SlideShare a Scribd company logo
1 of 24
Department of Defense Defense Information Systems Agency Drew Jaehnig DISA ITSM Office itSMF USA Fusion Conference September  2010
Supporting The Department’s Mission Provision ships Provide command  and control Manage parts and  replenish supplies Provide medical care Pay the Warfighters Manage transportation  and maintenance
An IT Powerhouse Created 1960 1965 2000 1990 1985 1975 1995 1970 1980 Different Cultures Different funding DIFFERENT PROCESSES DIFFERENT LEGISLATION National Military Command System Minimum Essential Emergency Communications Network Defense Switched Network Joint Spectrum Center Joint Tactical Command, Control and Communications Agency Anti-Drug Network World Wide Command and Control System NMCS ADP Support Defense Data Network Defense Mega-centers created Defense Communications System Combined Military Satellite Communications System Office 122 Networks Converged – Defense Information Systems Network Born Sat Comms Defense Communications Agency 3
4
“The Pentagon is functioning...in the face  of these terrible attacks against our country.   It will be open for business tomorrow.”   - Former Secretary of Defense Rumsfeld 5
Nine Years of Converged Process Drives IT Convergence DISA Grassroots ITSM Starts Counter- Insurgency Disaster Recovery Infrastructure Reconstruction Humanitarian Assistance Government Services Anti-Terrorism DISA Support Element - Afghanistan DISA Support Element - Iraq Operation Noble Eagle Coalition Provisional Authority Iraqi Business Teams OEF OIF Asian Tsunami Leyte Mudslide Hurricane Katrina Med-Fiber Cuts Haiti Earthquake Satellite Collision ,[object Object]
Critical Infrastructure
Enterprise Services
Global CapacitySetting the Conditions for the Next Engagement Dynamic, Asymmetric Challenges 6
DISA’s Strategic Vision Network Operations and Global Service Delivery Services Policy-Based Enterprise Management NetOps Visibility and Reporting Design Processes Policies Technology Next Generation Operations Support System Enterprise Computing DECC Defense  in Depth Network Extensions Stratified Organization Converged Organization
DISA’s Strategic Vision Network Operations and Global Service Delivery “Seams among strategic decision making, the sustaining base, and the edge where the user operates are disappearing.   The objective, then, is a true Defense enterprise.”  -2010 DISA Campaign Plan The Defense Business Board estimates that $37 Billion of waste is in badly managed IT Services Policy-Based Enterprise Management NetOps Visibility and Reporting Design Processes Policies Technology Next Generation Operations Support System Enterprise Computing DECC Defense  in Depth Network Extensions Stratified Organization Converged Organization
Commercial Military SATCOM Commercial Deployed Forces Fixed  Locations Fiber Wireless SEAMLESS INTEGRATION Convergence Challenges Spectrum Management across multiple continents with different frequency allocations and policies Seamless Satellite-Terrestrial-Sea communications  Cross classified & non-classified information domains Global telecommunications path diversity Constant threat of cyber attack 9
“Innovation will be squashed” “People will die” “We’re special !” “Can’t be done here” “I’ll just wait this out” “You don’t understand our business” “Just another fad of the day” “I’m too busy for more work” Cultural Challenges
Unique Challenges:           The Perfect Storm Extremely high availability & performance requirements Constant threat of attacks impact national security Services & SLAs not always established with customers Funding allocations fosters power silos Highly regulated and laden with bureaucracy impedes progress Military, Civilian, and Contractor cultural differences
12,000+ military & civilian members Presence in 40 countries 29 field offices worldwide 8 million+ users 5000+ Gbps capacity 6,100 servers 1.7 petabytes of storage 2,800 applications 215 software vendors Relocation to Ft. Meade in 2011 12 DISA Today
March 2010  DISA Vice Director Orders ITSMO to be formed 4 Key Tenets Convergence Transparency Single, Accountable Process Owners ISO/IEC 20K Compliance ,[object Object]
Govern improvement efforts
Convergence across agency
Unified communications
Obtain resources
Monitor and reportingDISA CIO DISA ITSMO Process Spiral  Development Compliance & Inspection  Strategy  And Policy  Quality Management Strategic Communications DISA’s ITSM Office
The Agency’s Process Improvement Offices DISA ITSMO Directorate PIO Directorate Process Improvement  Officer Integration, compliance, and performance monitoring Process design and continual improvement Directorate Process Owners Directorate  Process Managers Day-to-day operations and  local procedures Dashed line – Functional Process Relationship Solid Line – Command Relationship
ITSM Governance EXEC Board  ITSM Office CIO Service Management  Process Working Group Agency Level Process Change  Advisory Board CFE CAB (PIO) NS CAB (PIO) GO CAB (PIO) GE CAB (PIO) CSD CAB (PIO) Directorate Level Process Change Advisory Boards
Scope of Services Cyber Space Global Information Grid (GIG) DISA’s  CORE  Offerings DISA’s  Internal  Services “The categories of warfare are blurring and no longer fit into neat, tidy boxes.”  - Robert M. Gates, Secretary of Defense

More Related Content

Viewers also liked

5 Simple Ways to Higher DevOps Integration
5 Simple Ways to Higher DevOps Integration5 Simple Ways to Higher DevOps Integration
5 Simple Ways to Higher DevOps IntegrationBeyond20
 
Wrenches in the Trenches: A Practical Application of ITSM Know-How
Wrenches in the Trenches: A Practical Application of ITSM Know-HowWrenches in the Trenches: A Practical Application of ITSM Know-How
Wrenches in the Trenches: A Practical Application of ITSM Know-HowBeyond20
 
James Craft_May_2016
James Craft_May_2016James Craft_May_2016
James Craft_May_2016Craft James
 
IT Innovation in the state of Arizona
IT Innovation in the state of ArizonaIT Innovation in the state of Arizona
IT Innovation in the state of ArizonaBeyond20
 
Disa Itsm V1.3
Disa Itsm V1.3Disa Itsm V1.3
Disa Itsm V1.3djaehnig
 
Максим Исаев, IBS. Практика использования комплекса Veritas NetBackup для мод...
Максим Исаев, IBS. Практика использования комплекса Veritas NetBackup для мод...Максим Исаев, IBS. Практика использования комплекса Veritas NetBackup для мод...
Максим Исаев, IBS. Практика использования комплекса Veritas NetBackup для мод...IBS
 
Примеры использования HR-аналитики
Примеры использования HR-аналитикиПримеры использования HR-аналитики
Примеры использования HR-аналитикиIBS
 
Veritas NetBackup 7.7 VSE+
Veritas NetBackup 7.7 VSE+Veritas NetBackup 7.7 VSE+
Veritas NetBackup 7.7 VSE+Carswell Setona
 
Обзор решений резервного копирования Symantec Netbackup Appliance
Обзор решений резервного копирования Symantec Netbackup ApplianceОбзор решений резервного копирования Symantec Netbackup Appliance
Обзор решений резервного копирования Symantec Netbackup ApplianceКРОК
 
Connecting ITSM to IT governance
Connecting ITSM to IT governanceConnecting ITSM to IT governance
Connecting ITSM to IT governanceHigherEdITMgt
 
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowSlaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowCA Technologies
 
Unique Ways Veritas can Supercharge your AWS Investment - Session Sponsored b...
Unique Ways Veritas can Supercharge your AWS Investment - Session Sponsored b...Unique Ways Veritas can Supercharge your AWS Investment - Session Sponsored b...
Unique Ways Veritas can Supercharge your AWS Investment - Session Sponsored b...Amazon Web Services
 
Service Management Office Outcomes
Service Management Office OutcomesService Management Office Outcomes
Service Management Office OutcomesBeyond20
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsSolarWinds
 
ITIL compliant Open Source tools
ITIL compliant Open Source toolsITIL compliant Open Source tools
ITIL compliant Open Source toolsBruno Cornec
 
Training Ensimag OpenStack 2016
Training Ensimag OpenStack 2016Training Ensimag OpenStack 2016
Training Ensimag OpenStack 2016Bruno Cornec
 
rama linux solaris vmware admin resume
rama linux  solaris vmware admin resumerama linux  solaris vmware admin resume
rama linux solaris vmware admin resumeRam Ram
 
Solaris linux-administrator-resume-nj
Solaris linux-administrator-resume-njSolaris linux-administrator-resume-nj
Solaris linux-administrator-resume-njVikas Pandey
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examKadimil
 
ITIL V3 New Process Maps
ITIL V3 New Process MapsITIL V3 New Process Maps
ITIL V3 New Process Mapscityfan
 

Viewers also liked (20)

5 Simple Ways to Higher DevOps Integration
5 Simple Ways to Higher DevOps Integration5 Simple Ways to Higher DevOps Integration
5 Simple Ways to Higher DevOps Integration
 
Wrenches in the Trenches: A Practical Application of ITSM Know-How
Wrenches in the Trenches: A Practical Application of ITSM Know-HowWrenches in the Trenches: A Practical Application of ITSM Know-How
Wrenches in the Trenches: A Practical Application of ITSM Know-How
 
James Craft_May_2016
James Craft_May_2016James Craft_May_2016
James Craft_May_2016
 
IT Innovation in the state of Arizona
IT Innovation in the state of ArizonaIT Innovation in the state of Arizona
IT Innovation in the state of Arizona
 
Disa Itsm V1.3
Disa Itsm V1.3Disa Itsm V1.3
Disa Itsm V1.3
 
Максим Исаев, IBS. Практика использования комплекса Veritas NetBackup для мод...
Максим Исаев, IBS. Практика использования комплекса Veritas NetBackup для мод...Максим Исаев, IBS. Практика использования комплекса Veritas NetBackup для мод...
Максим Исаев, IBS. Практика использования комплекса Veritas NetBackup для мод...
 
Примеры использования HR-аналитики
Примеры использования HR-аналитикиПримеры использования HR-аналитики
Примеры использования HR-аналитики
 
Veritas NetBackup 7.7 VSE+
Veritas NetBackup 7.7 VSE+Veritas NetBackup 7.7 VSE+
Veritas NetBackup 7.7 VSE+
 
Обзор решений резервного копирования Symantec Netbackup Appliance
Обзор решений резервного копирования Symantec Netbackup ApplianceОбзор решений резервного копирования Symantec Netbackup Appliance
Обзор решений резервного копирования Symantec Netbackup Appliance
 
Connecting ITSM to IT governance
Connecting ITSM to IT governanceConnecting ITSM to IT governance
Connecting ITSM to IT governance
 
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowSlaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
 
Unique Ways Veritas can Supercharge your AWS Investment - Session Sponsored b...
Unique Ways Veritas can Supercharge your AWS Investment - Session Sponsored b...Unique Ways Veritas can Supercharge your AWS Investment - Session Sponsored b...
Unique Ways Veritas can Supercharge your AWS Investment - Session Sponsored b...
 
Service Management Office Outcomes
Service Management Office OutcomesService Management Office Outcomes
Service Management Office Outcomes
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
 
ITIL compliant Open Source tools
ITIL compliant Open Source toolsITIL compliant Open Source tools
ITIL compliant Open Source tools
 
Training Ensimag OpenStack 2016
Training Ensimag OpenStack 2016Training Ensimag OpenStack 2016
Training Ensimag OpenStack 2016
 
rama linux solaris vmware admin resume
rama linux  solaris vmware admin resumerama linux  solaris vmware admin resume
rama linux solaris vmware admin resume
 
Solaris linux-administrator-resume-nj
Solaris linux-administrator-resume-njSolaris linux-administrator-resume-nj
Solaris linux-administrator-resume-nj
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
ITIL V3 New Process Maps
ITIL V3 New Process MapsITIL V3 New Process Maps
ITIL V3 New Process Maps
 

Similar to Itsm Fusion Final

Enterprise Architecture.pptx
Enterprise Architecture.pptxEnterprise Architecture.pptx
Enterprise Architecture.pptxKamalKamalli1
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelJohn Weiler
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2KBIZEAU
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016David Hale
 
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Michael Smith
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentationwebhostingguy
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingGovCloud Network
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
Performance in the Cloud 2.0
Performance in the Cloud 2.0Performance in the Cloud 2.0
Performance in the Cloud 2.0Lockheed Martin
 
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Carolin Weisser
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherEOTSS
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governanceguestea68b0
 
CIO Transformation Live - Opening remarks and The soft side of Digital Transf...
CIO Transformation Live - Opening remarks and The soft side of Digital Transf...CIO Transformation Live - Opening remarks and The soft side of Digital Transf...
CIO Transformation Live - Opening remarks and The soft side of Digital Transf...David Terrar
 
Brighttalk getting back on track - final
Brighttalk   getting back on track - finalBrighttalk   getting back on track - final
Brighttalk getting back on track - finalAndrew White
 

Similar to Itsm Fusion Final (20)

Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Enterprise Architecture.pptx
Enterprise Architecture.pptxEnterprise Architecture.pptx
Enterprise Architecture.pptx
 
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
Mr John Taylor - The ICT Transformation Challenge for a Transformed MODMr John Taylor - The ICT Transformation Challenge for a Transformed MOD
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
 
Dossier 2008 V3
Dossier 2008 V3Dossier 2008 V3
Dossier 2008 V3
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016
 
Dit yvol2iss43
Dit yvol2iss43Dit yvol2iss43
Dit yvol2iss43
 
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
 
Robert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight sessionRobert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight session
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Performance in the Cloud 2.0
Performance in the Cloud 2.0Performance in the Cloud 2.0
Performance in the Cloud 2.0
 
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better Together
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governance
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
CIO Transformation Live - Opening remarks and The soft side of Digital Transf...
CIO Transformation Live - Opening remarks and The soft side of Digital Transf...CIO Transformation Live - Opening remarks and The soft side of Digital Transf...
CIO Transformation Live - Opening remarks and The soft side of Digital Transf...
 
Brighttalk getting back on track - final
Brighttalk   getting back on track - finalBrighttalk   getting back on track - final
Brighttalk getting back on track - final
 

Itsm Fusion Final

  • 1. Department of Defense Defense Information Systems Agency Drew Jaehnig DISA ITSM Office itSMF USA Fusion Conference September 2010
  • 2. Supporting The Department’s Mission Provision ships Provide command and control Manage parts and replenish supplies Provide medical care Pay the Warfighters Manage transportation and maintenance
  • 3. An IT Powerhouse Created 1960 1965 2000 1990 1985 1975 1995 1970 1980 Different Cultures Different funding DIFFERENT PROCESSES DIFFERENT LEGISLATION National Military Command System Minimum Essential Emergency Communications Network Defense Switched Network Joint Spectrum Center Joint Tactical Command, Control and Communications Agency Anti-Drug Network World Wide Command and Control System NMCS ADP Support Defense Data Network Defense Mega-centers created Defense Communications System Combined Military Satellite Communications System Office 122 Networks Converged – Defense Information Systems Network Born Sat Comms Defense Communications Agency 3
  • 4. 4
  • 5. “The Pentagon is functioning...in the face of these terrible attacks against our country. It will be open for business tomorrow.” - Former Secretary of Defense Rumsfeld 5
  • 6.
  • 9. Global CapacitySetting the Conditions for the Next Engagement Dynamic, Asymmetric Challenges 6
  • 10. DISA’s Strategic Vision Network Operations and Global Service Delivery Services Policy-Based Enterprise Management NetOps Visibility and Reporting Design Processes Policies Technology Next Generation Operations Support System Enterprise Computing DECC Defense in Depth Network Extensions Stratified Organization Converged Organization
  • 11. DISA’s Strategic Vision Network Operations and Global Service Delivery “Seams among strategic decision making, the sustaining base, and the edge where the user operates are disappearing. The objective, then, is a true Defense enterprise.” -2010 DISA Campaign Plan The Defense Business Board estimates that $37 Billion of waste is in badly managed IT Services Policy-Based Enterprise Management NetOps Visibility and Reporting Design Processes Policies Technology Next Generation Operations Support System Enterprise Computing DECC Defense in Depth Network Extensions Stratified Organization Converged Organization
  • 12. Commercial Military SATCOM Commercial Deployed Forces Fixed Locations Fiber Wireless SEAMLESS INTEGRATION Convergence Challenges Spectrum Management across multiple continents with different frequency allocations and policies Seamless Satellite-Terrestrial-Sea communications Cross classified & non-classified information domains Global telecommunications path diversity Constant threat of cyber attack 9
  • 13. “Innovation will be squashed” “People will die” “We’re special !” “Can’t be done here” “I’ll just wait this out” “You don’t understand our business” “Just another fad of the day” “I’m too busy for more work” Cultural Challenges
  • 14. Unique Challenges: The Perfect Storm Extremely high availability & performance requirements Constant threat of attacks impact national security Services & SLAs not always established with customers Funding allocations fosters power silos Highly regulated and laden with bureaucracy impedes progress Military, Civilian, and Contractor cultural differences
  • 15. 12,000+ military & civilian members Presence in 40 countries 29 field offices worldwide 8 million+ users 5000+ Gbps capacity 6,100 servers 1.7 petabytes of storage 2,800 applications 215 software vendors Relocation to Ft. Meade in 2011 12 DISA Today
  • 16.
  • 21. Monitor and reportingDISA CIO DISA ITSMO Process Spiral Development Compliance & Inspection Strategy And Policy Quality Management Strategic Communications DISA’s ITSM Office
  • 22. The Agency’s Process Improvement Offices DISA ITSMO Directorate PIO Directorate Process Improvement Officer Integration, compliance, and performance monitoring Process design and continual improvement Directorate Process Owners Directorate Process Managers Day-to-day operations and local procedures Dashed line – Functional Process Relationship Solid Line – Command Relationship
  • 23. ITSM Governance EXEC Board ITSM Office CIO Service Management Process Working Group Agency Level Process Change Advisory Board CFE CAB (PIO) NS CAB (PIO) GO CAB (PIO) GE CAB (PIO) CSD CAB (PIO) Directorate Level Process Change Advisory Boards
  • 24. Scope of Services Cyber Space Global Information Grid (GIG) DISA’s CORE Offerings DISA’s Internal Services “The categories of warfare are blurring and no longer fit into neat, tidy boxes.” - Robert M. Gates, Secretary of Defense
  • 25. ISO 20K audit compliance ITSMO sets standards and governs process reform ITIL V3 is the ITSM primary Process Framework, also using e-TOM, CobiT, FEA, TOGAF, and others Single and accountable process ownership with enterprise scope Spiral Development Approach Lean Six Sigma as ongoing improvement methodology Process Reform Policies
  • 26. DISA’s Spiral Approach Maturity Level 1, 2 and / or Silo’ed Process or Non-existent process Spiral Three Target, Baseline, Gap Analysis Sustainment, Monitoring, and CSI Phase I Spiral Two Maturity Level 2, 3 and / or Limited agency Penetration Phase V Spiral One Phase II Maturity Level 3, 4 and / or Enterprise View PhaseIII Phase IV Process Design & Planning Implementation
  • 27. Assess As-Is 1 month DesignTo-Be 3 months Briefings & Approvals 1 month Deployment 12-18 months Form Core Team 1 month Process Design 4 months Review 1 month Deployment 12-18 months Initiation 1 month Process Spiral Cycle Time: 1 ½ - 2 Years Spiral Development Timeline
  • 28. Separation of Process and Policy Current Future POLICY Based on ISO 20000 and CobiT (Executives & Process Owners) DoD Directives DFAR DISA PAC Instructions Speeds Staffing of Changes PROCESS Based on ITIL V3 (Process Owners & Managers) DISA Circulars MOAs DoD Instructions PROCEDURES Become CONOPs & SOPs (Process Managers & Workers) DISA EUR Instructions DISA Instructions WORK INSTRUCTIONS Tool-specific content (Workers & Vendor Documentation) CJCSIs DISA CONUS Instructions
  • 29. Accomplishments to Date Mar 2008: Formed Service Management Process Working Group (SMPWG) to coordinate process improvements Jun 2008: DISN Strategic Vision and targeted initiatives approved Dec 2008: Formed the Executive ITSM Governance Board (EIGB) May 2009: Began separation of policy, process, and procedural documentation to streamline approvals and updates Jun 2009: First performance based, firm-fixed price contract July 2009: Began ITIL V3 training globally Aug 2009: Formalized structured Change Management Mar 2010: Formed ITSMO under Office of CIO April 2010: Designated Six Enterprise Process Owners and began spiral development under governance of ITSMO July 2010: Established new IT Governance structure
  • 30.
  • 31. Dedicated ITSMO Director and PIO Chiefs
  • 32. Single Process Ownership, empowered with enterprise-wide authority
  • 34. Standardized and integrated process workflow systems
  • 35. Enterprise-wide acceptance and utilization of Governance
  • 36. Planned and unified communications
  • 37. Continuous Improvement instilled in culture2010: Initial process workflow automation Improved IT Asset Management audit compliance Enterprise Knowledge Management strategy 2011: Strengthened IT Governance Centralized Service Desk Consolidated Service Catalog $5B performance-based contracts 2012: Improved Fiscal transparency Rapid Agile Provisioning Business Intelligence Competency Center Cloud Computing
  • 38. Adamantly refuse to provide an ROI during process design but insist on one for all process improvements. It is not always necessary to grab hearts and minds first – the results will do that on their own. Seize any opportunity to realize a quick win with passion. Assume no one communicates – take charge of all communications. It’s a waste of resources to conduct detailed As-Is baselines – maintain razor-sharp focus on the target. It’s sometimes less painful to modify processes to accommodate out-of-the-box toolset capabilities. ITIL Training is not for everyone. Leave Process design and terminology to the experts. ITIL in Stealth Mode has merits. "In war, only the simple succeeds.” - Field Marshal Paul Von Hindenburg Lessons From the Trenches
  • 39.