Main
Log in

Wissam Raffoul

This email address is being protected from spambots. You need JavaScript enabled to view it.

Dr. Wissam Raffoul Specialises in transforming IT groups into service organisations, with particular expertise in IT Service Management (ITSM), process optimisation, outsourcing and cloud strategies, enterprise systems management solutions and business-centric IT strategies. Prior to joining IBRS in August 2013, he was General Manager strategic consulting in Dimension Data advising clients on applying technology to improve business performance. Prior to joining Dimension Data, he was a Vice President in Gartner /META Group and issued various research publications covering service delivery processes, centre-of-excellence models, managing outsourcing vendors, benchmarks, maturity models, IT procurement evolution and supply/demand models. In previous positions, he headed HP ITSM consulting Practice in Australia. He also acted as an infrastructure manager, reporting to the CIO at a number of large organisations in government and in the financial and petrochemical industries.

Conclusion: IT organisations driving their business transformation should mature their as-a-Service capability to deliver IT services at commercial standards in a timely and cost-effective manner. This should lead to effective delivery through the integration of business and IT processes.


Register to read more...


IBRS iQ is a database of Client inquiries and is designed to get you talking to our Advisors about these topics in the context of your organisation in order to provide tailored advice for your needs.


Register to read more...


Conclusion: Traditional disaster recovery plans do not mitigate risks against frequent software and hardware malfunction, nor do they integrate with business continuity plans. As a result, a production service may become unavailable for up to two days in certain cases (e. g. recovery from a database outage or data corruption). In the digital world, the business impact of such a failure will be significant as clients may place their orders with a competitor when they face an unavailable service for a prolonged period of time. IT organisations should deliver recovery-as-a-service that provides non-stop business operations.


Register to read more...


Conclusion: IT organisations driving their business transformation should mature their internal consulting function to connect with business units’ service quality expectations. This should lead to consistent delivery, facilitate knowledge sharing and realise business benefits.


Register to read more...


Conclusion: While the increased adoption of public IaaS1 can reduce cost and simplify technology procurement challenges, IaaS does not meet all IT organisations’ sourcing requirements such as legacy applications maintenance and IT service management. Hence, IT organisations are left with no alternative but to use multiple service providers to satisfy all their needs. This will increase clients’ governance cost of service providers and extend the duration of external services acquisition. As a result, a service broker model has emerged to provide one single point of accountability to all sourcing deliverables, simplify go-to-market strategies and fulfil the Cloud migration requirements in a cost-effective manner. IT organisations should assess the applicability of this model to their environment.


Register to read more...


Conclusion: Forward thinking IT organisations wishing to create a service differentiation should analyse their value activities to construct a “uniqueness capability”. The outcome should convince business lines that IT services can generate business value at a competitive price. The value chain firstly requires to address service delivery processes by constructing the IT value chain1 , secondly to realise cost advantage2 and thirdly to create service differentiation (this note).


Register to read more...


Conclusion: Cost advantage can be achieved by firstly, estimating the existing services costs. Secondly, use cost effective external services. Thirdly, integrate services. Fourthly, retain cost advantage. This can be achieved by removing duplicated activities and influencing cost drivers.


Register to read more...


Conclusion: Many IT organisations are perceived by their business units as high cost/low quality service providers. Much of this perception is due to the IT group’s inability to successfully articulate service value, demonstrate cost competitiveness, and create internal service differentiation. IT organisations should construct service value chain models to diagnose the IT organisation’s deficiencies, improve image, and link to vendors’ value chains. This can be achieved by disaggregating the business of IT into its strategic activities (e. g. service definition and communication, customer service). This will result in understanding the cost behaviour and identifying existing and potential differentiation sources such as accelerating the release of business products to market and improving IT and business lines interaction.


Register to read more...


Conclusion: While technology is becoming increasingly critical to business transformation, IT organisations are becoming less important to business stakeholders. This is because enterprise architecture practice’s main focus remains on back-office systems and on initiatives that do not necessarily contribute to business performance improvement and business cost reduction initiatives. IT organisations should revive the enterprise architecture practice by delivering IT-as-a-Service with an outward focus targeting business, information, applications, and infrastructure domains. This will increase IT organisations’ credibility to become key players in business transformation projects.


Register to read more...


Conclusion: IT organisations should not be treating software releases to support the digital transformation as “business as usual”, because they may overlook the demand for extra-company IT management process integration, rapid application deployment, and speedy problem resolution. IT organisations should recreate their “release to production” processes to address the new applications’ unique requirements for appropriate security, resilient architecture, and elevated service level standards.


Register to read more...


In the News

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles