The majority of the US & global economy is now service, rather than manufacturing or trading of tangible goods. Even the development of goods & systems increasingly takes on the character of service. CMMI is a reference model for process improvement meant to enhance the business performance of a wide range of organizations. Recent data from top CMMI users illustrates the quality & other business results that capable organizations get, such as customer satisfaction, higher income, defect reduction, on-time performance, & decreased costs.
This webinar will briefly cover the CMMI for Services (CMMI-SVC) model, focusing on the service-specific process areas (SVC PAs), & show how the SVC PAs can enhance organizational performance. Part of the overview will show the aggressive adoption curve for CMMI-SVC (just released in 2009), including case studies & other industry adoption data. The webinar will also show users how to pick the right model pieces with which to begin adoption, & where to go for adoption guidance.
Eileen Forrester is the manager of CMMI for Services and the CMMI Learning Suite at the Software Engineering Institute. She is a senior member of the technical staff in the Software Engineering Process Management program at the SEI. She is also the lead author of the Addison Wesley book, CMMI for Services, Guidelines for Superior Service, the co-chair of the International Process Research Consortium, and the editor of the IPRC Process Research Framework. Forrester is the developer of TransPlant, a transition-planning process, and her current research area is in process-oriented approaches to service delivery, teaching, technology change, risk management, and emergent system types. Forrester has more than 35 years of experience in technology transition, strategic planning, applied research, process improvement, communication planning, and managing product, service, and non-profit organizations.
Today we have several compelling best practice frameworks like ITIL, Cobit, CMMI for Services and industry standards like ISO 20000 that makes organisations overwhelmed and wonder the best way to adapt and adopt to leverage maximum business benefits. This talk would focus with pragmatic case study to illustrate a simplified approach and methods to fit the framework and standard to the organisational environment.Read more >
The Information Assurance - Capability Maturity Model (IA-CMMI) is based on SEI's CMM, which became an ISO standard in 2002 (ISO 21827). IA-CMMI focuses on the processes that product information assurance analysis artifacts (e.g., results that identify vulnerabilities, threats, and their countermeasures). It is THE work breakdown structure for compliance implementation. But how many of us actually know what it is?Read more >
This presentation will provide insights into the use of ITIL leading to ISO/IEC 20000 certification. The discussion will also touch on CMMI for Service and COBIT.
James Howard, General Dynamics Information Technology
Jim has been with GDIT for 40 years, more than 30 of which have been involved in Service Management. The last 6 of which as the ITSM Program Manager. His varied assignments have included 18 years in Europe and 8 in Hawaii. He has spoken frequently at government conferences and this year’s Pink Elephant Conference in Las Vegas. Jim holds a number of ITSM certifications including:
•ITIL v2 Service Manager and ITIL v3 Expert
•ITIL v3 Service Operations, Operational Support & Analysis and Release Control and Validation Intermediates
•Certified Process Design Engineer (CPDE)
•Certified ISO/IEC 20000 Consultant/Practitioner/Auditor
•Accredited Instructor for the above certifications
Cyber risk must be measures using a top-down approach to understand the business impact of cyber risk in dollars and cents and the effectiveness of cyber controls. Bottom-up approaches stop at the system level and do not tie the business processes to the data assets and the systems, hence they lack the ability to demonstrate the effect a missing control, or a discovered vulnerability has on cyber risk.
Bottom-Up methods have proved themselves to be extremely inaccurate as they measure controls on the technology level and only describe the control maturity and not its effectiveness. Control maturity is a term that is commonly used by IT to measure their ability to perform and is derived from IT governance methodologies such as CobIT, ITIL and CMMI models. From a Risk Management perspective, controls maturity has no effect on Risk because it only describes the implementation status of the control. For example, an Anti-Malware solution can be 90% mature because it is installed on 90% of the end-points. But from a Risk perspective, the policy this control is enforcing could be irrelevant to the Risk. So its effectiveness could be 0%.
Measuring cyber risk by evaluating controls maturity puts the insurer in a very high exposure for loss. Learn how to quantify cyber risk in dollars and cents.
Title: The CSI Bucket List: Key Ingredients of a Successful Continuous Improvement Program
Abstract: Six Sigma, Lean, Plan-Do-Check-Act, CMMI, TQM, and now CSI there is no shortage of methods when it comes to improvement. In this session, join Ian Clayton, author of the Universal Service Management Body of Knowledge (USMBOK), and co-author of the Service Management Manifesto(tm), on an exploration of the common 'must-do', 'how-to' the 'when-to' and 'not to' of continuous improvement, and how they can help form a 'bucket list' for service improvement.
YaSM (Yet another Service Management Model) provides guidance ("best practices") for service providers. There are various guidelines in this area already, but we learned from our customers that many find them too complex and would welcome something simpler that makes it easier for them to get started. So we looked into the most popular frameworks and standards such as ITIL, COBIT, USMBOK, CMMI-SVC and ISO 20000, and created a new, streamlined, framework that captures the common thinking behind the existing guidelines.Read more >
Improve the "Business of IT" by using a measurement framework and metrics that matter most.
Metrics are important to management. What's not measured cannot be managed.
But what should be measured, why and how?
Metrics validate your IT strategy and vision; provide direction with targets and metrics; justify changes with a means to gauge value-realized; signal when to intervene with corrective actions.
Hear case studies and examples that help you improve alignment, meet compliance and drive service excellence.
Learn the secrets of how measurement frameworks work and take away a roadmap with actionable steps. Let's get IT started.
David Smith is the President of Micromationinc.com, an IT Consultancy that specializes in IT service optimization. David is also a certified TCO Expert, ITSM Expert and ISO 20000 Consultant. He has 30+ years experience in managing and improving the quality, efficiency and effectiveness of IT service delivery for commercial IT vendors as well as the internal IT organizations of well-known private and public sector companies.
David's IT consulting kit-bag includes tools, methods and lessons-learned for: measurement frameworks, metrics, optimization, governance, portfolios, scorecarding, benchmarking, baselining, service & process improvement, KPI designer SW, ROI, TCO, ABC, ABM, technology refresh, support modelling, service marketing, cataloguing and pricing using industry best practices like ITIL, CobiT, CMMI etc.
David is the author of “Implementing Metrics for IT Service Management” ISBN: 9789087531140 and contributing co-author of "IT Service Management - Global Best Practices" ISBN: 9789087531003.
What has strategy execution, got to do with certification lighthouses such as ITIL, VALIT, COBIT, RISKIT, CMMI, TOGAF, ISO 9000, 20 000, 27 001?
Martin Palmgren will discuss how these certifications can work alongside; stakeholder priorities, time to market, business drivers, cost effectiveness & cycle time, total cost of ownership (TCO), cost, consumption, chargeback, a business (IT) model and value proposition, as well as demand and cost drivers.
He will also pose the question how effective is your business (IT) model? Sharing his experiences where IT has perceived to fail to meet business expectations and how to overcome this by optimizing your IT business model.
See how the CollabNet to HP Quality Center integration creates a bi-directional synchronization of requirements, development, and test artifacts to meet the demands of frequent releases, continuous build, integration and quality management. This connector enables business analysts, project managers, Agile developers and QA team members, each working exclusively with their tool of choice, to improve visibility, communication and collaboration among teams - and ultimately, the quality of their software projects.
Giampiero Saracino, Senior Presales Manager, is currently managing the EMEA Apps Presales Practice in HP Software & Solutions. The practice comprises experts focusing on Functional Assurance, Performance Validation, Application Security Assurance and SOA Testing software products portfolio.
Since 1989 he had gained extensive experience in all the different phases of Software Application Development Lifecycle, at project and program management level, ranging from Airspace/Military Real Time applications to Corporate Core Business applications, adopting different development methodologies.
He led the Identity and Access Management Practice in HP, looking after EMEA presales activities for Identity, Access, Federation, and Audit Management software products.
Roy Woodfine, Senior Technical Consultant is currently managing the deployment of CollabNet solutions throughout several industry sectors within Europe.
Since 1985 He has been involved in the Software industry, from designing software for Military Aircraft through to the Commercial Sector. He has focused on SCM for the latter 15 years
Roy has led a variety of significant SCM implementations including a CMMI Agile adoption at a leading investment bank that could demonstrate full compliance after only 6 months.
Traditionally the professions of business continuity, security management and IT operations have been separate entities. This is not the most advantageous way to protect an organization. An environment in which these and other key activities are integrated into a structured framework makes better business sense. Such a framework now exists: it's called the Resiliency Management Model (RMM) and was developed by the Software Engineering Institute's CERT group at Carnegie Mellon University. Although considered a framework, RMM addresses critical issues regarding the protection and recovery of business activities from an operational risk perspective. Specifically, RMM overlays the issues of business continuity/disaster recovery, security planning and management, and IT operations and service delivery management. RMM also overlays several key standards, such as BS 25999, ISO 27001, ISO 20000, ISO 24762, DRII GAP, NFPA 1600, CMMI Ver. 1.2 and CobiT 4.1. This session provides a timely introduction to a new and critically important methodology.Read more >