallinan , CFO of IT , Freddie Mac
Details (hide)
The IT CFO plays a critical role in managing the IT and finance needs of an organization. Through successful relationships and communication, they can make or break the functioning of the IT department, the finance department, and the company as a whole. Understanding the role of the IT CFO, and how best to balance competing IT, finance, and business needs, along with that of other stakeholders, can realize tremendous improvements in the functioning of those departments and the business as a whole.
In simple terms, the IT CFO is responsible for enabling the success of the CIO and the broader IT department, and ensuring that proper finance and accounting rules with respect to IT finance are managed. Those basic responsibilities should inform the decision-making and tactics used in advancing the IT finance agenda. The relationships and communication channels between the IT CFO and CIO, as well as finance subordinates and their IT management counterparts, are critical to the smooth functioning and success or failure of the IT organization.
Clear responsibility and reporting structure are crucial to proper financial management. Absent direct approval responsibility for their accounts, it is impossible to hold an IT finance employee (or anyone, for that matter) accountable. Establishing those roles and responsibilities, and giving team members a sense of ownership is crucial to moving the IT finance organization forward. Additionally, minor changes and team building through everyday finance activities can help reinforce the mantra that IT succeeds or fails as one.
Trust and credibility are important traits for IT finance. Being accurate with forecasts, fiscally responsible with funds, and looking out for responsible corporate IT spending as a whole are all fundamental to building trust and demonstrating the credibility and value of IT finance.
Transparency is another key aspect of IT finance. Having a clear picture of the true costs of business, products, and services, and being able to liaise and communicate those clearly to decision-makers, is one of the primary functions of IT finance. Without transparency and clarity of how IT expenses are being billed and allocated, it’s difficult for decision-makers to understand the costs or make the best decisions about what the true needs of the business might be.
Communicating and building relationships with the business, as well as other CFOs and finance personnel within the company, are really key to smooth functioning and, ideally, cost savings. IT finance can be a valuable partner for the business side of things, but only if a relationship of trust and clear communication can be built. When business personnel understand costs and their impact, they often tend to start driving the “right” choices and behaviors themselves.
Finally, IT finance has a role to play in contract negotiations. Typically, it is a three-pronged team effort, with IT requesting what they need, procurement seeking out competitive quotes and negotiating the deal, and IT finance validating the terms, costs, vendor, and other details. In some ways, the IT CFO acts as a traffic cop in negotiations, to ensure everyone stays in their lane of responsibility, in order to ensure the best prices and results of the negotiations.
Overall, the pillars of good IT finance practices and a good IT CFO can be summed up in the common themes of relationships, communication, trust, credibility, and transparency. Those are the fundamental building blocks to IT finance success.
Content
In each issue, an industry leader discusses
a new topic, exclusively for IMF members.



Presented On: Mon Oct 16, 2017
Darryl Cleveland , VP of HR Corporate , Milliken & Company
Details (hide)

 Milliken is a large, privately-held manufacturing company based in the United States. Despite over 150 years of operation, in 2013, Milliken’s IT organization was in need of some serious improvement. Roles, responsibilities, promotions, and compensation were inconsistent, not competitive with the market, and there was a general lack of clarity, transparency, or accountability for employees. Management was also stymied, unable to plan skill coverage or new hire profiles. Turnover was a consistent problem, and there was growing frustration within the company’s IT organization. A careful plan of identifying and analyzing these problems, and IT management working with HR and employees to define roles and responsibilities, benchmark salary data against the broader market, and other activities, ultimately resulted in a complete turn-around of the IT organization in just 3 short years. While the experience may be unique to Milliken, there are easily-adapted lessons from this case study that can be applied to other IT organizations of any size or style.



Presented On: Thu Feb 22, 2018
Justin Kappers , VP of IT Engagement and Solutions , NetApp
Details (hide)

 Trends, fads, and hot spots are just as common in IT as they are in the rest of society. Understanding the trends of the past, trends of the present, and possible trends of the future is a challenge. However, studying this important topic, and the debates that rage within these trends, can better equip IT management and IT finance personnel to position themselves and their businesses for the best results and long-term success.

Looking at past trends, such as infrastructure growth, build vs. buy in software, and insourcing vs. outsourcing of talent and functions, can help explain more current trends, and hopefully teach lessons as to how seriously (or not) we should take trends in making our strategic IT planning decisions. However, some caution is needed, as trends have a tendency not to last, and to treat those who embrace them to the extremes very harshly, with violent snapback and compensation that can leave many organizations in tatters.
At the same time, analyzing current trends, including XaaS (‘X’ as a Service), employee mix, project funding sources and IT finance management, and robots and automation, can help IT finance and management better perform in the present, and make better bets on the future. There are no truly right or wrong answers as to how firmly to embrace these present trends. A good balance, and ensuring a sound business and IT finance case for any changes in operations, is usually the best bet.
Lastly, looking ahead to potential future trends can hopefully allow companies to get a leg-up on the competition, and make the right kinds of investments in their budgets, equipment, and personnel for the future. While no one can tell what the future holds, studying the past and present can be most instructive in helping to shape the potentials of the future.


Presented On: Mon Feb 26, 2018
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)

 Over the past century, the world has become more and more urbanized, with an almost endless migration from rural living to city living.  Different parts of the world have experienced this migration at different paces, with the developed world seeing the most massive shift, and the developing world poised to begin their journey along this same route.  This increase in urbanization presents a large number of challenges in the present and even more challenges as we move into the future.  Climate change, waste management, energy production, transportation and infrastructure, limited resources – the list of problems facing us as a species is large.  Current increases in urbanization have brought many of these problems to the forefront in cities around the world.  Continued urbanization and population growth could very well push some cities to the brink of collapse.  But this CAN be averted.  A fusion of technology and tech experts, innovation, private and public investment, engagement, political will, and intelligent planning can move us forward, not only by solving these problems, but by helping all of us to live healthier, more productive, happier, and ultimately better lives in the cities of tomorrow.



Presented On: Thu May 31, 2018
Details (hide)

 Vendor Selection and Strategy for Infrastructure as a Service is based on a

Connect Discussion. In this report, members share their experiences and insight regarding the choosing of and negotiation with an IaaS vendor, feedback on implementation time frames, initial costs and lessons learned along the way.


Presented On: Tue Jun 12, 2018
Details (hide)

 New Accounting Standards for Operating Leases is based on a Connect discussion.

The discussion of accounting standards is certainly a hot topic. The report outlines
how important your preparedness for these changes are. Members share their
ideas and what their possible strategies could be when this new standard takes
effect on January 1, 2019.


Presented On: Wed Jun 28, 2017
Daniel Couture , Chief Information Officer , UNICEF
Details (hide)

 Executive Summary

For more than 70 years, UNICEF has worked to improve the lives of children and their families. Even while championing the cause of making the world a better place for children, you also have to ensure your business is effective, efficient and achieves its goals. Daniel Couture, CIO at UNICEF, walks readers through the critical strategies and priorities, specifically in IT, that keep UNICEF growing and thriving in today’s ever changing technology landscape.


Presented On: Wed Jun 28, 2017
Mark Polansky , Managing Director , Korn/Ferry International
Details (hide)

 Senior technology executives need to be aware of best practices and attributes when searching for the best opportunity in the job market.  This report looks back at the role of CIO and its progression from the 1950’s through today.  Mark Polansky, Senior Client Partner in the Technology Officers Practice at Korn Ferry, highlights key factors in what makes today’s CIO successful, and what CEO’s search for in the hunt for top CIO recruitment.  



Presented On: Wed Sep 27, 2017
William Miller , Chief Information Officer , NetApp
Details (hide)

 In this report Bill Miller talks to us about the environment at NetApp specifically and in Silicon Valley, generally. It is a good read on where technology is moving from a manufacturer’s standpoint with most of the focus on the software. Bill also gives us a primer on CIOs and his perspective of the top five job requirements.

I hope you enjoy this report and share it with your peers.


Presented On: Mon Jun 26, 2017
Details (hide)

 Managing any company application portfolio can be a daunting task, but it is a critical one.  In the IMF Connect discussion,

several members discuss best practices for successfully overseeing the application inventory across platforms.



Presented On: Wed Jun 28, 2017
Sean Reilley , Vice President , IBM
Details (hide)

IBM is a company that has famously reinvented itself and turned around several times since their founding over a century ago. They appear to be in the midst of another outstanding turn around now. Moving a company of their scale with 380,000 employees in 177 countries must be extremely difficult but it is happening, and one key driver is the adaptation of Agile Processes. In this report, we cover Sean Reilley’s presentation from New York this summer on how IBM implemented Agile across the organization and the results of that strategy. 



Presented On: Tue Feb 28, 2017
John Kennedy , Senior Director , Kaiser Permanente
Details (hide)

Embracing the IT as a Service model offers many benefits and challenges.  It is typically delivered as a managed service with an IT services catalog and pricing associated with each catalog item.  IT Service providers focus on improving employee productivity, availability and profitability.  John Kennedy, Senior Director of Service Portfolio and Business Planning, Kaiser Permanente, elaborates on his own IT as a Service journey through the following Information Management Forum Report. 



Presented On: Tue Feb 28, 2017
Details (hide)

 In this report, our good friend Ralph Quarles shares his thoughts on IT security in a pragmatic and understandable way.  Ralph has 30 years as a cyber security expert, most recently in the Federal Intelligence community and currently with Wells Fargo. I think you will find his approach to the subject to be understandable and enlightening.



Presented On: Thu Sep 29, 2016
Harold Bolton , Global Director IT Vendor Management , United Parcel Service
Details (hide)

The IT Finance and Accounting Training is a report based on a presentation given by Harry Bolton at the ITFM Fall meeting in September 2016.  Harry and his team led an effort to train UPS IT experts on financial management strategies and components.  In this report Harry details the process, the goals, and the benefits of the training.  



Presented On: Fri Jun 17, 2016
Davind Maharaj , Vice President , McKesson
Details (hide)

The Reinvention of McKesson’s Remote Hosting Business is a report based on a presentation given by Davind Maharaj at an IMF Forum earlier this year. The Hosting and Strategy Services Department at McKesson has recently taken a different approach to remote hosting services. Davind Maharaj gives readers an inside look at the process of reinventing this sector. He also explains why the change needed to happen in regards to McKesson’s goals, culture and customers.  



Presented On: Thu Jun 16, 2016
Brian Parks , Director for IT Workforce Strategy , USAA
Details (hide)

Retaining Top IT Talent is a report based on a presentation from the 2016 IMF Information Summit in Atlanta, GA. Brian Parks, an IT Director in the IT Workforce Strategy Department at USAA, takes us through his new recruiting process step by step. He gives us insight to some of the challenges that arise when looking for new talent, as well as solutions for narrowing down the best possible candidates for the IT Department. Brian and his team have transformed their hiring process into an effective and efficient system. USAA’s IT workforce hires approximately 250 of the 500 new employees annually. Having a productive hiring process is essential in such an expanding comapany, and USAA’s new employees reflect very well on the hiring strategies recently implented by the IT Department. 



Presented On: Fri Feb 10, 2017
Brendan Woods , Travelers Corporation
Kyle Chagnon , Travelers Corporation
Details (hide)

IT Supplier Management and Governance is a report based on a presentation given by Brendan Woods and Kyle Chagnon at an IT Finance Managers meeting. Brendan and Kyle explain the strict, yet effective, supplier management structure at Travelers by sharing its framework. The model focuses heavily on supplier relationships and monitoring processes. Because of this framework, the supplier management division at Travelers was, is and continues to be successful. 



Presented On: Thu Feb 25, 2016
Brad Gibson , Vice President , IBM
Details (hide)

Deploying Agile and Measuring Throughput is a report based on a presentation given by Brad Gibson, Director of Finance and Operations at IBM, during the ITFM First Quarter Meeting in February. Brad explains the larger story behind IBM’s decision to transition fully to Agile and goes into detail when describing the logistics that come along with implementing significant changes.  



Presented On: Fri Oct 28, 2016
Details (hide)

Command Center Best Practices is based on an IMF Connect discussion between IMF members on strategies for organizing andmanaging domestic and global command centers. Members participating in this Connect discussed the fundamental make-up of their command centers and shared their insight on best practices, strategies and procedures. 



Presented On: Mon Oct 10, 2016
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Getting Ahead of the (Revenue) Curve is a report based on a presentation by Michael Bender, Chief of Staff to the CIO at VMware.In this report, Michael emphasizes the importance of IT’s role in revenue growth in the form of internally-made applications. He gives examples of innovations that both his company and others have created and explains the impact they have on businesses today. Michael reminds readers that building something for external users is a tactful strategy and has the potential to generate a large amount of IT revenue. 



Presented On: Thu Jun 2, 2016
Girish Israni , Controller, IT Infrastructure and Desktop , VMware
Details (hide)

Tech Bars: Are They Worth the Investment? is a report based on a presentation by Girish Israni, Controller in IT Infrastructure atVMware. Girish introduces the company’s newest workplace installation called the Oasis Center. This unqiue on-campus tech bar concept is revolutionizing the way VMware handles IT help desk mattres, including saving company time and increasing efficiency. 



Presented On: Thu Jun 16, 2016
David Lee , Hewlett-Packard
Details (hide)

SunTrust’s Innovation Programs is a report based on a presentation given by David Lee, Director ofInnovation Programs at SunTrust during the 2016 IMF Innovation Summit in Atlanta, GA. Mr. Lee shares how Innovation Programs aims to change culture and enables for all kinds of innovation to happen in every corner of the company. The team delivers a series of innovation contests, grassroots change programs and cultural exposure efforts to help people see the possibilities. Mr. Lee discusses why this model has been successful, examples of the efforts lead and lessons learned for future approaches.



Presented On: Thu Jun 16, 2016
Jennifer Pearce , BI Team Lead , Milliken & Company
Details (hide)

Use of Dashboards to Drive IT Performance is a report based on an IMF Summit Presentation by Jennifer Pearce,Business Intelligence Team Lead at Milliken & Co. In this report, Jennifer explains how dashboards are beneficial from both an IT and business perspective by breaking down the system into categories. She expands on these dashboard categories, which include IT projects & Help Desk, Internal Phishing, Health Checks and Licenses & Assets. Examining each of these dashboards individually shows just how much data can be shared and easily accessed within a large company. The development of modern data collection tools has benefitted Milliken in a number of ways.



Presented On: Mon Feb 22, 2016
Michael Rimmey , Manager, IT QA , ITG Brands
John Dyson , Director Corp & Sales Systems , ITG Brands
Details (hide)

Mergers and Acquisitions – Managing the Transformation is a report based ona presentation given by                                       Michael Rimmey and John Dyson during the 2016 IMF Senior Executive Spring Roundtable in Orlando, FL. The two discuss how Lorillard Tobacco Company successfully managed through its own transformation into ITG Brands as a result of a multi-company acquisition/asset purchase agreement. They will share challenges of the transaction as it relates to IT governance, project management and infrastructure in addition to reviewing the critical success factors that guided a successful transformation. 



Presented On: Tue Feb 23, 2016
David Sullivan , AVP � GTO Planning & Effectiveness , MetLife
Details (hide)

Rightsizing the IT Organization is a report based on a presentation given by David Sullivan during the 2016 IMF Senior Executive Spring Roundtable in Orlando, FL. In this report, Mr. Sullivan will walk us through Metlife’s organization and their efforts to have the right people in the right jobs and proper personnel counts to enable a flexible and agile organization. He will discuss their challenges in developing systems and balancing budgets against time to market.

 

 

 

 

 



Presented On: Mon Oct 12, 2015
Richard Bankes , Vice President, Information Technology , Canadian Tire
Details (hide)

Driving Agile Through the IT Organization is a report based on a presentation given by Rick Bankes, Vice President, Information Technology, FGL Sports and Mark’s (Divisions of Canadian Tire Company) during the 2015 Fall IMF Senior Executive Forum in Coral Gables FL. Mr. Bankes shares how his company adapted analysis and architecture to drive agile across the organization, not only in application development but in multiple functions.

 

 

 

 

 



Presented On: Mon Feb 22, 2016
Fletcher Previn , SVP & Chief Digital Officer , Cisco Systems, Inc.
Details (hide)

The Real and Anticipated Benefits of the IBM – Apple Alliance is a report based on a presentation from the IMF Senior Executive Spring Roundtable in Orlando, FL. Fletcher Previn, VP of Workplace as a service at IBM, shows readers how the new alliance aims to redefine the way work gets done and sparks a true mobile-led business change. He speaks on the unique IBM cloud services optimized for iOS including the new class of more than 100 industry‐specific enterprise solutions.

 

 

 

 

 



Presented On: Tue Feb 23, 2016
Brian Smith , Vice President , Akamai Technologies
Details (hide)

Internal Private Cloud Operations is a report based on a presentation given by Brian Smith during the 2016 IMF Senior Executive Spring Roundtable in Orlando, FL. Smith shares the growth VMware has experienced over the past few years in terms of its private cloud. The organizational structure and timeline are detailed in addition to tips and tricks for implementing a successful private cloud.

 

 

 

 

 



Presented On: Mon Jun 15, 2015
Paul Kincaid , Information Security , VMware
Details (hide)

 

Network Virtualization in the Software Defined Data Center is a report based on a presentation given by Paul Kincaid during the IMF IT Security Summit in June 2015. In this report, Mr. Kincaid discusses the “modern attack" and describes the context/isolation trade-off. He explains how moving from a perimeter-centric focus to an internal-centric focus can be beneficial and how the infrastructure is one of the key building blocks to a secure environment.

 

 

 

 

 



Presented On: Mon Oct 12, 2015
Craig Brice , CIO Canada , PricewaterhouseCoopers LLP
Details (hide)

 

The Transformation to a Leadership Development Experience is a report based on a presentation from the 2015 Fall IMF Senior Executive Forum in Coral Gables, FL. With more than 208,000 staff worldwide, PwC invests heavily in staff development. Craig Brice, Director, UK/US IT Enablement, takes readers through the innovation behind developing high-quality staff. Brice discusses the difference between millennials and non-millennials in addition to detailing PwC’s new Leadership Development Experience.

 

 

 

 



Presented On: Wed Nov 18, 2015
Details (hide)

 Service Desk Best Practices is based on an IMF Connect discussion. In this report, members share their experience using various service desk and self-support services and discuss how ITIL and analytics play into the service picture. Members also converse over best practices and discuss what gives a person VIP status regarding help tickets.

 

 

 

 

 



Presented On: Tue Jun 16, 2015
James Campbell , Distinguished Military Professor for Character Education , U.S. Naval Academy
Details (hide)

Ethical Decision-Making and Leadership is a report based on a leadership discussion given by US Naval Academy Captain James Campbell at the IT Security Summit in Annapolis, MD in June 2015. 

Captain Campbell presents on how ethical decision-making is a core component of organizational leadership. The report features case studies as a basis for interactive discussion. He asks “What’s right, and how do you decide?”

 

 

 

 



Presented On: Tue May 5, 2015
Details (hide)

IT Cost Transparency: Journey and Lesson Learned is a report based on a presentation from an ITFM quarterly meeting. The presenter shares how her company adapts to ever-changing technology, their implications on IT, and chargeback opportunities and challenges. She also speaks about the importance of accountability and good data.

 

 

 

 



Presented On: Tue May 5, 2015
Details (hide)

Building a Business Case for Analytics is based on a presentation from an ITFM quarterly meeting. In this report, the presenters discuss their new enterprise analytics team that helps enable their company’s business areas through data and analytics. Their guidelines, benefits and master data management (MDM) discipline is broke down.

 

 

 

 



Presented On: Tue May 5, 2015
David Sullivan , AVP � GTO Planning & Effectiveness , MetLife
Details (hide)
 

Business Value from MetLife’s New North Carolina Technology Campus is based on a presentation given by David Sullivan, Global RAD Vice President of Planning and Effectiveness at MetLife, during an ITFM quarterly meeting in May 2015. In this report, Mr. Sullivan examines the new MetLife campus located in the Research Triangle in North Carolina. Mr. Sullivan discusses what inspired the relocation and reflects on what made the new technology hub a success. 

 

 

 

 



Presented On: Mon Feb 9, 2015
Brad Gibson , Vice President , IBM
Details (hide)
 
Bring Your Own Device (BYOD) for Mobile and Laptops is a report based on a presentation given by Brad Gibson, Director of Finance and Planning at IBM, during an ITFM quarterly meeting in Feb. 2015. In this report, Mr. Gibson outlines the benefits of allowing IBM employees to bring their own personal devices to work. They have found that employee productivity and satisfaction has increased by adopting a BYOD policy. Mr. Gibson also
discusses the development of a successful BYOD policy, and costs and risks associated with this tech-savvy approach.
 
 
 
 
 
 
 
 


Presented On: Mon Jun 15, 2015
Sheryl Hanchar , Director of Information Security , Broadcom
Details (hide)

The Evolving Landscape of Cybersecurity

 

The Evolving Landscape of Cybersecurity is a report based on two presentations given by Sheryl Hanchar, Director of Information Security for Broadcom Corporation at the IMF Senior Executive Forum and an IT Finance Managers Meeting in 2015.

Sheryl outlines the evolution of hackers and types of attacks, as well as highlights areas of significance in planning for and mitigating cyber attacks. She also shares ways companies can share intel to learn from previous hacks and put in place stronger security measures in preparation for the future.

 

 



Presented On: Tue Feb 10, 2015
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

 Structuring an Optimal IT Workforce is based on a presentation given by Michael Bender, Senior Finance Director of Operations and IT at VMware, during an ITFM quarterly meeting in Feb. 2015. In this report, Bender explains that there is no simple way to create a perfect IT workforce, but there are formulas available that can help companies determine what works best for their workforce. Bender discusses how VMware created their unique strategy by focusing on aiming to reach their goals. This was achieved by assessing their current workforce, defining mission-critical activities and developing a location strategy.
 
 
 
 
 
 
 
 


Presented On: Mon Feb 23, 2015
Craig Brice , CIO Canada , PricewaterhouseCoopers LLP
Details (hide)

Outsourcing IT at PwC Report CoverOutsourcing IT at PwC is a report based on an IMF Senior Executive Forum presentation by Craig Brice, Director of US/UK IT Enablement at PwC.

Brice discusses the path to outsourcing and offshoring for PwC IT US, staffing challenges and opportunities, outcomes and results and future outlook for PwC US IT.

Over a period of years, PwC began the process by outsourcing ad hoc and moved to full outsourcing - multi-sourced with three vendors - in 2011.

This case study provides excellent background for others looking to outsource par of or entire IT functions.

 

 



Presented On: Mon Feb 23, 2015
Richard Bankes , Vice President, Information Technology , Canadian Tire
Details (hide)

Insourcing IT Within Canadian Tire Company Report CoverInsourcing IT Within Canadian Tire Company is based on an IMF Senior Executive Forum presentation by Richard Bankes, Vice President of Information Technology for Mark's Work Wearhouse, a division of Canadian Tire Company.

Rick outlines the history of the company and its previous outsourcing agreements in two acquired divisions: Mark's Work Wearhouse and The Forzani Group Ltd. (FGL). Following the decision to insource IT, Rick outlines the process, its challenges and results of insourcing.

 

 

 

 



Presented On: Mon Oct 13, 2014
Geoffrey Knoerzer , Vice President and CIO , IMF Fellow
Details (hide)

Benefits of Cloud Services for IT and Businesses Report CoverBenefits of Cloud Services for IT and Business is based on an IMF Senior Executive Forum presentation by Geoffrey Knoerzer, Vice President and CIO at Afni. In this report, Geoffrey leads a discussion on his organization’s work in cloud services, explores if cloud technology is beneficial for IT, and examines the risks and benefits of cloud services from a business perspective.

Geoffrey shares the steps his organization has taken to enter the cloud services space, and discusses the best early candidates for cloud deployment at the enterprise level as well as selecting and working with third part vendors for services, barriers to adoption, practical reasons to explore deployments, and future work in the cloud space.

 

 

 



Presented On: Mon Feb 23, 2015
William Miller , Chief Information Officer , NetApp
Details (hide)

Debunking Common IT Myths CoverDebunking Common IT Myths is based on an IMF Senior Executive Forum discussion led by Bill Miller, Chief Information Officer for Broadcom.

In this report, a group of IMF member companies debate the merits of several modern IT trends in an interactive IMF workshop.

Members participating in this discussion shared their experiences on:

  • Cloud’s effects on modern IT, 
  • Mobility, 
  • Always-connected workforces, 
  • Innovation in IT, 
  • The role of ERP systems, and more.

 



Presented On: Mon Feb 23, 2015
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Employee Attrition and Retention IMF Report In this IMF Report, Michael Bender of VMware discusses:

  • Attrition management objectives
  • Competition for candidates
  • Tools to attract talented workers
  • Strategies for attrition and retention

The report is based on the presentation Michael shared at the IMF Senior Executive Forum held February 2015 in Laguna Beach.

 

 



Presented On: Thu Mar 26, 2015
Details (hide)

Apptio Implementation Strategies is based on an IMF Connect discussion between IMF members on strategies for implementing Apptio IT finance management services. Members participating in this Connect discussed overall implementation strategies, timelines and implementation project length, project manager assistance, data connectivity, and more.

 

 

 

 

 

 



Presented On: Mon Oct 13, 2014
Phillip Hirschel , Director , PricewaterhouseCoopers LLP
Details (hide)

Risk and Security in Cloud Services is based on an IMF Senior Executive Forum presentation by Phil Hirschel, Director for IT Risk Management at PwC. In this report, Phil explores how cloud services have opened new opportunities to reconsider how IT supply chain risks are being managed.

Phil discusses the need to take a broader look at the cloud definition as part of supply chain management programs and developing a better understanding of where data is being hosted, the responsibilities of the service provider and the retained responsibilities of the customer when utilizing infrastructure as a service, the need to determine how to apply internal risk programs within the context of modern cloud services, and much more.
 
 
 
 
 
 


Presented On: Thu Aug 7, 2014
Jon Birdsall , WW IT Controller , IBM
Details (hide)

Cloud Experiences: Workloads Matter is based on an IT Finance Managers group presentation by Jon Birdsall, IT Finance Controller at IBM. In this report, Jon discusses his organization’s work in the cloud, including cloud benefits for workload, the cost of moving applications to the cloud, and the transformation of the service portfolio to address new demand for applications using cloud-based solutions.

 
Jon explores the future of cloud implementations for large enterprises, the use of private cloud implementations versus public cloud implementations, the adoption of infrastructure, platform, and software cloud models, and more. 
 
 
 
 
 
 
 


Presented On: Mon Oct 13, 2014
Chip Ward , Director, Global IS , Milliken & Company
Details (hide)

Showback and Chargeback Implementation is based on an IMF Senior Executive Forum presentation by Chip Ward, Director of Global Information Services at Milliken & Company. In this report, Chip discusses his organization’s implementation of a chargeback and showback process for IT services. Milliken & Company has created their system in a phased approach spanning multiple years. 

Chip explores how the showback and chargeback processes have changed division behavior as it relates to IT service usage, how his phased approach has eased organization wide adoption of the process across divisions, and what types of services are charged for across help tickets and projects within his organization. 
 


Presented On: Tue Jun 24, 2014
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)

Best Practices for Creating a Multi-Domain Delivery Team is based on an IMF Web Forum presentation by Hans Eckman, GVP Security Services Workstream Manager at SunTrust. In this report, Hans explores methods for creating a capability based delivery team serving multiple business needs. 

 
Hans discusses traditional role based team hierarchy and single domain support, including pros and cons of the traditional model; current role levels and capabilities by level; building a team to serve multiple domains at the execution level; and capability leads with knowledge and experience in serving a particular business need.


Presented On: Tue Jun 10, 2014
Trace Fooshee , Business Intelligence and Analytics Manager , SunTrust Bank
Details (hide)

Fraud Prevention through Detection Algorithms is a report based on an IMF Forum presentation by Trace Fooshee, Business Intelligence and Analytics Manager at SunTrust bank. In this report, Trace discusses the challenge of combating bank deposit fraud from a technology perspective, including the tools and procedures his team uses to catch fraudsters.

 
Trace shares his team’s efforts to build fraud detection algorithms based on large data sets. He presents how his team has conglomerated big data to create an integrated view of fraud - a high variety view of massively large volumes of observations of fraudulent and non-fraudulent events that has enabled his team to model a way to optimize true positive/false positive rates, resulting in a substantial increase in fraud prevention within his organization.
 


Presented On: Thu Dec 4, 2014
Details (hide)

Strategies for Lync Implementation is based on an IMF Connect discussion between IMF members on the process of implementing Microsoft Lync communication services at a large scale, enterprise level. Topics discussed include utilizing third party consultants to assist in Lync implementation, performing the implementation in-house without outsourced assistance, support options for Lync services, online and classroom training options for administration, phased rollouts for new services, and more.



Presented On: Mon Dec 1, 2014
Details (hide)

Apptio Implementation and Best Practices is based on an IMF Connect discussion between IMF members on the process of adopting and implementing Apptio IT finance management services. Members participating in this Connect discussed service costing, planning and forecasting, benchmarking, potential pitfalls in new and early implementations, reporting, customer access, improving communication between IT and business partners in terms of finance management, and the productivity, transparency, and financial benefits of a service implementation. 



Presented On: Thu Jun 12, 2014
Rizwan Patel , Field CTO , Redapt
Brad Karnafel , Director IT , Caesars
Details (hide)

Big Data Applications at Caesars is a report based on an IMF Big Data Forum presentation by Rizwan Patel and Brad Karnafel, IT Directors at Caesars Entertainment. In this report, Brad and Rizwan share details on Caesars’ new approach to big data and how an open source platform has allowed their organization to explore new avenues of customer service through an expanded big data presence.  

Rizwan and Brad discuss the path that led Caesars’ IT to adopt a new method for processing large volumes of customer data for marketing purposes and some practical applications for big data in their industry, including location and hospitality alerts through GPS and other communication technologies, social media analysis, voice and video data analysis, and the process of analyzing web data and clickstream data for design and customer experience improvements.
 


Presented On: Mon Oct 20, 2014
Details (hide)

The Role of a PMO in an SAP Environment is based on an IMF Connect discussion between IMF members on best practices for project management, planning, and approval within an SAP environment. Members participating in this Connect discussed the scope of services an IT PMO manages in such an environment, how to determine the number of project managers needed to support an implementation, the types of governance mechanisms used to manage project intake and scheduling, and more.



Presented On: Fri Sep 26, 2014
Details (hide)

Telecom Expense Management Solutions is based on an IMF Connect discussion between IMF members on managing enterprise wide telecom spend for wireline communications and mobile devices. Members participating in this discussion discussed telecom expense management tools, strategies for contract negotiation and management, procurement best practices, inventory management for devices and open lines, and more.  



Presented On: Tue May 20, 2014
Details (hide)

Content Management and Sensitive Data is based on an IMF Connect discussion between IMF members on best practices and strategies for storing sensitive data and effective content management. Members participating in this Connect discussed scanning and storing old internal human resources documents, effective security processes for multifunctional devices, limiting system administrator access to content through encryption, secure search and discovery, and IT tools for effective content management.



Presented On: Thu Feb 20, 2014
Richard Bankes , Vice President, Information Technology , Canadian Tire
Details (hide)

The Case for Insourcing is a report based on an IMF presentation given at a 2014 IMF Senior Executive Forum by Mark’s Work Wearhouse and FGL Sports Vice President of Information Technology, Rick Bankes. In this report, Bankes discusses the change drivers that led to the decision to insource a large portion of the work performed by a number of primary and secondary vendors. He shares the approach followed to execute the overall change, and provide insights into the risks related to the completion of the strategy. 

Some of the topics discussed in his presentation include potential cost savings through insourcing, benefits of pursuing insourced labor as opposed to outsourced services, strategies for ensuring a smooth transition from outsourced positions to in-house managed services, and risks associated with making such a change within an enterprise.
 


Presented On: Wed Jul 2, 2014
Details (hide)

IT Service Catalog Implementation and Best Practices is based on an IMF Connect discussion. An IMF member requested to speak with other members on the benefits of IT service catalog implementation, and best practices for planning and creating a robust, effective service catalog. Members participating discussed motivations for creating a service catalog, consultant assistance and outsourced vs. insourced implementation, tools for managing a new service catalog, the scope of initial implementations, the use of chargeback and/or showback in IT, and how the implementation of a catalog has affected internal IT operations. 



Presented On: Thu Apr 3, 2014
Details (hide)

Using Lync in an Existing CallManager Environment is based on an IMF Connect discussion. An IMF member requested to speak with other members on the implementation of Microsoft Lync services, with specific interest in deploying those services into an environment with an existing Cisco CallManager infrastructure. Members participating in this Connect discussed performance issues, capacity, stability in mobile clients, comparisons between collaboration tools, best practices, and lessons learned.  



Presented On: Mon Oct 7, 2013
Allen Greathouse , Vice President, Enterprise Information Services , Harris Corporation
Details (hide)

MDM and BYOD in the Enterprise is based on a presentation given at a 2013 IMF Senior Executive Forum by Allen Greathouse, Vice President, Enterprise Information Services for Harris Corporation.  In this report, Greathouse discusses effective mobile device management and Harris Corporation’s own experiences in implementing a bring your own device (BYOD) policy.  

Greathouse outlines effective security strategies for personally owned devices, best practices for device support plans, the future of BYOD implementation, using BYOD as a method for cost savings, and more.
 


Presented On: Thu Feb 20, 2014
Details (hide)

Wireless and BYOD Best Practices is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of managing employee wireless devices and implementing bring your own device programs. Members discussed possible cost savings of such a program, security concerns and mobile device management platforms, attracting talent with innovative BYOD programs, limitations placed on deployed BYOD implementations, and stipends versus employee paid programs.  



Presented On: Mon Feb 10, 2014
Charly Paelinck , CIO , Affinity Gaming
Details (hide)

Big Data Innovations at Caesars is a report based on an IMF Executive Forum presentation by Charly Paelinck, CIO of Caesars’ Entertainment. 

In this report, Paelinck discusses an ongoing big data implementation project at Caesars, and how a small team of engineers have successfully revamped the organization’s big data processing efforts, dramatically reducing the processing time of complex marketing campaigns. 
 
Paelinck discusses the decision to select Hadoop, an open source platform, to drive Caesars’ big data efforts, the benefits of an open source platform, the investment necessary to begin such an implementation, system components, challenges faced, and the architecture of their Hadoop big data system.
 


Presented On: Tue Mar 25, 2014
Details (hide)

Macs in the Enterprise is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of the use of Macintosh computers in a large scale setting. Participants discussed steps necessary to begin offering Macintosh computers for users as alternatives to Windows machines, including infrastructure hurdles, user support, overall cost, security issues, and procurement challenges.  



Presented On: Thu Dec 12, 2013
Brandon Lee , Director , USAC
Charles Dean , Manager of Applications Delivery , USAC
Rexhina Marjani , IT Enterprise Application Delivery Manger , USAC
Details (hide)

Breaking Down Departmental Silos is a report based on an IMF Web Forum presented by USAC’s Brandon Lee, Director of IT; Rexhina Marjani, IT Application Delivery Manager; and Charles Dean, Manager of Applications Delivery. 

In this report, Brandon, Rexhina, and Charles discuss USAC’s efforts to rebuild communication and collaboration avenues for its IT division after a rapid period of growth left the organization unorganized and inconsistent. They share effective strategies for fostering creativity and consistency in working toward an organization’s operational goals.
 
Some of the topics discussed in this report include growing communication avenues, change management, horizontal collaboration across IT, bettering collaboration between IT and business operations, and more.
 


Presented On: Thu Aug 1, 2013
Ed Hayman , Apptio
Details (hide)

The Costs and Benefits of IT Service Catalogs is based on a Web Forum given by Ed Hayman, Technology Business Management Architect & Practice Director at Apptio. In this report, Hayman discusses the benefits versus the cost of implementing service catalogs for IT organizations.

 
Too often, IT organizations take on a limited view of how their services and products should be presented, opting to present those services with a technical focus, concentrated on hardware and software figures instead of the overall value of the service. Hayman encourages his audience to consider viewing their service offerings through a customer’s perspective. 
 
Hayman presents a sample design of an IT service catalog listing, demonstrating what type of business language those product listings should feature, and what types of information should be prominently displayed  in a service catalog. 
 


Presented On: Mon Feb 10, 2014
Details (hide)

IT Project Cost Modeling is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of IT project cost modeling. Members discussed project management issues that arise from the funding process, best practices and strategies for accurate forecasting, financial accountability and project ownership, IT finance management tools, project estimation, and managing and allocating funds for upcoming IT projects. 



Presented On: Mon Apr 21, 2014
Details (hide)

Remote Server Virtualization Technologies and Strategies is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of servers that reside outside of the traditional data center in an effort to centralize infrastructure through remote server virtualization. Some of the topics discussed by the members on this call included budgeting for such a project, security, convincing leadership on the value of remote server virtualization, the possible timeline for project implementation, and the maintenance and depreciation costs of physical hardware.

 


Presented On: Thu Mar 20, 2014
Details (hide)

Establishing an Effective Change Advisory Board is based on an IMF Connect discussion. In this report, IMF members share their experiences in the creation, and ongoing management of an internal change advisory board (CAB). Some of the topics discussed in this report include CAB ownership, strategies for increasing participation, reasons to establish set change schedules, standard changes, and tools that can be used to calculate risk level. 



Presented On: Mon Oct 7, 2013
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Benefits of Internal Cloud Deployment is based on a presentation by VMware Senior Finance Director, Corporate Functions, IT and Operations Michael Bender at an IMF Senior Executive Forum. In this report, Bender outlines VMware’s internal transition from many segmented divisional data centers and technologies to one cloud service.

Bender discusses the cost savings of the effort, challenges faced, strategies for pushing adoption throughout the organization, and additional productivity and agility benefits found in adopting an internal cloud system.



Presented On: Thu Aug 15, 2013
John Crary , Chief Information Officer , American Red Cross
Details (hide)

Moving Enterprise Email to a Cloud-Based Platform is based on a presentation by American Red Cross CIO John Crary at an IMF IT Planning Forum in 2013. In this report, Crary outlines a massive Red Cross IT project to unify 40,000 users under a single cloud-based email platform for the first time in the organization's existence.

The American Red Cross successfully transitioned more than 40,000 staff to the Microsoft Office 365 email solution. This included users at national headquarters, blood services regions, and more than 600 chapter organizations. The effort consolidated more than 400 different email domains. 

Crary examines the benefits of going cloud, including improved services, features, and annual cost savings in excess of $1.5 million. He explains his organization’s approach to the vendor selection process and how to overcome several common migration obstacles. 



Presented On: Wed Sep 25, 2013
Details (hide)

Hadoop Implementation Experiences is based on an IMF Connect discussion. In this report, IMF members share their experiences around Hadoop implementation at large IT operations, including planned and unforeseen benefits, recruitment and internal development techniques, and metrics for measuring implementation success. Members participating in the call discussed vendor selection, future Teradata use, data security and administration within Hadoop, benefits and known issues with the Hadoop platform, and metadata.



Presented On: Fri Aug 30, 2013
Details (hide)

IT Finance Management Software is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of IT finance management applications, such as tools offered by Apptio, VMware, and Nicus and using those tools for expense transparency. Other members who use these tools participated in the discussion. Some of the topics addressed include resources assigned to the tools, community support, future updates, and the pros and cons of current available finance management applications.



Presented On: Thu Aug 15, 2013
John Kennedy , Senior Director , Kaiser Permanente
Details (hide)

Bridging Generational Gaps is a report based on two IMF presentations: one originally given by Global Information Partners Senior Consultant John Kennedy at a 2013 IMF IT Planning Forum, and a Web Forum presentation given by Principal Consultant Maggie Williams on the same subject. In this report, Kennedy and Williams discuss not only the new, rapidly growing generation of workers in their 20s and early 30s, but also the traits of every generation currently occupying the workforce and strategies for helping ever employee to work together.

Some of the topics discussed in these presentations include preventing generation clashes, the changing workplace demographic, and strategies for adapting management approaches for a new generation of employees. Kennedy and Williams discuss the importance of, the traits, and attitudes of Generation Y.



Presented On: Thu Aug 15, 2013
Robert Fields , IMF Fellow
Details (hide)

Telepresence Implementation at Loews is based on an IMF Web Forum presentation given by Bob Fields, CIO of Loews Corporation. In this report, Fields speaks on how Loews has successfully implemented Telepresence on a global scale across their diverse subsidiaries. Their slow and cautious approach resulted in a cost-effective, working solution on which the organization can grow and continue to develop.

Every organization struggles while juggling costs, compatibility, and vendor selection at some point in their videoconferencing efforts. Loews Corporation is no different – but their strategies managed to see a complex videoconferencing initiative through to success. Use Loews’ experiences as a guide for overcoming the struggle with expensive, complicated videoconferencing plans, and learn new ideas that can be put into action.



Presented On: Thu Aug 15, 2013
Cathy Kirch , SM Process Architect , Allstate Insurance
Details (hide)

Using an ITIL Service Delivery Framework for Planning is based on a presentation by Allstate IT Service Manager Cathy Kirch at an IMF IT Planning Forum in 2013. In this report, Kirch, a longtime technical leader within infrastructure services, shares several strategies and best practices for the implementation of the ITIL service framework and the use of the framework around planning.

Kirch shares her thoughts around IT service management and how it should be approached, challenges that might be encountered, and proven practices based on years of IT service leadership. She discusses the benefits of ITIL implementation, roles, ITIL goals, and why service management is key to the future of effective IT.

Kirch has spoken on the subject of ITSM best practices to many audiences and at many different venues around the world.


Presented On: Thu Aug 29, 2013
Details (hide)

Reviewing and Modifying Project Status Dashboards is based on an IMF Connect discussion. An IMF member requested to speak with other members on the subject of Project Status Dashboards, seeking efficient but effective methods of IT project reporting to organization management. Some of the topics discussed during the Connect discussion include best KPIs to track, proprietary dashboard solutions, closed and open dashboards, risk management, and tools for implementing digital project tracking.



Presented On: Fri Jan 31, 2014
Details (hide)

Designing a Bring Your Own Device Policy is based on a Jan. 2014 IMF Connect. An IMF member requested to speak with other members on the subject of BYOD policies, strategies for initial planning and construction of a device policy and best practices for ensuring that a policy remains effective. Some of the topics discussed during the Connect discussion include policy scope, the types and operating systems of devices permitted under a BYOD policy, cost savings, restrictions, and policy evolution.



Presented On: Thu Jan 30, 2014
Details (hide)

PCI Compliance Metrics is based on a Jan. 2014 IMF Connect.  A IMF member requested to speak with other members on the subject of Payment Card Industry (PCI) compliance, including strategies for achieving compliance and metrics for tracking compliance projects. Some of the topics discussed during the Connect discussion included Qualified Security Assessor firms, alternative routes to PCI compliance, segmenting compliance tasks, and ideas for reducing the number of applications in-scope.

 


Presented On: Wed Aug 28, 2013
Details (hide)

Transitioning to Tangoe Telecom Expense Management  is based on a 2013 IMF Connect.  An IMF member requested to speak with other members about the transition from Symphony telecom expense management software to Tangoe telecom expense management software. Some of the topics discussed in this IMF call included auditing, platform support, device tracking, reporting, and contract management. 

 


Presented On: Thu Aug 8, 2013
Christian Torres , Product Line Marketing Manager , VMware
Details (hide)

How Microsoft Tracks BYOD Policies is based on a presentation given by Christian Torres, Senior Finance Manager at VMware, during an ITFM quarterly meeting in Aug. 2013. In his presentation, Torres outlined a few approaches for an organization looking to tackle the ‘Bring Your Own Device’ dilemma. 

 
BYOD is indicative of a growing trend of change in the IT industry, an important part of the balance between IT control and user empowerment. Torres argues that IT organizations must learn to embrace and leverage BYOD policies as a way to entice new talent, while also seeking methods to ensure best security practices. Learn the four different categories for device policy, strategies for implementing different BYOD policies, and why IT departments should expand their focus beyond just budget.
 


Presented On: Tue Nov 12, 2013
Details (hide)

 Cisco ELA Best Practices is based on a Nov. 2013 IMF Connect.  A IMF member requested to speak with other members around audio conferencing technology trends. This includes Technologies as well as use of Company IP fabric (WAN and LAN) as carrier alternative to PSTN. They are considering migrating to a company wide IP fabric and are looking for best practices or experiences other have had. 

 
A Connect is a member requested open, roundtable online discussion among an ad hoc group of IMF members on a specific topic. Connect particpants are asked to contribute, ask questions, and challenge their own ideas. 
 


Presented On: Thu Oct 10, 2013
Brad Karnafel , Director IT , Caesars
Rizwan Patel , Field CTO , Redapt
Details (hide)

Big Data Implementation at Caesars is based on a Web Forum presentation given by Rizwan Patel and Brad Karnafel, IT Directors at Caesars Entertainment. In this report, Patel and Karnafel discuss the nuts and bolts of a massive big data technology project undertaken by Caesars Entertainment over the last year.

Big Data implementation can be challenging for any organization, especially one as large and diverse as Caesars Entertainment. Patel and Karnafel present their Big Data implementation approach, discussing strategies for how to overcome several obstacles along the journey. They also offer best practices and actionable advice based on their experiences in the Big Data realm.

Patel and Karnafel go into details on specific hardware and application choices taken by their organization, the thought process behind those choices and problems encountered as a result. Their experience serves as a guide for other organizations contemplating a similar move into big data processing, storage, and application.



Presented On: Fri Jun 7, 2013
Details (hide)

The Insider Threat is based on a Forum presentation given by Ralph Q, a CIA Cyber Security Officer. In this presentation, Ralph focuses on the rise of the insider threat and its harmful impact on the CIA and other organizations alike. He explains that rigorous security vetting cannot singlehandedly thwart these clandestine attacks. His advice to other organizations – examine their users and the access they're given.

This report identifies specific groups of users at risk and provides solutions companies can use now to prevent, detect and mitigate the insider threat. The reader will learn about factors that contribute to the risk, allowing them to better manage their security measures. Other solutions include: creating a counter-intelligence center, automating actions, providing IT security training, providing cross-training opportunities and conducting rigorous log management, auditing and monitoring.



Presented On: Fri Jun 7, 2013
Flavio Villanustre , Vice President of Products and Infrastructure , LexisNexis
Details (hide)

Security and Privacy in a Big Data World is based on a Forum presentation given by Dr. Flavio Villanustre, VP of Information Security & Lead for the HPCC Systems open source initiative for LexisNexis at an IMF Security Forum in Washington, D.C. in June 2013.

Big data is a relatively new and exponentially growing problem for modern enterprise. More user created content is being produced than ever before through social online services, and more devices are generating data every day. Companies must have effective processes and technology for processing and sorting this new influx of information.

Beyond the challenge of simply processing this data, organizations face new security and privacy challenges as information tables grow and become more diverse. In this report, Dr. Villanustre outlines several strategies that have been implemented by his organization for handling this very modern problem, including technology systems and organization operations to ensure that sensitive customer data remains secure and protected. Also, view a few examples of when big data anonymization features go wrong, and sensitive data becomes jeopardized.


Presented On: Thu Jun 6, 2013
Nalneesh Gaur , Partner , PricewaterhouseCoopers LLP
Details (hide)

How to Build and Govern a Security Operating Model is based on a Forum presentation given by Nalneesh Gaur, a director with PwC's health care practice.

Organizations are increasingly establishing the role of the Chief Information Security Officer (CISO). In fact, PwC's Global Information Systems Security Survey finds that 42% of the surveyed organizations have established a CISO role. Experience shows that the CISO role is not a purely technology oriented role; instead it is a role where the function must foster relationships with both business and technology.

Additionally, CISOs must also think through how security is governed, what skills and talents they need, and how they interface with business, especially in a large global company. This presentation will focus on the specifics of designing a CISO operating model and what considerations come into play. In this report, Gaur presents four key questions an organization must ask before constructing or improving an information security operation.


Presented On: Mon Feb 25, 2013
Kandy White , ADP
Michael Flanagan , Verizon
Details (hide)

 Lean Six Sigma: How Process Engineering Works at Verizon is based on a Forum presentation given by Kandy White from Verizon. The reader will get a comprehensive "big picture" look at Lean Six Sigma. There are five focus areas:

1. WHY do Lean Six Sigma?

2. WHAT is VLSS?

3. WHAT is the basic idea behind Lean Six Sigma?

4. HOW does Lean Six Sigma work?

5. Roles and Responsibilities

 

Based on Verizon's studies, companies often fail in their Six Sigma pursuit due to a lack of leadership support. This is why the company actively incorporates their credo into everyday communications. The credo plays an integral role in strategic alignment too, which is necessary to establish a rigorous framework for process improvement.

Read about the four pillars driving shareholder value: Revenue Growth, Operating Margin,  Asset Efficiency, and Expectations. Lean Six Sigma plays positively impacts those pillars through expense reduction. This is accomplished by platform consolidation, process improvements, and organizational realignment.

Take a brief but interesting look back at the rich history of Process Excellence and the Lean Six Sigma approach. Find out how it has shaped Verizon's current Lean Sigma methodology. Learn about the various process deployment roles, from VLSS Leader to Green Belt, and the levels of training these roles require.

Finally, we'll get into the process itself and how it works. This means looking at the three phases of work: value-added work, incidental work, and pure waste. Discover the differences between Six Sigma and Lean Sigma through illustrations and practical examples.

 

 

 

 

 



Presented On: Thu Jul 18, 2013
Marty Smith , CIO , Implantable Provider Group
Details (hide)

 

Enterprise Computing in the Public Cloud  is based on a Web Forum presentation given by Marty Smith, CIO of Implantable Provider Group (IFG).   IPG collaborates with Health Plans in partnership with Providers, Physicians, Manufacturers and Patients to develop market-based solutions that deliver tangible value in the implantable Device Benefit Management (DBM) space.  Assisting payers and providers with managing the cost of implanting a medical device into the human body, IPG has demonstrated saving healthplans over 20%.  

 
This report gives you an overview of the advantages and challenges IPG and other enterprises can expect to encounter in migrating to the cloud.  Discover the scope of products they've selected and the strategic positions behind their migratory approach that added to their success.


Presented On: Thu Jun 6, 2013
Louis Magnotti , VP of IT Services and Security , Pentagon Federal Credit Union
Details (hide)

 

IT Security Succession Planning is based on a Forum presentation given by Lou Magnotti, Vice President of IT Services & Security, Pentagon Federal Credit Union.  Mr. Magnotti focuses on how security leaders in particular are facing challenges in attracting and retaining highly qualified personnel in the technical field of Information Technology (IT) Security/Information Assurance (IA).   These challenges are mostly attributed to a continuously rising compensation scale over the last decade and the overall competition for limited personnel resources in the field.

 
This report highlights the steps that the Pentagon Federal Credit Union (PFCU) took in order to achieve a working succession planning model. The reader will learn that using a 5 step method and creating a timeline to manage the effort will allow for the continuity of operations, increased opportunities and ROI.  


Presented On: Mon Jul 1, 2013
Cathy Kirch , SM Process Architect , Allstate Insurance
Details (hide)

 

Enterprise Release and Change Management is based on a IMF Connect discussion led by Cathy Kirch, an ITSM Consultant.  Ms. Kirch has many years of experience with large enterprise implementations, specifically in the insurance industry.  This report highlights the current challenges organizations face throughout the process of migrating from the approval stage of change management to the endpoint of implementation, while proposing several solutions to best navigate the terrain.  The reader will learn that developing an agile, responsive management structure is imperative for success and can be achieved through mapping defined roles, standardizing onboarding and off-boarding, measuring metrics to justify and improve methods and utilizing intuitive application tools to facilitate a seamless transition. 



Presented On: Thu Jul 25, 2013
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)

 

BA 2020: Creating a Discrete Vision and Goals to Transform Your Practice is based on a Web Forum presentation given by Hans Eckman, SunTrust GVP and Security Services Workstream Manager.  In 2007, SunTrust made a strategic investment to improve the business analyst capabilities within applications delivery.  In this presentation Mr. Eckman focuses on where SunTrust's BA maturity will be in the year 2020. 

 
This report highlights the steps SunTrust took in order to achieve continuous improvement to the BA role and processes.  The reader will learn that having a bold strategy along with quantifiable goals is critical to any organizations improvement efforts.  Walk through how this project transpired and gather some recommendations on how you can apply the model to your organization.  


Presented On: Fri Jun 7, 2013
Kurt Lieber , Vice President, Identity & Access Management and Large Programs , Kaiser Permanente
Details (hide)

 

 

 

Identity and Access Management (IAM) is based on a Forum presentation given by Kurt Lieber, VP of IAM and Large Programs at Kaiser Permanente.  Mr Lieber is responsible for assuring appropriate workforce identity and access for all of Kaiser Permanente by providing increased security, risk reduction and identity data protection.  This report highlights KP's current inefficiencies regarding IAM that is the result of a highly complex, manual and decentralized model.  The reader will learn that transforming access management functions to serve a centralized, automated and standardized model will benefit organizations in a number of areas.  Benefits of this initiative include: streamlining access to applications, enabling productivity and performance for future business needs, and efficiently address regulatory and compliance requirements.

 

 



Presented On: Thu May 30, 2013
Michael O'Brien , Chief Information Officer , IMF Fellow
Details (hide)
The Evolution of IT Leadership for CIOs is based on a Web Forum presentation given by experienced IT leader Michael O’Brien.  The proliferation of Shadow IT, BYOD, and SaaS services in the enterprise  is having a major impact on the CIO role. CIOs are now expected to be  “Chief Change Agents,” “Chief Innovation Officers,” “Chief Intelligence Officers,” and more. In many cases, they’re also being asked to herd  technology and applications in the organization.

Shadow IT is a term that typically sparks passionate debate between the business and IT. Proponents of the idea may refer to it as “Application Outsourcing” while its detractors make snide remarks like “Cockroach Technology.” Whatever side you’re on, it’s important to remember there are positives AND negatives to shadow IT. For example, it can lead to an inconsistent approach but also free IT to focus on larger strategic challenges.

There’s no denying the balance of power is shifting from IT to business user in the enterprise. Personal devices encourage people to make their own decisions on how to improve life in and out of the office. In some cases these decisions this means bypassing IT altogether. IT departments are working with fewer resources these days, making it harder to support these new technologies and apps. Research says 35% of IT expenditures will happen outside the corporate IT budget within three years.

IT needs to update and modernize its business user engagement model to reflect the times. Perhaps it means becoming more of a service organization and enabler. This report explores how CIOs can deal with the tsunami of personal devices and apps flooding the workplace. Discover ways to embrace Shadow IT and make it work for the overall good of your organization. 
 


Presented On: Thu Apr 25, 2013
Phil Malatras , Sr. Manager , Broadcom
Story Colling , Manager , Broadcom
Details (hide)
Communicating IT Service & Value within the Enterprise is based on a Web Forum presentation given by Phil Malatras and Story Colling from Broadcom. The reader will learn about Broadcom’s current IT-Business alignment model and the pivotal role communications plays in its success. Good frontline IT communications leads to fast and efficient customer service response resulting in satisfied customers, trust, and credibility.
 
IT has evolved over the past 25 years and now the organization is expected to act as a strategic business partner. In order for your workforce to succeed, you need the right mix of technical understanding, collaboration and relationship management, communication skills, business engagement skills, and business acumen. Discover how to build and transform your current staff to meet these demands.
 
This report will show you which communication areas to focus on and what common, ineffective practices to look out for in your organization. Makeshift marketing efforts spread between technical writers, IT managers, and corporate communications teams can lead to an inconsistent message and multiple misconceptions. Some effective communication “myths” might even surprise you.
 
Find out how Broadcom successfully plans and executes their project communication strategy. We’ll examine the high level components of a corporate communication strategy. This includes:
  • Identifying and assessing your enterprise’s multiple audiences
  • Choosing the correct combination of communication tools and channels
  • Creating a plan and launch schedule
  • Building messages and collateral
  • Formal and casual feedback gathering techniques to ensure understanding


Presented On: Mon Feb 25, 2013
Rich Murr , VP of IT , Rackspace
Details (hide)
A Successful Approach to Recruiting and Retaining Top IT Talent is based on a Forum presentation given by Rich Murr from Rackspace. Without the right talent, delivering the results your organization deserves is impossible. Competition for IT talent is fierce. In this report, Mr. Murr focuses on the best ways to approach an “employees’ market.” 

Learn about the challenges leaders face and why their personal brand is often more important than the company’s brand. You reputation plays a critical role in attracting and retaining the people you need to achieve outstanding results. Historical data suggests that a good technical employee will stay with an IT services firm from three to five years, so how can you convince them to stay longer? 
 
Find out how to connect with your employees on a deeper level to drive personal and professional growth. Mr. Murr discusses the degrees of “stickiness” keeping employees in place and their motivations may surprise you. Your employees and recruits are people and individuals. There are generational differences and varying incentives you must consider. Understanding these differences takes time, so get started today! 


Presented On: Thu Mar 14, 2013
Doug Greene , Vice President, Enterprise Technology , American Red Cross
Details (hide)
Moving email to cloudMoving Enterprise Email to the Cloud is based on a Web Forum presentation given by Doug Greene from the American Red Cross. The American Red Cross successfully transitioned over 40,000 staff members to the Microsoft Office 365 email solution. This included users at in their national headquarters, Blood Services Regions, and more than 500 chapter organizations. The effort consolidated over 400 different email domains. For the first time, the organization has a single, enterprise-wide email platform. 

There were plenty of reasons for the Red Cross to make this move. For instance, moving to a cloud-based email platform offers improved services and features like 24x7 support, centralized administration, and enterprise shared calendars. Find out how an enterprise platform solution also helped the Red Cross realize annual cost savings in excess of $1.5 million.

This report gives you a pre and post-migration outlook for the Red Cross.  Discover the scope of products they’ve selected and the strategic decisions behind their migratory approach. Follow their timeline, starting with beginning stages of planning and contracting up to the last chapter migration.
 
Finally, you’ll read about some of the obstacles encountered and lessons learned along the way. For example, learn how to make your biggest critics the earliest adopters. Find out why calendar migrations and different mobile devices can be rather problematic during migration. As with any large-scale initiative though, communication is the key and the Red Cross had a plan for user awareness. 


Presented On: Thu Mar 21, 2013
Dane Ingram , Managing Director , PricewaterhouseCoopers LLP
Details (hide)
PwC Mobile Device Remote Workforce InnovationInnovating to Empower the Mobile Workforce is based on a Web Forum presentation given by Dane Ingram from PwC. The report details results from PwC’s iPad Experience program as the company searches for different ways to connect their mobile workforce. This program provided a rich opportunity to look at some of the newer, more innovative technologies available as well as address the BYOD phenomenon. 
 
A new approach meant reevaluating PwC’s core infrastructure. They needed a Managed Application Store, Single Sign-On Certificate Management, VPN on Demand, Mobile Device Management, and the ability to push VPN, WiFi, MDM, Mail Profiles, etc. Find out why they built out a separate VPN environment for mobile devices with a different set of rules and access rights.
 
Once the core infrastructure was in place, focus shifted towards deploying native email, calendaring, and contacts. In addition, they released a number of internally  developed applications like Time Recording, Expense Reporting, PwC News, and  Office Locator. PwC also identified ways to handle Word / Excel / PowerPoint files, manage secure file sharing, and support instant messaging and video connectivity. 
 
PwC has adopted a mentality of “one size doesn’t fit all” when it comes to application development. Discover the reasoning behind this approach and why it’s important to look at apps on an individual basis. There are factors like app type, use frequency, user type you must consider during the development process. Above all though, user experience should be your top priority. If an app doesn’t make completing tasks easier or quicker for employees, don’t bother with it.
 


Presented On: Mon Feb 25, 2013
Morgan Gothard , Enterprise Security Architect , Quanta Services Inc.
Details (hide)
The Anatomy of Modern Malware Threats is based on a Forum presentation given by Morgan Gothard from Quanta Services. The IT Security landscape has changed drastically over the last few years. New vulnerabilities are being discovered every day and basic defense tactics are no longer good enough. 

This report shares some alarming statistics regarding malware and attacks. For example, 1 in 239 emails contain a virus and more than 80,000 new malware strains are created each day. That’s just the tip of the iceberg. Find out who’s being targeted and why nobody is immune.

From organized crime syndicates to political “hacktivists,” learn about the diverse groups and individuals behind these attacks. Why are they doing it? How are they  doing it? We’ll explore several motives and methods, along with the black market economy associated with those threats. Examples of recently well-publicized attacks on companies like Sony, RSA, Yahoo, LinkedIn, and more are included to show how they fit a rapidly growing trend. 

Speaking of troubling trends, mobile malware increased tenfold from 2011 to 2012. Discover which mobile platforms present the most risk. You’ll read about the capabilities associated with this kind of malware, such as tracking users, collecting data, and sending content.

Mr. Gothard gives you a comprehensive look at the six stages of a malware attack: Lure, Redirect, Exploit Kit, Dropper File, Call-home, and Data Theft/Destruction. Plus, he’ll reveal what makes today’s malware different from past versions. How can you avoid being the victim? Basic security measures still apply but this report will uncover new tactics and emerging technologies you can deploy to defend your organization. Some of the tools and activities we focus on include “anywhere” content filtering, virtual execution, network traffic replay, and mobile antivirus. 



Presented On: Thu Feb 21, 2013
Lynnee Jimenez , Program Manager , VMware
Details (hide)
Cost and Process Efficiency Gains Using RFID Technology is based on a Web Forum presentation given by Cisco’s Lynnee Jimenez. Cisco has employed RFID technology to improve the tracking of their fixed assets. In this report, you’re going to find out why and how they decided on an RFID solution. It was a cross-functional team effort that required careful planning, constant communication, and a consistent approach. Their hard work paid off too, earning them an award for “Best RFID Implementation” in 2012.

Cisco took into account a number of considerations with regards to people, process, and technology. For instance, how many people needed to be trained? Do you tag existing assets or just newly acquired ones? Should you outfit all sites with RFID readers or just the largest ones? RFID has been around for a long time but is not that common in a metal/cable dense lab environment. Find out how Cisco leveraged external benchmarking in a relatively immature space to forge new ground in that area.

It is critical that you examine your asset process as a whole, from purchase all the way to disposal. Never underestimate the importance of having a consistent process across the board for your environments. Even the something as simple as the positioning of a RFID tag needs to be consistent. Discover the benefits of having an asset management system serve as your single source of truth for asset-related data, such as a one-stop shop for reusable assets.

The report also provides an in-depth look at RFID technology and its supporting elements. There are several factors for deployment like location, obstructions, and mounting space. Learn how Cisco uses fixed RFID read points and takes advantage of handheld readers in certain scenarios. The tag designs themselves can make or break your RFID initiative. However, the lessons shared here will help make this a successful venture for your organization. 



Presented On: Thu Jan 31, 2013
Daniel Spratlen , Director , Rackspace
Details (hide)
Moving Internal Applications to the Public Cloud is based on a Web Forum presentation given by Rackspace’s Daniel Spratlen. Rackspace is in the process of moving some their internal applications to the public cloud by way of open source software known as OpenStack. This is a work in progress and with any endeavor of this scope you’re going to run into challenges along the way. The report dives into their experiences, focusing mainly on the non-technical aspects like organization culture, compliance and security, as well as financial implications. 

Find out what makes a good candidate for cloud migration and the factors you must consider if you hope to be successful. Learn about the kinds of organizational changes you can expect from such shifts. This impacts your QA teams, infrastructure teams, system administrators, and developers to name a few.

Security and compliance are always a primary concern when dealing with cloud technologies. Fortunately there are ways to move your applications in a secure manner and remain compliant. Some of these pre-cautions, like encrypting sensitive data, should’ve already been taken but the cloud will make them mandatory.

From a financial perspective, a cloud shift will obviously affect your budget so you need to know what to look out for in order to plan ahead. How are you going to handle capacity planning and chargeback? Rackspace was even able to shift what were historically considered CAPEX costs to OPEX. Thinking outside the box, discover why “speed to impact” can be a more important metric than cost savings. 

 



Presented On: Thu Jan 24, 2013
Jennifer Philage , Wireless Carrier Program Manager , Quanta Services Inc.
Details (hide)
Best Practices for Conducting In-House Telecom Management is based on a Web Forum presentation given by Jennifer Philage from Quanta Services. Jennifer is Quanta’s Wireless Carrier Program Manager. Mobile communication devices (cell phones, aircards, mifis) are necessities of everyday business. Without monitoring, the expense associated with these devices can prove to be much greater than originally budgeted. Ever changing usage patterns, employment status, outdated plans, and the management of such a program can overwhelm an office manager already burdened with a multitude of responsibilities.
 
With TEM (Telecom Expense Management) vendors calling daily, Quanta opted to pull away from their third-party consultant and bring this management in-house. The company has experienced tremendous success over the last 12 months with their new in-house telecom management program. During this time, the program has helped the company save over $1.5 million dollars in cost prevention and reduction. To put that kind of success in perspective, Quanta’s average monthly cell bills amount to roughly $600,000.
 
This report identifies best practices used to develop a centralized in-house telecom management program created to support multiple office locations. Read and discover the following:
  • Structure and approach of establishing the initial program
  • Preventative measures that can be taken to minimize and avoid high overages 
  • Types of carrier provided data (exported from the carrier websites) that can be analyzed monthly for potential cost reduction 

 



Presented On: Thu Dec 13, 2012
Details (hide)
A Simple Approach for Optimizing Your Environment to Save Costs is based on a Web Forum presentation given by Caleb Masland. This report focuses on leveraging quantitative data to save money in your environment but it’s really more about how to approach measurement in general. This is something a lot of companies struggle with and we perform on a daily basis. Here you’ll learn about an approach you can take back and use in your own environment. 
 
The report covers three major areas. First is a general framework for measurement in the IT organization. The second part highlights choosing effective measures. Finally, you’ll find out how to leverage your collected data for improvement. The ultimate goal is getting actionable information to improve costs in your IT organization. You can use data and metrics for a variety of reasons in the organization. However, as a frame of reference for this report, they are used for cost optimization.

 



Presented On: Tue Sep 25, 2012
Jeff O'Dell , Vice President, Engineering and Product Management , The Hartford
Details (hide)
A New Compute Model: Lessons Learned from Cloud Migration is based on a Forum presentation given by Jeff O'Dell. Mr. O'Dell is the Vice President of Enterprise Architecture for the Property and Casualty line at The Hartford Financial Services Group. The Hartford is a leading provider of life insurance, group and employee benefits, automobile and homeowners insurance, and business insurance. 

Like many major companies, they had technology issues to address in the forms of simplifying a complex environment and introducing a more variable cost model. As a result, the New Compute Model was created to simplify their processing platforms through standardization, processes automation, and establishing a more variable cost structure using cloud computing. They were able to gain efficiencies by introducing Standard Service Tiers and updating their IT Service
Management processes.

In this report you'll read about the importance of strategically aligning your hosting centers and the role cloud plays in that alignment. Find out how capacity utilization and Office automation fit into the journey to "cloudiness." Also, what factors should you consider in the application migration process? What stays and what goes? Finally, Mr. O'Dell takes us through some of the lessons they have learned so far during this endeavor. These deal with highly debatable topics like public vs. private cloud, vertical and horizontal integration, and just how much change is really necessary.
 


Presented On: Thu Nov 8, 2012
Monty Hamilton , CEO , Rural Sourcing, Inc.
Details (hide)
Rural Sourcing: IT’s Onshore Alternative is based on a Web Forum presentation given by Monty Hamilton. Mr. Hamilton is the Chief Executive Officer of Rural Sourcing Inc. Rural sourcing is quickly picking up steam as a cost-effective alternative to offshore outsourcing. 
 
This report takes a look at some cost comparisons and how using an onshore resource helps your bottom line. Learn about the rural sourcing market in terms of size and what companies are involved around the country. Find out what IT, consumer, and global economic factors are contributing to this growing trend. Discover some additional domestic sourcing benefits, on top of lower costs, like quicker times to market, time zone advantages, and reduced compliance risk.
 
 
Some other areas of focus in this report include:
  • What is “rural sourcing”
  • Geographical breakdown of domestic sourcing providers
  • How companies like IBM, HP, and ADP created jobs using onshore resources
  • Four changing landscapes impacting the outsourcing industry
  • Case study on cost comparison between offshore and onshore
  • Four areas where rural and domestic sourcing has an advantage
 


Presented On: Thu Jun 7, 2012
John Holmblad , Principal Information Security Services Specialist , U.S. Senate
Details (hide)
Innovation in Cyber-Security Threat Avoidance is based on a Forum presentation given by John Holmblad. Mr. Holmblad is a Principal Information Security Services Specialist for the United States Senate. The U.S. Senate has recently re-competed their Cyber-Security Services contract. This enabled them to update their Statement of Work in order to reflect the current environment and threats. It also provided great insight into how the market for these services has changed since 2007. In this report, you will learn what to look for in a cyber-security services contract in terms of program management, SOC supervision, network security monitoring, and more.
 
Another major focus is the Senate’s cyber-security approach. This includes how they use relevant concepts that are also incorporated into the Department of Defense’s Active Defense Doctrine. The volume
of global cyber-attacks is up 81% from 2010 to 2011 according to one
report. Find out what services the Office of the Sergeant at Arms offers
Senate customers to combat these rising threat levels and more sophisticated attacks.
 
Some other areas of focus in this report include:
  • Office of the Sergeant at Arms (SAA) overview
  • Size and scope of SAA’s IT Operations
  • “Five Stages of Attack” for Advanced Persistent Threats
  • More sophisticated malware, i.e. W32.Flamer
  • Cyber-security tools such as Intrusion Detection, Log File Analysis, SIEM, etc.
  • Cyber-security services contract structure, including key performance indicators
  • The contract solicitation process
 


Presented On: Thu Sep 20, 2012
Rizwan Patel , Field CTO , Redapt
Swithin George , IT Manager , Caesars
Details (hide)
Application Performance Management and Monitoring is based on a Web Forum presentation given by Rizwan Patel and Swithin George from Caesars. They play integral roles in Caesars’ IT Common Services Group. This report focuses on the group’s successful journey in influencing and implementing monitoring and management across Enterprise Services. 

The effects of their enterprise monitoring initiative spread across technologies like TIBCO BW, BE, EMS, RV, and Java. It also includes infrastructure components like pSeries, iSeries, VMWare, and Wintel. You will read about the challenges, implementation, benefits, and extension of the framework with references to the Five Dimensions of APM (Application Performance Management) Functionality.

Some other areas of focus in this report include:
  • Composition of new monitoring framework and .NET application
  • Filling in your monitoring gaps
  • Enterprise monitoring initiatives
  • Caesars’ vendor selection approach
  • Application monitoring solution features like deep dive analytics
  • Infrastructure monitoring solution features like inbuilt workflow management

 



Presented On: Thu Aug 16, 2012
Chris Bennett , Director , EMC Corporation
Details (hide)
Emerging Trends in Enterprise Storage is based on a Web Forum presentation given by Chris Bennett. Mr. Bennett is the Director of Enterprise Storage Services at Cox Communications. Approximately every four years, a disruptive technology shift occurs in Enterprise Storage Systems. This report focuses on how these new technologies are impacting storage environments. You’ll read about the effects on Operational scale, scope and practice. The following technologies are highlighted:
  • FCoE / Converged networking
  • SSD / Flash
  • Automated workload management
  • Reducing the disruptive nature of data mobility
  • Converged storage (file, block, object)

Some other areas of focus in this report include:
  • IT competes by investing in transformation
  • Virtualization
  • Traditional vs. Converged Networking
  • Manual vs. Automated Data Placement
  • Federation and global scale
  • Data protection
  • The advent of Big Data
  • Massively scalable modern storage systems
  • Organizational shifts around Big Data and IT Consumerization

 



Presented On: Mon Sep 24, 2012
Geoff Aranoff , CISO , Western Digital Corporation
Details (hide)
Cyber-Security and Intellectual Property Protection is based on a Forum presentation given by Geoff Aranoff. Mr. Aranoff is the Chief Information Security Officer for Broadcom. This report looks at strategy and tactics for securing advanced computing environments to protect against malicious threats. There’s an emphasis placed on intellectual property (IP). 
 
The number of cyber incidents per year is increasing, as is the number of records  compromised. Most of these cyber-attacks are opportunistic in nature and, even worse, continually evolving. Information Security teams need to take the proper steps to mitigate these risks. Find out how Broadcom built its Information Security organization practically from the ground-up and how they approach risk management. Read about different IP protection practices like data
classification, executive reporting, and DLP. Learn the importance of
defining your organization’s cyber-threat tiers.
 
Some areas of focus here include:
  • Same threats, different applications
  • Cyber-attack facts and figures
  • Possible compromise through mergers and acquisitions
  • How IP protection helps your cyber-security strategy
  • Broadcom’s Information Security program
  • Elements of IP protection, including basic and advanced techniques
  • Creating a “cyber-focused” strategy

 



Presented On: Thu Oct 11, 2012
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)
Digital Cities, Open Data, and Applications is based on a Web Forum presentation given by Dr. Jonathan Reichental. Dr. Reichental is CIO for the City of Palo Alto, California. We have reached a point in the U.S. where reinventing how local government is delivered is not only necessary, but also possible. This is the result of significant new technology capabilities available in communities. The City of Palo Alto is leading the way in exploring and building completely new ways of delivering services and engaging civic participation. Their vision is to build and enable a leading digital city. 

Deeply embedded within this strategy is the need to innovate across all local government functions while engaging the community and private sector in a partnership. This report looks at their journey and how early lessons might apply in the private sector too. You’ll learn how to deliver innovative solutions more quickly and at a lower cost.

Some areas of focus here include:
  • Local government’s challenges in 2012
  • Organizational structure of a digital city
  • The benefits of asking “why?”
  • Doing things differently in a “new world”
  • Case study– local collaboration leads to quicker results
  • Scaling solutions and open data in action
  • A lean startup approach emphasizing the basics and speed

 



Presented On: Thu Sep 27, 2012
Steve Martin , Manager IT Security , ITG Brands
Details (hide)
Secure Cloud Computing: Resources to Assist with Vendor Assessment is based on a Web Forum presentation given by Steve Martin. Steve is the IT Security Manager for Lorillard Tobacco. Data stored within the Cloud presents unique challenges to information security. It is often difficult, if not impossible, to ascertain whether or not a cloud service provider has implemented security controls that align with an organization's security strategy and compliance efforts.

This report looks at some of the key questions your organization should be asking with regards to data security. Whether you’re moving to the cloud or already there, it is important to address key points such as where your data resides, who is touching it, and what happens if there’s a breach. For those companies evaluating cloud service providers, you’ll find information on existing and emerging resources available to help you assess cloud provider security.

Some areas of focus here include:
  • Cloud deployment and service models
  • Data residence considerations
  • Data breach laws
  • Bringing data back from the cloud
  • IT security audit standards
  • Cloud Security Alliance resources
  • STAR Registry
  • FedRAMP
  • Shared Assessments


Presented On: Thu Aug 23, 2012
Rob Beistline , Transition Leadership Team Lead , Milliken & Company
Details (hide)
Successfully Managing a Multi-Year IT Initiative is based on a Web Forum presentation given by Rob Beistline. Rob is the Transition Leadership Team Lead at Milliken & Company. Companies attempt a number of initiatives every year and many of them are abandoned for various reasons before completion. Others may be completed with less than predicted outcomes, culminating in countless time, money, and energy lost trying to resolve the situation. 
 
Over the last 5 years, Milliken & Company has successfully implemented SAP globally throughout the company on time, on budget, and without business interruption. This report looks at how managing your organizational structure, developing a strategic implementation plan, and committing to change management can guide you to successfully managing a multi-year initiative.  

Some areas of focus here include:
  • Milliken’s challenges reasons behind selecting a SAP solution
  • Five steps to a successful multi-year implementation
  • Project team composition
  • Developing a realistic implementation plan
  • The SAP project roadmap and Milliken’s ERP five year layout
  • Change management responsibilities
  • Importance of end-user ownership and how to improve it

 



Presented On: Thu Jul 26, 2012
Bryan Steward , Sr. IT Manager , U.S. Senate
Details (hide)
The Benefits of Upgrading to Exchange 2010 is based on a Web Forum presentation given by Bryan Steward. Bryan is a Senior IT Manager for the Office of the United States Senate Sergeant at Arms CIO Division, overseeing System Architecture and Integration. This report takes a look at the Senate’s recent upgrade to Exchange 2010. 
 
The move enabled them to adopt cheaper storage, significantly increase mailbox sizes, convert their Symantec ILM archiving over to the native Exchange archive, and virtualize a majority of their infrastructure. You will read about the challenges they encountered during the upgrade process and the consequent lessons that were learned as a result.

Some of the highlighted areas in this report include:
  • The Senate’s design goals for Exchange 2010
  • Comparison of  old and new Exchange environments
  • Considerations and selections for Exchange 2010 storage, archiving, and architecture
  • Migration approach
  • Exchange 2007 and 2010 solution overviews
  • Why storage design still matters
  • Importance of planning roles carefully
  • Determining the right balance between virtualization and consolidation

 



Presented On: Thu Jun 14, 2012
Mark Guidi , Senior Vice President
Details (hide)
Driving Business Value Through Technology: Historical Lessons and Future Implications is based on a Web Forum presentation given by Mark Guidi, Senior Vice President of Corporate Strategy for LPL Financial. Throughout history, societies have demonstrated time and time again how technology can be a strategic advantage. In the modern world, that same premise holds true for businesses. This report focuses on the three main components of technology: Innovation, Adaptability, and Quality. 

Mr. Guidi hypothesizes that performing well in those three areas can generate value, which will further drive business and society at large. For each component, you will read about an ancient culture who mastered in that area followed by some more modern examples. The report looks at how some of these newer technologies are changing the world and driving new business models for organizations. 

Some of the topics touched on in this report include:
  • Ancient China’s Song Dynasty and their innovative contributions
  • Modern innovation
  • How Ancient Rome improved a civilization by adapting
  • Apple’s “innovation” vs. “adaptation”
  • Globalization’s effect
  • Quality unlocks value
  • Looking ahead at technology in the mobile, virtualization, and video spaces
  • Business and societal implications
  • Education is key

 



Presented On: Thu Jul 19, 2012
Diane Martin , Director of Corporate Software Development , IMF Fellow
Mary Rasmussen , Director of Program Software Development , USAC
Details (hide)
From Waterfall to Agile: One Company's Journey is a report based the Web Forum presentation given by Diane Martin and Mary Rasmussen from the Universal Service Administrative Company (USAC). Agile software development practices continue to gain popularity in the IT industry. Is agile really the silver bullet? According to the Standish Group's 2011 CHAOS Manifesto, agile projects are successful three times more often than non-agile projects.
 
This report takes a look at USAC's journey from waterfall to an agile methodology and the "Scrum" framework in particular. You will read about the challenges, pitfalls, and results from this company's transition. The report also focuses on factors USAC found critical for successful agile implementation.
 
Some of the topics covered in this report include:
  • Overview of agile and its values
  • Scrum basics, including roles and meetings
  • USAC's IT organization pre and post agile implementation
  • Establishing new metrics for agile development
  • Lessons learned from USAC's agile transition
  • Future outlook 

 



Presented On: Fri Jun 8, 2012
John Stasko , Director , Georgia Institute of Technology
Details (hide)

Visual Analytics and Information Visualization: Bringing Your Data to Life is based on a Forum presentation given by Dr. John Stasko from the Georgia Institute of Technology. Investigators have an ever-growing suite of tools available for analyzing and understanding their data. While techniques such as statistical analysis, database queries, machine learning, and data mining all have benefits, this report explains how visualization can add much needed benefit to the mix.

Visualization brings capabilities for exploring data when one does not know which questions to initially ask. The report looks at why visualization is so powerful, how it helps people in data analysis, and provides some provocative examples of visualization techniques and systems. 

 

 

 



Presented On: Fri Jun 8, 2012
Flavio Villanustre , Vice President of Products and Infrastructure , LexisNexis
Details (hide)

Innovation with Big Data and Total Cost Ownership is based on a Forum presentation given by Dr. Flavio Villanustre from LexisNexis Risk Solutions. It looks at how Big Data and a Big Data processing platform helped transform LexisNexis Risk Solutions from $0 to $1.4 billion in 10 years. There is a case study presented showing that Total Cost of Ownership (TCO) of Big Data can catapult innovation, product delivery, and overall competitiveness in your organization.

This particular case study focuses on acquisition integration and includes ways to cut costs while increasing your capacity to scale for growth and innovation. Readers will get an in-depth look at the technology involved in LexisNexis’s High Performance Computing Cluster (HPCC) Systems and the benefits of this platform.

 

 

 



Presented On: Thu Jun 7, 2012
Adrian Gardner , CIO, Director of the Information, Technology, and Communications Directorate , FEMA
Details (hide)

Building a Future-Ready Digital Government is based on an IT Innovation Forum presentation given by Adrian Gardner from NASA’s Goddard Space Flight Center. Nobody can deny that the global mobile landscape is rapidly changing. As a result, Federal CIO Steven VanRoekel declared 2012 as the "Year of Mobile Government." This report details the complex approach involved with becoming a more future-ready digital government. You will read about the three strategic layers of this approach: presentation, production, and information.

Mr. Gardner provides great insight on how to make your organization more information and customer-centric while placing high value on innovation and collaboration. The report then shifts its focus to Virtual Desktop Infrastructure and the role it plays in a Bring-Your-Own-Device model. There are specific examples used from Mr. Gardner's experiences with NASA and Goddard in order to illustrate key points related to those concepts as well as Mobile Device Management.

 

 

 



Presented On: Thu May 24, 2012
Casey Bishop , Sr. IT Specialist , U.S. Senate
Claudette Archambault , Principal IT Specialist , U.S. Senate
Details (hide)
 
Transitioning from Waterfall to Agile: UX Opportunities and Challenges is based on a Web Forum presentation given by Casey Bishop and Claudette Archambault from the U.S. Senate. Agile isn’t necessarily a new concept but at the same time there's not much out there on how to make it work, best practices, etc. There is even less information available on how to make it work with UX integrated into the development phases. This report takes you through the Senate’s transition from a waterfall to agile methodology, specifically dealing with a lightweight, agile framework known as SCRUM.
 
Casey dives into the scrum process, including its roles, goals, and the importance of meetings. Claudette highlights the lessons they learned from the transition. Some of these include shifting scope, balancing current and future sprint goals, and design continuity. Then you’ll read about good ways to get this transition off the ground. Recognizing that it’s both a change in process and mindset as well as building the right kind of team will go a long way in determining success.
 
 


Presented On: Thu May 10, 2012
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)
Quality Improvements for Your IT Project Portfolio is based on a Web Forum presentation given by Michael Bender, an IT Financial Management Consultant. Mr. Bender has many years of  experience as an IT Finance lead and this report captures some of his brilliant insights. There are a lot of questions around project ROI and many IT executives don’t know how to translate their project’s value to the business. Business cases are critical in terms of IT Portfolio Management and you’re going to discover how to properly build one in a way that gets your project recognized.  

Now it’s not enough to have a business case. A case study used in this report shows the correlation between quality business cases and IT project spend at an industry leading tech company. Unfortunately, many organizations struggle with culture, process, and consistency issues relating to IT project ROI tracking. Find out why these challenges stifle innovation in your enterprise and how you can change course.

In order to improve the quality of your IT project portfolio, you must have solid assessment processes and scoring mechanisms in place. Mr. Bender details some of his best practices for measuring risk and value, including scorecards and educational materials. Finally, he lays out IT Portfolio Management adoption approaches for small, mid-size, and larger companies so you can select the best fit for your organization.
 
 


Presented On: Thu Apr 12, 2012
Alex Miyagi , U.S. Senate
Jim Lane , Senior Information Security Services Specialist , U.S. Senate
Details (hide)
 
Leading Change: System Management and Vulnerability Assessment Services is based on a Web Forum presentation given by Alex Miyagi and Jim Lane from the U.S. Senate. The Senate provides enterprise-wide SMS and vulnerability assessments on an “opt-in” basis. This report looks at how they convinced offices to subscribe to these services and what was learned during the endeavor. First you’ll read about the hard and soft benefits of technology as we try to answer the question: is it a people problem or a technology issue?
 
The report focuses on the Senate’s culture and how that contributed to early adoption failures. Then we find out how they made it work through several actionable items like organizational alignment, guiding coalitions, and short-term victories. Finally the report details challenges related to both your technology team and customers, followed up by ways to enable success, such as relationship building and process redesign.
 
  
 
 


Presented On: Thu Mar 15, 2012
Peter Ehrhard , IT Chief Architect , IMF Fellow
Craig Masters , Chief Mobility Architect , Harris Corporation
Details (hide)
 
Mobile Device Management is a report based on Peter Ehrhard and Craig Masters' Web Forum presentation. They are Chief Architects within the CIO Organization at Harris Corporation. This report presents an overview of Harris's mobility strategy, which is driven by a "Bring Your Own Devices" (BYOD) approach. It includes sections focusing on mobile security and management, necessary infrastructure upgrades, and application development methodologies. Finally, you will read about the company's Zenprise implementation experience and the tool's critical role in securing mobile devices that consume Harris data. 
 
 
 
 
 


Presented On: Wed Mar 21, 2012
Monty Hamilton , CEO , Rural Sourcing, Inc.
Details (hide)
 
Rural Sourcing: IT's Onshore Alternative is a report based on ITFM's March Call presentation given by Monty Hamilton, CEO for Rural Sourcing, Inc. Rural sourcing is quickly picking up steam as a cost-effective alternative to offshore outsourcing. This report touches on the cost comparisons and why using an onshore resource helps your bottom line. You will read about some of the driving forces behind this concept, the progress that has been made, and challenges that still exist. Case studies are provided to illustrate how rural sourcing can benefit an organization in a variety of ways. 
 
 
 
 
 
 
 
 


Presented On: Thu Mar 22, 2012
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)
 
"IT Software Asset Management" is a report based on the Web Forum presentation given by Michael Bender, Management Consultant for Silicon Valley Bank. Software asset management (SAM) is a business practice that involves managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. This report looks at SAM's potential benefits for your organization. You will read about the implementation process and its tactical nature, focused specifically on balancing the number of software licenses purchased with the number of actual copies installed. Learn how SAM can serve many different functions within organizations, depending on your software portfolios, IT infrastructures, resource availability, and business goals.
 
 
 
 
 


Presented On: Tue Feb 28, 2012
Jack Lewis , Manager PMO , Macy’s
Details (hide)
 
"Security & Privacy Standards for Outsourcing" is a report based on Jack Lewis' presentation at the IMF Sr. Executive Retreat. Jack is the Vice President for Global Workforce Strategies at Ceridian. His organization has chosen an international staffing model to support its global business footprint. Read about the various safeguards and practices Ceridian has implemented to enforce the Security and Privacy policies that govern their business model, both domestically and overseas. The following security measures are detailed in this report:

- Physical Security
 
- Information Security and Data Privacy
 
- Systems Security
 
- Network Security
 
- Personnel Pre-employment Screening  
 
 

 



Presented On: Mon Feb 27, 2012
Ann Jacobs-Long , Group Vice President , SunTrust Bank
Details (hide)
 
Implementing an Enterprise Program Management Office is based on a presentation given by Ann Jacobs-Long at The IMF Sr. Executive Retreat. Ann is a Group Vice President for SunTrust Bank. The banking industry’s unprecedented change and operating pressures will require SunTrust to manage a massive portfolio of performance improvement and regulatory reform projects. SunTrust has implemented an Enterprise PMO and Project Management Model to deliver the right projects, at the right time, for the right costs in the right way. This report looks at the value of an EPMO with regards to things like organizational strategy alignment. It walks the reader through a deployment approach focusing on three phases: Intent, Implementation, and Realization. You will also get an in-depth look at the particular EPMO model SunTrust selected as well as some background around those particular decisions.
 
 
 


Presented On: Thu Feb 9, 2012
Mark Guidi , Senior Vice President
Details (hide)
 
"Developing Capability Roadmaps" is based on a Web Forum presented by Strategy and Planning Executive Mark Guidi. The roadmapping process identifies critical customer needs and the capabilities, technologies, and skills that will meet those needs. It also helps a planning team set a strategic approach in a future oriented competitive context. This identifies gaps in meeting customers’ needs and helps define plans to fill the gaps. In this report, you will read about how roadmaps connect and balance the drivers of customer needs (“customer pull”) and technology innovation (“technology push”). It looks at different approaches, traps to avoid, lessons learned, and roadmap integration. Also included in the report is a case study taking you through the roadmap process.
 
 
 


Presented On: Thu Jan 19, 2012
Allen Greathouse , Vice President, Enterprise Information Services , Harris Corporation
Details (hide)
 
"IT Governance: Supply & Demand" is a report based on a Web Forum presented by Allen Greathouse, Director of Corporate IS Governance, Architecture, and Policy at Harris Corporation. It looks at the keys to success in achieving your governance goals, such as understanding your environment and strong PMO discipline. Potential pitfalls are examined, like poor resource management and strategic alignment. Readers will learn about the difference between "doing things right" (Supply) versus "doing the right thing" (Demand). Find out how those two elements play a pivotal role in your organization's IT Governance.  
 
 
 
 
 
 
 


Presented On: Tue Jan 10, 2012
Details (hide)
 
This report is based on an IMF member initiated Connect call focusing on “Centralized Cellular Device Management.” A member company with 10k devices had just centralized and wanted to ensure they had the proper controls and policies in place. At the same time they had to be responsive to the field. Here you will read about various views on issues like:
 
- Contract negotiations, including billing plans
 
- Using vendors as an extension of your staff
 
- Different device implementation models, like stipends and tiers
 
- Emphasizing service over hardware
 
- Internal improvements
 
 


Presented On: Thu Jan 12, 2012
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)
 
This report is based on a Web Forum presentation given by Hans Eckman, former Principal (Senior Consultant) for xpanxion (consulting and dedicated offshore IT firm). It focuses on best practices when working with offshore and distributed IT services. Challenges can be magnified with distance. Many companies consider their offshore initiatives as under delivering on expected ROI or in some cases complete failures. Read this report to learn about the best practices, tricks, and pitfalls for adapting activities to optimize projects that work with offshore and distributed project teams. 


Presented On: Thu Dec 1, 2011
Details (hide)
 
This report is based on an IMF member initiated Connect call focused on “Middleware & Application Integration.” It addresses how other companies are handling application integration into their environment while utilizing a middleware toolset (BizTalk, AIA, etc.). Find out how organizations create SOA or Middleware policies and how they enforce those policies. Learn about the individuals involved in this process and the challenges it presents. You will also read several other elements including:
  • How to gain upper management buy-in
  • Demonstrating the benefits of the service

  •  ROI measurements

  • Technologies used for Application Integration
     
  • Size and reporting structure for an Application Integration team 


Presented On: Tue Nov 1, 2011
Details (hide)
 
An IMF member initiated this Connect to discuss Fraud Prevention and Management Practices. Their goal was to gain insight into how other IMF member companies are approaching the matter. This report looks at the various aspects of an organization's fraud management framework and best practices. You will also read about: 
 
  • The relationship between the Fraud Team(s) and your company’s leadership team
  • Pain-points regarding fraud and how to work through them
  • Balancing the need to have fraud prevention with other business priorities
  • Measures of success
  • Technology and tools used in a fraud prevention strategy
  • Core CBA selling features that promote further investment in the Fraud Team(s)


Presented On: Thu Nov 10, 2011
Doug Burton , Senior Manager , Allstate Insurance
Greg LaVigne , Platform Architect , Allstate Insurance
Details (hide)

“Virtual Desktop Deployment: Lessons Learned & Mistakes to Avoid” is a report based on a Web Forum presentation given by Doug Burton and Greg LaVigne from Allstate. They are two years into an enterprise-wide virtual desktop initiative, targeting over 30,000 employees. One year after going live with the technology solution, 100+ applications and 2,000+ users have been converted.  This report looks at their approach to this initiative, with a focus on the people, processes, and technology lessons learned.
 
 
 
 
 


Presented On: Thu Nov 3, 2011
Rob Murphy , Program Manager , U.S. House of Representatives
Details (hide)
 
"Flexibility During Project Implementation" is a report based on a Web Forum presentation by Rob Murphy, CAO for Enterprise Applications at the U.S. House of Representatives. The House is in the process of implementing a Financials ERP. It is a project they have decided to rollout in phases. This report takes a look at what the project team has been able to accomplish while going in-depth on some of the issues that drove internal project decisions. You will read about instances of schedule adjustment, different approaches to customization, and staffing resources that can be utilized throughout the project lifecycle. 
 
 
 
 
 


Presented On: Tue Oct 4, 2011
Michael Higgins , Director of Information Security and Chief Information Security Officer , Harris Corporation
Details (hide)

“Security Architecture: Living in a World of Compromise” is a report based on a presentation given at our Fall Sr. Executive Forum by Michael Higgins, CISO for Harris Corporation. It looks at different types of threats companies face, specifically with regards to Advanced Persistent Threats. You will read about how these threats typically materialize and how to create friction for your adversaries because “unless you disconnect from the Internet you are going to be compromised.” This report shows what changes have taken place over the past couple of years in Information Security and where you should focus your efforts today. 


Presented On: Thu Oct 27, 2011
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)
 
“Enterprise Portfolio Management” is a report based on a Web Forum presentation given by IMF consultant Mike Bender. It focuses on a brief case study of how Cisco implemented a new Enterprise Portfolio Management approach with the objective to coordinate and improve the overall value of Cisco's key cross-functional (Finance, IT, Operations, Manufacturing, HR, etc.) enterprise transformation investments. Specific topics covered in the report include investment selection, monitoring, benefit tracking, architecture roadmaps, and the change management needed to implement this approach.
 
 
 


Presented On: Mon Oct 3, 2011
Nalneesh Gaur , Partner , PricewaterhouseCoopers LLP
Details (hide)
 
“Security Considerations for Being Social & Mobile While Riding the Cloud” is based on a presentation from our Sr. Executive Forum in Baltimore. Nalneesh Gaur, a Director for PricewaterhouseCoopers, discusses the three key technologies driving business innovation today: cloud, social media, and mobile. Consumerization of these technologies is one reason they appeal to businesses. Savvy technology leaders welcome the opportunity and are working with individual businesses to drive their transformation at a faster pace than ever. But the trend raises security concerns. This report takes a look at the cyber-security risks, focusing on the key questions and considerations for advancing a business agenda that relies on one or a combination of these three critical technologies. 
 
 
 


Presented On: Thu Oct 13, 2011
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)
This report is based on a Web Forum presentation given by Dr. Jonathan Reichental, CIO for the City of Palo Alto, CA. Social media at one time was considered more of an option for companies but it is quickly becoming a requirement.  The usage rates for blogs and mainstream sites like Twitter and Facebook are absolutely staggering. Consumerization has played a major part in this shift of focus. Here we will look at social media’s impact on the business from a variety of standpoints, such as innovation and collaboration. The journey towards a social enterprise can be difficult but this report provides an outline for changing your organization’s culture and gaining executive support.


Presented On: Mon Oct 3, 2011
N. Derek Wilkinson , Managing Director , Boyden
Details (hide)
This report is based on a Forum presentation led by Derek Wilkinson, the Managing Director for Boyden Global Executive Search. It focuses on how candidates can better position themselves with recruiters. Executive recruiters work for the hiring company and in a tough job market they are often overwhelmed with high quality executives endeavoring to advance their careers. The report will take a look at this dilemma, where the job market is heading, and what individuals can do separate themselves from the pack.


Presented On: Mon Oct 10, 2011
Details (hide)
 
This report is based on a member initiated IMF Connect discussion focusing on “Change Management.” The member company is moving to a more integrated environment and wanted to find out what the business response is to handling configurations for different software. In particular, they were interested to see how other companies assign responsibilities in change management.  Here you will read several views on these issues from companies who are in or have gone through similar situations. They provide their perspectives and best practices. Other areas of focus for this report include:
 
- When a business unit wants to change to a business process that is automated by one or more IT systems, who leads the change management process, the business unit or IT?
 
- In a successful change management process, what roles and responsibilities are the business unit’s vs. IT’s?


Presented On: Mon Oct 3, 2011
Brent Conran , CISO , McAfee
Details (hide)
 
"Advanced Persistent Threats to Mobility" is a report based on a Forum presentation given by Brent Conran a tour Fall Sr. Executive Forum in Baltimore. Mr. Conran is the CIO and CISO for the U.S. House of Representatives. This report focuses on security operations today and battling the "new threat landscape." It also provides some counter measures that your organization should be practicing to combat these threats. We will look at some of the sources and methods these cyber-criminals are using, such as malicious code, root kits, and different data mining tools. The characteristics of these attacks and attack groups are another issue touched upon in the report. 



Presented On: Thu Sep 22, 2011
Jonathan Asher , Group Finance Manager , Microsoft Corporation
Jason Cowan , Group Finance Manager , Microsoft Corporation
Details (hide)
Planning & Budgeting at Microsoft” is based on a Web Forum presentation by Jason Cowan and Jonathan Asher from Microsoft. This report looks at MSIT’s process for planning and operationalizing its annual strategic plan and budget. It takes a real in-depth look at target setting and the key steps in that process from both a financial and infrastructure perspective. Microsoft utilizes several funding models to various degrees and those are focused on as well. Learn about how the IT Finance team supporting Microsoft’s Worldwide IT Infrastructure and Services team operationalizes those dollars once they are allocated to the organizations.
 
 
 
 
 
 


Presented On: Mon Sep 26, 2011
Details (hide)
 
Performance Management Reporting” is based on a Connect initiated by one of our member companies. That company recently experienced a reorganization that placed their service desk and field services organizations under a single executive. They are now evaluating performance management reporting for this newly consolidated end user services operation. The goal is to develop a cascading set of aligned metrics that measure not only the performance of the individual technicians and teams, but also provide insight into the end-to-end customer experience. This report covers the discussion between several member companies on how they have handled this situation and several best practices they have established.
 
 
 
 


Presented On: Tue Sep 20, 2011
Mark Masenhimer , Senior Finance Manager , Microsoft Corporation
Details (hide)
This report is based on a presentation given for the ITFM September Call. Mark Masenhimer is part of the IT Finance Infrastructure team at Microsoft and he spoke about the budgeting process at MSIT, specifically with regards to bottom-up budgeting. Here you will read a methodology comparison for top-down versus bottom-up budgeting and how MSIT views these methods. The advantages and disadvantages to bottom-up budgeting are explored. While it may be traditionally more accurate, there is usually more time and expense involved. Mark focuses on the target setting phase of the budgeting process and explains what they include in those targets or goals. We will also look at the steps MSIT is taking towards building a better foundation so it can reap the benefits of bottom-up budgeting. There are specific requirements they are putting in place to achieve those budgeting objectives and those will be detailed.
 


Presented On: Thu Sep 15, 2011
Details (hide)
 
A consistent focus area for IMF benchmarking clients over the past year or so has been more robust implementations of utility models for storage. We’ve all seen the charts in meetings showing exponential growth of storage footprints year over year, and seen storage become a bigger and bigger piece of the IT cost pie. This report will provide insights into how far companies are actually getting down the StaaS road as observed by The IMF’s Managing Director of Information Exchange, Caleb Masland. You will read about issues such as:
 
- Storage Utilization differences observed in utility model environments
 
- Actual targets observed for Storage Virtualization, Thin Provisioning, Data Deduplication, Storage Auto provisioning, etc.
 
- Expected and actual Cost Differences across various delivery models
 
- Current trends in the usage of SAN, NAS, DASD, and Virtual vs. Physical Tape


Presented On: Wed Sep 7, 2011
Details (hide)
 
Remote Workforce Transition” is a Connect Report based on an IMF Connect initiated by one of our member companies interested in transitioning to a remote workforce. They were looking to move some of their home office employees to remote status. In this report you will read about how different companies determine potential benefits to their customers and define the success of their remote workforce. Learn about working with the business side to determine proper metrics and the benefits of using third party resources to handle your work-from-home employees. Some of the other issues approached in this report include training your leadership and using a “manage the process, not the people” method for your remote workers.  


Presented On: Thu Aug 18, 2011
Cathy Kirch , SM Process Architect , Allstate Insurance
Details (hide)
 
Best Practices in Release Management” is based on a Web Forum presentation by Cathy Kirch, a Process Architect for Infrastructure Services at Allstate. It focuses on best practices for pursuing an Enterprise Release Management Process (ERM). In this report you will read about how the process was rolled out at Allstate to first gain compliance and then for continual service improvement. There were plenty of challenges and lessons learned along the way. The report also looks at common language, release phases, release types, integrating with Change Management, and basic metrics out of the gate.


Presented On: Sun Aug 28, 2011
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)
On Lock-Down: Requirements Change Management” is based on a Web Forum presentation by Hans Eckman, Vice President and Enterprise Business Analyst for SunTrust. It focuses on how the remediation cost of changes and defects increases significantly during the project lifecycle and post implementation. BA’s often struggle on projects and with project team members trying to manage scope, changes to requirements, and clarifications. By reading this you can learn how to use some of the fundamental principles of project and release management to create an iron clad requirements management process.


Presented On: Thu Jun 9, 2011
Hans Eckman , Hans Eckman, GVP, Security Services Workstream Manager , SunTrust Bank
Details (hide)
Enterprise Architecture Innovations Team” is based on a Forum presentation by Hans Eckman, Vice President and Enterprise Business Analyst for SunTrust. This takes a look at SunTrust’s unique Innovations Team. Companies often have teams to manage technology standards and approve software use, but who is working to help leverage these systems and emerging technologies to solve disparate business challenges?  Find out how the Innovations Team engagement model can be leveraged in your organization to replicate solutions across multiple organizational needs, develop proof of concept systems, evaluate emerging technologies, and transition work to projects or business units.


Presented On: Wed Jul 6, 2011
Details (hide)
 
This report looks at the pressure points and risk assessments associated with the public cloud through the eyes of several IMF member companies. They address the IT structure and configuration needed to use a public cloud. Other areas of focus include: cloud security; determining which applications are best suitable for cloud migration; and how to deal with vendors regarding contracts and SLA’s. There is also some debate around what actually defines the cloud.
 
 
 
 
 
 


Presented On: Thu Jun 30, 2011
Cassandra Van Gelder , Senior Technical Writer , Caesars
Details (hide)
Here you will learn about the benefits of having properly trained technical writers and satisfactory documentation. Whether it is time or money, bad documentation habits will cost your organization more than you probably think somewhere down the line. There is an experiment provided to give you a brief snapshot of just how much time you may actually be wasting while trying to look over documents. Alas, there is a better way and this report will take you through the 8 steps necessary to improve your documentation practices.
 
 
 
 


Presented On: Thu Jun 2, 2011
Details (hide)
                                                                                                                                                                           Here you will learn about the capacity and performance management strategies of several IMF member organizations. You will learn about what capacity metrics these companies are using for their forecasting purposes as well as how implementing chargebacks can help control system growth. We will also look at “stress testing” and the differences between capacity management versus performance monitoring. There is detailed discussion included on Configuration Management Databases and the push for virtualizing your environments.

 



Presented On: Mon Jun 13, 2011
Details (hide)
                                                                                                                                                                        This report looks at managing data center workloads. It focuses on the scenario of having two main data centers with the thought of switching over to one primary data center and a secondary backup. You will also read about the idea of splitting development and production between the data centers as well as the option of moving certain applications and systems to the cloud. Data replication methods and practices are expanded upon and the importance of properly mapping your solution chain is examined.

 

 

 
 


Presented On: Wed May 25, 2011
Details (hide)
 
Here you will learn about the strategies several companies have deployed to surrounding batch job management. You will read about the different ways to handle incident and change management, including managing different environments. We broach the topics of workload scheduling and process automation as well. On top of that we will take a look at what key metrics and measurements other companies use in their evaluation process.
 
 


Presented On: Tue May 24, 2011
Details (hide)
 
In this report we will focus on an IT organization searching for answers on how other IT departments handle the challenges presented by corporate email on their employees’ personal devices. You will see how other companies deal with several issues like written policies, employee eligibility, and corporate vs. individual liable information. Also included is a rather in-depth look at the biggest threat on people’s minds: security. Find out other organizations’ concerns and what they are doing to solve the puzzle.


Presented On: Thu Jun 2, 2011
Cama Piccini , Human Resources Business Partner , Harris Corporation
Details (hide)
 
This report focuses on Harris Corporation’s IT Rotation Leadership and Development Program. The program was developed  to ensure Harris recruits, hires, and develops successful future IT leaders. It is a fast track rotation and development program for high potential employees that provides job enrichment and career broadening for early IT professionals and new graduates. Read about the program's success and how you can incorporate something like this into your organization.
 
Here is a sample about some of the benefits of these rotation programs:
"This program gives participants in-depth exposure across the corporation. Harris has become a larger international presence with many different divisions. Employees need a broader view of their position in the company. These rotations let them see how operations within their respective divisions affect the company as a whole.
Networking is another driving force behind the leadership and development programs. Getting things done in a big company can be difficult for a variety of reasons. Rotations allow employees to venture out into the different divisions and network within those groups as part of a project team. As a result, they become familiar with various groups and individuals, making it easier to accomplish their tasks in a timely manner.
 
This is real life on the job training employees are receiving while participating in their rotations. It maximizes their learning experiences at Harris..."


Presented On: Thu May 19, 2011
Michael Podemski , Manager, Advisory Services , Ernst & Young
Details (hide)
 
In this report we will focus at the key steps and processes for planning and executing a comprehensive technology audit. It dives into several different types of technology audits. We will also look at some approaches to performing risk assessments and the various frameworks that can be used as part of the audit. The benefits of these different approaches will also be addressed, as well as the issues to keep in mind.
 
Below is an excerpt on different frameworks provided from ISACA:
 
A majority of the frameworks Michael Podemski uses come from ISACA because of his IT audit background and the purpose of the organization. COBIT 4.1 is the IT governance framework they use followed by the IT Assurance Guide using COBIT. This is where he obtains most of his test procedures or guidance for test procedures. Val IT is an enterprise governance framework of IT. Using this is like looking into IT from a business perspective. For instance, in looking at IT portfolio management you are focusing on how the company is investing their money into IT projects and operations. Podemski has used Val IT in the past to assess how Allstate has done funding on projects. It has a lot of the valuable information you need in a framework.
He will also utilize the mappings of ITILv3 to COBIT 4.1, TOGAF 8.1 to COBIT 4.0, and PMBOK to COBIT 4.0. If you are not familiar with ITIL, it is an IT service management framework. Version 3 is more comprehensive than Version 2. Version 3 talks about the identification of a service that is going to enable your business using technology through the design, deployment, operation, and eventually retirement of that service…”


Presented On: Thu May 5, 2011
Patricia Lee , Lead Architect , Caesars
Details (hide)
 
This report looks at Casears’ enterprise architecture framework and shares some of its successes.  Also included in the report is an overview of Caesars’ architecture review process.  You will then see how the EA team works to ensure the integrity of solutions without assigning architects to the projects and the various architecture domains. 
 
Below is an excerpt from the report talking a little bit about Caesars’ Architecture Review Board process…
 
Based on the overview, Caesars expects to have the project scope defined with some of the known constraints. The stakeholder impact is looked at from the business side, staff side, and, when vendors are engaged, the vendor management perspective. A functional overview uses business terms to show what applications are involved and which pieces are being delivered by each area. It describes the overall solution and key integration points. Next is a high level technical overview. This is basically the same layout as the functional overview. However, instead of utilizing business terminology, the presenter overlays it with the transport mechanisms, data bases, and perhaps data center locations involved. It indicates these aspects as new, changed, or removed and if regulated. The highlights point out interesting functional or technical components that are new and unique with this project compared to all of the others. What makes it stand out, essentially?
 
Being in a highly regulated industry like gaming with multiple regulatory agencies, Caesars places a lot of emphasis on ensuring compliance. This is where the commonly missed items and regulatory topics come into play. For Caesars, this can be areas like: responsible gaming; gaming regulatory; infrastructure; design reviews; and vendor solutions. These are there to avoid a situation where a development lead does not know to ask about the critical areas. A lot of times individuals mean no harm but some things are just missed due to ignorance. While the regulations may be different from industry to industry, it still happens all the same. It is the age old challenge: you do not know what you do not know…”  


Presented On: Thu Apr 21, 2011
Nick Malik , Enterprise Architect , Microsoft Corporation
Details (hide)
 
When managing the portfolio of projects in organizations, many of the core concepts of traditional IT demand management fail to deliver on one of the key demands of CIOs: IT-Business Alignment.  This report focuses on the meaning and value of Alignment and how it can be measured. Furthermore, it will show you how to find projects that are misaligned, what to do when you find one, and how to include alignment in the overall demand management process.
 
Here is a brief excerpt from the report on supporting innovation…
 
There is no real ROI for disruptive change because quite frankly most disruptive change fails, especially if your company is trying to lead and get out in front. If that is the case, the goal should be to get out in front as fast as possible, fail as fast as possible, learn as fast as possible, and do it again. In this case, using ROI to decide what makes the cut list of funded projects can have an adverse effect.
Every year Business Week lists 50 of their most innovative companies which typically includes companies like Apple, Google, Microsoft, IBM, and Toyota. The question becomes what are these companies doing and, more interestingly enough, do you want your company on that list? If you do, the internal processes in your company have to support innovation. In order to support innovation you have to support failure and in order to support failure you cannot have ROI as the primary mechanism for prioritization and demand management. The same holds true for any change project. ROI will not take you where you want to go from an innovation standpoint. ROI based planning can actually stifle innovation…”


Presented On: Thu Apr 14, 2011
Jill Allen , GVP , SunTrust Bank
Details (hide)
 
Throughout the recession, employee morale has been a challenge due to layoffs, increased workload and other factors brought on by an uncertain market. SunTrust has successfully worked to combat these challenges. This report will take a look at some of the strategies they have implemented to ensure they retain the best and brightest “teammates.” It will also focus on the creation of a Professional Development Manager role and the positive impact this has made on SunTrust’s organization as a whole.
 
Here is a brief excerpt on teammate feedback:
 
“…SunTrust Bank has always found teammate feedback critical for improvement. Generally they utilize employee surveys. An outside organization is asked to perform these surveys in order to gauge the pulse of SunTrust’s teammates. The goal is to find out how individuals felt about the organization and whether or not current procedures were working. In late 2005, in response to teammate surveys, the bank embarked on an effort to change the landscape of how its teammates are measured for performance, goals monitored, feedback provided, and growth within the organization. This gave way to the Professional Development Management model. To facilitate this change, leadership behavior needed to change and the organization needed a redesign…”  
 


Presented On: Thu Mar 24, 2011
Chris Hildenbrand , Senior Director, Information Security and Risk Management , Microsoft Corporation
Price Oden , Principle Security Architect , Microsoft Corporation
Mark Estberg , Senior Director of Information Security Risk Management and Compliance , Microsoft Corporation
Details (hide)
 
As more and more organizations begin moving their programs and applications to the cloud, security becomes a hot button issue. Microsoft’s internal IT Security and Compliance team recently led a discussion on its strategy for building applications to run securely in the cloud. This report focuses on that strategy and its governance model. Their risk-based acceptance strategy of future projects planned for cloud deployment is also looked at in-depth.
 
Here is a brief excerpt on cloud security challenges:
 
“...The first is a growing interdependence among cloud service providers and cloud consumers. There are mutual expectations that platform services and hosted applications must be secure and available. That web of interdependency can become complex. At Microsoft, they spent a lot of time on the following: understanding those dependencies on interdependent cloud services; ensuring they have solid reliability plans; setting clear expectations about the availability of their cloud services.
The second challenge is meeting compliance obligations. If you work for international organizations you can experience ambiguous regulations as well as conflicting regulations. This is an area Microsoft has invested heavily in to ensure they can meet their compliance obligations in business ventures around the world. 
Another issue is security methods keeping up with evolving technologies. Virtualization is clearly an example of this challenge…”

 



Presented On: Mon Mar 7, 2011
John Crary , Chief Information Officer , American Red Cross
Details (hide)
 
Social media policies vary according to organization type and size, and there is no blueprint for implementation and integration. This report focuses on how the American Red Cross is utilizing social media to help meet its initiatives and the unique lessons they have learned through disaster scenarios. It also touches on the fine line between public and private information and the security problems that can arise due to this conflict.


Presented On: Thu Mar 17, 2011
Maru Flores , Manager, Digital Worker Programs , Ford Motor Company
Details (hide)
 
Ford Motor Company’s Digital Worker program was set up to enable global employee collaboration.  With the One Ford plan, Ford understands its success is increasingly dependent on employees collaborating around the world.  The ultimate goal is to provide the tools and services that connect people and data, anytime and anywhere. This report focuses on some of the strategies that have been deployed to ensure this program is successful and meets the needs of a growing global organization.

                                                           



Presented On: Thu Feb 17, 2011
John Toner , Associate Director, Data Centers , Verizon Wireless
Details (hide)
 
Over the last few years Verizon Wireless has made energy conservation initiatives at its data centers a top initiative. Their efforts have brought them recognition and awards for their success in both cost and energy savings. This report outlines their strategy, process, and the benefits reaped from the energy efficient improvements.



Presented On: Thu Feb 24, 2011
Details (hide)
 
Previous discussions about application development benchmarking at IMF events have tended to devolve into contentious debates about the merits or shortcomings of function point analysis. After seeing the same debate go nowhere time and again, IMF’s benchmarking group took a step back and asked themselves, “Is there a comparable and effective way to compare application development and maintenance that is simple enough for any organization?” This report will explain the method The IMF has been using with their benchmarking clients in recent months and how it’s yielded actionable results without the headaches (and costs) associated with a detailed function point study.


Presented On: Wed Apr 6, 2011
Details (hide)
 
In the first quarter, member initiated connects revolved around testing applications, software licensing standards, and website capitalization.
 
In order to improve its existing processes, one IMF member wanted to see what best practices other companies were using relative to software licensing. They came across one standard and were trying to see if anybody else was using that particular standard and how they are implementing it.
 
Another IMF company was interested understanding how other companies go about capitalizing portions of their website. They want to move to a more frequent capitalization and creation of a fixed asset for this work they are doing with their website. Also they would like to find out how other teams go about putting together the different portions of website development into phases.
 
As an organizational improvement, another IMF Connect involved a member company’s desiring to discuss viewpoints other IT organizations have for Industry best practices for testing applications.  They wanted to know what do best in class testing areas measure (KPIs), and what percent of the SDLC dollars are spent on testing, among other issues. 


Presented On: Thu Jan 13, 2011
Matt Carothers , IT Security , Cox Communications
Details (hide)
 
Digital crime is more sophisticated and prevalent than ever.  IT organizations must work to stay ahead of these type attacks.  This report will focus on some best practices utilized by Cox Communications to ensure digital crime is effectively addressed. It looks at different techniques in correlation to the different types of Spam that are out there today.


Presented On: Thu Dec 9, 2010
Max White , Portfolio Manager, Business & Information Management , Pacific Northwest National Laboratory
Details (hide)

This report takes a look at the implementation and success behind the award winning technology, Project Central, a software application designed by PNNL Information Management Services. It provides a central service-oriented framework for managing project lifecycle information from beginning to end.



Presented On: Thu Nov 18, 2010
Dustin Fennell , CIO , Scottsdale Community College
Details (hide)
 
Scottsdale Community College was recently awarded CIO Magazine’s Innovation Award Driving Future Business with Technology Innovation after successfully virtualizing its computing infrastructure. This report takes a look at the IT environment prior to this project and the success they have seen after moving to a more virtualized environment, including a savings of $250,000 annually.


Presented On: Thu Nov 4, 2010
Walton Smith , Booz Allen Hamilton
Details (hide)
 
For most organizations outlook is the de facto knowledge management and collaboration tool, however it is not searchable or scalable. In this report, learn how Booz Allen Hamilton leveraged a wide range of Enterprise 2.0 tools to unlock the explicit and tacit knowledge within its growing worldwide consulting firm.


Presented On: Thu Jan 27, 2011
Details (hide)

This is a sample benchmarking report put together by The IMF's Managing Director of Information Exchange, Caleb Masland. It focuses on 3 areas of study: Intel & MidRange Servers, Enterprise Storage, and Mainframes. 



Presented On: Thu Jan 27, 2011
Details (hide)

This is a sample benchmarking report focusing on Application Development.



Presented On: Thu Oct 28, 2010
Scott Laliberte , Managing Director , Protiviti Inc.
Details (hide)
 
Data leakage is an increasing problem facing companies today. Each day individuals put sensitive data at risk by improperly emailing, transmitting, copying or otherwise losing the data. Data Loss (leakage) Prevention (DLP) can be an effective way to help limit this risk. DLP has also become a popular buzz word with many products claiming to provide DLP capability while not really delivering true DLP protection. This report discusses the need for DLP, risk DLP mitigates, types of DLP available, Pro's and Con's of DLP technology, and considerations when assessing and deploying DLP technology.


Presented On: Thu Oct 14, 2010
Sandra Slaughter , Professor, College of Management , Georgia Tech
Details (hide)

This report, “Soft Skills and Their Place in Project Management,” is presented by Dr. Sandra Slaughter, a professor at Georgia Tech. It talks about the skills needed for effective project management in global software projects. While project managers need technical, domain, and project management expertise, they also need “softer” skills like practical intelligence and cultural intelligence to effectively manage global project teams. The report discusses what these soft skills are and how they can be utilized for better project management. Also included in the report are project examples and a case study Dr. Slaughter and her team performed.



Presented On: Thu Oct 7, 2010
Rodney Tosten , Gettysburg College
Details (hide)

This report covers the development of an on-line, real-time Graduation Requirements Tracking System and a Recognition and Participation Tracking System that is available through Gettysburg College’s PeopleSoft ERP. These newly developed systems replaced a paper based systems and ended up saving 2000 fewer hours in data management. Included are some of the process changes as well as successes that came about along the way.



Presented On: Thu Sep 30, 2010
Details (hide)

Managing the security of critical information has proven a challenge for businesses and organizations of all sizes. Even companies that invest in the latest security infrastructure and tools soon discover that these technology-based “solutions” are short-lived. Attackers are constantly changing their tactics and strategies to make their attacks and scams as damaging as possible. This report covers 10 key information security activities your company may want to be aware of come the New Year.



Presented On: Thu Sep 23, 2010
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)

 

This report highlights some best practice techniques in managing IT Innovation for business value.  The report also describes the role of IT innovation in an organization today and 5 ways to make IT innovation work for your company.


Presented On: Thu Aug 26, 2010
David Sanek , Group Vice President and CPMO Competency Manager , SunTrust Bank
Details (hide)
 
For the first time in history, the workplace is a generational melting pot comprised of four generations that bring with them contrasting values, attitudes, expectations and viewpoints. To be successful, every organization and every leader must learn to effectively manage the diversity of each generation in order to enable creative and successful teams. This report details the different generations, what they think, and why they think that way. It also focuses on reality versus perception in regards to the “generation gap.”


Presented On: Thu Jul 29, 2010
Tom Guthrie , Vice President , IMF Fellow
Details (hide)

In moving from head of infrastructure to head of Enterprise Architecture for Cox Communications Tom Guthrie had many challenges. He built a very pragmatic model to assess the opportunities for improvement and moved quickly into the implementation phase. This report will discuss the challenges he uncovered and the perspectives he gained in the new role.



Presented On: Thu Aug 5, 2010
Arnold Coleman , Sr Consultant of Business Operations Support , Verizon
Tony Dragoni , Vice President of IT Consumer and Mass Business Billing , Verizon
Details (hide)

This report centers around the success Verizon has had with its Student Mentoring Program.  Several Verizon employees walk through the steps that were taken to establish the program, some of the issues and concerns that arose and are ongoing, and how both the students and mentors were coached to ensure a meaningful and healthy mentorship was created.



Presented On: Tue Jul 13, 2010
Shelly Nichols , Project & Process Quality Director , PricewaterhouseCoopers LLP
Details (hide)

This report focuses on the business perspective and impact of transitioning to an outsourced managed services model for the support and development of the Firm's financial systems. You will see how IT managed the transition, the impacts to the Finance organization and the changes the Finance PMO has had to implement in order to support the new model.



Presented On: Tue Jul 13, 2010
Sumeet Sanghani , SVP, Global Outsourcing , SunTrust Bank
Details (hide)
 
In this report, we will take a look at some of SunTrust’s success and the key strategic steps it took to avoid many of the difficulties other financial institutions have faced during this economic downturn. It will also touch on some Mr. Sanghani’s experiences in managing Global Outsourcing at SunTrust, including the changing nature of outsourcing and the challenges and guiding principles of a successful outsourcing strategy.


Presented On: Tue Jul 13, 2010
Jo Ann Sheppard , LexisNexis
Details (hide)

Over the past three years, project management at LexisNexis has played a key role in the integration of Choicepoint into LexisNexis.  From migrating to new platforms, sun-setting technologies, to bringing DR in-house, the last few years have been significantly challenging. This report details some of those key milestone migrations and how Project Management assisted in transition management.  



Presented On: Wed Jul 14, 2010
Tracy Bleam , Director of Project Management , FHLBank Atlanta
Details (hide)

 

In response to the need for better project management of two of the largest projects ever undertaken at FHLBank Atlanta, the bank decided to build a Project Management Office.  Their goal in doing so was to improve processes and build their bottom line by giving these and other projects an improved chance of success.  This report takes a look at that process including the key steps taken in development, benefits received, and how this endeavor contributed to the success of both projects.


Presented On: Tue Jul 20, 2010
Lisa Ercoli , Director - IT Strategy and Planning , Verizon
Details (hide)

Collaboration among project management teams has become increasingly important as more and more companies turn to virtual teams, accommodating multiple locations in various geographical areas. Difficulty with communicating, working together, and producing high-quality, on-time results is typically heightened by distance. This report will reveal some best practices in collaboration among remote teams and explain some of the challenges associated with virtual teaming.



Presented On: Thu Jul 8, 2010
Rich Razon , Co-founder , PureShare
Details (hide)

This report is an introduction to best practices in deploying ITSM performance metrics. Irrespective of tools available, it will guide you to move from being in a constant state of fire-fighting to a more productive, proactive state with metrics.  



Presented On: Thu Jun 10, 2010
Andrew Filev , CEO , Wrike
Details (hide)

Collaboration among project management teams has become increasingly important as more and more companies turn to virtual teams, accommodating multiple locations in various geographical areas.  Difficulty with communicating, working together, and producing high-quality, on-time results is typically heightened by distance.  Andrew Filev, CEO at Wrike, Inc., has successfully implemented best practices in collaboration among teams. This report shares some of the challenges and success associated with remote collaboration. 

 



Presented On: Thu Jun 24, 2010
Kevin Hyatt , IT Innovation , Walt Disney Company
Details (hide)

IT Innovation is costly and, even though the ROI is not always readily apparent, it must be done to move the business forward. What are some of the strategies used by successful, innovative companies? In this report documents some of the methods Disney uses for communication to cut back on costs. This includes videoconferencing and an interesting look into the growing popularity of telepresence. 
 



Presented On: Thu May 13, 2010
Srinivasa Kalapala , Sr. Manager - VZT Architecture , Verizon
Details (hide)

Srinivasa Kalapala, Senior manager of Enterprise architecture spoke on the growth and implementation of enterprise architecture at Verizon. He will touches on the challenges faced in planning and designing enterprise applications that are spread across business and geographies as well as developing architects to think at enterprise level.



Presented On: Thu May 6, 2010
Paul Moran , Information Security Analyst , Automotive Resources International
Scott Laliberte , Managing Director , Protiviti Inc.
Details (hide)

Over the last few years, a greater emphasis has been placed on separation of IT duties across all IT functions, especially security.  Most organizations are now realizing responsibilities must be assigned to individuals in such a way as to mandate checks and balances within the system and minimize the opportunity for unauthorized access and fraud, among other things.  But, how does a security organization do this while ensuring all security needs are met and the process runs effectively and efficiently?  This report will discuss the benefits and challenges created by these separation of duties, as well as how their organizations have addressed security issues.



Presented On: Thu Mar 11, 2010
Nick Schneider , Consultant , newScale
Details (hide)

The Service Catalog is the heart of the Front Office of IT which enables key Front Office processes such as Service Portfolio Management, Demand Management and Financial Management. Together these capabilities enable an organization to experience a broad range of benefits from rationalizing services to optimizing demand to controlling service consumption and managing fulfillment. This report will explore these concepts in more detail with practical examples.


 



Presented On: Thu Jan 14, 2010
Michael Hitson , Project Program Manager , Verizon
Details (hide)

Dr. Michael Hitson, whose academic work and research centers on team leadership within virtual environments, offers a presentation centered on leadership process and methodology within virtual teams who are oftentimes transitory in member orientation.



Presented On: Mon Jan 25, 2010
Christopher Corrado , Senior Vice President, Technology Products , Asurion
Details (hide)

Designing a company’s IT and Business strategy is a familiar task for many organizations, but managing to that strategy proves to be another feat in itself. Chris Corrado, Senior Vice President of Technology Products at Asurion, will discuss how his organization designs and executes using an enterprise architecture methodology. He will also lead us through the design of a proper and scalable operational platform which reaches across all aspects of the business including IT to support and guide revenue growth. 



Presented On: Mon Jan 25, 2010
Matt Manzella , Director of Strategy & Innovation Services , Allstate Insurance
Details (hide)

Manzella and his team are leading an effort to drive innovation through a deeply traditional, risk-averse corporate environment.  He will discuss how they have utilized social media and ideation technologies to engage employees in an effort to shift the culture from one focused on incremental operational improvements to one where disruptive change is explored and embraced early. Manzella will share the successes, lessons learned and continuing challenges of Allstate's journey to transform itself.



Presented On: Thu Jan 7, 2010
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

There was a time when vendor management was simply contract negotiations and finding the best price for the best solution.  With the emphasis on running core operations in many companies the role of vendor manager  has evolved into a critical role in managing strategic assets of the organization.  One must build a relationship with the vendor, understand the vendor, and work to ensure they understand you you become a strategic partner with your organization.



Presented On: Mon Apr 5, 2010
Details (hide)

In the first quarter, member initiated connects revolved around web mail solutions, severity levels of incidents, and corporate mentoring programs.

In order to improve its existing processes, one IMF member was interested in exploring how other IT organizations defined their severity levels of incidents reported. This organization already had a service desk process in place, and though it what been working well, the organization desired to reassess the process in order to adjust to changing business requirements.
Another IMF company was interested in beginning a corporate mentoring program for high school students. The organization already had an internal mentoring program in place, but wanted to design an external program to help youths in their community. They also wanted to examine challenges that are often encountered, legality, and other best practices for establishment of these types of programs.

As an organizational improvement, another IMF Connect involved a member company sharing their experience of migrating from Microsoft to a web mail solution. Key drivers for this change were driven by cost savings and scalability. Currently, the organization is still in the process of completing the transition.

We encourage all members to review active connects on a regular basis for opportunities to leverage knowledge and experiences from other IT experts. If you are interested in initiating a connect, please visit our website: www.theimf.com
 



Presented On: Tue Oct 6, 2009
Ron Baklarz , Chief Information Security Officer , Amtrak
Details (hide)

Ron Baklarz, CISO at Amtrak, provides insight into the role of the CISO and discusses his particular experiences with the different facets of responsibilities while during his time at MedStar Health. In his presentation, Baklarz presents the CISO role in three main categories which include: "Chief Risk Officer," "Chief Hacking Officer," and "Chief Investigative Officer."



Presented On: Tue Nov 3, 2009
Martin Gardocki , Business Development , IMF Fellow
Details (hide)

 

In this IMF web forum, Martin Gardocki from Rural America Onshore Sourcing, discussed the rural alternative in the total cost of outsourcing. Rural America Onshore Sourcing is responsible for finding and aggregating rural talent to provide customers with contract assistance as required for their businesses.
 
The different types of outsourcing that exist include:
· USA Urban Outsourcing (domestic, urban firms contracted to provide a service)
· Offshoring (contracting with firms in places such as India and China)
· Nearshoring (outsourcing to firms in Central and South America)
· USA Rural Onshoring (domestic firms in rural communities or distributed rural teams contracted to provide a service)
 
There are 4 basic costs associated with outsourcing which include the following:
1. Labor (cost of personnel and source of savings generated through arbitrage)
2. Transition (cost of identifying, negotiating, and moving work to the outsourcer,
3. Operation (ongoing cost of the relationship)
4. Management reserve (cost of managing the unexpected)
 
Gardocki explains that the evolution of outsourcing began with contracting with urban vendors where good work came at a premium price. With offshore sourcing there was significant cost savings in comparison to urban vendors, but the overhead costs of governance, communication and lost productivity dilutes these savings. Gardocki states, “As people have become more comfortable with the offshore model and companies become more global, the whole concept of having captive offshore development centers has crept up over the last 5-10 years. You avoid the middle man markup and [do] it yourself.” In Gardocki’s own experiences, he has known many owners of small to medium sized business where low cost providers did not necessarily work out and their productivity dropped dramatically for every transition which delays the promise of ongoing benefits and a wealth of capability and capacity. According to Gardocki, what is more alarming is the effect on the customers because “they feel the pain in delayed delivery, they feel the pain in increased costs, and basically you’re the one who has to tell them why,” Gardocki explains. As a result, people look for other areas in which they can reduce some overhead of the operation and still get some of the savings. The Rural Alternative involves domestic firms in rural communities or distributed rural teams contracted to provide a service. There are millions of people willing and able to work from their homes or local offices with strong work ethic and speak the same language. They are technically skilled to meet the demands of today’s information technology and business process outsourcing environment.
 
The “3 Ps” of rural onshoring include:
· Proximity to broadband (access to internet at speed capable of sustained operation)
· Population Density (depending on the skill and number of personnel required, you can work in a single community or require personnel across multiple regions or states)
Process disciple (dispersed or remote teams require process rigor to ensure efficient operation. This includes the infrastructure to support


Presented On: Thu Jul 30, 2009
Ashu Bhatia , Director of Delivery , Ciber
Details (hide)

Enterprise architecture is typically driven by business strategies. The company needs to know where they are going and how their dynamics are changing. Once the strategies are clarified, that is what drives enterprise architecture and enables business strategy. Alignment ensures tight linkages between today's business strategies and technology priorities and initiatives. It also focuses on where IT can deliver the most impact and where it can deliver impact to the business.



Presented On: Mon Dec 28, 2009
Details (hide)

 

 
Initiated connects included discussions focused on topics that are not easy to deal with, but are sometimes a necessary aspect of running any organization, such as migrating to a new service delivery strategy, working through stress and burnout in the organization, and renegotiating license agreements with vendors. However, companies also have been focusing on their strategies for growth following the recession, such as building the right organization structure for HR management, implementing a service management or service catalog toolset, and improving capacity management.
 
Through discussions with IMF members, a common theme has been the determination of companies to use the current financial climate as a tool for long-term improvement. Rather than accepting spending cuts for short-term survival, companies are instead focusing their efforts intelligently, such that their organizations can gain a competitive advantage while positioning for growth.
 
IMF members continue to leverage the experiences of their peers through the IMF Connect service more and more. In addition to the discussions that have made it into this quarterly report in summary form, many other requests were fulfilled in real-time through anonymous means.
 
IT organizations have responded by increasing their use of outsourced services, by creating alternative work programs, and by centralizing and restructuring their architecture groups, among other activities. The unique benefit of the IMF is the ability to bring companies together that are just starting down the path with those that have already made significant progress. In this way, each organization may have something to learn from others as well as something to share with others.
 
 
Other initiated connects centered around new challenges and decisions that companies faced including:
 
-What does Cloud Computing really mean for organizations?
-Is Social Media a fit for the Workplace?
-What are the important things to consider when selecting an outsourcing partner?
 
We encourage all members to review upcoming connects on a regular basis, share your experiences with others, and submit your questions and issues. Our goal is to be the best source for unbiased information, and this is accomplished through IMF facilitating the networking power of IT colleagues in other member organizations.
 
 
 
 


Presented On: Tue Oct 6, 2009
Dr. Kenneth Brancik , Principal Architect , The Northrop Grumman Corporation
Details (hide)

 

Enterprise Security Architecture (ESA) is an elusive topic for many organizations, with only a minimal level of guidance in terms of industry sound and best practices. Dr. Brancik will discuss an on-going project he has been involved in to place a science around the topic of ESA.
 
The primary goal of this interactive session was to engage and enable the attendees to think about the topic and to freely share their thoughts and ideas on both the theoretical and practical aspects for creating viable solutions to strengthen ESA practices. The general framework for the open discussions may include, but not be limited to the following areas of ESA risk: Architecture User Requirements and Design, Integrating governance, Risk Management and Compliance (iGRC) considerations, Cyber Security risks and controls, Threat Modeling and architectural implementations to name a few. 
 


Presented On: Tue Oct 6, 2009
Paul Moran , Information Security Analyst , Automotive Resources International
Details (hide)

 

Paul Moran, CISSP, CISA, CGEIT, is responsible for managing the operation and effectiveness of security-related programs and initiatives.  He assesses the cost of potential threats relative to cost of solutions required to eliminate, minimize, or mitigate threats. Paul is also responsible for the development and communication of information security policies and procedures.  He works closely with all departments to ensure integrity of security procedures, systems, and policies.  In his presentation, Paul will be sharing his expertise on how security is an important role in any sales process. 
 


Presented On: Tue Oct 6, 2009
Clint Kreitner , President and Chief Executive Officer , IMF Fellow
Details (hide)

 

In his presentation at the October IT Security Summit, Clint Kreitner, Senior Advisor at The Center for Internet Security (CIS), discussed the need for the information security community to come to a consensus on what constitutes success and how to measure it. In addition, Kreitner addressed the need for a feedback learning loop to enable measurable and continued improvement in protecting information.
 
Kreitner states that although there is a lot of money being spent in information security, there is a lack of ability to answer questions such as:
 
· Are we more secure than we were last year?
· Are we spending the right amount on security?
· Which of our security investments are yielding the most cost-effective results?
· How do we compare to our peers?
 
Kreitner states, “Currently, much of what we are doing in security involves risk assessment scenarios that hypothesize what various outcomes might be.”
 
Crucial elements that are missing in the area of information security include a widely accepted definition of success, clearly established definition of goals, and a set of consensus metrics. The CIS Security Metrics document contains a list of 20 metrics in specific business functions such as incident management, vulnerability management, patch management, application security management, configuration management, and financial management. It was compiled by over 100 expert participants from various sizes and types of public and private sector enterprises and representing various professional backgrounds.
 


Presented On: Tue Sep 22, 2009
Buck Woody , Program Manager , Microsoft Corporation
Details (hide)

Buck Woody, a SQL Server Technical Specialist discussed the conflicting environment between DBAs and developers. According to Woody, this conflict is divided into three main categories which include:

·        Conflicting requirements
·        Conflicting Customers
·        Conflicting Ideologies
 
In order to understand the reasons behind why this conflict exists, it is important to define each role. Woody defines a developer as, “someone who uses various tools and software methodologies usually within a team and is charge of particular duties” while “pure DBA’s” refer to those who own the data stack from beginning to end.”
 
In his presentation Woody takes a closer look at the source of the conflict by highlighting the different requirements of each role and the effect of conflicting customers and conflicting ideologies. Woody also offers his advice on how to successfully overcome these conflicts and bring teams together. According to Woody, “The first step in bringing the team together is to let the team know that there may be some shared resources available.”


Presented On: Thu Nov 5, 2009
Dale Seavey , Director of Architecture/Design/Engineering , Cisco Systems, Inc.
Details (hide)

At an IMF web forum, Dale Seavey, Director of Architecture Design and Engineering at Cisco IT offered insight into cloud computing and stated that it is part of the responsibility of IT professional’s to take away the veil of uncertainty around the cloud concept.

At Cisco, Seavey and his team are responsible for setting the computing direction for the IT organization for the next three years and putting actions in place that will help them accomplish the initiatives they have established. The three fundamental design pillars determined by the group include:
 
1)      Immediacy
2)      Smaller computing platforms
3)      User experience being key while computing environment and platform are irrelevant.
 
In his presentation, Seavey discussed the history behind Cisco’s email architecture, defined the cloud concept, and offered his predictions on the future of cloud. Seavey defines cloud as an evolution of technologies, or an updated computing paradigm that is a massively scalable and elastic environment. In reference to security for cloud, Seavey states that we are still in the infancy stages of this technology, but maturity and eventual reduction of threat will come.
 
Seavey and his team’s predictions include the idea that the desktop will become irrelevant, the user experience will come through a browser with shared services, software needs to work in a distributed environment. What this means for Cisco and other companies is that organizations will be less likely to implement software without a consistent look and feel, more inclined to look at other desktop operating systems, applications will become more cloud compliant, and the idea that systems who utilize shared elastic services will be implemented.
 


Presented On: Tue Oct 6, 2009
Louis Magnotti , VP of IT Services and Security , Pentagon Federal Credit Union
Details (hide)

 

At the IMF October IT Security Forum, Louis Magnotti, Chief Information Officer of the U.S. House of Representatives, discussed his own career development and the steps and best practices that have made him the successful IT Executive he is today. He outlines the building blocks that allowed him a successful career in Information Technology which includes time at the Department of Defense 9 years as CISO, and since November 2008, as CIO of one of the nation’s oldest institutions, the U.S. House of Representatives. In describing his career progression Magnotti states, “My career has kind of been like a trip without luggage. I sort of knew where I was going, but when I got there, my stuff wasn’t with me.”
 


Presented On: Tue Oct 6, 2009
Brandi Landreth , Director, Continuity Management & Data Center Strategy , Allstate Insurance
Details (hide)

 

The data center strategy began with a movement to consolidate Allstate’s existing footprint from four data centers to two. Some of the reasons for this movement were centered on economies of scale, operations efficiency, simplifying the environment, and improving availability and recoverability. Through the execution of this strategy it became evident that there were some additional opportunities around energy efficiency that provided a different perspective on the construction of the data center, but also in the operation of the existing IT infrastructure.
 
These additional opportunities stemmed from the Green IT movement which has been receiving much attention in the last couple of years. Reports from the Environmental Protection Agency (EPA) indicate that data centers are growing energy consumers. Taking this into consideration, Allstate began thinking differently while working through the data center strategy which was initiated three years ago. Earlier this year, the first phase of this strategy was completed and a new data center was built and an existing center was upgraded. The organization is currently in a migration phase which involves taking all equipment in the existing data centers and moving them into new facilities.
 


Presented On: Thu Feb 5, 2009
Robert Shaw , Manager, Software Engineer Process Group , Time Customer Service
Details (hide)

In his presentation, Bob Shaw, Manager of the Software Engineering Process Group at Time Customer Service, delved into real world problems of managing IT Projects using metrics versus feelings. He addressed useable metrics of the real world and why it is important to measure accurately and in real time. In addition, Shaw presented the keys for success he has developed through Time Customer Service’s new project management process and the specific measurements that are used to track and forecast EAC (Estimate At Completion). Shaw has spent several months creating and implementing this process which has been successful in creating more visibility for senior management to ensuring that all projects are on track and visible.



Presented On: Tue Oct 6, 2009
Linda Hooker , Professional Development Manager , SunTrust Bank
Details (hide)

In an October IT Workforce forum at the U.S. Pharmacopeia facilities, Linda Hooker provided insight into how the SunTrust team has smoothed transition as employees face changes due to outsourcing while maintaining a focus on career growth.

Many companies are choosing outsourcing or are making significant changes to their IT organization due to three factors which include: cost savings, an increased focus on the core business, and cost restructuring and quality improvement. In 2005, SunTrust began an off-shoring program in the IT applications development area.



Presented On: Tue Oct 6, 2009
Ron Baklarz , Chief Information Security Officer , Amtrak
Details (hide)

Ron Baklarz, Chief Information Security Officer (CISO) at Amtrak provides insight into the role of the CISO and discusses his particular experiences with the different facets of responsibilities while during his time at MedStar Health. In his presentation Baklarz presents the CISO role in three main categories which include: “Chief Risk Officer,” “Chief Hacking Officer,” and “Chief Investigative Officer.”



Presented On: Tue Oct 6, 2009
Laura Viehmyer , VP Human Resources , U.S. Pharmacopeia
Details (hide)

When Laura Viehmyer joined US Pharmacopeia (USP) as the Vice President of Human Resources, she found that the human resources department (HR) was very understaffed. No functional organization or centralized processes and systems existed in HR, and though the organization had a considerable global presence, there was no one on staff with global expertise. In addition, there was no central training initiative as well as a lack of emphasis on employer relations. After receiving advice from a senior executive, Viehmyer began to talk to individuals and embarked on the most significant orientation she ever experienced in her career.



Presented On: Mon Nov 10, 2008
Details (hide)

Mark Weischedel, CIO of the American Red Cross, discusses the organization's IT Transformation strategy. He outlines his initiatives including application portfolio rationalization, infrastructure optimization, and modernization, upgrading human capital, and strengthening governance, quality, compliance, and controls.



Presented On: Thu Aug 27, 2009
John Olmstead , Senior Project Manager , Cox Communications
Details (hide)

 This presentation by John Olmstead offers an overview of Cox Communications delivery and methodology for project development and infrastructure delivery.   CCI’s Enterprise Solutions Group consists of six sub-groups each working on various projects, many of which crossed groups. Each group was conducting project management and SDLC their own way. The Delivery Management Organization (DMO) (one of the six groups) devised a common frame work so everyone would work off of the same play book. This Assured framework allows all groups to think and work alike allowing for better quality, cross functionality and the ability to augment each other’s teams. Along with Assured, gating functionality was introduced to audit quality and stop the implementation of projects until problems and issues are rectified.

 


Presented On: Thu Sep 10, 2009
Rizwan Patel , Field CTO , Redapt
Patricia Lee , Lead Architect , Caesars
Details (hide)

Not having a data strategy or having one that is so high level as to make the strategy non-existent is a recipe for disaster. The situation is prime for each department to make its own choices on how to use the products, leading to design and implementation decisions that are data centric – a proliferation of fragile (data driven) implementations that are a management and tuning nightmare. Additionally, this situation gives free reign for departments to introduce and try new technologies and tools adding to an already chaotic scenario. The situation also lends well to departments introducing redundant data sources with the intent of having control of data within their "territory".

During the discussion Harrah's Entertainment discuss how a well defined Data Strategy minimizes the one-off solutions leading to a more streamlined organization by substantially improving success rate of projects. Discussion will also incorporate how divergences from the strategy, if initiated are handled by the Governance board (aka Architecture Review Board) – a cross-functional Governance board established with the backing of top management to oversee the implementation of an enterprise data strategy.
 



Presented On: Tue Jun 16, 2009
Kevin Brennan , Director of Network Support & Security , Cox Communications
Details (hide)

Cox Communications’ network is composed of the backbone customer network and the internal enterprise network. Brennan will review the backbone network as the foundation for the Enterprise network. Then he will show how the enterprise network is able to leverage it to achieve business requirements of network reliability, predictability, capacity & growth, and along with connectivity leveraging the CISCO suit of solutions.

 


Presented On: Tue Jun 16, 2009
Kevin Brennan , Director of Network Support & Security , Cox Communications
Details (hide)

In this report, Kevin Brennan, Lead Network Architect for Cox Communications, speaks about Cox's backbone network. He discusses the where they were a short time ago, where they are, and how far they hope to go.



Presented On: Tue Mar 24, 2009
William Miller , Chief Information Officer , NetApp
Details (hide)

William Miller, CIO at Harris Corporation will lead a discussion on IT’s role in driving Corporate Initiatives and assisting in the strategy discussion. This report is a part of the series of meetings from the 2009 Spring Senior Executive Forum in March 2009 in Melbourne, FL.



Presented On: Tue Jun 16, 2009
Thomas Stanley , Senior Director Platform Services , LexisNexis
Details (hide)

Tom Stanley will discuss the automated inventory system developed by the LexisNexis Infrastructure team to collect, correlate and report on system configuration information that would allow them to rebuild the system for Disaster Recovery. The system allows them to collect all the key information about the servers on a daily basis and store that in a database for not only disaster recovery but administration. He will describe in detail why they chose to build these tools and how they work, as well as the benefits these tools have provided LexisNexis.



Presented On: Thu Jul 30, 2009
Ashu Bhatia , Director of Delivery , Ciber
Details (hide)

In this report, Ashu Bhatia will discuss some approaches and examples of how Enterprise Architecture can help an organization achieve IT Operational Excellence and help the business complete value targeting, using levers such as Application Rationalization/Consolidation, emerging technology management, etc. This report will walk through a structured approach of how Enterprise Architecture can enable their firm’s business initiatives and create value. A case example will be used from the pharmaceutical industry, showing how holistic enterprise architecture planning can help channelize specific IT investments towards strategic impacts to your business.



Presented On: Thu May 21, 2009
Dominic Calvert-Lee , Apptio
Details (hide)

Traditionally Finance has had a significant impact vendor costs and price per unit. However, IT Finance professionals often find that after competitive pricing has been negotiated, another challenge arises from continuing internal pressure due to ever increasing demand. What are the key demand drivers and how does each affect cost? On this Web Forum, Dominic Calvert Lee, Finance Director, IT Finance of Microsoft, will discuss how Finance can impact the quantity or demand side of the IT cost equation. 

 


Presented On: Tue Jun 16, 2009
Eric Jackson , Development Manager , Rollins
Details (hide)

Eric Jackson of Rollins will lead a discussion on their journey toward agile development. He will address why Rollins decided to implement Agile and Scrum and how they have tailored each to fit their organization. He will also discuss specific examples of their successes, mistakes, and pitfalls in moving from a non-iterative methodology to Agile.



Presented On: Thu Feb 12, 2009
Benjamin Tomasini , Assistant Vice President and Application Developer , Bank of America
Details (hide)

Ben Tomasini at Bank of America will present solid, common sense approaches to strategic software design, team communication, and project process that development teams can adopt today to deliver project faster and with greater quality. He will also discuss the strategic challenges that software development organizations face.



Presented On: Tue Jun 16, 2009
Michael Taylor , CEO , Merge Agency
Details (hide)

As tough times continue with rampant cutbacks and more layoffs, IT has a hard focus on doing more with less and executing flawlessly. Although those are exactly the right instincts, most IT organizations fail at one of the most critical success factors of IT success or failure: communication. In this seminar Michael Taylor, CEO of Merge, will show why IT’s perception has much to do with reality (ex. job security) as the technology execution and why good communication is one of the biggest success tools one has. Taylor will show some simple techniques that can be used right away to turn perception into your favor.



Presented On: Mon Aug 24, 2009
Details (hide)

Over the past few months, IMF Connect Services has grown significantly.   While we used to average one connect every other week, we now manage a few Connect requests per week. We are thrilled to see this increase in interest, as we see connects as one of the most valuable services IMF offers.

The second quarter connects centered around new challenges and decisions that companies faced. 
        What does Cloud Computing really mean for organizations? 
  Is Social Media a fit for the Workplace?
 
  What are the important things to consider when selecting an outsourcing partner?
 
Next Quarter’s Connect report will include best practice focus groups including: Source Code Management, SAS and its alternatives, best practices for mass eMarketing, along with a number of topics that continue to shape the IT landscape.
We encourage all members to review upcoming connects on a regular basis, share your experiences with others, and submit your questions and issues. Our goal is to be the best source for unbiased information, and this is accomplished through IMF facilitating the networking power of IT colleagues in other member organizations.


Presented On: Thu Aug 20, 2009
Details (hide)

Download this document to view a list of recently published IMF Reports.

For more information on IMF Reports or other IMF services please contact: 770.455.0070.

*This list includes newly published reports up until August 20, 2009. See published reports section for entire list of newly published reports available for download.



Presented On: Tue Mar 24, 2009
Tom Guthrie , Vice President , IMF Fellow
Details (hide)

Tom Guthrie will discuss his team’s adoption infrastructure technology including virtualization and open systems solutions to allow the enterprise to position for growth while reducing expense. This report is a part of a series of presentations during the March 2009 Senior Executive Forum in Melbourne, Florida.

 


Presented On: Tue Mar 24, 2009
Robert Fields , IMF Fellow
Details (hide)

Robert Fields will discuss the opportunities and cost savings of Loews’ new data center move, including virtualization and upgrades. This report is a part of the series of meetings from the 2009 Spring Senior Executive Forum in March 2009, in Melbourne FL.

 


Presented On: Thu Mar 5, 2009
Denise Peek , Manager, Human Performance Development , NASCO
Details (hide)

 Succession planning and career path management ensure that there are highly qualified people in all positions, not just today, but tomorrow, next year, and five years from now. In the past, succession planning typically targeted only key leadership positions. In today’s organizations, it is important to include key positions in a variety of job categories. Developing a clear communication strategy, creating the right assessment and selection tools, and identifying gaps in current employees and candidate competency levels are just a few of the necessary steps one needs to take to ensure successful succession and career path management. Denise Peek, Manager of Human Performance Development at NASCO, will discuss these steps along with others.

 


Presented On: Wed Jan 21, 2009
Thomas Stanley , Senior Director Platform Services , LexisNexis
Details (hide)

This report will feature an interactive discussion on the issues that IT infrastructure management teams are grappling with today. Thomas Stanley of LexisNexis will share the journey that he and his team went through at ChoicePoint (a LexisNexis company) to consolidate and optimize their data centers and increase their use of Server Virtualization. The group will also have the opportunity to share their own experiences with one another to uncover common practices that lead to success and setbacks.

 


Presented On: Thu Mar 12, 2009
Details (hide)

 As communication technologies improve, employees often exchange ideas and information with distant colleagues. When virtual teams are formed, team members often will not meet in person during an entire project life cycle, but are required to work very closely together to produce project deliverables. Virtual teams make sense in today’s workplace environment. However, they create unique challenges for managers and team members. This report will focus on some of these challenges, and how to effectively manage and engage team members to ensure successful results.

 


Presented On: Tue Mar 24, 2009
James McCabe , Director , IMF Fellow
Details (hide)

In this report Jim McCabe will discuss Milliken’s SAP journey, including the cost justification upfront, the unexpected issues that arose, and its benefits to IT and the business. This report is part of a series of meetings from the March 2009 Senior Executive Forum held in Melbourne, Florida.



Presented On: Wed Mar 25, 2009
James McCabe , Director , IMF Fellow
Details (hide)

This report chronicles the tale of a Spartanburg, South Carolina based textile company's SAP journey. Jim McCabe, Director of Information Services for Milliken and Company, takes you for a ride among the trials and tribulations of such a grueling, yet ultimately rewarding process.



Presented On: Tue Mar 24, 2009
Mike Macedonia , Vice President , Forterra Systems Inc
Details (hide)

In this report, Jeff Cooper and Mike Macedonia will discuss reducing travel expenses through videoconferencing, virtual reality, and social networking. They will discuss cost effective methods deployed to move the organization forward while reducing expense in a tough economy. This report is part of a series of presentations during hte March 2009 Senior Executive Forum held in Melbourne, Florida.



Presented On: Thu Jul 30, 2009
Ashu Bhatia , Director of Delivery , Ciber
Details (hide)


Presented On: Wed Nov 12, 2008
Cama Piccini , Human Resources Business Partner , Harris Corporation
Details (hide)

 

Harris Corporation, like many high-performing organizations, has a dedicated sourcing team as part of its recruiting model. In this presentation, Piccini outlines their sourcing model and discusses its roles and responsibilities, some of the resources and tools that are used, and explains how Harris' sourcing model has been successful in its recruiting efforts.   
 


Presented On: Thu Apr 30, 2009
Lori Furman , Innovation Consultant, Social Media , Chevron
Details (hide)

Social computing applications are moving quickly into the enterprise space and fast becoming main stream. What applications truly benefit the organization and how? This Web Forum, led by Lori Furman, Innovation Consultant at Chevron, will take you beyond the basics of social technologies and explain the challenges faced with enterprise adoption and the consequences of doing nothing. The following topics will be discussed:

· Social computing overview
· Opportunities to drive business value
· Social tools in action
· Potential obstacles
· Recommendations
 
 


Presented On: Thu Jan 22, 2009
Clint Kreitner , President and Chief Executive Officer , IMF Fellow
Details (hide)

In this report, Kreitner will discuss the progress that has been made toward standard security metrics. The following points will also be addressed:

  • Why incident metrics/outcome metrics are so important to advance the field
  • A Consensus security metrics initiative update
  • Survey
  • CIS Consensus Metrics Document and how to obtain it


Presented On: Thu Dec 11, 2008
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)

Social Networking has created a number of new and difficult challenges for Workforce professionals. Dr. Jonathan Reichental from PricewaterhouseCoopers will discuss some of the key points he has learned and how other are addressing new issues around social networking.



Presented On: Mon Sep 29, 2008
Gregory York , Senior Manager, Corporate IT Security , Abbott
Details (hide)

Over time, corporate security programs have shifted from a reactive to a proactive mindset, focusing more on risk management and less on fear, uncertainty and doubt in order to facilitate good business decisions. Inherent, but not formally addressed in risk management, is the concept of the "normal accident" - an inevitable failure driven by the complexity of a system. Greg York will discuss highlights of Abbott's IT Security program and ongoing efforts at this 25 billion dollar pharmaceutical, medical devices and nutritional products company. He will focus on the principles of accident theory as they relate to Information Security (IS), and how these principles are being applied at Abbott in order to identify the most important issues to address.

 


Presented On: Mon Nov 10, 2008
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Mike Bender will discuss Cisco’s vendor management strategy including risk assessment and contingency plans. Mike will also discuss Cisco’s ongoing development of a strategy for evaluating the sustainability of key vendors and their approach to building back up plans that support business partners but protect the business.

Keywords

  • Vendor Management
  • Procurement
  • Governance
  • Outsourcing
  • Third Party Vendor
  • Manufacture
  • Engineering
  • Business Intelligence
  • Single Source
  • Risk
  • Vendor Metrics
  • Dual Vendor Strategy


Presented On: Tue Jul 15, 2008
Details (hide)

This report contains an overview of XBRL and review the expectations for compliance with the related SEC programs. Through electronic polling of the forum audience, the discussion will interactively navigate the presentation through the internal process considerations applicable to the audience, and reveal the candid positions on XBRL that the forum participants bring to the table.



Presented On: Wed Nov 12, 2008
Barbara Ring , Principal , AXA Equitable
Details (hide)

Barbara Ring discusses how Chubb is addressing the changes in the workforce. From the aging existing workforce to the challenges brought about by the new generation workforce, Barbara will outline the research and analysis Chubb has done to better understand these changes and the initiatives they have undertaken to ensure Chubb retains and continues to hire top talent.

Keywords

  • Mainframe Systems
  • Workforce
  • Call Center
  • Mainframe Programming
  • Outsource
  • Infrastructure
  • Offshore
  • Outsourcing
  • Onshore
  • Access
  • Risk Mitigation Plan
  • Phased-In Retirement
  • Succession
  • Performance Guidelines
  • Performance Management
  • Legacy Systems
  • Knowledge Transfers
  • Job Rotation Program
  • Succession Planning
  • Telecommute


Presented On: Wed Oct 29, 2008
Details (hide)

Learn how the Business Intelligence Center of Excellence (BI COE) has developed an enterprise BI strategy and how the BI COE has helped them to drive the full benefits through the organization. Hear how they approached centralization versus decentralization issues, governance, simplification, standardization through retirement of old solutions, and development standards. This is the best practices and strategy for successfully managing BI projects and enterprise-wide standards.



Presented On: Wed Apr 29, 2009
Details (hide)

The first quarter of 2009 showed continued focus on the economic climate from IMF members. Members initiated Connects on a variety of topics that are directly linked to dealing with a recession.

Discussions focused on topics that are not easy to deal with, but are sometimes a necessary aspect of running any organization, such as migrating to a new service delivery strategy, working through stress and burnout in the organization, and renegotiating license agreements with vendors. However, companies also have been focusing on their strategies for growth following the recession, such as building the right organization structure for HR management, implementing a service management or service catalog toolset, and improving capacity management.

Through discussions with IMF members, a common theme has been the determination of companies to use the current financial climate as a tool for long-term improvement. Rather than accepting spending cuts for short-term survival, companies are instead focusing their efforts intelligently, such that their organizations can gain a competitive advantage while positioning for growth.

IMF members continue to leverage the experiences of their peers through the IMF Connect service more and more. In addition to the discussions that have made it into this quarterly report in summary form, many other requests were fulfilled in real-time through anonymous means.

IT organizations have responded by increasing their use of outsourced services, by creating alternative work programs, and by centralizing and restructuring their architecture groups, among other activities. The unique benefit of the IMF is the ability to bring companies together that are just starting down the path with those that have already made significant progress. In this way, each organization may have something to learn from others as well as something to share with others.

The IMF Connect service is an included part of your IMF membership. These best practice focus groups bring together the networking power of the IMF with the expertise of your colleagues in other IMF member organizations. Whether your issue requires an immediate response or a longer discussion process, the IMF team is ready to help you connect with your peers. Please contact us anytime you find an issue that is suited for discussion in this forum.
 

Connects included in this report are:

  • Managing Stress in the IT Organization    
  • IT HR Functions and Organizational Structures   
  • Company BlackBerry/PDA/Cell Phone Policies
  • Building Model Changes from
  • Mainframe Enterprise License Vendors 
  • Service Catalog Tool Implementation
  • Computer to Computer Telephony
  • Capacity Management
  • Server Incident Throughout
  • the Asset Lifecycle
  • Senior Executive Roundtable Discussions


Presented On: Thu Feb 19, 2009
Details (hide)

With budgets under pressure, adept IT leaders need to know how to make every penny count and the cost of acquiring and supporting IT equipment can account for a significant savings in the IT Budget.  Successfully tracking IT assets—and understanding which applications are on devices—has become increasingly difficult.  So how can IT leaders ensure that their attempts to manage assets are worth the effort? How does an effective IT asset management strategy improve the bottom line? And what are the core components of an effective strategy?  This report addresses these issues and provide you advice on asset and configuration management strategies that work.



Presented On: Tue Mar 24, 2009
Tom Guthrie , Vice President , IMF Fellow
Details (hide)

Tom Guthrie, VP of Operations and Information Technology at Cox Communications, will discuss his team's adoption infrastructure technology including virtualization and open systems solutions to allow the enterprise to position for growth while reducing expense. 



Presented On: Mon Feb 23, 2009
Details (hide)

The IMF Connect process puts you in touch with the top knowledge source in IT, your peers!  Simply call IMF or initiate an IMF Connect by visiting www.theIMF.com and IMF will start the process.

IMF will:

  • Find others who are interested in discussing their successes on the same issue
  • Write a Connect Charter to capture the issue
  • Schedule and facilitate a web conference or meeting
  • Write up the results for future reference

Most research in IT begins with the users, why not cut out the middleman and any potential for bias?

IMF members understandably turned inward during the last quarter of a rough 2008.  As a result, the overall activity within the

IMF Connect service was below normal levels.  For those members that still reached out to their peers through IMF, the discussions were focused on initiatives that were either for regulatory compliance (PCIDSS), to uncover potential cost reduction opportunities (IT Spending Compared to Revenue), or to optimize investments for long-term savings (SAP and Exchange Best Practices).  Clearly, the IT industry is being asked to bear a significant portion of the cost reduction load.

Connects Included:

Virtualizing the Exchange 2007 Environment

SAP Implementations

IT Spending Metrics

PCI Scanning Tools



Presented On: Tue Jul 15, 2008
Michael Bender , Chief of Staff to the CIO , VMware
Details (hide)

Due to the success of products like Macintosh's, iPhones and consumer based PCs, Business Units and IT users are demanding more and different devices due to this "consumerization" impact on IT services. Unfortunately Corporate IT has been traditionally tasked with standardization which drives efficiency (maximize TCO) which is in conflict with what users are demanding. Mike Bender discussed the approach Cisco is taking to manage/optimize the CFO/shareholder TCO impact versus the needs/wants of the users.  



Presented On: Tue Jan 13, 2009
Details (hide)

The IMF Connect process puts you in touch with the top knowledge source in IT, your peers! Simply call IMF or initiate an IMF Connect on our website and IMF will start the process.

IMF will:

  • Find others who are interested in discussing their successes on the same issue
  • Write a Connect Charter to capture the issue
  • Schedule and facilitate a web conference or meeting
  • Write up the results for future reference

Most research in IT begins with the users, why not cut out the middleman and any potential for bias?

This report contains a summary of several IMF Connects that were initiated in the third quarter of 2008. In addition to the information provided in each of the Connects, this report also provides a look into the key issues for IMF member organizations.

  • IT Intern Programs
  • Training the IT Workforce
  • Enterprise Collaboration
  • Project Management Curricula
  • Rewarding for Innovation
  • Unit Costs for Application Code Line Development
  • Project Effort Estimations
  • Storage Management
  • Chargeback Practices


Presented On: Tue Apr 22, 2008
Jack Lewis , Manager PMO , Macy’s
Details (hide)

Strategic sourcing is an institutional procurement process that continuously improves and re-evaluates the purchasing activities of a company. During this session, Jack Lewis will present a case study on two global sourcing strategies applied by two different organizations. You will learn why these organizations selected the approaches they did and how these sourcing efforts compare and contrast. Both strategic plans designed and implemented represent great success, yet could benefit in various ways from one another’s strategy.



Presented On: Tue Sep 16, 2008
Details (hide)

Allstate Insurance was interested in benchmarking their IT intern program against other companies.  They were  interested in discussing the following issues:

 

How long have their internship programs been in existence?
What are the goals of their program, how are they doing relative to their goals?
How many interns are included in this summer’s program?
How is the program(s) funded?  Is there one internship program, or many?  (please explain)
How satisfied are their interns? What do the interns feel is working well and what could be improved in terms of the program?
How satisfied are their managers in regards to the internship program?
Are they getting solid, qualified candidates? 
Are these interns meeting their goals?
What’s working well, and what could be improved from the manager’s perspective
How do they recruit their interns? (please describe)  Is this method effective? 
(please explain)
How much are they paying their interns?  What is the pay based on?
Do they offer subsidized housing and transportation?  (please explain) 
What events do they offer and are they subsidized? 
How many interns on average typically get hired?



Presented On: Tue Apr 15, 2008
Sabyasachi Mitra , Associate Professor of IT Management , Georgia Institute of Technology
Details (hide)

In recent years, companies have increasingly outsourced and offshored many elements of their Information Technology function. There has also been an increased focus on the use of packaged software, rather than developing proprietary in-house systems. Service Oriented Architectures (SOA) is also likely to increase the use of outsourcing and offshoring in the future. These changes have caused a shift in the roles, responsibilities and job functions of IT Managers in technology consuming companies in the U.S. This presentation focused on the type of skills that are necessary for IT Managers to survive, thrive and take advantage of the global economy, how to develop these skills in yourself and your employees and the role of universities and corporate training programs to build a globally competitive IT workforce.



Presented On: Mon Dec 8, 2008
Details (hide)

IMF members continue to leverage the experiences of their peers through the IMF Connect service more and more. In addition to the discussions that have made it into this quarterly report in summary form, many other requests were fulfilled in real-time through anonymous means.  Many of the topics covered in the second quarter of 2008 focus on strategic planning and transformation issues. Due to a financially tightened business climate, companies have asked their IT organizations to centralize, innovate, and otherwise find opportunities to reduce expense while still improving services. IT organizations have responded by increasing their use of outsourced services, by creating alternative work programs, and by centralizing and restructuring their architecture groups, among other activities. The unique benefit of the IMF is the ability to bring companies together that are just starting down the path with those that have already made significant progress. In this way, each organization may have something to learn from others as well as something to share with others.

Included Connects:

  • Desktop Delivery - Common Practices
  • The Corporate Business Intelligence Function
  • Application Development Programmer Productivity
  • Training Investments in the IT Organization
  • Information Security Support Organizations
  • Building a "Right Sourcing" Program
  • Office 2007 Upgrades


Presented On: Thu Sep 18, 2008
Matt Manzella , Director of Strategy & Innovation Services , Allstate Insurance
Details (hide)

Allstate Insurance Company has recently developed an Innovation Service and an associated Innovation Lab within their technology organization. The intent of the Lab is to provide a place where employees can expose their early stage ideas in a safe and open environment, while utilizing social networking tools like blogs, wikis and other networking forums to provide feedback and input through an idea network. During this Web Forum, Matt Manzella and his team will speak about some of the early efforts and successes of the Innovation Lab. One of the concepts the team is exploring is the use of Virtual Worlds (such as Second Life®). The team will discuss how Allstate is leveraging these worlds to improve collaboration at Allstate, while also taking advantage of some unexpected capabilities.



Presented On: Tue Mar 11, 2008
Rick Nordtvedt , IMF Fellow
Details (hide)

Rick Nordtvedt discusses a four-year study he recently completed and published, which draws on the opinions and practices of senior executives from organizations across many industries, including several IMF members. His research examines the relationship between Information Technology (IT) Governance and Organizational Flexibility and their combined effects on responsiveness to business requirements. Results suggest that IT organizations can become more flexible and more responsive to their businesses through governance standardization and that such standardization also results in better business outcomes.

 

• Governance
• Return on Assets
• IT Flexibility
• IT Execution
• IT Decision-Making
• Prioritization Process
• Resource Allocation
• Centralized
• Formalized
• Standardized
• Performance
• Project Prioritization
• Flexibility
• Standardized Toolsets
• Standardized Processes
• Budget
• Systems Integration
• Implementation
• Standardization
• Sarbanes-Oxley
• SOX
• Management Information Systems
• MIS
• Customer Relationship Management
• CRM
• Infrastructure
• Alignment



Presented On: Thu Aug 7, 2008
Details (hide)


Presented On: Tue Apr 15, 2008
Stuart Kressel , Atlanta Practice Leader , Watson Wyatt
Details (hide)

 

 

 

 

While employers state that their best employees are leaving because of pay issues, top performing employees report that the number one reason for leaving an organization is stress levels. What does this mean to the rapidly changing workforce of the 21st Century? How do we measure stress, and what can we do to ensure that our organization is not being hurt by it?

 

 

Keywords:

  • Employee Engagement
  • Human Capital
  • Organizational Effectiveness
  • Compensation
  • Benefits
  • Retirement
  • Polling Methodology
  • Total Return to Shareholders
  • TRS
  • Employee Effectiveness
  • Work Performance
  • Turnover
  • Mergers and Acquisitions
  • M&A
  • Offshore
  • Performance
  • Rewards
  • Communication
  • Decision-making
  • Pay and Benefits
  • Teamwork
  • Work Environment
  • Integrity
  • Roles and Responsibilities
  • Career Development


Presented On: Tue Apr 15, 2008
Carlton Burroughs , Business HR Manager , Hewlett-Packard
Details (hide)

 

 

 

 

This session focuses on some practical strategies for attracting, motivating, and retaining members of Gen Y as both employees and customers. Carlton Burroughs discusses some key areas of generational difference, including cohort size, style, motivators, etc. The session also includes a strategic overview, some key concepts and linkages to motivation theory, a couple of intriguing case studies and some nuts-and-bolts recomendations.

Keywords:

  • Baby Boomers
  • Gen Y
  • Diversity
  • Facebook
  • MySpace
  • Career Management
  • Succession Plans
  • Mentoring
  • Domino
  • Security
  • Gen X
  • Work/Life Balance
  • Public Relations
  • PR
  • LinkedIn
  • Flexible Career Development
  • Job Rotation
  • Relative Performance
  • Leadership


Presented On: Wed Aug 27, 2008
Details (hide)

 

Our members at Allstate Insurance were interested in learning from other companies that have experience with implementing Enterprise Collaboration policies and practices. This Connect was an open discussion on which collaboration tools and strategies have been implemented within the participant organizations.

 



Presented On: Thu Aug 21, 2008
Details (hide)

Training your IT organization is important, especially now during some harder economic times when turnover can be of greater risk to the organization, so you need to build and retain a strong workforce. We want to focus on the tools and techniques that the participating companies are using to train their IT organizations.



Presented On: Tue Apr 15, 2008
Price Harding , Partner , CarterBaldwin
Details (hide)

 

 

 

Identifying and purposefully shaping your own corporate culture is often a difficult task. This session provides attendees with the analytical tools necessary to understand the “microcultures” that exist in any geographically dispersed organization and to build teams that can benefit from meaningful cultural interaction across multiple geographies.

 

Keywords:

 

  • Skillsets
  • Methodology
  • Power Structure
  • Cultural Metric
  • Sales Force
  • Workforce
  • Dispersed Workforce
  • Infrastructure
  • Aspirational Alignment
  • eMotionalization
  • Principles
  • Mergers and Acquisition
  • M&A

 



Presented On: Tue Mar 11, 2008
Bill Kwelty , Senior Vice President and Chief Information Officer , Automotive Resources International
Donald Reny , Chief of Information Technology , El Paso Corporation
Bruce Anderson , Vice President , TIAA-CREF
Details (hide)


Presented On: Thu Oct 18, 2007
Phillip Hibbert , IMF Fellow
James Stanley , Assistant Vice President, Human Resources , The Hartford
Details (hide)

Phil and James discuss lessons learned at The Hartford concerning divestiture of business units with a focus on personnel and staff concerns.



Presented On: Tue Jan 22, 2008
Thomas Stanley , Senior Director Platform Services , LexisNexis
Details (hide)

Tom Stanley leads a discussion on the virtualization journey at ChoicePoint. Utilizing consolidation strategies that includes VMware, Solaris 10 and Technology Refresh, ChoicePoint enjoyed a 30 percent cost reduction in data center operations. Despite a 40 percent growth in capacity, the power needs increased only 10 percent. Tom discusses tools, strategies and lessons learned for success.



Presented On: Tue Mar 11, 2008
Mark Polansky , Managing Director , Korn/Ferry International
Details (hide)

The emergence of Information Technology (IT) leadership and innovation at the "C" level has dramatically changed the role Chief Information Officers (CIOs) play in corporate America. This presentation take a looks at a historic perspective on the changing role of the CIO and provides a roadmap and operating model for 21st Century CIOs, and the “next level” of CIO impact. Read on to learn what drives the developments affecting the CIO position today and what will in the future.



Presented On: Fri Jun 6, 2008
Details (hide)

IMF members continue to leverage the experiences of their peers through the IMF Connect service more and more. In addition to the discussions that have made it into this quarterly report in summary form, many other requests were fulfilled in real-time through anonymous means.
Many of the topics covered in the first quarter of 2008 focus on strategic planning and transformation issues. Due to a financially tightened business climate, companies have asked their IT organizations to centralize, innovate, and otherwise find opportunities to reduce expense while still improving services.
IT organizations have responded by increasing their use of outsourced services, by creating alternative work programs, and by centralizing and restructuring their architecture groups, among other activities. The unique benefit of the IMF is the ability to bring companies together that are just starting down the path with those that have already made significant progress. In this way, each organization may have something to learn from others as well as something to share with others.



Presented On: Tue Jan 22, 2008
Scott Holmes , Senior Manager, Enterprise Architecture , Waste Management
Details (hide)

The beginning of a new calendar year is a natural time for reflection and planning. This presentation reviews the progress made toward the goals at Waste Management, Inc. (WMI) to the objectives communicated in the August 2007 presentation “Quantifying EA to IT Business Units." It also outlines the next steps that are planned.



Presented On: Tue Jan 22, 2008
Tom Guthrie , Vice President , IMF Fellow
Details (hide)

The Six Sigma methodology has been successfully applied in many process improvement situations, and the benefits have been praised publicly as key to the success of large international corporations. The problem is that most of us are not statisticians, and many of us work in industries and businesses that are rarely addressed in Six Sigma literature. The average businessperson’s ability to apply Six Sigma to his/her situation has been limited. This presentation focuses on exactly how and why Six Sigma works as a process improvement approach to any process and uses examples from the services sector to illustrate the point.



Presented On: Tue Jan 22, 2008
Bill Peer , Director , InterContinental Hotels Group
Details (hide)

Think creating an Enterprise Architecture (EA) is tough? Try creating one for an entire industry! Bill Peer shares his experiences and personal observations as a member of an architecture workgroup doing just that: creating an architecture for the entire hotel industry. He covers interesting insights, challenges, standards generation, lessons learned, TOGAF’s applicability, espionage concerns, maintaining the company’s secret sauce and other menacing topics that surface at this echelon.



Presented On: Thu Oct 18, 2007
Denise Peek , Manager, Human Performance Development , NASCO
Details (hide)

Denise Peek from NASCO discusses the importance of having a solid talent management and succession planning strategy. She shares her experience in the development and implementation of this strategy. In addition, she highlights the importance of utilizing benchmark data, best practices and market research when developing a solid talent management and succession planning strategy.



Presented On: Thu Oct 18, 2007
Tammy Reeves , Manager, IT Workforce , Milliken & Company
Details (hide)

Information Technology (IT) recruiting techniques vary from company to company. At Milliken & Company, the Information Services (IS) department is responsible for recruiting IT professionals. The ability to adapt and readily improve recruiting techniques is vital to obtaining top college graduates year after year. Tammy Reeves shares the IS recruiting process and how it has evolved within Milliken.



Presented On: Thu Oct 18, 2007
John Tindal , Associate , Booz Allen Hamilton
Dagne Fulcher , Booz Allen Hamilton
Details (hide)

John and Dagne will discuss best practices in staffing and workforce development. They will relate them to models that the Federal Chief Information Officer’s Council and Booz Allen Hamilton have developed for assessing the capabilities of the information technology workforce.



Presented On: Tue Sep 18, 2007
Jonathan Reichental , CIO , City of Palo Alto, CA
Details (hide)

Dr. Jonathan Reichental will cover a variety of topics including behaviors that are core to a culture of radical innovation at PwC. Drawing on his experience of working within his company to drive innovation he will discuss designing an innovation model for your company and actions you can take now to begin or significantly improve your approach to innovation.



Presented On: Tue Oct 16, 2007
Michael Roberti , Senior Security Manager , Harris Corporation
Details (hide)

Michael Roberti is the Senior Manager in charge of Information Security at Harris Corporation. Michael and his team of 11 security professionals are responsible for ensuring the security of Harris' enterprise applications and infrastructure systems at more than 80 locations worldwide. He also sets security policy and standards for the division’s business systems. Michael has worked in the security field for more than 10 years. Prior to his present managerial position, he was the Lead Security Engineer at Harris. His duties included firewall support, network security and Unix and NT system security and auditing. In addition, he developed and implemented an identity management and access approval process that was identified by external audit as a best practice. Michael earned a Bachelor of Science Degree in Computer Studies from the University of Maryland College and a Master of Science Degree in Information Assurance at Norwich University. In addition, he has received many technical certifications including CISSP, CISM, GSEC and MCSE.



Presented On: Tue Mar 11, 2008
Chris Desoiza , Vice President , Milliken & Company
Details (hide)

Chris DeSoiza oversees Milliken's Research and Development Organization and is the owner for one of their Key Corporate Initiatives "Growth through Innovation." An Invention is the solution to a problem. An Innovation is the commercially successful use of the solution. This is why Innovation takes the successful interaction of foresight, vision, process, multi-functional collaboration and leadership. By doing these things consistently you give yourself a much greater probability of success and the ability to meet your growth objectives. For Milliken, this has resulted in an ongoing stream of new product launches each year and the development and strengthening of Technology Platforms on which to maintain and build upon. This innovation process that weaves collaboration between IT, Research, Development, Manufacturing and Business works! Hear how IT is vital to the innovation model used at Milliken. Take away key drivers to implement in your organization to achieve new growth through innovation.



Presented On: Mon Mar 10, 2008
Details (hide)

The IMF Connect Process:

What is it?
IMF Connect provides members with a means of leveraging the experience of their peers on topics of immediate interest. Complementing the existing scheduled meetings and reports, IMF Connect matches member queries with real, practical advice from other practitioners who have already blazed the trail.

How Does it Work?
A member contacts IMF with a question for peer feedback.
IMF creates and pursues the reference group for your company.
IMF completes the research gathering.
Responses come directly from peers without any skewing.
IMF will arrange follow-up discussions and produce a summary of the results for the benefit of your corporation and your department.
Informative letter outlining the Connect results sent to Senior Most of IT Department.

Quarter One

  • Software Asset Management
  • IT Talent Rotations
  • Technology Renewal
  • Chargeback Methodologies
  • Intern Programs
  • Single Sign On
  • Website Filtering

Quarter Two

  • Corporate Scorecarding
  • Microsoft’s SharePoint Collaboration Solution
  • CobiT and ITIL IT Governance Frameworks
  • Infrastructure Technical Support Resource Requirements and Forecasting
  • Developing Front-Line and Middle-Tier Managers
  • Microsoft Operating System (OS) Based Handheld Device Security
  • Next Generation Virtual Networking
  • IT Communications
  • Patch Management
  • Configuration Management and the Configuration Management Database (CMDB)
  • Payment Card Industry (PCI) Data Security Standard

Quarter Three

  • Roles-Based Access Controls
  • Information Security Strategy
  • eDiscovery Compliance for Email
  • International Payroll and Human Resources
  • Shared Services Organizations and Service Owners
  • Flexible Work Arrangements
  • Applications Development Staff Ratios
  • Customer Satisfaction Surveys
  • Application Design Processes
  • Vendor Management

Quarter Four

  • Business Intelligence (BI) and Data Warehousing (DW)
  • Capacity Planning
  • Enterprise Architecture (EA)
  • Non-Business SharePoint Sites
  • Organizational Collaboration
  • Keys to Success with Project Portfolio Management (PPM)
  • Data Governance


Presented On: Tue Jan 23, 2007
Dennis Neuger , Lead Architect , Cox Communications
Details (hide)

Dennis Neuger discusses how Cox Communications approached virtualization and turned it into a successful infrastructure strategy for consolidation and infrastructure optimization. He also discusses its role in the area of Business Continuity.



Presented On: Thu Oct 16, 2008
Steven Zagoudis , Chief Executive Officer , Meta Governance
Details (hide)

Data Governance is a necessary oversight function in all IT and business organizations today. Increasingly, regulations and other compliance requirements necessitate a real focus on the company’s data assets and uses. During this web forum, Steve Zagoudis shared his philosophy on data governance, with critical information shared from his many years of industry experience.



Presented On: Wed Jul 11, 2007
Carter Johnson , Assistant Vice President , LexisNexis
Details (hide)

Carter Johnson discusses how he has been able to control Information Technology (IT) cost along with the importance of having complete visibility into infrastructure cost and how that helps the overall control of cost. In addition, he discusses how the procedures and discipline that affect the connection between asset management, financial control and vendor management are keys to successful cost management.



Presented On: Tue Sep 18, 2007
Matt McGarvey , San Diego Government
Details (hide)

The City of San Diego’s current financial systems are a mix of technologies with critical financial data residing in numerous disparate systems. Even generating simple financial reports is often a laborious and manual process. While embarking on a long-term strategy to implement an Enterprise Resource Planning (ERP) system, the City realized the need to make immediate improvements. Using data warehousing and business intelligence to consolidate viewing and analysis of data contained in the City’s major financial systems has greatly improved the City’s ability to make better business decisions.



Presented On: Thu Aug 23, 2007
Scott Holmes , Senior Manager, Enterprise Architecture , Waste Management
Details (hide)

Scott Holmes, Senior Manager of Enterprise Architecture (EA) at Waste Management, shares some of the more important aspects of EA. Using his own philosophies, Scott discusses how to improve the value that EA can provide to an organization.



Presented On: Thu Sep 27, 2007
Phillip Burdett , Senior Director , Koch Business Services
Brad Wagner , Technical Lead , Georgia-Pacific
Michael Smela , Technical Lead, VM Operations , Georgia-Pacific
Details (hide)

This Web Forum focuses on server virtualization and consolidation, specifically VMware implementation. Brad Wagner, Mike Smela and Phil Burdett discuss VMware implementation at Georgia-Pacific and answer participants’ questions about their own varied VMware implementations.



Presented On: Thu Jan 24, 2008
Details (hide)

IMF members pursued experiential information sharing on a wide variety of topics in 2007. While Information Security saw the greatest number of Connects for the year, the focus in the fourth quarter shifted to planning initiatives for the New Year. Therefore, the overall numbers for the Workforce, Architecture, Infrastructure and Data Management communities rose. Connects are a real-time measure of the “hot-button” issues at IMF member organizations. During the fourth quarter of 2007, these issues include topics such as Organizational Collaboration, Business Intelligence and Data Warehousing Best Practices, Capacity Planning, Enterprise Architecture, Non-Business SharePoint Sites, Project and Portfolio Management and Data Governance.



Presented On: Tue May 15, 2007
Chris Porch , Associate , Booz Allen Hamilton
Ben Marglin , Senior Associate , Booz Allen Hamilton
Details (hide)

How can organizations move beyond Service Oriented Architecture (SOA) hype and tactical implementations toward a well-orchestrated, business-driven SOA strategy? As IT executives from leading businesses across private and public sectors, this roundtable provides you with a unique forum for learning how other organizations are thinking about and approaching SOA, what is and is not working and where to find true value generation for sustained SOA success. Included topics are defining the business imperative; capturing and measuring SOA value; establishing organizational controls and governance; integrating SOA into broader strategies such as Capital Planning and Enterprise Architecture; and learning from success stories and failures.



Presented On: Tue Jul 10, 2007
Rick Bell , Director , Canadian Tire
Details (hide)

Rick Bell describes how Canadian Tire’s Corporate Information Technology (IT) department has approached the tracking of critical application service levels, the Corporation’s methods for using IT operational performance metrics and the Customer Focus program followed by the IT staff. An overview of infrastructure benchmarking and Service Costing/Cost Recovery practices will also be included.



Presented On: Tue Jul 10, 2007
David Traynor , Business Excellence Manager , Southern Company
Details (hide)

David Traynor discusses the efforts undertaken at Southern Company to run Information Technology (IT) as a business with a focus on chargeback methodologies and lessons learned, benchmarking and market testing of IT products and services along with IT investment decision-making.



Presented On: Tue Jul 10, 2007
Details (hide)

Jeff Cooper discusses how The Walt Disney Company manages service delivery in a multi-vendor, outsourced environment and the importance of establishing an internal Information Technology (IT) brand. He also covers the “marketing” of IT services to internal customers through his Technical Relationship Management organization.



Presented On: Thu Apr 19, 2007
Jean Sirica , Program Director , The Hartford
Details (hide)

The eBusine