Upcoming Programs
Program | Date | Location |
---|
CIO Playbook | Winter/Spring 2022 | Online, Facilitator-led |
Applications Playbook | Winter/Spring 2022 | Online, Facilitator-led |
Security Playbook | Winter/Spring 2022 | Online, Facilitator-led |
Infrastructure Playbook | Winter/Spring 2022 | Online, Facilitator-led |
Why Attend?
- Immersive, Role-specific TrainingCovers four key IT disciplines: CIO, Applications, Infrastructure, and Security. Focuses on developing IT management practices to help you systematically improve your IT department.
- Collaborate & Learn From Your PeersCollaborate and leverage your team and other industry experts to complete all activities and outputs in your playbook.
- Connect With Industry ExpertsPlaybook gives you the exclusive opportunity to meet with our world-class research analysts, as well as industry experts.
- Develop Your NetworkNetworking via small group breakouts expand your learning during Playbook.
- Walk Away With a Plan to Execute onBuild a playbook that allows you and your team to successfully execute on your core process improvements and strategic direction.
Feedback From Recent Training Program Attendees
- 90% would recommend the program to someone else
- The program received a 9.5/10 on applicability of materials
- The material received a 9.2/10 for insightfulness
"In the end we retain from our studies only that which we practically apply."
Goethe
In this spirit, we design all of our training programs.
Session Breakdowns
CIO Playbook
IT Strategy
Derive business context, IT key initiatives & roadmap.
Innovation/ Digital Transformation
Create a plan to deliver on your most important digital initiatives.
Vendor Management
Prioritize and classify your vendors, standardize your processes for transitioning in new vendors, maintaining communications, and monitoring performance.
Performance Measurement
Develop meaningful service metrics to reinforce service orientation in your IT organization by ensuring your IT metrics generate value-driven resource behavior.
Cost Optimization
Take a value-based approach to cost optimization. Reduce IT spend while continuing to deliver the most important services. Involve the business in the cost-cutting process. Develop a plan for cost cutting that avoids unintended interruptions to the business.
Applications Playbook
Applications Strategy
Align your business with applications through your strategy to ensure increased business satisfaction and to deliver applications that enable the organization’s goals.
Quality Management
Develop a fully functional quality management program to promot innovation, agility, lower costs, and improved operations.
Data Management
Effective data management requires a cross-functional approach that engages both the business and IT. Effective data management is more than just a technical solution. It requires a change in culture from the business and investments in resourcing, technology, and process.
Requirements Gathering
Creating a unified set of standard operating procedures, centralize governance, and build a center of excellence to improve requirements gathering.
Application Portfolio Management
Define the roles, responsibilities, and assessment criteria for application rationalization and initiate an application portfolio roadmap that will showcase your rationalization decisions to key stakeholders.
Security Playbook
Security Strategy
Ensure alignment with business objectives, assess organizational risk and stakeholder expectations, enable a comprehensive current state assessment, and prioritize initiatives and building out a security roadmap.
Security Policies
Enhance your overall security posture with a defensible and prescriptive policy suite.
Data Classification
Understand where your data lives and who has access to it so that you can develop an appropriate data classification system by conducting interviews with data owners and by incorporating vendor solutions to make the process more manageable and end-user friendly.
Security Awareness & Training
Cyber attackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to properly prepare your end users to effectively defend your organization against security threats.
Risk Management
Develop a security risk management program to create a standardized methodology for assessing and managing the risk that information systems face.
Infrastructure Playbook
Infrastructure Roadmap
Follow the roadmap process to better interface with the business, becoming true strategic partners by aligning Infrastructure’s work with business value.
Disaster Recovery Planning
Create an effective, right- sized DRP: discover current capabilities, define business requirements, and close gaps to deliver service continuity.
Automation
Define your automation suite in terms of your business goals. Take stock of what you have now: RPA, AIOps, chatbots. Think about how to integrate and optimize what you have now, as well as roadmap your continual improvement.
Cloud Management
Evaluate workloads’ suitability for the cloud using Info-Tech’s methodology to select the optimal migration (or non- migration) path based on the value of cloud characteristics. Build a roadmap of initiatives for actions by workload and risk mitigation. Define a cloud vision to share with stakeholders.
Reduce the Chaos
The ability to respond and recover quickly from unplanned incidents is a critical path in becoming a strategic and trusted partner for the business.
Virtual, Facilitator Led Program
