Log in

Governance & Planning

Conclusion: Poor planning is frequently cited in surveys as a major reason an ICT project has failed. A major element in the planning process is the preparation of the business case setting out why the project is needed and must be approved.

Management is remiss when it approves a poorly developed business case as it sends the wrong message to developers and sponsors – that if the project fails to deliver they are not to blame.

Conclusion: Proficiency in financial analysis and concepts is critical for management. Assessment of an organisation’s skills establishes the requirements necessary to raise abilities. The financial maturity model can assist with the process of setting those requirements.

Conclusion: Big data and analytics projects can learn important lessons from the domain of information security analytics platforms. Two critical factors to consider when planning deployment of an analytics platform are: the need for a clear business objective and; the depth and duration of organisational commitment required. Without a clear understanding of the objective of the analytics project, or adequate resource commitment, the project will likely fail to deliver on expectations. The worst outcome is that inadequate investment in people could result in an organisation drawing incorrect conclusions from the analytics platform.

Conclusion: The Workspace of the Future is a vision statement on how staff and stakeholders will perform tasks related to their work in the next decade. It includes technological innovation (e. g. mobility, Cloud, data analytics), organisation transformation (e. g. activity-based working) and cultural change (e. g. social, collaboration). To realise this vision, especially given its all-encompassing and potentially transformational impact, requires a strategy that is specifically crafted to fit with an organisation’s long-term objectives. Part of this strategy is a complete rethink of end user computing, by challenging desktop era assumptions.

However, challenging assumptions is difficult. To gain clarity, IBRS recommends mapping assumptions to principles and business impacts. By conducting an assumption mapping exercise, organisations may begin to not only communicate the need for change within both IT and business groups but, also, uncover potential for fundamental business transformation.

Conclusion: Nearly all organisations recognise that the world, their industry, and their customers are changing. Evidence of that realisation can be seen in company restructures, strategy and vision documents, and the discourse used by executive management. Change vocabulary such as transformation, innovation, anything Cloud, as-a-service or mobile is widely used. However, history shows that even highly successful companies find change and transformation difficult, with icons such as Novell and Netscape either failing completely or being relegated to market followers.

Review of these and similar organisations shows that being overly committed to a previously winning formula, misreading the market and competition dynamics or responding to market changes too slowly were common missteps.

Conclusion: IT organisations adopting IT-as-a-Service strategies tend to acquire the best of breed services from the market instead of building them in-house. This leads to increased adoption of multi-sourced services, whereby reliable governance processes are critical success factors to realise the desired business benefits in a timely and cost-effective manner.

Conclusion: the Department of Finance has produced a Cloud Policy that is linked to a paper about Cloud implementation that does not mention modern Cloud architecture, which in turn is linked to an architecture paper that does not mention Cloud.

Agencies looking to adopt Cloud services are advised to look for advice beyond the Australian Government’s Cloud Policy and its supporting documents.

Conclusion: in the publication ‘Running-IT-as-a-Service part 4’, IBRS defined how Service Value Agreements can be constructed by correlating business performance metrics with IT service levels. This note describes how Service Value Agreements can be constructed by aligning IT service levels with business service levels and processes. As a result, meeting or exceeding SLA targets will demonstrate the IT organisation’s contribution to business performance improvement and cost reduction undertakings.

Conclusion: leading Mobile Device Management (MDM) solution providers will persist but face multiple challenges with Microsoft’s Enterprise Mobility Suite, especially its Intune Configuration, rising as a logical challenge to MDM in >50% of Australian enterprises before 2017.

The dominant MDM selection criterion will remain: how well does this mobility solution integrate with Microsoft and others?

Conclusion: the adoption of Cloud-based applications and data, the proliferation of mobile devices (i.e. Smartphones and Tablets) and the increased interest in BYOD is driving a radical change in end user computing. The old device-centric model, based on a stateful Windows desktop, is being replaced by an application-centric model where device state is transient. While this is not yet the end of the Windows desktop, the beginning of the end has arrived.

In the News

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...

Intel chip meltdown flaw shows new vulnerability - AFR - Jan 5th 2018

Cyber security experts have warned the long-term implications of chip vulnerabilities nicknamed Spectre and Meltdown discovered by researchers this week are still unknown, despite it appearing that...

Business experience should help parents keep kids safe online - AFR - 28th Nov 2017

The adults in the lives of young people need to know more about security and safety in an online world and they could be learning this at work The Office of the eSafety Commissioner deals with some...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry


Already a subscriber?

Login to read your premium content.

Recently Viewed Articles
Related Articles