SlideShare une entreprise Scribd logo
1  sur  39
Pay Me Now Or Pay Me a 
Lot More Later: 
How To Get the Budget You Need To 
Prevent Catastrophes, Not Clean 
Them Up 
Jeremy Swanner, Executive Vice President, 
RLE Technologies
MANAGING CEUs AND CFM® MAINTENANCE POINTS 
You are eligible to receive Continuing Education Units and Certified Facility Manager® 
maintenance points for attending sessions at IFMA's World Workplace. 
To receive 20 CFM maintenance points: 
Record your attendance on your CFM Recertification Worksheet. 
At recertification time, submit your completed CFM Recertification Worksheet. 
To receive CEUs: 
Pay the US$15 processing fee via registration 
Log into the Attendee Service Center http://tinyurl.com/mwo9zxj 
Your log in information was sent to you when you registered for the conference. 
Complete the session evaluation then take the five question CEU assessment. After 
passing the assessment, you will receive your certificate of completion. CEUs can only be 
earned upon successful completion of the assessment. 
Individuals seeking CEUs or LUs from other organizations must contact those 
organizations for instructions on self-reporting credit hours.
Your Feedback is Valued! 
Please take the time to Evaluate Sessions 
Log into the Attendee Service Center 
http://tinyurl.com/mwo9zxj
Meet Our Presenter: 
Critical facilities monitoring utilizes ever-evolving technology, 
and the field requires management that can adapt to an 
increased demand for resources and security. Like you, data 
center and critical facility expert Jeremy Swanner has adapted 
to - and predicted - the changes. With more than 25 years (and 
counting) of in-the-trenches experience in the critical facilities 
space, Jeremy has intimate knowledge from a variety of 
perspectives, with a focus on how to better protect sensitive facilities from threats. 
RLE Technologies is a leading global provider of critical facility environment oversight and 
notification. For more than 30 years, RLE has delivered reliable, cost-effective facility 
monitoring and leak detection technologies with the sole purpose of preventing disasters, 
providing peace of mind, and preserving its customer’s reputations. Thousands of 
businesses worldwide rely on RLE products to detect environmental threats, notify 
stakeholders, and mitigate risks to their critical sensitive facilities. RLE products are 
manufactured in the United States. www.RLETech.com
Review Session Learning Objectives 
1. Recognize why making a case for comprehensive facility 
monitoring to the people holding the purse strings is so 
important. 
2. Discuss the multiple ways that facility downtime impacts the 
performance of your business. 
3. Understand how facility downtime impacts your reputation 
and job security. 
4. Learn how to quantify and justify the needed budget and 
staffing to fully protect your facility.
To Reach Our Learning Objectives… 
We will explore: 
 Basic causes and costs of downtime in your facility 
 Resulting costs from intangible concerns you may 
not have considered 
 A three step, proven process for getting the 
environmental monitoring budget you need 
 Review resources you can use to make your case 
6 www.rletech.com Protecting facilities, people, and reputations
Continuing the Conversation 
Have a thought during the presentation? Live-tweet 
us your idea @RLETechnologies and we’ll 
continue the conversation. 
We also set aside time for your 
questions at the end/Please jump 
in with your questions as they arise 
7 www.rletech.com Protecting facilities, people, and reputations
Why is Facilities Monitoring Important? 
First, A Few Obvious Answers 
Monitoring helps avoid: 
 Damage to mission critical data 
and assets 
 Interrupted organizational productivity 
 The need to replacement or repair 
of equipment and 
other assets 
 Clean up 
8 www.rletech.com Protecting facilities, people, and reputations
Typical Causes of Downtime 
9 www.rletech.com Protecting facilities, people, and reputations
Another Source for Causes of Downtime 
10 www.rletech.com Protecting facilities, people, and reputations
“Little” Problems Can Cost You BIG 
Example: 2013 Cost of Data Center Outages 
 Average cost of outage: $7,900 per minute, up by 
41% from 2010 
 Average reported incident length: 86 minutes, 
equating to an average cost per incident of nearly 
$680,000 
 Total data center outage statistics: 
• Average recovery time of 119 minutes 
• Cost of about $900,000 
*Source: Ponemon Institute report “2013 Cost of Data Center Outages” 
11 www.rletech.com Protecting facilities, people, and reputations
And It Gets Worse 
 Certain industries are even higher 
• Hospitality sector (129% increase) 
• Public sector (116%) 
• Transportation (108%) 
• Media organizations (104%) 
• Financial (no data but… OH BOY) 
 Impact on reputation/loyalty and the loss of data 
*Source: Ponemon Institute report “2013 Cost of Data Center Outages” 
12 www.rletech.com Protecting facilities, people, and reputations
2013 Downtime Costs by Industry 
*Source: IT Performance Engineering and Measurement Strategies 
13 www.rletech.com Protecting facilities, people, and reputations
2013 Downtime Costs by Industry 
Do you know the cost of downtime for your firm? If not, 
*Source: Emerson 2013 Study on Data Center outages 
that’s step one! 
14 www.rletech.com Protecting facilities, people, and reputations
Slow Inflation? Not in Downtime Recovery 
Change in cost of downtime by category 
$53,608 
$118,080 
$140,543 
$183,724 
Business Disruption 
Lost Revenue 
End-User Productivity 
15 www.rletech.com Protecting facilities, people, and reputations 
$238,717 
$42,530 
$96,226 
$179,827 
$0 $50,000 $100,000 $150,000 $200,000 $250,000 $300,000 
IT Productivity 
2010 2013 
*Source: Ponemon Institute report “2013 Cost of Data Center Outages”
Now For Some Not So Obvious Impacts 
 Legal and regulatory impact 
 Lost confidence and trust among key stakeholders 
• Shareholders 
• Customers 
• The management team 
• Your employees 
 Diminishment of marketplace 
brand and reputation 
16 www.rletech.com Protecting facilities, people, and reputations
The Intangible Costs 
Decreased 
customer 
loyalty 
Damage 
to your 
company's 
reputation 
Clean up 
Employee 
morale 
issues 
Ammunition 
for your 
competitors 
“Morale is seriously affected by system 
downtime, because IT lives in dread of 
failures.” 
-Robert McFarlane, principal and data center 
design expert, Shen Milsom Wilke Inc. 
“An outage can also erode a company's 
competitive edge, like loss of business 
reputation within the industry and/or customer 
base.” 
-Matt Stansberry, director of content and 
publications, Uptime Institute 
“There are tangible and intangible costs of 
downtime. It can be expensive, but beyond the 
financial implications, there is also a loss of 
credibility and trust. When you are down, both 
of these erode fast and take much longer to 
rebuild.” 
-Chuck Goolsbee, data center manager and 
SearchDataCenter.com blogger 
All quotes from a SearchDataCenter.com article. 
17 www.rletech.com Protecting facilities, people, and reputations
What’s Your Cost of Downtime? 
Insert question mark 
Need a starting point? Download our 
Cost of Downtime Calculator at 
http://rletech.com/cost-of-doing-nothing- 
calculator/ 
18 www.rletech.com Protecting facilities, people, and reputations
Example Calculation 
19 www.rletech.com Protecting facilities, people, and reputations
Example Calculation 
20 www.rletech.com Protecting facilities, people, and reputations
And What about You… Personally 
The resulting impact on a career can be 
significant: 
 A surprising 1 in 5 companies fired an IT employee 
when a network downtime incident occurred 
 The ratio was more dramatic for some industries 
 1 in 3 companies in the natural resources, utilities & 
telecoms sector sacked IT staff due to downtime 
When downtime occurs, management 
is going to be looking at YOU 
*March 2014 Avaya survey 
21 www.rletech.com Protecting facilities, people, and reputations
Making Your Case 
Try using a Why How What case 
Simon Sinek’s Golden Circle* 
 People make decisions based on emotion 
 Understand the core of WHY the company exists 
 Present HOW a business disruption would 
impact the WHY 
 Show HOW to avoid the disruption 
 Detail WHAT will be needed to execute the HOW 
*Simon Sinek’s Ted Talk located here http://www.youtube.com/watch?v=fMOlfsR7SMQ 
22 www.rletech.com Protecting facilities, people, and reputations
Start With “Why” 
 Far too many business cases start 
with WHAT needs to be done 
NOT why we need to implement monitoring: 
• Why does your company exist? 
• Look to the company mission statement for guidance 
• Consider the WHY from the perspective of the decision 
maker 
 Get management passionate about monitoring’s 
impact on the company WHY 
Consider these BEFORE making 
the case with facts and figures. 
23 www.rletech.com Protecting facilities, people, and reputations
Once You Know “Why”, Move to “How” 
 HOW would downtime caused by controllable 
environmental issues impact the WHY? 
 HOW can the company mitigate the risk to the 
WHY? 
 The answer typically includes: 
• Create and implement an action plan 
• Deploy monitoring equipment 
• Review procedures 
24 www.rletech.com Protecting facilities, people, and reputations
Support the “How” with Facts 
Case studies Probabilities 
25 www.rletech.com Protecting facilities, people, and reputations 
Impacts 
Metrics 
ROI 
Cost of Doing Nothing 
Calculations
HOW Can Be the Hardest Part 
 Be prepared to 
challenge your boss 
 Give them what 
they need and not just what they think they want 
 You must help them think beyond the “Threat de jour” 
“The worst culture you can ingrain within a business is an 
atmosphere of saying yes to everything. When you are debating a 
new idea, those who disagree are crucial to getting the right result in 
the end. Yes men will only ever get so far.” 
Richard Branson, Founder of Virgin Group 
26 www.rletech.com Protecting facilities, people, and reputations
“Top of Mind” ≠ “Good Priority” 
It’s easy to get caught up in what just 
happened… 
 Active shooter 
 Hurricane 
 Tornado 
 Earthquake 
27 www.rletech.com Protecting facilities, people, and reputations
“Top of Mind” ≠ “Good Priority” 
But it’s the less dramatic threats that can cause 
the biggest problems: 
 Water Leaks 
 Chemical Leaks 
 Overheating 
 Power surges 
 Air Quality (pressure, 
composition, etc.) 
 Excessive humidity 
 Vermin 
28 www.rletech.com Protecting facilities, people, and reputations
Probability vs. Impact 
Credit: High Stakes Business: People, Property and Services Report 
For more information attend session 5.02, 8:00 am Friday Morning, IFMA 
Research: Perspectives on Business Continuity, Management Skills 
Learning Lab for more information 
29 www.rletech.com Protecting facilities, people, and reputations
Finally, Provide the “WHAT” 
 Build out a candid, honest proposal to execute 
the HOW 
 Do your homework 
 Present a comprehensive proposal protect the 
WHAT 
30 www.rletech.com Protecting facilities, people, and reputations
An Example For Leak Detection 
This worksheet is available for free download at 
http://rletech.com/system-design-worksheet/ 
31 www.rletech.com Protecting facilities, people, and reputations
Case Study: University of Northern Colorado 
Director of IT Services, Marcus McCutchen, 
identified vulnerabilities in the telephone and 
computing centers 
32 www.rletech.com Protecting facilities, people, and reputations
Step 1: WHY 
Knowing UNC’s Vision statement provided the basis 
The University of Northern Colorado strives to be a 
leading student-centered university that promotes 
effective teaching, lifelong learning, the advancement 
of knowledge, research, and a commitment to 
service. 
This enabled Marcus to focus on the 
student experience in his argument for 
sufficient facilities monitoring 
33 www.rletech.com Protecting facilities, people, and reputations
Step 2: HOW 
• HOW would an environmental disaster impact the 
student experience and ability to effectively learn? 
• Reduce student effectiveness 
• Impact student confidence in the university 
• Jeopardize student security 
• Calculated the cost of forecasted downtime, $92,000 
conservatively 
• HOW to limit the risk to the student experience? 
• Implement a disaster mitigation and recovery plan 
• Deploy leak detection equipment 
• Schedule annual reviews of the plan 
34 www.rletech.com Protecting facilities, people, and reputations
Step 3: WHAT 
• Marcus started with a mitigation plan and review 
process 
• He then worked with RLE to design a leak detection 
system 
– Fluid sensing cable 
– Distance read controller 
– Spot detectors 
– Automated notifications of key personnel 
• Presented a final proposal including 
– Cost of downtime 
– Cost of new system 
– ROI Calculation 
35 www.rletech.com Protecting facilities, people, and reputations
Results 
 The administration at University of Northern 
Colorado fast tracked the approval of the facilities 
monitoring plan 
 Staff at UNC integrated a proactive, cost effective 
and user-friendly monitoring system in just six weeks 
36 www.rletech.com Protecting facilities, people, and reputations
Epilogue 
 Less than three months later, a “small” problem 
occurred 
 Moisture in the telephone switch room was detected 
 Upon inspection, moisture was found along a section 
of monitoring cable as well as a ceiling tile 
 The problem was eventually traced one story higher 
to a cracked floor sink, which was located directly 
above a critical piece of telecommunication 
equipment. 
 Had the leak gone undetected, tens of thousands of 
dollars in downtime would have resulted 
37 www.rletech.com Protecting facilities, people, and reputations
Conclusion and Questions 
“Prevent Catastrophes, Not Clean Them Up” 
Further thoughts or questions after the presentation? 
Contact Jeremy Swanner 
jswanner@RLEtech.com 
@RLETechnologies 
RLE Mission 
We exist to prevent disasters, preserve our clients’ reputation, and provide peace of mind. 
38 www.rletech.com Protecting facilities, people, and reputations
Thank You! 
Be sure to evaluate the session online at 
the Attendee Service Center 
http://tinyurl.com/mwo9zxj

Contenu connexe

Tendances

AIRCRAFT MAINTENANCE ENGINEER’S LICENCING 3
AIRCRAFT MAINTENANCE ENGINEER’S LICENCING 3AIRCRAFT MAINTENANCE ENGINEER’S LICENCING 3
AIRCRAFT MAINTENANCE ENGINEER’S LICENCING 3
Tranos Matezhure
 
2016_Security_System_Monitoring_in_Healthcare_Facilities
2016_Security_System_Monitoring_in_Healthcare_Facilities2016_Security_System_Monitoring_in_Healthcare_Facilities
2016_Security_System_Monitoring_in_Healthcare_Facilities
Erin Gorman
 
Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015
Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015
Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015
Gary Jennings
 

Tendances (20)

2002 ibc - Assessing the safety of staffing arrangements
2002 ibc - Assessing the safety of staffing arrangements2002 ibc - Assessing the safety of staffing arrangements
2002 ibc - Assessing the safety of staffing arrangements
 
Federated Access Management, JISC Presentation
Federated Access Management, JISC PresentationFederated Access Management, JISC Presentation
Federated Access Management, JISC Presentation
 
AIRCRAFT MAINTENANCE ENGINEER’S LICENCING 3
AIRCRAFT MAINTENANCE ENGINEER’S LICENCING 3AIRCRAFT MAINTENANCE ENGINEER’S LICENCING 3
AIRCRAFT MAINTENANCE ENGINEER’S LICENCING 3
 
Human factors in major hazard safety Ronny Lardner
Human factors in major hazard safety  Ronny LardnerHuman factors in major hazard safety  Ronny Lardner
Human factors in major hazard safety Ronny Lardner
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
 
6 Steps to Getting Your Nonprofit to Embrace New Technology
6 Steps to Getting Your Nonprofit to Embrace New Technology6 Steps to Getting Your Nonprofit to Embrace New Technology
6 Steps to Getting Your Nonprofit to Embrace New Technology
 
Doing Too Much PM Report
Doing Too Much PM ReportDoing Too Much PM Report
Doing Too Much PM Report
 
Fm computer roomcleaningguide
Fm computer roomcleaningguideFm computer roomcleaningguide
Fm computer roomcleaningguide
 
The Practice Management Seminar
The Practice Management SeminarThe Practice Management Seminar
The Practice Management Seminar
 
2005 Energy Institute - Staffing arrangements for automated plant
2005 Energy Institute - Staffing arrangements for automated plant2005 Energy Institute - Staffing arrangements for automated plant
2005 Energy Institute - Staffing arrangements for automated plant
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
 
Werner Schierschmidt
Werner SchierschmidtWerner Schierschmidt
Werner Schierschmidt
 
Human factors additional paper Ronny Lardner
Human factors additional paper  Ronny LardnerHuman factors additional paper  Ronny Lardner
Human factors additional paper Ronny Lardner
 
Human Factors as Driver for Safety Management, Engineering, and Risk Governance
Human Factors as Driver for Safety Management, Engineering, and Risk GovernanceHuman Factors as Driver for Safety Management, Engineering, and Risk Governance
Human Factors as Driver for Safety Management, Engineering, and Risk Governance
 
Accident investigation and Root Cause Analysis - by www.oyetrade.com
Accident investigation and Root Cause Analysis - by www.oyetrade.comAccident investigation and Root Cause Analysis - by www.oyetrade.com
Accident investigation and Root Cause Analysis - by www.oyetrade.com
 
2016_Security_System_Monitoring_in_Healthcare_Facilities
2016_Security_System_Monitoring_in_Healthcare_Facilities2016_Security_System_Monitoring_in_Healthcare_Facilities
2016_Security_System_Monitoring_in_Healthcare_Facilities
 
Safety, Accidents, and Human Error
Safety, Accidents, and Human ErrorSafety, Accidents, and Human Error
Safety, Accidents, and Human Error
 
Avoiding Data Center Disasters
Avoiding Data Center DisastersAvoiding Data Center Disasters
Avoiding Data Center Disasters
 
Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015
Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015
Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015
 
Human Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & SafetyHuman Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & Safety
 

Similaire à Pay Me Now or Pay Me A Lot More Later

Best Practices for the Service Cloud
Best Practices for the Service CloudBest Practices for the Service Cloud
Best Practices for the Service Cloud
Ross Bauer
 
Class,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docxClass,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docx
clarebernice
 
Presentation on DR testing featuring quotes by Robert Nardella in an intervie...
Presentation on DR testing featuring quotes by Robert Nardella in an intervie...Presentation on DR testing featuring quotes by Robert Nardella in an intervie...
Presentation on DR testing featuring quotes by Robert Nardella in an intervie...
Robert Nardella
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
VMware_EMEA
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
FraudBusters
 

Similaire à Pay Me Now or Pay Me A Lot More Later (20)

Cutting the Cord
Cutting the CordCutting the Cord
Cutting the Cord
 
Best Practices for the Service Cloud
Best Practices for the Service CloudBest Practices for the Service Cloud
Best Practices for the Service Cloud
 
Class,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docxClass,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docx
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
How To Save Millions At Your Company
How To Save Millions At Your CompanyHow To Save Millions At Your Company
How To Save Millions At Your Company
 
[Webinar Slides] Put an End to Manual Data Processing
[Webinar Slides] Put an End to Manual Data Processing [Webinar Slides] Put an End to Manual Data Processing
[Webinar Slides] Put an End to Manual Data Processing
 
Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basics
 
Essay On Electrical Appliances
Essay On Electrical AppliancesEssay On Electrical Appliances
Essay On Electrical Appliances
 
8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger Whitepaper8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger Whitepaper
 
Presentation on DR testing featuring quotes by Robert Nardella in an intervie...
Presentation on DR testing featuring quotes by Robert Nardella in an intervie...Presentation on DR testing featuring quotes by Robert Nardella in an intervie...
Presentation on DR testing featuring quotes by Robert Nardella in an intervie...
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
VMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential ChecklistVMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential Checklist
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
 
Nextcard Case Essay
Nextcard Case EssayNextcard Case Essay
Nextcard Case Essay
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Pay Me Now or Pay Me A Lot More Later

  • 1. Pay Me Now Or Pay Me a Lot More Later: How To Get the Budget You Need To Prevent Catastrophes, Not Clean Them Up Jeremy Swanner, Executive Vice President, RLE Technologies
  • 2. MANAGING CEUs AND CFM® MAINTENANCE POINTS You are eligible to receive Continuing Education Units and Certified Facility Manager® maintenance points for attending sessions at IFMA's World Workplace. To receive 20 CFM maintenance points: Record your attendance on your CFM Recertification Worksheet. At recertification time, submit your completed CFM Recertification Worksheet. To receive CEUs: Pay the US$15 processing fee via registration Log into the Attendee Service Center http://tinyurl.com/mwo9zxj Your log in information was sent to you when you registered for the conference. Complete the session evaluation then take the five question CEU assessment. After passing the assessment, you will receive your certificate of completion. CEUs can only be earned upon successful completion of the assessment. Individuals seeking CEUs or LUs from other organizations must contact those organizations for instructions on self-reporting credit hours.
  • 3. Your Feedback is Valued! Please take the time to Evaluate Sessions Log into the Attendee Service Center http://tinyurl.com/mwo9zxj
  • 4. Meet Our Presenter: Critical facilities monitoring utilizes ever-evolving technology, and the field requires management that can adapt to an increased demand for resources and security. Like you, data center and critical facility expert Jeremy Swanner has adapted to - and predicted - the changes. With more than 25 years (and counting) of in-the-trenches experience in the critical facilities space, Jeremy has intimate knowledge from a variety of perspectives, with a focus on how to better protect sensitive facilities from threats. RLE Technologies is a leading global provider of critical facility environment oversight and notification. For more than 30 years, RLE has delivered reliable, cost-effective facility monitoring and leak detection technologies with the sole purpose of preventing disasters, providing peace of mind, and preserving its customer’s reputations. Thousands of businesses worldwide rely on RLE products to detect environmental threats, notify stakeholders, and mitigate risks to their critical sensitive facilities. RLE products are manufactured in the United States. www.RLETech.com
  • 5. Review Session Learning Objectives 1. Recognize why making a case for comprehensive facility monitoring to the people holding the purse strings is so important. 2. Discuss the multiple ways that facility downtime impacts the performance of your business. 3. Understand how facility downtime impacts your reputation and job security. 4. Learn how to quantify and justify the needed budget and staffing to fully protect your facility.
  • 6. To Reach Our Learning Objectives… We will explore:  Basic causes and costs of downtime in your facility  Resulting costs from intangible concerns you may not have considered  A three step, proven process for getting the environmental monitoring budget you need  Review resources you can use to make your case 6 www.rletech.com Protecting facilities, people, and reputations
  • 7. Continuing the Conversation Have a thought during the presentation? Live-tweet us your idea @RLETechnologies and we’ll continue the conversation. We also set aside time for your questions at the end/Please jump in with your questions as they arise 7 www.rletech.com Protecting facilities, people, and reputations
  • 8. Why is Facilities Monitoring Important? First, A Few Obvious Answers Monitoring helps avoid:  Damage to mission critical data and assets  Interrupted organizational productivity  The need to replacement or repair of equipment and other assets  Clean up 8 www.rletech.com Protecting facilities, people, and reputations
  • 9. Typical Causes of Downtime 9 www.rletech.com Protecting facilities, people, and reputations
  • 10. Another Source for Causes of Downtime 10 www.rletech.com Protecting facilities, people, and reputations
  • 11. “Little” Problems Can Cost You BIG Example: 2013 Cost of Data Center Outages  Average cost of outage: $7,900 per minute, up by 41% from 2010  Average reported incident length: 86 minutes, equating to an average cost per incident of nearly $680,000  Total data center outage statistics: • Average recovery time of 119 minutes • Cost of about $900,000 *Source: Ponemon Institute report “2013 Cost of Data Center Outages” 11 www.rletech.com Protecting facilities, people, and reputations
  • 12. And It Gets Worse  Certain industries are even higher • Hospitality sector (129% increase) • Public sector (116%) • Transportation (108%) • Media organizations (104%) • Financial (no data but… OH BOY)  Impact on reputation/loyalty and the loss of data *Source: Ponemon Institute report “2013 Cost of Data Center Outages” 12 www.rletech.com Protecting facilities, people, and reputations
  • 13. 2013 Downtime Costs by Industry *Source: IT Performance Engineering and Measurement Strategies 13 www.rletech.com Protecting facilities, people, and reputations
  • 14. 2013 Downtime Costs by Industry Do you know the cost of downtime for your firm? If not, *Source: Emerson 2013 Study on Data Center outages that’s step one! 14 www.rletech.com Protecting facilities, people, and reputations
  • 15. Slow Inflation? Not in Downtime Recovery Change in cost of downtime by category $53,608 $118,080 $140,543 $183,724 Business Disruption Lost Revenue End-User Productivity 15 www.rletech.com Protecting facilities, people, and reputations $238,717 $42,530 $96,226 $179,827 $0 $50,000 $100,000 $150,000 $200,000 $250,000 $300,000 IT Productivity 2010 2013 *Source: Ponemon Institute report “2013 Cost of Data Center Outages”
  • 16. Now For Some Not So Obvious Impacts  Legal and regulatory impact  Lost confidence and trust among key stakeholders • Shareholders • Customers • The management team • Your employees  Diminishment of marketplace brand and reputation 16 www.rletech.com Protecting facilities, people, and reputations
  • 17. The Intangible Costs Decreased customer loyalty Damage to your company's reputation Clean up Employee morale issues Ammunition for your competitors “Morale is seriously affected by system downtime, because IT lives in dread of failures.” -Robert McFarlane, principal and data center design expert, Shen Milsom Wilke Inc. “An outage can also erode a company's competitive edge, like loss of business reputation within the industry and/or customer base.” -Matt Stansberry, director of content and publications, Uptime Institute “There are tangible and intangible costs of downtime. It can be expensive, but beyond the financial implications, there is also a loss of credibility and trust. When you are down, both of these erode fast and take much longer to rebuild.” -Chuck Goolsbee, data center manager and SearchDataCenter.com blogger All quotes from a SearchDataCenter.com article. 17 www.rletech.com Protecting facilities, people, and reputations
  • 18. What’s Your Cost of Downtime? Insert question mark Need a starting point? Download our Cost of Downtime Calculator at http://rletech.com/cost-of-doing-nothing- calculator/ 18 www.rletech.com Protecting facilities, people, and reputations
  • 19. Example Calculation 19 www.rletech.com Protecting facilities, people, and reputations
  • 20. Example Calculation 20 www.rletech.com Protecting facilities, people, and reputations
  • 21. And What about You… Personally The resulting impact on a career can be significant:  A surprising 1 in 5 companies fired an IT employee when a network downtime incident occurred  The ratio was more dramatic for some industries  1 in 3 companies in the natural resources, utilities & telecoms sector sacked IT staff due to downtime When downtime occurs, management is going to be looking at YOU *March 2014 Avaya survey 21 www.rletech.com Protecting facilities, people, and reputations
  • 22. Making Your Case Try using a Why How What case Simon Sinek’s Golden Circle*  People make decisions based on emotion  Understand the core of WHY the company exists  Present HOW a business disruption would impact the WHY  Show HOW to avoid the disruption  Detail WHAT will be needed to execute the HOW *Simon Sinek’s Ted Talk located here http://www.youtube.com/watch?v=fMOlfsR7SMQ 22 www.rletech.com Protecting facilities, people, and reputations
  • 23. Start With “Why”  Far too many business cases start with WHAT needs to be done NOT why we need to implement monitoring: • Why does your company exist? • Look to the company mission statement for guidance • Consider the WHY from the perspective of the decision maker  Get management passionate about monitoring’s impact on the company WHY Consider these BEFORE making the case with facts and figures. 23 www.rletech.com Protecting facilities, people, and reputations
  • 24. Once You Know “Why”, Move to “How”  HOW would downtime caused by controllable environmental issues impact the WHY?  HOW can the company mitigate the risk to the WHY?  The answer typically includes: • Create and implement an action plan • Deploy monitoring equipment • Review procedures 24 www.rletech.com Protecting facilities, people, and reputations
  • 25. Support the “How” with Facts Case studies Probabilities 25 www.rletech.com Protecting facilities, people, and reputations Impacts Metrics ROI Cost of Doing Nothing Calculations
  • 26. HOW Can Be the Hardest Part  Be prepared to challenge your boss  Give them what they need and not just what they think they want  You must help them think beyond the “Threat de jour” “The worst culture you can ingrain within a business is an atmosphere of saying yes to everything. When you are debating a new idea, those who disagree are crucial to getting the right result in the end. Yes men will only ever get so far.” Richard Branson, Founder of Virgin Group 26 www.rletech.com Protecting facilities, people, and reputations
  • 27. “Top of Mind” ≠ “Good Priority” It’s easy to get caught up in what just happened…  Active shooter  Hurricane  Tornado  Earthquake 27 www.rletech.com Protecting facilities, people, and reputations
  • 28. “Top of Mind” ≠ “Good Priority” But it’s the less dramatic threats that can cause the biggest problems:  Water Leaks  Chemical Leaks  Overheating  Power surges  Air Quality (pressure, composition, etc.)  Excessive humidity  Vermin 28 www.rletech.com Protecting facilities, people, and reputations
  • 29. Probability vs. Impact Credit: High Stakes Business: People, Property and Services Report For more information attend session 5.02, 8:00 am Friday Morning, IFMA Research: Perspectives on Business Continuity, Management Skills Learning Lab for more information 29 www.rletech.com Protecting facilities, people, and reputations
  • 30. Finally, Provide the “WHAT”  Build out a candid, honest proposal to execute the HOW  Do your homework  Present a comprehensive proposal protect the WHAT 30 www.rletech.com Protecting facilities, people, and reputations
  • 31. An Example For Leak Detection This worksheet is available for free download at http://rletech.com/system-design-worksheet/ 31 www.rletech.com Protecting facilities, people, and reputations
  • 32. Case Study: University of Northern Colorado Director of IT Services, Marcus McCutchen, identified vulnerabilities in the telephone and computing centers 32 www.rletech.com Protecting facilities, people, and reputations
  • 33. Step 1: WHY Knowing UNC’s Vision statement provided the basis The University of Northern Colorado strives to be a leading student-centered university that promotes effective teaching, lifelong learning, the advancement of knowledge, research, and a commitment to service. This enabled Marcus to focus on the student experience in his argument for sufficient facilities monitoring 33 www.rletech.com Protecting facilities, people, and reputations
  • 34. Step 2: HOW • HOW would an environmental disaster impact the student experience and ability to effectively learn? • Reduce student effectiveness • Impact student confidence in the university • Jeopardize student security • Calculated the cost of forecasted downtime, $92,000 conservatively • HOW to limit the risk to the student experience? • Implement a disaster mitigation and recovery plan • Deploy leak detection equipment • Schedule annual reviews of the plan 34 www.rletech.com Protecting facilities, people, and reputations
  • 35. Step 3: WHAT • Marcus started with a mitigation plan and review process • He then worked with RLE to design a leak detection system – Fluid sensing cable – Distance read controller – Spot detectors – Automated notifications of key personnel • Presented a final proposal including – Cost of downtime – Cost of new system – ROI Calculation 35 www.rletech.com Protecting facilities, people, and reputations
  • 36. Results  The administration at University of Northern Colorado fast tracked the approval of the facilities monitoring plan  Staff at UNC integrated a proactive, cost effective and user-friendly monitoring system in just six weeks 36 www.rletech.com Protecting facilities, people, and reputations
  • 37. Epilogue  Less than three months later, a “small” problem occurred  Moisture in the telephone switch room was detected  Upon inspection, moisture was found along a section of monitoring cable as well as a ceiling tile  The problem was eventually traced one story higher to a cracked floor sink, which was located directly above a critical piece of telecommunication equipment.  Had the leak gone undetected, tens of thousands of dollars in downtime would have resulted 37 www.rletech.com Protecting facilities, people, and reputations
  • 38. Conclusion and Questions “Prevent Catastrophes, Not Clean Them Up” Further thoughts or questions after the presentation? Contact Jeremy Swanner jswanner@RLEtech.com @RLETechnologies RLE Mission We exist to prevent disasters, preserve our clients’ reputation, and provide peace of mind. 38 www.rletech.com Protecting facilities, people, and reputations
  • 39. Thank You! Be sure to evaluate the session online at the Attendee Service Center http://tinyurl.com/mwo9zxj