SlideShare une entreprise Scribd logo
1  sur  31
Webiner: How to design IT services for
achieving business objectives?
Ph.D. Silvana Tomić Rotim, CISA,
PMP, Lead Auditor, Lead Implementer
ITSERVICEDESIGN
1. Aspects of Service Design
• New or changed services
• Service Management systems
and tools (Service Portfolio /
Service Catalogue)
• Technology architecture and
management systems
• The process required
• Measurement methods and
metrics
ITSERVICEDESIGN
Holisticapproachforensuring
consistencyandintegrationwithin
allprocesses
2. Service Design Principles
Guidelines
• Identifying the IT requirements
• Understanding the SD process:
– Service Catalog Management
– Service Level Management
– Capacity Management
– Availability Management
– Information Security Management
– Service Continuity Management
– Supplier Management
• Understanding the SD infrastructure
ITSERVICEDESIGN
2. Service Design Principles
Basic tasks
• Identify customer needs and their business
processes for IT services (functionality,
resources and schedule)
• For each IT service specify the necessary IT
infrastructure: HW, SW, databases,
applications, telecommunication, and all other
parts of the IT assets - especially skills
• Identify supporting services
• Transfer identified IT needs to other parts of
ITSM, so they can be realized
ITSERVICEDESIGN
2. Service Design Principles
Identification of requirements for IT services
ITSERVICEDESIGN
ITSERVICEDESIGN
2. Service Design Principles
ISO 20000-1 requirements
• Define authorities and responsibilities for
service delivery
• Activities to be performed
• New or changed human and financial resources
requirements
• Technology to support service delivery
• Changes to the SMS, SLA...
• Updates to the catalogue of services
• Procedures, measures and information to be
used for the delivery
3. Service Design processes
• Service Catalogue Management
• Service Level Management
• Capacity Management
• Availability Management
• Information Security Management
• Service Continuity Management
• Supplier Management
ITSERVICEDESIGN
3. Service Design processes
3.1.Service Catalog Management (SCM)
The purpose of SCM:
• Made by IT in close cooperation with users
• If an IT service is not in this catalog it may
not be offered or arranged
• If in this catalog is what the user does not
need, it does not make sense
ITSERVICEDESIGN
3.1. Service Catalog Management
The position of the Catalog in SD
ITSERVICEDESIGN
3.1. Service Catalog Management
ITSERVICEDESIGN
3.2. Service Level Management (SLM)
Meaning:
Define, maintain and improve the quality of IT
services through:
• Negotiation towards required service levels
• Arranging User - IT (SLA, OLA, UC)
• Monitoring the performance level of services
in practice
• Reports on their performance
• Checking the agreed levels of IT services
• Initiation of possible improvements
ITSERVICEDESIGN
3.2. Service Level Management
– SLA, OLA i UC
Customer Customer Customer
IT Systems IT Systems
IT Service
Internal External
Customers
IT Service
Department
Supplier &
Maintenance
OLA UC
SLA
ITSERVICEDESIGN
3.2. Service Level Management
• Service Catalog
• Service Level Requirements (SLR) – The level of
availability, response time ...
• Service Level Agreement (SLA) – Document
Client/Supplier
• Operational Level Agreement (OLA) – An
internal document
• Underpinning Contract (UC) – A document with a
third party
• Service Improvement Programme (SIP) – The
program of improving IT services
ITSERVICEDESIGN
1. Review service
catalog
2. Draft SLAs
3. Review and
negotiate SLAs and
contracts
4. Sign SLAs and
contracts
5. Monitor service
levels and gather
data
6. Produce, review
and distribute the
service reports
Operational activities
7. Review service
performance
Meeting agenda
for annual
Service review
meeting
Service interim
review agenda
Service Catalog
SLAs
Contracts
Service Chain matrix
Release
Management Change
management
Incident
Management
Continual
improvement
3.2. Service Level Management
- The contracting process example
ITSERVICEDESIGN
3.3. Capacity Management (CM)
Meaning:
• The purpose of the CM is to ensure the necessary
capacity for the entire IT infrastructure
• If they are insufficient, the agreed level of quality IT
services can not be achieved, and if they are too
large / oversized, money is irrationally spent for
something that is not necessary
• Therefore, it is necessary to plan the necessary IT
capacities – in the present and in the future
ITSERVICEDESIGN
3.3. Capacity Management (CM)
The way to achieve it:
• Make monitoring of current performance of
IT services
• Argue that IT resources are used efficiently
• Compile and maintain a capacity plan to
meet the requirements of the SLA
• Assess the future needs for IT services from
the perspective of new capacity
• Do tuning
ITSERVICEDESIGN
3.3. Capacity Management (CM) –
Discs capacity example
TIME
Disk Space
(in TB)
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov
1
2
3
Used
disk
space
A moment
for action
Disk
space
required
ITSERVICEDESIGN
3.4. Availability Management (AM)
Meaning:
• Availability is a condition in which IT
services are available when the user needs
them
• There are different levels of availability, as
this level is higher, its price is higher also
• The level of availability comes from the
demand of a business process
• The user and the provider of IT services
should agree / align the level of availability
for each IT service and each business
process
ITSERVICEDESIGN
3.4. Availability Management (AM)
• Purpose of AM is to ensure that the level of service
availability delivered in all services is matched to or
exceeds the current and future agreed needs of the
business, in a cost-effective manner
• How:
– Produce and maintain the Availability Plan
– Provide advice to other areas on all availability-related issues
– Ensure that service availability achievements meet all their
agreed targets
– Assist with the diagnosis and resolution of availability-related
incidents
– Asses the impact of all changes on the Availability Plan
– Provide the proactive measures to improve the availability
ITSERVICEDESIGN
3.4. Availability Management (AM) -
example
AST Agreed Service Time - Downtime
• Availability = ----------------------------- x100 %
AST
AST in hours
• Reliability = ------------------------------
Number of breaks
ITSERVICEDESIGN
3.4. Availability Management (AM)
Example of measurement
ApplicationX
Web Server
Citrix Server
Databases
LAN
J2EE Server
Availability
- what the
user sees
99.5%
99.5%
99.5%
99.5%
99.5%
99.5%
< 97%
Availability (%)
ITSERVICEDESIGN
3.5. Information Security Management
• Information is a crucial business resource and
because of that it has to be protected
• We protect the confidentiality, availability and
integrity of information
• There are numerous threats to breach the
information security, so that is why security
controls are set up
• The lack of a security control is vulnerability of IS
• Information security system is based on connecting
IT asset, threat, vulnerability, risk assessment and
the necessary security controls
ITSERVICEDESIGN
3.5. Information Security Management
ITSERVICEDESIGN
3.5. Information Security Management
Security Management Process
Security Monitoring
Determination of
indicators and
trend analysis
Indicators
Security controlsOverview of
Security and
Control
IT Security
Analysis
Identification and
classification of
information assets
Risk Management
Security policy
Service level
management
Release
management
Change
management
Incident
management
Incident
management
Service level
management
Continual
improvement
Problem
management
Change
management
ITSERVICEDESIGN
3.6. IT Service Continuity Management
(CM)
Meaning:
• For many reasons the business processes supported
by IT may be interrupted and for such situations
one should be prepared
• This is done through the development of IT Service
Continuity Management system (ITSCM))
• Its basis is the consideration of threats,
vulnerabilities, risk levels and controls that are
implemented in ITSCM
• Price of ITSCM grows with its level
ITSERVICEDESIGN
3.6. Continuity Management (CM)
• There are a lot of threats that can cause disruption
of IT support and as a consequence disruption of
business process
• ITSCM is a way of ensuring the recovery of business
/ IT activities
• The purpose of the ITSCM is to reduce the risk of
disruption of the IT support with the elaboration of
continuity and recovery plans
• The starting-points of the ITSCM are RTO and
RPO
ITSERVICEDESIGN
3.6. Continuity Management
RTO – Recovery Time Objective
Data recovery
INCIDENT
Time
The recovery of
critical processes
RTO
Renewal of IT infrastructure
Renewal of operating
resources
ITSERVICEDESIGN
3.6. Continuity Management
RPO – Recovery Point Objective
INCIDENT
Time
Regul
ar
back-
up
Therecoveryof
criticalprocesses
RPO RTO
Regul
ar
back-
up
Regul
ar
back-
up
Data recovery
ITSERVICEDESIGN
3.6. Continuity Management
Levels of response to deadlock
Recovery Time Objective (RTO)
15 Min. 1-4 H.. 4 -8 H.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. Dani
Level 4
Level 3
Level 2
Level 7
Level 6
Level 5
Level 1
Costs
ITSERVICEDESIGN
3.7. Supplier Management
• Goal – manage suppliers and the services they
supply, to provide seamless quality of IT service to
the business, ensuring value for money is obtained
• How:
– Ensure that underpinning contracts are aligned to
business needs and support agreed targets in SLAs
– Manage supplier performance
– Manage relationships with suppliers
– Negotiate and agree contracts and manage them through
their lifecycle
– Manage a supplier policy and database
ITSERVICEDESIGN
4. A FRAMEWORK FOR SD
REALIZATION
Other important factors
• In a similar way other factors that influence
the successful implementation of SD are
considered:
– An organization that does support to SD
– The technology to support SD
– Possible risks
– Impact on the key success factors
ITSERVICEDESIGN

Contenu connexe

En vedette

Light weighted it service management whitepaper -
Light weighted it service management   whitepaper -Light weighted it service management   whitepaper -
Light weighted it service management whitepaper -Koichiro Toda
 
Конспект для учеников 11-А класа
Конспект для учеников 11-А класаКонспект для учеников 11-А класа
Конспект для учеников 11-А класаАлексей Ткаченко
 
A41 Thank you letter for Supervisors VCPC
A41 Thank you letter for Supervisors VCPCA41 Thank you letter for Supervisors VCPC
A41 Thank you letter for Supervisors VCPCNoni McGuire
 
ITP journal Geospatial data in the Telecoms Industry
ITP journal   Geospatial data in the Telecoms IndustryITP journal   Geospatial data in the Telecoms Industry
ITP journal Geospatial data in the Telecoms IndustryBen Nduva
 
DanielStefanescu_ro_
DanielStefanescu_ro_DanielStefanescu_ro_
DanielStefanescu_ro_Xm Anul
 
Complicaciones de la diabetes: Manejo de la cetoacidosis
Complicaciones de la diabetes: Manejo de la cetoacidosisComplicaciones de la diabetes: Manejo de la cetoacidosis
Complicaciones de la diabetes: Manejo de la cetoacidosisAngel Daniel (Kely) Corona
 
Presentación de Ecologia
Presentación de EcologiaPresentación de Ecologia
Presentación de Ecologiaaracely
 
Presentaciones electrónicas
Presentaciones electrónicasPresentaciones electrónicas
Presentaciones electrónicasRicharMedina43
 
Marketing online camara de comercio de málaga
Marketing online  camara de comercio de málagaMarketing online  camara de comercio de málaga
Marketing online camara de comercio de málagamgarciav
 

En vedette (14)

Light weighted it service management whitepaper -
Light weighted it service management   whitepaper -Light weighted it service management   whitepaper -
Light weighted it service management whitepaper -
 
Конспект для учеников 11-А класа
Конспект для учеников 11-А класаКонспект для учеников 11-А класа
Конспект для учеников 11-А класа
 
A41 Thank you letter for Supervisors VCPC
A41 Thank you letter for Supervisors VCPCA41 Thank you letter for Supervisors VCPC
A41 Thank you letter for Supervisors VCPC
 
ITP journal Geospatial data in the Telecoms Industry
ITP journal   Geospatial data in the Telecoms IndustryITP journal   Geospatial data in the Telecoms Industry
ITP journal Geospatial data in the Telecoms Industry
 
Siva
SivaSiva
Siva
 
Romero brito
Romero britoRomero brito
Romero brito
 
DanielStefanescu_ro_
DanielStefanescu_ro_DanielStefanescu_ro_
DanielStefanescu_ro_
 
Que es bit locker
Que es bit lockerQue es bit locker
Que es bit locker
 
Mapa mental ITIL
Mapa mental ITILMapa mental ITIL
Mapa mental ITIL
 
Tics
TicsTics
Tics
 
Complicaciones de la diabetes: Manejo de la cetoacidosis
Complicaciones de la diabetes: Manejo de la cetoacidosisComplicaciones de la diabetes: Manejo de la cetoacidosis
Complicaciones de la diabetes: Manejo de la cetoacidosis
 
Presentación de Ecologia
Presentación de EcologiaPresentación de Ecologia
Presentación de Ecologia
 
Presentaciones electrónicas
Presentaciones electrónicasPresentaciones electrónicas
Presentaciones electrónicas
 
Marketing online camara de comercio de málaga
Marketing online  camara de comercio de málagaMarketing online  camara de comercio de málaga
Marketing online camara de comercio de málaga
 

Similaire à PECB Webinar: How to design IT Services for achieving business objectives?

Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examKadimil
 
ITIL service design
ITIL service designITIL service design
ITIL service designRasha Ragab
 
IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)Darshan Khant
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014Patricia NENZI
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014Patricia NENZI
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industryHappiest Minds Technologies
 
U2 chap1 itsm service design
U2 chap1 itsm service designU2 chap1 itsm service design
U2 chap1 itsm service designMusTufa Nullwala
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaJisu Dasgupta
 
Introduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsIntroduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsPrasad Deshpande
 
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical ApproachITIL Indonesia
 
ITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideMd. Rezaul Islam
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1miket60
 
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.pptL2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.pptThirumalainambiMurug
 

Similaire à PECB Webinar: How to design IT Services for achieving business objectives? (20)

Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
ITIL service design
ITIL service designITIL service design
ITIL service design
 
IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
Itilv3
Itilv3Itilv3
Itilv3
 
Itilv3
Itilv3Itilv3
Itilv3
 
U2 chap1 itsm service design
U2 chap1 itsm service designU2 chap1 itsm service design
U2 chap1 itsm service design
 
ITSM Overview
ITSM OverviewITSM Overview
ITSM Overview
 
ITIL - introduction to ITIL
ITIL - introduction to ITILITIL - introduction to ITIL
ITIL - introduction to ITIL
 
About itil v3
About itil v3About itil v3
About itil v3
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu Dasgupta
 
Introduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsIntroduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and Functions
 
ITIL Service Design
ITIL Service DesignITIL Service Design
ITIL Service Design
 
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
 
ITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideITIL(v3): A Beginers Guide
ITIL(v3): A Beginers Guide
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1
 
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.pptL2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
 

Plus de PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

Plus de PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Dernier

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Dernier (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

PECB Webinar: How to design IT Services for achieving business objectives?

  • 1. Webiner: How to design IT services for achieving business objectives? Ph.D. Silvana Tomić Rotim, CISA, PMP, Lead Auditor, Lead Implementer ITSERVICEDESIGN
  • 2. 1. Aspects of Service Design • New or changed services • Service Management systems and tools (Service Portfolio / Service Catalogue) • Technology architecture and management systems • The process required • Measurement methods and metrics ITSERVICEDESIGN Holisticapproachforensuring consistencyandintegrationwithin allprocesses
  • 3. 2. Service Design Principles Guidelines • Identifying the IT requirements • Understanding the SD process: – Service Catalog Management – Service Level Management – Capacity Management – Availability Management – Information Security Management – Service Continuity Management – Supplier Management • Understanding the SD infrastructure ITSERVICEDESIGN
  • 4. 2. Service Design Principles Basic tasks • Identify customer needs and their business processes for IT services (functionality, resources and schedule) • For each IT service specify the necessary IT infrastructure: HW, SW, databases, applications, telecommunication, and all other parts of the IT assets - especially skills • Identify supporting services • Transfer identified IT needs to other parts of ITSM, so they can be realized ITSERVICEDESIGN
  • 5. 2. Service Design Principles Identification of requirements for IT services ITSERVICEDESIGN
  • 6. ITSERVICEDESIGN 2. Service Design Principles ISO 20000-1 requirements • Define authorities and responsibilities for service delivery • Activities to be performed • New or changed human and financial resources requirements • Technology to support service delivery • Changes to the SMS, SLA... • Updates to the catalogue of services • Procedures, measures and information to be used for the delivery
  • 7. 3. Service Design processes • Service Catalogue Management • Service Level Management • Capacity Management • Availability Management • Information Security Management • Service Continuity Management • Supplier Management ITSERVICEDESIGN
  • 8. 3. Service Design processes 3.1.Service Catalog Management (SCM) The purpose of SCM: • Made by IT in close cooperation with users • If an IT service is not in this catalog it may not be offered or arranged • If in this catalog is what the user does not need, it does not make sense ITSERVICEDESIGN
  • 9. 3.1. Service Catalog Management The position of the Catalog in SD ITSERVICEDESIGN
  • 10. 3.1. Service Catalog Management ITSERVICEDESIGN
  • 11. 3.2. Service Level Management (SLM) Meaning: Define, maintain and improve the quality of IT services through: • Negotiation towards required service levels • Arranging User - IT (SLA, OLA, UC) • Monitoring the performance level of services in practice • Reports on their performance • Checking the agreed levels of IT services • Initiation of possible improvements ITSERVICEDESIGN
  • 12. 3.2. Service Level Management – SLA, OLA i UC Customer Customer Customer IT Systems IT Systems IT Service Internal External Customers IT Service Department Supplier & Maintenance OLA UC SLA ITSERVICEDESIGN
  • 13. 3.2. Service Level Management • Service Catalog • Service Level Requirements (SLR) – The level of availability, response time ... • Service Level Agreement (SLA) – Document Client/Supplier • Operational Level Agreement (OLA) – An internal document • Underpinning Contract (UC) – A document with a third party • Service Improvement Programme (SIP) – The program of improving IT services ITSERVICEDESIGN
  • 14. 1. Review service catalog 2. Draft SLAs 3. Review and negotiate SLAs and contracts 4. Sign SLAs and contracts 5. Monitor service levels and gather data 6. Produce, review and distribute the service reports Operational activities 7. Review service performance Meeting agenda for annual Service review meeting Service interim review agenda Service Catalog SLAs Contracts Service Chain matrix Release Management Change management Incident Management Continual improvement 3.2. Service Level Management - The contracting process example ITSERVICEDESIGN
  • 15. 3.3. Capacity Management (CM) Meaning: • The purpose of the CM is to ensure the necessary capacity for the entire IT infrastructure • If they are insufficient, the agreed level of quality IT services can not be achieved, and if they are too large / oversized, money is irrationally spent for something that is not necessary • Therefore, it is necessary to plan the necessary IT capacities – in the present and in the future ITSERVICEDESIGN
  • 16. 3.3. Capacity Management (CM) The way to achieve it: • Make monitoring of current performance of IT services • Argue that IT resources are used efficiently • Compile and maintain a capacity plan to meet the requirements of the SLA • Assess the future needs for IT services from the perspective of new capacity • Do tuning ITSERVICEDESIGN
  • 17. 3.3. Capacity Management (CM) – Discs capacity example TIME Disk Space (in TB) Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov 1 2 3 Used disk space A moment for action Disk space required ITSERVICEDESIGN
  • 18. 3.4. Availability Management (AM) Meaning: • Availability is a condition in which IT services are available when the user needs them • There are different levels of availability, as this level is higher, its price is higher also • The level of availability comes from the demand of a business process • The user and the provider of IT services should agree / align the level of availability for each IT service and each business process ITSERVICEDESIGN
  • 19. 3.4. Availability Management (AM) • Purpose of AM is to ensure that the level of service availability delivered in all services is matched to or exceeds the current and future agreed needs of the business, in a cost-effective manner • How: – Produce and maintain the Availability Plan – Provide advice to other areas on all availability-related issues – Ensure that service availability achievements meet all their agreed targets – Assist with the diagnosis and resolution of availability-related incidents – Asses the impact of all changes on the Availability Plan – Provide the proactive measures to improve the availability ITSERVICEDESIGN
  • 20. 3.4. Availability Management (AM) - example AST Agreed Service Time - Downtime • Availability = ----------------------------- x100 % AST AST in hours • Reliability = ------------------------------ Number of breaks ITSERVICEDESIGN
  • 21. 3.4. Availability Management (AM) Example of measurement ApplicationX Web Server Citrix Server Databases LAN J2EE Server Availability - what the user sees 99.5% 99.5% 99.5% 99.5% 99.5% 99.5% < 97% Availability (%) ITSERVICEDESIGN
  • 22. 3.5. Information Security Management • Information is a crucial business resource and because of that it has to be protected • We protect the confidentiality, availability and integrity of information • There are numerous threats to breach the information security, so that is why security controls are set up • The lack of a security control is vulnerability of IS • Information security system is based on connecting IT asset, threat, vulnerability, risk assessment and the necessary security controls ITSERVICEDESIGN
  • 23. 3.5. Information Security Management ITSERVICEDESIGN
  • 24. 3.5. Information Security Management Security Management Process Security Monitoring Determination of indicators and trend analysis Indicators Security controlsOverview of Security and Control IT Security Analysis Identification and classification of information assets Risk Management Security policy Service level management Release management Change management Incident management Incident management Service level management Continual improvement Problem management Change management ITSERVICEDESIGN
  • 25. 3.6. IT Service Continuity Management (CM) Meaning: • For many reasons the business processes supported by IT may be interrupted and for such situations one should be prepared • This is done through the development of IT Service Continuity Management system (ITSCM)) • Its basis is the consideration of threats, vulnerabilities, risk levels and controls that are implemented in ITSCM • Price of ITSCM grows with its level ITSERVICEDESIGN
  • 26. 3.6. Continuity Management (CM) • There are a lot of threats that can cause disruption of IT support and as a consequence disruption of business process • ITSCM is a way of ensuring the recovery of business / IT activities • The purpose of the ITSCM is to reduce the risk of disruption of the IT support with the elaboration of continuity and recovery plans • The starting-points of the ITSCM are RTO and RPO ITSERVICEDESIGN
  • 27. 3.6. Continuity Management RTO – Recovery Time Objective Data recovery INCIDENT Time The recovery of critical processes RTO Renewal of IT infrastructure Renewal of operating resources ITSERVICEDESIGN
  • 28. 3.6. Continuity Management RPO – Recovery Point Objective INCIDENT Time Regul ar back- up Therecoveryof criticalprocesses RPO RTO Regul ar back- up Regul ar back- up Data recovery ITSERVICEDESIGN
  • 29. 3.6. Continuity Management Levels of response to deadlock Recovery Time Objective (RTO) 15 Min. 1-4 H.. 4 -8 H.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. Dani Level 4 Level 3 Level 2 Level 7 Level 6 Level 5 Level 1 Costs ITSERVICEDESIGN
  • 30. 3.7. Supplier Management • Goal – manage suppliers and the services they supply, to provide seamless quality of IT service to the business, ensuring value for money is obtained • How: – Ensure that underpinning contracts are aligned to business needs and support agreed targets in SLAs – Manage supplier performance – Manage relationships with suppliers – Negotiate and agree contracts and manage them through their lifecycle – Manage a supplier policy and database ITSERVICEDESIGN
  • 31. 4. A FRAMEWORK FOR SD REALIZATION Other important factors • In a similar way other factors that influence the successful implementation of SD are considered: – An organization that does support to SD – The technology to support SD – Possible risks – Impact on the key success factors ITSERVICEDESIGN