This webinar discusses shadow IT and provides 5 steps for IT to improve relationships with business units and take back control. The presenters define shadow IT, explain why it is growing due to business perceiving IT as too slow, and the risks it poses. They then outline 5 steps: 1) understand current perceptions of IT, 2) understand business needs, 3) build a shared roadmap, 4) create a culture of service, 5) implement services based on the roadmap. The webinar aims to provide best practices for IT service delivery and improving business-IT relationships.
SharePoint Establishing the Business Case - SP Sat KC Oct 1 2016
TechClimb_Webinar_PPT_working_1014
1. Shining a Light on Shadow IT:
5 Steps to Taking Back Control
October 14, 2015 l 11:00 am – 12:00 pm Mountain
2. Housekeeping Items
• Everyone will be muted throughout the entire
presentation
• If you have a question, please use the “Chat”
feature during the presentation
• We will answer all questions along the way and
during the brief Q&A session towards the end of
the webinar
• Within 1-2 days, all registrants will receive an
email from me with a link to download the
recording
3. A Little Bit About Ascent
Service Delivery/
Process
Optimization
Consulting
4. About Service Delivery at Ascent
• Service Made Simple® toolkit includes over 200 accelerators based
on ITIL
– Service deployment processes and procedures
– Metrics and analytics
– Data elements
• Designed for organizations that:
– Seek meaningful change at the project level
– Want to solve problems this year; and not 5 years from now
– Want flexibility to pick and choose focus areas
– Have low to medium organizational maturity
5. Cheryl White
Expert on Organization Change and IT
Service Delivery, Published Author of the
Book – Change on Demand
• Over 20 years’ experience as executive
coach, corporate trainer, and change-
master
• Has successfully delivered projects,
processes and corporate change to
Fortune 500
• Familiar with all aspects of organization
development and culture re-engineering
in large organizations (telco,
manufacturing, banking, federal / state
governments, health care)
• MS – Business Development (Regis
University, Denver)
• Conference keynote speaker
Robert Shelden – Moderator
Laura Wilcox – Industry Trends
Speakers
6. Shadow IT: Let’s Define It
• Shadow IT is a term often used to describe information-
technology systems and solutions built and used inside
organizations without explicit organizational approval. It is
also used, along with the term "Stealth IT," to describe
solutions specified and deployed by departments other than
the IT department.[1]
• Shadow IT is considered by many an important source
for innovation and such systems may turn out to
be prototypes for future approved IT solutions. On the other
hand, shadow IT solutions are not often in line with the
organization's requirements for control, documentation,
security, reliability, etc., although these issues can apply
equally to authorized IT solutions.
8. Shadow IT: Why is it Happening?
• Business wants apps that they believe are
better than those approved
• Doesn’t believe IT listens to their needs
• 38% of business workers believe that IT
process is too slow.
9. Shadow IT: It’s Ramifications
• By 2017 over 50% of all IT dollars will be
spent outside of IT
• This puts IT in the position of babysitting their
Empire vs. Innovating for their future.
• 33% of IT and 30% of business workers have
a high level of concern over the introduction
of risks such as loss of data and breaches
10. What is Driving the Disconnect
Between IT and the Business?
• Because customers have choices. Very few things
they can’t find on the internet. There are almost no
products that other competitors can’t offer. They are
built with more current technology, and appear to be
less expensive.
• is internal IT is scrambling to either improve their
technology with limited resources or are busy on
other projects which makes them appear to be less
responsive to their customers than the open market
promises to be.
• Vendors are targeting your customers to replace IT
11. What is Service?
• Service is used a lot in the industry but in this case it
has a very specific meaning. For simplicity sake, let’s
look at a standard.
• ITIL provides best practice guidance to organizations
that want to provide for this. It says that service is a
way of creating value for the IT department and it’s
customers.
• ITIL provides a series of best practices to be evaluated
and selected as appropriate to provide value to the
customer.
• Concern is ‘relationship’ not ‘methodology’
12. What are the 5 Steps to
Improving Your Relationship?
Step 1: Know where you stand with your
customer (should you use surveys?)
13. Step 2: Understand Your Customer’s Needs
We break this down into 3 primary activities
Service Strategy, high level demand
assessment, and market analysis.
What are the 5 Steps to
Improving Your Relationship?
14. Step 3: Build a road map around shared strategies, benefits, and goals
(Service Realization)
– We Determine what does success look like?
– What is needed to meet the goals
– What are the obstacles to achieve these objectives
– Timing
– Cost of doing the work and risk of not doing the work
• Start fresh - with facilitator
– Try not to bring any baggage
– Target new goals
– Identify the benefits, challenges and cost
– Then work together to agree on the highest priorities
What are the 5 Steps to
Improving Your Relationship?
15. Step 4: Build a culture of Service (Business
Relationship Management)
The most effective way today is to have a
translation group between business and IT
with its own business objectives.
What are the 5 Steps to
Improving Your Relationship?
16. Step 5: Wrap every product and release in a
Service Wrapper
Track to the Roadmap
• Once the service is deployed confirm that we
met their goals
• Repeat the same steps
• Continue to learn and adjust
What are the 5 Steps to
Improving Your Relationship?
17. Q&A
Robert Shelden
Director, Strategic Solutions Group
rshelden@ascentsg.com
(303) 694-5490
Upcoming Webinars in the series:
• Nov 4th 11a MST: Building Shared Value Between
Business and IT: 5 Steps to Align IT Strategy with
Business Expectations
• Nov 18th 11a MST: Metrics that Matter in IT Operations:
Understanding the 3 Important Elements
Editor's Notes
Good morning, everyone (or afternoon depending on your locations). I’d like to welcome everyone to the first webinar in the TechClimb series.
My name is Robert Shelden. I’m with the Ascent Services Group. I will be moderating the discussion of Shadow IT and the steps necessary to taking control.
Before we get started, let’s review a few housekeeping items….
Next slide…..
If you know someone that was not able to attend or would like to refer to the content later, we will be uploading a recording on our website
All the registrants will receive a link with 1-2 days via email to where they can download the recording. This will come from your email through out automation system.
For those that did not register we will also send a separate email to them with the recording link so they can have the change to see what they missed.
Quickly, let me highlight a few things about Ascent…..
Next slide……
Many of you may know us from our peer to peer networking forums, but we are also a business and technology consulting firm
established in 2000
and headquartered in Walnut Creek, California
We have a number of core service lines including
Strategic and Management
PMO Creation and Optimization
Data Management
and Service Delivery/Process Optimization leveraging the Service Made Simple tool set
Next slide….
Read slide…….
So it is related to process optimization and the Service Made Simple tool set that brings us to our discussion today
So, with that, let’s get started……
I’d like to introduce two esteemed guests and colleagues: Laura Wilcox and Cheryl White who are experts in this space.----Hello, Laura and Cheryl!
Laura will be
my co-facilitator
provide commentary on the trends and causes of Shadow IT
Cheryl will provide additional perspectives and steps to manage, if not prevent it.
So, let’s get started…….
Next slide…..
Robert: So Laura, what is Shadow IT anyway? Many folks may be familiar with the term, but let’s create a foundation
What is shadow IT anyway?
What’s driving this trend?
What you as an IT organization can do to manage it, if not prevent it
Let’s first define it. Laura?
Laura: Have been watching our IT friends lose power and influence to outside providers over the last handful of years. It’s disturbing! Did you know by 2017 over 50% of all IT dollars will be spent outside of IT. This puts IT in the position of babysitting their technology empire vs. Innovating their company’s future. Some companies are past the point of pulling this back, others can still change their future.
Robert: So, is it growing? (switch to next slide)
Saas is what people are buying!
Laura slide…..
Robert: So why is it happening? (switch to next slide)
CIO Insight
Laura slide – Laura: $2M/6 months
Shopping cart $300K
Robert: What are the ramifications of Shadow IT? (switch to next slide)
According to CIO Insight
Laura slide. Laura: Shopping cart app – 9 year old kid - $300K
Trusted advisor
Transition here to Question 1……Robert: “Cheryl, let me ask you this…..why do you think this trend of Shadow IT is increasing?
Switch to next slide after I finish asking it.
Questions 1-5
When do I ask questions 2-5?
Question 6: So you mentioned ‘service’. What do you mean?
Go to next slide after asking this question
Question 6-7
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Five steps to reduce the threat of Shadow IT
1. Know where you stand with your customer (should you use surveys?)
2. Understand your customer's needs (Service Strategy: demand assessment, market analysis, impact assessment)
3. Build a road map around shared strategies, benefits, and goals (Service Realization)
4. Build a culture of Service (Business Relationship Management)
5. Wrap every product and release in a Service Wrapper (Service Made Simple)
Robert: “Ya know, a lot of this seems like common sense….”
Laura: “….the sense isn’t common…”
---Halloween costume/Starbucks flavor
---Personality – deep dive technologhy
---business people focused – creative
Provide tools that are simple efficient to provide a later of common sense
Out of the box
Wrapper – leave your solid SDLC
Robert: So that concludes this webinar. I want to thank everyone that registered and attended. If you have any questions, please don’t hesitate to email me.
I’d also like to remind you of the remaining webinars in the series occurring on November 4th and 18th.
Again, you will receive a link in the next few days with a recording of this webinar
Thanks and have a great day.