SlideShare una empresa de Scribd logo
1 de 12
Info-Tech Research Group 1Info-Tech Research Group 1
Info-Tech Research Group, Inc. is a global leader in providing IT research and advice.
Info-Tech’s products and services combine actionable insight and relevant advice with
ready-to-use tools and templates that cover the full spectrum of IT concerns.
© 1997-2017 Info-Tech Research Group Inc.
Optimize Change Management
Turn and face the change with a right-sized change management process.
Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools
and templates that cover the full spectrum of IT concerns.© 1997 - 2016 Info-Tech Research Group
Info-Tech Research Group 2Info-Tech Research Group 2
Balance risk and efficiency to optimize change management.
ANALYST PERSPECTIVE
Any significant change to the technical environment – be it a core business
application or a critical network/compute/storage appliance – brings a certain
element of risk of unplanned consequences. Organizations that prefer to avoid all
risk will drown in a burdensome process and red tape, entailed by rounds of
technical and configuration reviews. It’s essential to balance the need to mitigate
risk while remaining flexible and responsive to the needs of the business.
A right-sized process will incorporate adequate due diligence, without being so
onerous that sysadmins prefer to bypass the process altogether and implement
changes “under the radar.”
Key success factors for any change management initiative include staff buy into
the need for the control, appropriate processware, an ITSM platform to track the
lifecycle of all changes, and visible management support for this foundational
activity of any dynamic business.
Sumit Chowdhury,
Senior Director, Infrastructure Practice
Info-Tech Research Group
Info-Tech Research Group 3Info-Tech Research Group 3
Resolution
Situation
Complication
Executive summary
1. An objective framework for estimating
risk is necessary to assess changes.
Simply asking “what is the risk?” will result in
subjective responses that will likely minimize
the perceived risk.
2. Maximize value through integration with
the IT service management ecosystem.
Change management in isolation will bring
some benefits, but integration with problem,
incident, project, configuration, and release
management maximizes the ROI.
3. A mature change management process
will minimize review and approval activity.
Counterintuitively, with experience in
implementing changes, risk levels decline to a
point where most changes are preapproved.
• IT system owners often resist change management because they see it
as slow and bureaucratic.
• At the same time, an increasingly interlinked technical environment may
cause issues to appear in unexpected places. Configuration
management systems are often not kept up to date to catch the potential
linkages.
• Infrastructure changes are often seen as “different” from application
changes, and two (or more) processes may exist.
• Create a unified change management process that reduces risk and is balanced in its approach toward deploying changes,
while also maintaining throughput of innovation and enhancements.
◦ Categorize changes based on an industry-standard risk model with objective measures of impact and likelihood.
◦ Establish and empower a change manager and change advisory board with the authority to manage, approve, and
prioritize changes.
◦ Integrate a configuration management database with the change management process to identify dependencies.
Infrastructure and application change occurs constantly, driven by changing
business needs, requests for new functionality, operational releases and
patches, and resolution of incidents or problems detected by the service
desk. IT managers need to follow a standard change management process
to ensure that rogue changes are never deployed while the organization
remains responsive to demand.
Info-Tech Research Group 4Info-Tech Research Group 4
BUSINESS
NEW
APP
NEW
VERSION
Business requests2
IT change is constant and is driven by:
CONFIGURATION
MANAGEMENT
SYSTEM (CMS)
WORK-
AROUND
FIX
INCIDENT &
PROBLEM
SERVICE
DESK
MAJOR
RELEASE
SECURITY
PATCH
MAINTENANCE
RELEASE
OPERATIONS
CHANGE
MANAGEMENT
If you have a CMS, it is used to
keep a record of changes to
the infrastructure and is
queried to assess change
requests.
Operational releases and patches1
Incident or problem tickets3
Business-driven changes may include
requests from other business
departments that require IT’s support.
Operational releases,
maintenance, vendor-driven
updates, and security updates all
can be key drivers of change.
Some incident
and problem
tickets require a
change in order
to facilitate
resolution of the
incident.
Info-Tech Research Group 5Info-Tech Research Group 5
Successful change management will provide benefits to both
the business and IT
Respond to business requests faster, while reducing the number of change-related
disruptions.
IT Benefits
Fewer change-related incidents and outages.
Faster change turnaround time.
Higher rate of change success.
Less change rework.
Fewer service desk calls related to poorly
communicated changes.
Business Benefits
Fewer service disruptions.
Faster response to requests for new and
enhanced functionality.
Higher rate of benefits realization when
changes are implemented.
Lower cost per change.
Fewer “surprise” changes disrupting
productivity.
IT satisfaction with change management will drive business satisfaction with IT. Once
the process is working efficiently, staff will be more motivated to adhere to the process,
reducing the number of unauthorized changes. As fewer changes bypass proper evaluation
and testing, service disruptions will decrease and business satisfaction will increase.
Info-Tech Research Group 6Info-Tech Research Group 6
Change management improves core benefits to the business:
the four C’s
Change management brings daily control over
the IT environment, allowing you to review
every relatively new change, eliminate changes
that would have likely failed, and review all
changes to improve the IT environment.
Request for change templates and a structured
process shapes implementation, test, and
back-out plans to be more consistent.
Implementing processes for pre-approved
changes also ensures these frequent changes
are executed consistently and efficiently.
Change management planning brings
increased communication and collaboration
across groups by coordinating changes with
business activities. The Change Advisory
Board (CAB) also brings a more formalized
and centralized communication method for IT.
Change management processes will give your
organization more confidence through more
accurate planning, improved execution of
changes with less failure, and control over the
IT environment. This also leads to greater
protection against audits.
Most organizations have at least some form of change control in place, but
formalizing change management leads to the four C’s of business benefits:
1 3
2 4
Control
Consistency
Collaboration
Confidence
Info-Tech Research Group 7Info-Tech Research Group 7
You likely need to improve change management more than
any other infrastructure & operations process
8.9
8
8.4
8.7
8.4
8.2
7.9
8.6
7.1
6.1
6.3
6.5
6.2
5.8
5.4
6.1
0 2 4 6 8 10
Service Desk
Asset Management
Operations Management
Incident &
Problem Management
Availability &
Capacity Management
Release Management
Configuration Management
Change Management
Effectiveness Importance
Source: Info-Tech; N=3,285
Of the eight infrastructure &
operations processes measured
in Info-Tech’s IT Management
and Governance Diagnostic
(MGD) program, change
management tied for the
biggest gap between
importance and
effectiveness of these
processes.
Twenty-one percent of
organizations who have
completed this diagnostic were
classified as needing to improve
change management based on
these scores. More
organizations need to
improve change
management than any
other infrastructure &
operations process.
Info-Tech Research Group 8Info-Tech Research Group 8
Executives and directors recognize the importance of change
management, but feel theirs is currently ineffective
Info-Tech’s IT Management and
Governance Diagnostic program
assesses the importance and
effectiveness of core IT processes.
Since its inception, the MGD has
consistently identified change
management as an area for
immediate improvement.
Importance Scores
No Importance: 1.0-6.9
Limited Importance: 7.0-7.9
Significant Importance: 8.0-8.9
Critical Importance: 9.0-10.0
Source: Info-Tech; N=3,285
6.7
6.3
5.8 5.8
8.7 8.7 8.6 8.5
0.0
2.0
4.0
6.0
8.0
10.0
Frontline Manager Director Executive
MGDScore
Seniority Level
Change Management - Effectiveness
Change Management - Importance
Effectiveness Scores
Not in Place: N/A
Not Effective: 0.0-4.9
Somewhat Ineffective: 5.0-5.9
Somewhat Effective: 6.0-6.9
Very Effective: 7.0-10.0
Info-Tech Research Group 9Info-Tech Research Group 9
You are not alone…
Many organizations suffer from the lack of a defined change management process.
We are always
struggling with
utilization, and I think
[this] is because of a lack of
user knowledge.
– CIO, Claims Management
Provider
We found that people were making changes ad hoc into
production. This would result in change-related incidents.
– Senior Director, Technology and Managed Services
By not pre-planning
changes far in
advance, we are forced to
give the change
management form at the
eleventh hour (…) Because
of these time frame issues,
we don’t require proof of
testing prior to change,
and that’s a big gap.
– Assistant Director of
Technology Solutions,
Municipal Government
Services
We only recognize dependencies after deployment.
– Siebel Systems Administrator
Info-Tech Research Group 10Info-Tech Research Group 10
After: Right-Sized Change ManagementBefore: Informal Change Management
Overcome perceived challenges to implementing change
management to reap measurable reward
 Change Approval: Changes do not pass through a
formal review process before implementation.
 10% of released changes are approved
• Implementation Challenge: Staff will resist having to
submit formal change requests and assessments,
frustrated at the prospect of having to wait longer to
have changes approved.
 Change Prioritization: Changes are not prioritized
according to urgency, risk, and impact.
 60% of changes are urgent
• Implementation Challenge: Influential stakeholders
accustomed to having changes approved and
deployed might resist having to submit changes to a
standard cost-benefit analysis.
 Change Deployment: Changes often negatively
impact user productivity.
 25% of changes are realized as planned.
• Implementation Challenge: Engaging the business so
that formal change freeze periods and regular
maintenance windows can be established.
 Change Approval: All changes pass through a formal
review process. Once a change is repeatable and well-
tested, it can be pre-approved to save time. Almost no
unauthorized changes are deployed.
 95% of changes are approved
• KPI: Decrease in change-related incidents.
 Change Prioritization: The CAB prioritizes changes so
that the business is satisfied with the speed of change
deployment.
 35% of changes are urgent
• KPI: Decrease in change turnaround time.
 Change Deployment: Users are always aware of
impending changes and changes do not interrupt critical
business activities.
 Over 80% of changes are realized as planned
• KPI: Decrease in the number of failed deployments.
Info-Tech Research Group 11Info-Tech Research Group 11
Info-Tech’s approach to change management optimization
focuses on building standardized processes
Phase 1:
Form Strategy
Phase 2:
Build Intake Process
Phase 3:
Build Core Processes
Build risk
prioritization and
categorization
scheme
Assess CM maturity
1.2
1.1
Determine roles +
responsibilities
Build core change
processes
2.2
2.1
Establish post-
implementation
activities
Create change
intake process 3.2
3.1
• Maturity Assessment
Tool
• Risk Assessment Tool • Core Process Workflows
• Change Manager Job
Description
• RACI Chart & Role
Descriptions
• Request For Change
Process
• Request For Change
(RFC) Form
• Change Calendar
Guidelines
• Emergency Change
Process Workflow
Phase 4:
Build Implementation
Plan
Implement project
Identify metrics and
build change
calendar
4.2
4.1
• Metrics and Reports
• Change Metrics Tool
• Communication Plan
• Executive Presentation
• Implementation Gantt
Chart
• Sunshine Diagram
Outcomes + Deliverables
Change management standard operating procedures (SOP)
• Pre-Implementation
Checklist
• Post-Implementation
Review Checklist• CAB Charter
Info-Tech Research Group ‹#›
Toll Free: 1-888-670-8889

Más contenido relacionado

La actualidad más candente

Introducing The Open Group IT4IT™ Standard
Introducing The Open Group IT4IT™ StandardIntroducing The Open Group IT4IT™ Standard
Introducing The Open Group IT4IT™ StandardEnterprise Architects
 
MHA2018 - Agile Transformation Explained - Mike Cottmeyer
MHA2018 - Agile Transformation Explained - Mike CottmeyerMHA2018 - Agile Transformation Explained - Mike Cottmeyer
MHA2018 - Agile Transformation Explained - Mike CottmeyerAgileDenver
 
Storytelling Techniques for Better Requirements
Storytelling Techniques for Better RequirementsStorytelling Techniques for Better Requirements
Storytelling Techniques for Better RequirementsTechWell
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Sessionengtsze
 
Value analysis with Value Stream and Capability modeling
Value analysis with Value Stream and Capability modelingValue analysis with Value Stream and Capability modeling
Value analysis with Value Stream and Capability modelingCOMPETENSIS
 
An Introduction into the design of business using business architecture
An Introduction into the design of business using business architectureAn Introduction into the design of business using business architecture
An Introduction into the design of business using business architectureCraig Martin
 
Incorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureIncorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureAlan McSweeney
 
Sydney Water Target Operating Model Design
Sydney Water Target Operating Model DesignSydney Water Target Operating Model Design
Sydney Water Target Operating Model DesignSheng Zhong (Steven)
 
Change and Project Management Toolkit - Overview and Approach
Change and Project Management Toolkit - Overview and ApproachChange and Project Management Toolkit - Overview and Approach
Change and Project Management Toolkit - Overview and ApproachPeterFranz6
 
Capability-based Business Model Transformation
Capability-based Business Model TransformationCapability-based Business Model Transformation
Capability-based Business Model TransformationIlia Bider
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core conceptsPaul Sullivan
 
Visual Design and Architecture
Visual Design and ArchitectureVisual Design and Architecture
Visual Design and ArchitectureRuth Malan
 
Implementing Effective Enterprise Architecture
Implementing Effective Enterprise ArchitectureImplementing Effective Enterprise Architecture
Implementing Effective Enterprise ArchitectureLeo Shuster
 
Enterprise Agile Transformation Strategies
Enterprise Agile Transformation StrategiesEnterprise Agile Transformation Strategies
Enterprise Agile Transformation StrategiesMike Cottmeyer
 
Agile transformation 1.3
Agile transformation 1.3Agile transformation 1.3
Agile transformation 1.3Krystian Kaczor
 
What is Agile Service Management? Why Is it Important? ITSM Academy Webinar
 What is Agile Service Management? Why Is it Important? ITSM Academy Webinar What is Agile Service Management? Why Is it Important? ITSM Academy Webinar
What is Agile Service Management? Why Is it Important? ITSM Academy WebinarITSM Academy, Inc.
 
TOGAF Reference Models
TOGAF Reference ModelsTOGAF Reference Models
TOGAF Reference ModelsPaul Sullivan
 
IT4IT - The Full Story for Digital Transformation - Part 2
IT4IT - The Full Story for Digital Transformation - Part 2IT4IT - The Full Story for Digital Transformation - Part 2
IT4IT - The Full Story for Digital Transformation - Part 2Mohamed Zakarya Abdelgawad
 

La actualidad más candente (20)

Introducing The Open Group IT4IT™ Standard
Introducing The Open Group IT4IT™ StandardIntroducing The Open Group IT4IT™ Standard
Introducing The Open Group IT4IT™ Standard
 
MHA2018 - Agile Transformation Explained - Mike Cottmeyer
MHA2018 - Agile Transformation Explained - Mike CottmeyerMHA2018 - Agile Transformation Explained - Mike Cottmeyer
MHA2018 - Agile Transformation Explained - Mike Cottmeyer
 
Storytelling Techniques for Better Requirements
Storytelling Techniques for Better RequirementsStorytelling Techniques for Better Requirements
Storytelling Techniques for Better Requirements
 
IT4IT BCS
IT4IT BCSIT4IT BCS
IT4IT BCS
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
 
Value analysis with Value Stream and Capability modeling
Value analysis with Value Stream and Capability modelingValue analysis with Value Stream and Capability modeling
Value analysis with Value Stream and Capability modeling
 
An Introduction into the design of business using business architecture
An Introduction into the design of business using business architectureAn Introduction into the design of business using business architecture
An Introduction into the design of business using business architecture
 
Incorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureIncorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution Architecture
 
Sydney Water Target Operating Model Design
Sydney Water Target Operating Model DesignSydney Water Target Operating Model Design
Sydney Water Target Operating Model Design
 
Change and Project Management Toolkit - Overview and Approach
Change and Project Management Toolkit - Overview and ApproachChange and Project Management Toolkit - Overview and Approach
Change and Project Management Toolkit - Overview and Approach
 
Capability-based Business Model Transformation
Capability-based Business Model TransformationCapability-based Business Model Transformation
Capability-based Business Model Transformation
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core concepts
 
Visual Design and Architecture
Visual Design and ArchitectureVisual Design and Architecture
Visual Design and Architecture
 
Implementing Effective Enterprise Architecture
Implementing Effective Enterprise ArchitectureImplementing Effective Enterprise Architecture
Implementing Effective Enterprise Architecture
 
Enterprise Agile Transformation Strategies
Enterprise Agile Transformation StrategiesEnterprise Agile Transformation Strategies
Enterprise Agile Transformation Strategies
 
Agile transformation 1.3
Agile transformation 1.3Agile transformation 1.3
Agile transformation 1.3
 
What is Agile Service Management? Why Is it Important? ITSM Academy Webinar
 What is Agile Service Management? Why Is it Important? ITSM Academy Webinar What is Agile Service Management? Why Is it Important? ITSM Academy Webinar
What is Agile Service Management? Why Is it Important? ITSM Academy Webinar
 
TOGAF Reference Models
TOGAF Reference ModelsTOGAF Reference Models
TOGAF Reference Models
 
IT4IT - The Full Story for Digital Transformation - Part 2
IT4IT - The Full Story for Digital Transformation - Part 2IT4IT - The Full Story for Digital Transformation - Part 2
IT4IT - The Full Story for Digital Transformation - Part 2
 
What is DevOps? What is DevOps CoE?
What is DevOps? What is DevOps CoE? What is DevOps? What is DevOps CoE?
What is DevOps? What is DevOps CoE?
 

Similar a Optimize Change Management

SDLC Control
SDLC ControlSDLC Control
SDLC Controlbenji00
 
UCMDB _Predictive Change Impact Analysis circa 2009
UCMDB _Predictive Change Impact Analysis circa 2009UCMDB _Predictive Change Impact Analysis circa 2009
UCMDB _Predictive Change Impact Analysis circa 2009djasso7494
 
IT Strategy Sample
IT Strategy SampleIT Strategy Sample
IT Strategy SampleGlen Alleman
 
Fool With A Tool V2
Fool With A Tool V2Fool With A Tool V2
Fool With A Tool V2Linz1769
 
Evolution of service transition
Evolution of service transitionEvolution of service transition
Evolution of service transitionStuart Rance
 
Engineering Change Management - Overview and Best Practices
Engineering Change Management - Overview and Best PracticesEngineering Change Management - Overview and Best Practices
Engineering Change Management - Overview and Best PracticesShobhit Singhal
 
Iscope Digital : Integrated IT Service Management
Iscope Digital : Integrated IT Service ManagementIscope Digital : Integrated IT Service Management
Iscope Digital : Integrated IT Service ManagementIscope Digital
 
The DevOps promise: IT delivery that’s hot-off-the-catwalk and made-to-last
The DevOps promise:  IT delivery that’s hot-off-the-catwalk and made-to-lastThe DevOps promise:  IT delivery that’s hot-off-the-catwalk and made-to-last
The DevOps promise: IT delivery that’s hot-off-the-catwalk and made-to-lastPeter Shirley-Quirk
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementNIIT Technologies
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for SecurityTripwire
 
Chapter 2 analyzing the business case
Chapter 2 analyzing the business caseChapter 2 analyzing the business case
Chapter 2 analyzing the business caseRaquel Miranda
 
P2 how to develop an it change management program
P2 how to develop an it change management programP2 how to develop an it change management program
P2 how to develop an it change management programIT-Toolkits.org
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)raszky
 
Knowing the Important Phases of ITSM Implementation.pdf
Knowing the Important Phases of ITSM Implementation.pdfKnowing the Important Phases of ITSM Implementation.pdf
Knowing the Important Phases of ITSM Implementation.pdfAelum Consulting
 
Integrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User AdoptionIntegrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User AdoptionCA Technologies
 

Similar a Optimize Change Management (20)

SDLC Control
SDLC ControlSDLC Control
SDLC Control
 
Effective Change Management
Effective Change ManagementEffective Change Management
Effective Change Management
 
Dit yvol4iss27
Dit yvol4iss27Dit yvol4iss27
Dit yvol4iss27
 
UCMDB _Predictive Change Impact Analysis circa 2009
UCMDB _Predictive Change Impact Analysis circa 2009UCMDB _Predictive Change Impact Analysis circa 2009
UCMDB _Predictive Change Impact Analysis circa 2009
 
IT Strategy Sample
IT Strategy SampleIT Strategy Sample
IT Strategy Sample
 
Fool With A Tool V2
Fool With A Tool V2Fool With A Tool V2
Fool With A Tool V2
 
Evolution of service transition
Evolution of service transitionEvolution of service transition
Evolution of service transition
 
Engineering Change Management - Overview and Best Practices
Engineering Change Management - Overview and Best PracticesEngineering Change Management - Overview and Best Practices
Engineering Change Management - Overview and Best Practices
 
Iscope Digital : Integrated IT Service Management
Iscope Digital : Integrated IT Service ManagementIscope Digital : Integrated IT Service Management
Iscope Digital : Integrated IT Service Management
 
TCS Survey: The future of operations
TCS Survey:  The future of operationsTCS Survey:  The future of operations
TCS Survey: The future of operations
 
Integrated risk management
Integrated risk managementIntegrated risk management
Integrated risk management
 
The DevOps promise: IT delivery that’s hot-off-the-catwalk and made-to-last
The DevOps promise:  IT delivery that’s hot-off-the-catwalk and made-to-lastThe DevOps promise:  IT delivery that’s hot-off-the-catwalk and made-to-last
The DevOps promise: IT delivery that’s hot-off-the-catwalk and made-to-last
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure management
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
Chapter 2 analyzing the business case
Chapter 2 analyzing the business caseChapter 2 analyzing the business case
Chapter 2 analyzing the business case
 
An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance program
 
P2 how to develop an it change management program
P2 how to develop an it change management programP2 how to develop an it change management program
P2 how to develop an it change management program
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
 
Knowing the Important Phases of ITSM Implementation.pdf
Knowing the Important Phases of ITSM Implementation.pdfKnowing the Important Phases of ITSM Implementation.pdf
Knowing the Important Phases of ITSM Implementation.pdf
 
Integrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User AdoptionIntegrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User Adoption
 

Más de Info-Tech Research Group

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 
Master Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleMaster Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleInfo-Tech Research Group
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapInfo-Tech Research Group
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramInfo-Tech Research Group
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationInfo-Tech Research Group
 
Modernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureModernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureInfo-Tech Research Group
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsInfo-Tech Research Group
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyInfo-Tech Research Group
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revisedInfo-Tech Research Group
 

Más de Info-Tech Research Group (20)

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Create a Winning BPI Playbook
Create a Winning BPI PlaybookCreate a Winning BPI Playbook
Create a Winning BPI Playbook
 
Master Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleMaster Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sample
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 
Standardize the Service Desk
Standardize the Service DeskStandardize the Service Desk
Standardize the Service Desk
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and Prioritization
 
Modernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureModernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration Infrastructure
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
 
Info-Tech Membership Overview
Info-Tech Membership OverviewInfo-Tech Membership Overview
Info-Tech Membership Overview
 
Define an EA Operating Model
Define an EA Operating ModelDefine an EA Operating Model
Define an EA Operating Model
 
Become a Transformational CIO
Become a Transformational CIOBecome a Transformational CIO
Become a Transformational CIO
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Build an Application Integration Strategy
Build an Application Integration StrategyBuild an Application Integration Strategy
Build an Application Integration Strategy
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management Strategy
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revised
 
Implement a Shared Services Model
Implement a Shared Services ModelImplement a Shared Services Model
Implement a Shared Services Model
 
Assess and Optimize EA Capability
Assess and Optimize EA CapabilityAssess and Optimize EA Capability
Assess and Optimize EA Capability
 
Survive an Impending Audit
Survive an Impending AuditSurvive an Impending Audit
Survive an Impending Audit
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Optimize Change Management

  • 1. Info-Tech Research Group 1Info-Tech Research Group 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. © 1997-2017 Info-Tech Research Group Inc. Optimize Change Management Turn and face the change with a right-sized change management process. Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.© 1997 - 2016 Info-Tech Research Group
  • 2. Info-Tech Research Group 2Info-Tech Research Group 2 Balance risk and efficiency to optimize change management. ANALYST PERSPECTIVE Any significant change to the technical environment – be it a core business application or a critical network/compute/storage appliance – brings a certain element of risk of unplanned consequences. Organizations that prefer to avoid all risk will drown in a burdensome process and red tape, entailed by rounds of technical and configuration reviews. It’s essential to balance the need to mitigate risk while remaining flexible and responsive to the needs of the business. A right-sized process will incorporate adequate due diligence, without being so onerous that sysadmins prefer to bypass the process altogether and implement changes “under the radar.” Key success factors for any change management initiative include staff buy into the need for the control, appropriate processware, an ITSM platform to track the lifecycle of all changes, and visible management support for this foundational activity of any dynamic business. Sumit Chowdhury, Senior Director, Infrastructure Practice Info-Tech Research Group
  • 3. Info-Tech Research Group 3Info-Tech Research Group 3 Resolution Situation Complication Executive summary 1. An objective framework for estimating risk is necessary to assess changes. Simply asking “what is the risk?” will result in subjective responses that will likely minimize the perceived risk. 2. Maximize value through integration with the IT service management ecosystem. Change management in isolation will bring some benefits, but integration with problem, incident, project, configuration, and release management maximizes the ROI. 3. A mature change management process will minimize review and approval activity. Counterintuitively, with experience in implementing changes, risk levels decline to a point where most changes are preapproved. • IT system owners often resist change management because they see it as slow and bureaucratic. • At the same time, an increasingly interlinked technical environment may cause issues to appear in unexpected places. Configuration management systems are often not kept up to date to catch the potential linkages. • Infrastructure changes are often seen as “different” from application changes, and two (or more) processes may exist. • Create a unified change management process that reduces risk and is balanced in its approach toward deploying changes, while also maintaining throughput of innovation and enhancements. ◦ Categorize changes based on an industry-standard risk model with objective measures of impact and likelihood. ◦ Establish and empower a change manager and change advisory board with the authority to manage, approve, and prioritize changes. ◦ Integrate a configuration management database with the change management process to identify dependencies. Infrastructure and application change occurs constantly, driven by changing business needs, requests for new functionality, operational releases and patches, and resolution of incidents or problems detected by the service desk. IT managers need to follow a standard change management process to ensure that rogue changes are never deployed while the organization remains responsive to demand.
  • 4. Info-Tech Research Group 4Info-Tech Research Group 4 BUSINESS NEW APP NEW VERSION Business requests2 IT change is constant and is driven by: CONFIGURATION MANAGEMENT SYSTEM (CMS) WORK- AROUND FIX INCIDENT & PROBLEM SERVICE DESK MAJOR RELEASE SECURITY PATCH MAINTENANCE RELEASE OPERATIONS CHANGE MANAGEMENT If you have a CMS, it is used to keep a record of changes to the infrastructure and is queried to assess change requests. Operational releases and patches1 Incident or problem tickets3 Business-driven changes may include requests from other business departments that require IT’s support. Operational releases, maintenance, vendor-driven updates, and security updates all can be key drivers of change. Some incident and problem tickets require a change in order to facilitate resolution of the incident.
  • 5. Info-Tech Research Group 5Info-Tech Research Group 5 Successful change management will provide benefits to both the business and IT Respond to business requests faster, while reducing the number of change-related disruptions. IT Benefits Fewer change-related incidents and outages. Faster change turnaround time. Higher rate of change success. Less change rework. Fewer service desk calls related to poorly communicated changes. Business Benefits Fewer service disruptions. Faster response to requests for new and enhanced functionality. Higher rate of benefits realization when changes are implemented. Lower cost per change. Fewer “surprise” changes disrupting productivity. IT satisfaction with change management will drive business satisfaction with IT. Once the process is working efficiently, staff will be more motivated to adhere to the process, reducing the number of unauthorized changes. As fewer changes bypass proper evaluation and testing, service disruptions will decrease and business satisfaction will increase.
  • 6. Info-Tech Research Group 6Info-Tech Research Group 6 Change management improves core benefits to the business: the four C’s Change management brings daily control over the IT environment, allowing you to review every relatively new change, eliminate changes that would have likely failed, and review all changes to improve the IT environment. Request for change templates and a structured process shapes implementation, test, and back-out plans to be more consistent. Implementing processes for pre-approved changes also ensures these frequent changes are executed consistently and efficiently. Change management planning brings increased communication and collaboration across groups by coordinating changes with business activities. The Change Advisory Board (CAB) also brings a more formalized and centralized communication method for IT. Change management processes will give your organization more confidence through more accurate planning, improved execution of changes with less failure, and control over the IT environment. This also leads to greater protection against audits. Most organizations have at least some form of change control in place, but formalizing change management leads to the four C’s of business benefits: 1 3 2 4 Control Consistency Collaboration Confidence
  • 7. Info-Tech Research Group 7Info-Tech Research Group 7 You likely need to improve change management more than any other infrastructure & operations process 8.9 8 8.4 8.7 8.4 8.2 7.9 8.6 7.1 6.1 6.3 6.5 6.2 5.8 5.4 6.1 0 2 4 6 8 10 Service Desk Asset Management Operations Management Incident & Problem Management Availability & Capacity Management Release Management Configuration Management Change Management Effectiveness Importance Source: Info-Tech; N=3,285 Of the eight infrastructure & operations processes measured in Info-Tech’s IT Management and Governance Diagnostic (MGD) program, change management tied for the biggest gap between importance and effectiveness of these processes. Twenty-one percent of organizations who have completed this diagnostic were classified as needing to improve change management based on these scores. More organizations need to improve change management than any other infrastructure & operations process.
  • 8. Info-Tech Research Group 8Info-Tech Research Group 8 Executives and directors recognize the importance of change management, but feel theirs is currently ineffective Info-Tech’s IT Management and Governance Diagnostic program assesses the importance and effectiveness of core IT processes. Since its inception, the MGD has consistently identified change management as an area for immediate improvement. Importance Scores No Importance: 1.0-6.9 Limited Importance: 7.0-7.9 Significant Importance: 8.0-8.9 Critical Importance: 9.0-10.0 Source: Info-Tech; N=3,285 6.7 6.3 5.8 5.8 8.7 8.7 8.6 8.5 0.0 2.0 4.0 6.0 8.0 10.0 Frontline Manager Director Executive MGDScore Seniority Level Change Management - Effectiveness Change Management - Importance Effectiveness Scores Not in Place: N/A Not Effective: 0.0-4.9 Somewhat Ineffective: 5.0-5.9 Somewhat Effective: 6.0-6.9 Very Effective: 7.0-10.0
  • 9. Info-Tech Research Group 9Info-Tech Research Group 9 You are not alone… Many organizations suffer from the lack of a defined change management process. We are always struggling with utilization, and I think [this] is because of a lack of user knowledge. – CIO, Claims Management Provider We found that people were making changes ad hoc into production. This would result in change-related incidents. – Senior Director, Technology and Managed Services By not pre-planning changes far in advance, we are forced to give the change management form at the eleventh hour (…) Because of these time frame issues, we don’t require proof of testing prior to change, and that’s a big gap. – Assistant Director of Technology Solutions, Municipal Government Services We only recognize dependencies after deployment. – Siebel Systems Administrator
  • 10. Info-Tech Research Group 10Info-Tech Research Group 10 After: Right-Sized Change ManagementBefore: Informal Change Management Overcome perceived challenges to implementing change management to reap measurable reward  Change Approval: Changes do not pass through a formal review process before implementation.  10% of released changes are approved • Implementation Challenge: Staff will resist having to submit formal change requests and assessments, frustrated at the prospect of having to wait longer to have changes approved.  Change Prioritization: Changes are not prioritized according to urgency, risk, and impact.  60% of changes are urgent • Implementation Challenge: Influential stakeholders accustomed to having changes approved and deployed might resist having to submit changes to a standard cost-benefit analysis.  Change Deployment: Changes often negatively impact user productivity.  25% of changes are realized as planned. • Implementation Challenge: Engaging the business so that formal change freeze periods and regular maintenance windows can be established.  Change Approval: All changes pass through a formal review process. Once a change is repeatable and well- tested, it can be pre-approved to save time. Almost no unauthorized changes are deployed.  95% of changes are approved • KPI: Decrease in change-related incidents.  Change Prioritization: The CAB prioritizes changes so that the business is satisfied with the speed of change deployment.  35% of changes are urgent • KPI: Decrease in change turnaround time.  Change Deployment: Users are always aware of impending changes and changes do not interrupt critical business activities.  Over 80% of changes are realized as planned • KPI: Decrease in the number of failed deployments.
  • 11. Info-Tech Research Group 11Info-Tech Research Group 11 Info-Tech’s approach to change management optimization focuses on building standardized processes Phase 1: Form Strategy Phase 2: Build Intake Process Phase 3: Build Core Processes Build risk prioritization and categorization scheme Assess CM maturity 1.2 1.1 Determine roles + responsibilities Build core change processes 2.2 2.1 Establish post- implementation activities Create change intake process 3.2 3.1 • Maturity Assessment Tool • Risk Assessment Tool • Core Process Workflows • Change Manager Job Description • RACI Chart & Role Descriptions • Request For Change Process • Request For Change (RFC) Form • Change Calendar Guidelines • Emergency Change Process Workflow Phase 4: Build Implementation Plan Implement project Identify metrics and build change calendar 4.2 4.1 • Metrics and Reports • Change Metrics Tool • Communication Plan • Executive Presentation • Implementation Gantt Chart • Sunshine Diagram Outcomes + Deliverables Change management standard operating procedures (SOP) • Pre-Implementation Checklist • Post-Implementation Review Checklist• CAB Charter
  • 12. Info-Tech Research Group ‹#› Toll Free: 1-888-670-8889