Building confi dence in IT programs
Transcription
Building confi dence in IT programs
Insights on IT risk Business briefing September 2011 Building confidence in IT programs Facilitating success through program risk management Key issues to blame for failures in IT programs are not being identified properly until after they have occurred. Success in IT programs translates to success in business We believe there has never been a better or more important time for organizations to review how they plan, execute and realize benefits from strategic IT programs. Organizations are looking to IT as a key enabler to help them realize business strategies, improve productivity and obtain a competitive advantage through product and service innovation. IT is a focal point for executives seeking to drive cost competitiveness and transformation agendas that have become part of the global economy over the past three years. But even as IT investments are again set to increase significantly in the coming years, strategic IT program success rates are still underperforming and in need of attention by organizations looking to spend their hard-earned capital wisely. Strategic IT programs are clearly on the rise, but so are expectations. Organizations are realizing that they must respond to increasing pressure to improve the return on their program investments. Today’s strategic IT programs are not only expected to be delivered on time and on budget, but also to deliver multiple, high-level business benefits. Key issues to blame for failures in IT programs are often not identified properly until after they have occurred. By the time issues are identified (often in a crisis), it’s too late to for a positive outcome, and even the time for damage control is limited and sometimes missed altogether. Organizations need to challenge the status quo and ask themselves how they can better manage risks around underperforming programs and improve performance rates to deliver sustained benefits. IT program risk management (PRM) can help to increase the success of strategic IT initiatives. IT PRM provides the means to better protect organizations from common IT program pitfalls and increase the likelihood of delivering successful program outcomes. Insights on IT risk | September 2011 1 While IT spending is increasing, program IT spending scheduled to increase An upsurge in spending in IT projects and programs is expected. IT research and advisory firm, Gartner, has indicated that worldwide IT expenditure in 2011 is estimated at $3.6 trillion, a 7.1% increase from 2010. Gartner predicts an increase in IT spending will be sustained at an average rate of 5.3% per year through 2015. Gartner also indicates that approximately 20% to 50% of a company’s IT spending will be focused on programs and projects — depending on an organization’s initiatives. In 2011, this represents an expected increase in spending of up to $2.16 trillion on technology-enabled programs and projects. In addition, Ernst & Young’s 2011 report, Turn risks and opportunities into results, has identified investing in IT as a top-three priority (see Figure 1 below). In fact, across Europe, America and the Middle East, investing in IT is typically either the top or second-highest priority for executives. A key driver for the increase in investment in IT is that organizations that have failed to invest in IT in the past few years have run the risk of not keeping pace with business demands for increased efficiency, improved performance and of legacy systems not being supported by software vendors as time progresses. A recent Forrester Trends 2011 enterprise resource planning (ERP) report highlighted that companies are lagging in investing in ERP projects but will need to reinvest soon to keep up to date with upgrades and demand for ERP cloud services. Forrester reported that the “ERP software market was hit hard by the recession but rebounded last year. … [Roughly] half the companies surveyed are running on product releases that are two releases behind current.” A second driver is the rapid uptake of new technologies, such as cloud computing and mobile technologies, which offer new ways of working and opportunities for efficiency and innovation. Organizations are increasingly competing on innovation in new products and services, with IT and emerging technologies seen as both a risk and opportunity for companies wishing to differentiate in the market and improve productivity and performance. The research highlights that organizations have little choice but to invest continuously in IT and IT programs or suffer the consequences of an aging and underperforming application and infrastructure landscape, ultimately affecting competitiveness. Figure 1: Global risks and opportunities Top five global opportunities for 2011 Cost cutting Perceived risk impact Regulation and compliance Managing talent Pricing pressure Market risks Emerging technologies Expansion of government’s role Slow recovery or double-dip recession Social acceptance/CSR Access to capital Perceived scale of opportunity Top five global risks for 2011 Risk mitigation measures needed but not yet implemented Source: Turning risks and opportunities into results, Ernst & Young, 2011. 2 Insights on IT risk | September 2011 Improving execution of strategy across business functions Investing in products, services and operations Excellence in investor relations Investing in IT Investing in processes, tools and training to achieve greater productivity Investing in cleantech and emerging markets demand growth New market channels Public-private partnership Mergers and acquisitions Measures to exploit opportunity needed but not yet implemented success rates are not IT programs continue to underperform Across all industries, organizations continue poor performance in successfully delivering IT programs, achieving expected outcomes and sustaining benefits. Reports by Gartner show that IT program success rates vary between 30% and 50%, remaining relatively flat over the years. In addition, a PANORAMA study of 1,600 ERP projects in 2010 indicated that 70% of Tier I ERP clients fail to realize at least 50% of business benefits. In addition, 51% of current implementations, at the time of PANORAMA’s survey, were at risk of going over budget. While companies have invested significantly in increasing their knowledge and capabilities in program and project management, this is not visible in the success rates. In our opinion, the lack of improvement is mainly due to increased complexity in business processes and the emerging technology landscape. Organizations are still failing to properly adapt their program approaches to this increased complexity. IT program risk is a key megatrend to be addressed An Ernst & Young report from 2011, The evolving IT risk landscape, identified programs and change management as the most significant megatrends in IT that need to be managed. The paper highlighted the risks related to IT programs next to several other risk categories such as cybercrime, cloud computing and consumerization. Figure 2: IT risk universe Business environment IT pro_am risc mana_ement Transparency and conÕdence g n m e nt l i ty A li a bi Chan_e a_enda Physical environment Infrastructure Potentially reduced cost of operations Avoidance of security breaches Enhanced capability Protect brand Manage compliance and expectation Seamless customer experience tia a il Internal threats Business objectives Enable innovation and change Predictability Security and privacy IT risk universe Cybercrime den y li t Economic recovery and market volatility Strategy Applications and databases Resiliency Co n Ô New business models and technology Cloud computin_ E Pro_rams and chan_e mana_ement KtafÕn_ Data Av Regulatory pressure Consumerization De_al and re_ulatory Third-party suppliers and outsourcin_ Outcomes s nes ive ct ffe Globalization Margin pressure EfÔciency IT me_atrends Com pli an ce Market forces Drive growth Operations Investor conÕdence I n te g r i t y Operational excellence Source: The evolving IT risk landscape, Ernst & Young, June 2011 Insights on IT risk | September 2011 3 Delivering on the promise of IT is now a crucial differentiator for corporate competitiveness. Program failure prevents benefits delivery Effective program and project management capabilities are now one of the most crucial differentiators for competitiveness in the future market place. Given the focus in 2011 on investing in IT, getting strategic IT programs right could be the make-or-break difference between realizing business growth and staying afloat. Strategic IT programs should deliver sustainable business benefits to create a competitive advantage. An Ernst & Young survey from 2008, Managing programs for success, found that only 8% of respondents viewed their company’s ability to obtain business value from strategic programs as poor, while 33% would have liked to see some improvement in this area. One explanation for this may be that in the past, ensuring that programs deliver business value was a priority of only 15% of the companies. A majority of the respondents instead focused on the more traditional measures of success, namely delivering on time and within budget. Encouragingly, the survey confirmed that a shift toward benefitsdriven programs had begun. Of the companies who responded, 72% stated that the primary focus of the future will be to make sure that tangible business benefits and value are realized as a result of their strategic programs. While the failure of strategic IT programs can leave companies exposed to significant increases in costs, reputational damage, loss of customers and disruption of day-to-day activities, we believe that in the future, organizations that fail to manage their strategic IT programs based on realizing business benefits and contributions to innovation and competitive advantage will find it increasingly difficult to be relevant to their workforce, customers and the broader market in which they operate. Indeed, delivering on the promise of IT is becoming a crucial differentiator for corporate competitiveness. Figure 3: Focus on strategic IT programs Historical focus of respondents’ strategic IT programs Future focus of respondents’ strategic IT programs 100% 100% 75% 75% 72% 53% 50% 50% 32% 25% 15% 0% 16% 12% Time to budget Quality 0% Time to budget Quality :efeÕtk delivery Source: Managing programs for success, Ernst & Young, 2008. 4 25% Insights on IT risk | September 2011 :efeÕtk delivery The big picture: IT program risk universe There is not one single reason for IT program failure In our experience, there are usually many factors that result in an IT program failing to deliver its intended objectives and benefits. There are typically a number of risks that, combined, result in programs failing or underperforming. Management needs to be aware of the organization’s specific IT program risk universe and implement strategies up front to manage the most likely risks to program success. The most common causes of complex IT program failures are: IT program/project risk universe Vision and initiation • Lack of management support for the program • Unresolved or uncertain project vision or strategy • Poorly defined business objectives • Poorly defined project scope and requirements analysis • Inadequate assessment of business impact or priority • Poorly defined critical success factors and risk assessment • Lack of complexity measurement • Unclear governance and decision framework • Lack of communication and user group involvement Planning Execution • Aggressive schedule commitments restricting proper planning phase • Inadequate risk assessment, quantification and allocation of project risks • Inappropriate skills, resources and processes in place • Incomplete or unrealistic cost information • Inadequate understanding of complexities and accounting for factors necessary to succeed • Mismatched balance between time, cost, quality and benefit attainment • Ineffective prequalification process • Incomplete project charter • Poorly defined contractual terms and conditions • Ineffective governance mechanisms and inconsistent decision framework Business acceptance • Lack of appropriate accountability and approvals • Ineffective deployment strategy • Ineffective change management • Unresolved problems and disputes • Inadequate representation of the “voice of the customer” • Incomplete operating and maintenance information • Shifting budget, scope and timetables • Insufficient user satisfaction • Lack of accountability • Scale and volume of defects (e.g., data, test) • Adversarial team and supplier relationships • Missing warranties and guarantees • Lack of skills or resources in program and project management • No project go-live review • Lack of defining appropriate performance metrics Measuring and monitoring • Governance model fails to manage key project internal and external stakeholders • Ineffective control of change orders • Ineffective project management systems • Poor quality management and assurance plans • Ineffective project performance monitoring and reporting • Incomplete design information and changing design and scope requirements • Lack of continuity in project staff • Ineffective communication with stakeholders • Lack of situational awareness • Ineffective decision-making and resolution of issues • Lack of a risk management framework • Lack of independent progress monitoring and executive reporting • Lack of tracking 6 Insights on IT risk | September 2011 The holistic view: program risk implies enterprise risk Increased IT program complexity not only makes program management more challenging, it is also a major driver of risk. Complex IT programs are associated with considerable uncertainty and ambiguity. As the degree of complexity increases, so does the inherent IT program risk, and therefore the need for diligent IT program governance, risk management and project control. In addition, the increasing importance of IT programs for reaching strategic goals implies that the whole business is put at risk when IT programs fail to deliver expected business benefits. Figure 4: Risk/complexity matrix Risk There is a direct relationship between program complexity and risk that needs to be assessed and managed throughout the program life cycle. The risk/complexity matrix (see Figure 4) outlines how, as the degree of complexity increases, so does the risk, and therefore, the need for greater governance, risk management and program controls to protect the broader enterprise also rises. Complexity is the key driver of risk Factors of complexity Time Risk as a function of complexity Team size Level of innovation and change Team maturity Team proximity Number of internal/external teams Capability maturity Degree of learning Rapid dependent materials Regulated requirements Environmental safety Security requirements Level of program governance required Complexity The increasing importance of IT programs for reaching strategic goals implies that the whole business is put at risk when IT programs fail to deliver expected business benefits. Insights on IT risk | September 2011 7 Key ingredients for effective IT PRM Using IT PRM to build additional lines of defense The poor historical performance of IT programs and the magnitude of the investments in IT can force organizations to take measures to enhance control and risk management over their strategic IT programs. A proven method of achieving this is to create multiple “lines of defense” against the threat of risk. Organizations are strengthening control by: 1. Appointing experienced risk managers and a risk committee to take charge of the management of end-to-end program risk — in addition to the traditional role that a project management office (PMO) undertakes to log and report project risks and issues. 2. Enhancing the role of internal audit, compliance and enterprise risk functions to provide assurance coverage where possible during the implementation of the program. 3. Appointing an external independent PRM provider who is charged with bringing experience not readily available inside the company or that other suppliers (e.g., system integrators) cannot provide due to conflicts of interest. In essence, an independent IT PRM approach functions as an additional line of defense for major IT program initiatives. Defenses include: • First line of defense — the most crucial layer of risk management on a program. It typically includes the executive leadership team, program steering committee, program risk committee, technical design authority, the PMO, system integrators (SIs) and the various project workstream leaders. 8 • Second line of defense — the independent IT PRM role. It can be provided by one independent (mostly external) party, or it can include a combination of internal and external providers such as: an independent (external) program risk/quality assurance provider, operational risk and compliance functions, external auditors and even software providers. • Third line of defense — typically includes the audit committee and internal audit function. Often seen as the last line of defense when it comes to detecting error and waste in organizational activities, these functions benefit from being able to rely on the outputs of a trusted independent party and brand. An independent IT PRM may even reduce the need for their oversight and control in program risk and assurance activities. Independent IT PRM often communicates the program and project delivery teams’ activities to executive management (e.g., main board) and the stakeholders who operate in the third line of defense, such as the board’s audit committee and internal audit function. The IT PRM function acts independently of the project delivery team (first line of defense). It often consists of those experienced with program risk for other companies, providing a “critical friend” to provide a fresh, independent perspective, and providing confidencebuilding assurance and review activities. The leader of the IT PRM function will typically also sit on the steering committee in an independent capacity to challenge and advise on program progress. Insights on IT risk | September 2011 Figure 5: Lines of defense Corporate First line Second line Third line Main board Audit committee Executive leadership Internal audit Portfolio risk committee Independent PRM Program Steering committees Technical design authority Project Program management ofÕce Project workstreams Internal audit reviews Key roles • Main board (“heartbeat”): Responsible for providing overall portfolio and program direction. Accountable for corporate-level risk management. • Executive leadership team: Provides program sponsorship, strategy and direction. Responsible for sign-off of scope; functional, technical and service solutions; and changes to spending. Also responsible for monitoring of program plan, budget, risks, issues and change requests. • Portfolio risk committee: Responsible and accountable for providing overall portfolio risk management oversight. Accountable for portfolio and program-level risk management. Seeks interventions to address any concerns across portfolio. • Audit committee: Assists the board by setting the agenda for and receiving reports related to the effectiveness of risk management on the project and the effectiveness of controls within key business processes. • Internal audit: Typically will have some responsibility for providing independent assurance to the audit committee on the effectiveness of internal controls within key business processes on change programs. • Steering committees: Responsible for ensuring strong buy-in for the solution and that all stakeholder groups are represented appropriately. Accountable for effective governance and planning, sign-off of quality deliverables and ensuring that the solution and business change meets business and user requirements. • Technical design authority: Responsible for technical review of solution and ensuring adherence to technical architecture principles of the organization. • Program management office: Provides day-to-day management controls over the project, including management of project plan, budget, risks and issues. Responsible for communicating effectively with governance groups, raising risks and issues and required sign-offs. • Independent PRM: Responsible for independently reviewing and advising on the effectiveness of risk management at the program level, including effectiveness of mitigation strategies for key program risks. • Project workstreams: Responsible for day-to-day project delivery and management of project risk. Insights on IT risk | September 2011 9 Building confidence in IT programs through Risk-based analysis, good information and deep perspective enable value delivery Figure 6: Ernst & Young IT Program Engaging the right IT PRM function is ultimately about building and sustaining the confidence of key stakeholders and having the right information at the right time to make well-informed decisions throughout your journey. Using a proprietary methodology, tools and templates to help embed an IT PRM function, companies are able to leverage our experience of major IT change earned working with the world’s largest companies. Sources of PRM Clear, concise reporting within an IT PRM framework process is essential. Key stakeholders need information and findings so they can make fact-based decisions to mitigate risks and/or improve program outcomes. To address this, and based on a risk-based analysis of the most common success criteria for IT programs, we created the IT Program Confidence Wheel — a reporting tool to demonstrate an independent view of IT program confidence and a point-in-time view of the key risks and issues that may affect a successful outcome. Outside the program: In the program: • Risk manager • Quality manager • PMO • Independent PRM • Risk committee • Internal auditors • External auditors • Compliance functions • Software vendors The IT Program Confidence Wheel contains seven confidence elements typically found on IT programs. A typical IT PRM assignment: • Starts with an assessment of program governance and project management, and proceeds with: • Solution integrity • Data integrity Immediate intervention required. High-risk area where the impact of not resolving the program is significant. • Business readiness • Support readiness • Ends with a post go-live assessment Close monitoring required. There is awareness of a material risk or issue, but appropriate remedial action is in place. Normal monitoring required. Risk or issue appears managed at an appropriate level. 10 Insights on IT risk | September 2011 IT PRM Confidence Wheel® Projec tm ana ge Comm m unic atio en ns ma t ce rnan e v go tion, m za reali y ra and egulator g n r g o r esi e and d P c s nd Õt lian ent a procResou ure rce me an nt d mg mt . (sco Plan pe, and tim cos e t) ] Program [ofÔ\]f[] Accept ance and cutover Business readiness Insights on IT risk | September 2011 t] gra L cu \ oa a te g to v] r a rity t] at va a) li\ a \ st T] in ss C t n\ Train and adopt r v] n o (D an tr ea tr n an a e l if or Test and validate (User) mi an l Cl] co n\ giz t] s] l] a n \ ct Strategiz e Opera t valida ional tion Stabiliz atio n Sust and us ainabilit er ad y opt ion Outc beneÕtsomes an reali d zat ion ma na ge m en t ma na ge me nt iz e ra al Strategize St p s ro d rt es ce ) i g n ss Org an cess and izational proign at c s o e n d trols e (Business) pt na ge m en t tegrity on in luti So d do d ri sk over nd cut ce a y, Business lian it mp ecur ter Recovery) s Co ing s Disa d clu and (In ity nu nti idate d val ) Co t an on Tes (Soluti an l y- pp ne ti o Integ rati on g te ra St n t i o ol i za t r an on po c up Org li d and (S va t) d or an p st u p Te (S ain Tr r Ea Su di si Quali ty a n al hnic e Tec tructur ras inf gy and dolo ent m tho Me evelop d gem ess ana ctiven e m effe c an ce rm nan nd rk a t rfo ver e ewo emen P go ram anag f ion ge m cis an De . ch lity g pabi or , ca proÕle y t xi ity ple ur m mat o C nd a ase ss c ine s Bu ents uirem Req d design an Post-go live ne p Be com t a D a 11 The path to achieving IT program confidence First, we focus on the maturity of program governance and project management (top two segments of IT Program Confidence Wheel). An objective assessment of these elements will help understand the maturity of the organizations current processes to deliver the program, taking into account the overall complexity of the program. The analysis provides the foundation for understanding the likelihood of a successful delivery of the program, and what issues may result if there are gaps in these two important program confidence areas. It is important to perform the initial assessment prior to the actual program kick-off to determine how ready the organization is to proceed with the initiative. By performing an initial “readiness to start” assessment, organizations increase the ability to correct any preplanning gaps and increase the ability to influence positive outcomes of the program. All elements of the IT Program Confidence Wheel are commonly assessed throughout the entire lifecycle of the program. Second, the quality of the deliverables of the program (remaining five segments) are assessed, on an interim basis, as they are delivered throughout the life cycle of the program. In the IT Program Confidence Wheel, there are a number of layers, with the initial activities (e.g., strategy) toward the center. Each layer typically represents a key activity and/or deliverable on an IT program at a point in time. By assessing the activities within each 12 segment and layer at a given stage gate (e.g., end of design, end of build) we can assess the overall risk profile of the key confidence segment and therefore the overall program at a given point in time. Our approach is simple and is based on the view that there is a path to achieving IT program confidence in each segment of the IT Program Confidence Wheel. For example, there is a path to achieving confidence in data integrity, which begins with having a robust strategy for data migration, then progresses to effective processes for “cleanse and collect,” “convert and migrate,” “testing and validation” and finishes with “load and cutover.” If all of these are achieving program KPIs and have been independently checked and verified to a high standard, then — subject to no material risks or issues — management can have confidence in a “go” decision on data integrity. By managing the risks within each segment, an organization can “bank” confidence in each critical element of the program and, over time, progress toward a more transparent and confident view of risk. This informs management before it makes important “go/ no go” decisions. As the program progresses towards go-live, the number of critical risks and major issues should be declining, and the program can narrow its concerns to the issues that are most likely to impact a successful go-live (i.e., potential showstoppers). IT PRM can play an important role in assessing the outstanding issues that may impact progression to the next stage or go-live and provide an independent perspective to management on the business impact of potentially reduced or accepting outstanding risks and issues. Insights on IT risk | September 2011 Projec tm ana ge m en ion sm t a nce erna gov , m zation reali y ra and egulator r gn og esi and Pr s d ce nd Õt lian ent a Comm unic at Quali ty a n ] t] gra Lo Business readiness a\ ]r a rity ta te g s T] Accept ance and cutover in t at] mi \ ]r nv tov ea tr Co n (D \ at va a) li\ or an tr Train and adopt ss cu an l Cl] co Test and validate (User) n n\ giz t] ra s] a ct n\ St l] Strategize Org an cess and izational proign controls des (Business) an Stabiliz atio n Opera t valida ional tion Strategiz e Sust and us ainabilit er ad y opt ion Post-go live Program conÔ\]nc] lia ity, B mp ecur ter Recovery) s Co ing s Disa d clu and (In uity n nti idate d val ) Co t an on Tes (Soluti a pt tegrity on in luti utover So and c siness u nce ents uirem Reqnd design a d pp e l if ne ti o na ge m en t ma na ge m en t procResou ure rce me an nt d mg mt . g te ra li d va t) d or an p st u p Te (S an l y- Su r Ea di si d ri sk ma na ge me nt (sco Plan p and e, tim cos e t) iz e a s lp rt des roce ) i g n ss at e do Integ rati on St n t i o ol i za t r an on po Org nd c (Sup a in Tra Key question: Is the financial and business data to drive business processes and effective management information and reporting tested, proven and ready? em ss nag vene ma ecti ce eff an ce rm nan d k an nt rfo ver e wor Pe go me gem fra ana ion ge m cis an De . ch lity g pabi le a or c roÕ y, xit ity p ple atur m m Co nd a case ess sin Bu al hnic e Tec tructur as infr gy and dolo ent m tho Me evelop d Figure 7: Achieving data integrity Outc beneÕtsomes an reali d zat ion ne p Be com Da ta Cleanse and collect 60% Convert and migrate 90% Test and validate 100% Load and cutover on \ata [mton]r r]kmdtk! Insights on IT risk | September 2011 º º º º º º º º 9[`i]ning hrogram CHAk Go Go 30% º Hrogram ]d]m]nt [onÕ\]n[] m]akmr] Third review: Hr] go%din] ktag] gat] r]ni]o Õnad nadi\ation º Strategy An\]h]n\]ntdq [`][c]\ an\ n]riÕ]\ Second review: Data [onn]rkion an\ nadi\ation r]ni]o 10% 9[`i]ning hrogram CHAk First review: Data migration ktrat]gq r]ni]o Hjg_jYe]d]e]fl[gfÕ\]f[]e]Ykmj] Proposed independent PRM activity Data integrity Go An\]h]n\]ntdq [`][c]\ an\ n]riÕ]\ 13 Method of providing independent PRM In order to establish a balanced view of independent PRM, we recommend a triangulated approach: 1. End-to-end advisory — Independent senior-level challenge, advice and mitigation strategies for key risk areas throughout the program life cycle. The extent of the role depends on the program’s risk profile and the level of assurance required by the organization. It can range from steering committee attendance to full independent verification and validation services. 2. Stage-gate reviews — Point-in-time “health check” performed at specific phases of a program and often conducted at key transition points between program phases. Typically used as an input to steering committee stage-gate decision-making and designed to inform management of major risks prior to making key go/no go decisions. For programs that are already in-flight (i.e., partially completed), an IT PRM role would typically start with a baseline stage-gate assessment that provides an overall assessment of a program’s health. 3. Targeted assessments — Drill-down reviews of common highrisk areas (e.g., third-party contracting, business change, test strategy, data migration). Outputs provide confidence to management that high-risk areas have been independently checked and verified to follow leading practices. Figure 8: Ernst & Young’s approach to developing an IT PRM framework Mobilization Triangulated approach Assess program risk and complepity proÕle Communicate and agree on program risks Program steering committee 14 Program risk committee Targeted assessments Develop and agree on PRM plan Example of PRM activities and reviews Program team End-to-end advisory Determine level of program assurance required What are they? Reporting Stage-gate reviews Executive management “helicopter sessions” End-to-end advisory Stage gate reviews Targeted assessments (drill-down reviews) Independent senior-level challenge and advice throughout the program. Role can be full-time or part-time depending on the risk profile of the program and level of end-to-end advisory required. Point-in-time health check on the progress and readiness of the program to move from one key program stage to the next. Informs management prior to making key go/no go decisions. Deep-dive reviews on areas commonly identified as high risk (e.g., third-party contracting; business change management; business and IT controls; design and execution; security and access; data migration and conversion; testing, design and execution; financial reporting readiness; and support model). Steering group attendance Ongoing program risk role Stage gate 1 — Design review Stage gate 2 — Build design Insights on IT risk | September 2011 Third-party contracting Project plan integrity Testing and data strategy Business and IT controls integrity a series of stage-gate reviews, targeted assessments and end-to-end advisory meetings throughout the program’s lifetime. The output of a program risk assessment is an independent IT PRM framework. Ultimately, management’s risk appetite will determine the level of program assurance required on any given program or project. A properly designed independent IT PRM framework (see Figure 9) provides management with the opportunity to implement An independent IT PRM framework should be flexible enough to suit most program implementation models (e.g., ASAP methodology via SAP or AIM methodology via Oracle). Figure 9: Example of an independent IT PRM framework Oracle ** SAP * DeÕ nition and analysis Preparation TA3 TA5 Final preparation Final preparation SG3 E2E TA2 TA4 Delivery SG2 E2E Transition Realization Design SG1 TA1 Build Requirements Startup and planning Generic program Design TA7 TA8 TA9 TA10 TA11 TA12 TA13 TA14 TA15 TA17 Go live and support Go-live and support SG4 E2E TA6 Production SG5 E2E TA16 TA18 E2E TA19 TA20 TA21 TA22 TA27 TA23 TA24 TA25 TA26 TA30 TA28 TA29 Stage-gate reviews (SG) SG1 — Planning stage or baseline review SG2 — Design-to-build stage review SG3 — Build-to-test stage review SG4 — Test to pre-go-live stage review (Pre-implementation) SG5 — Early-life support to steady-state stabilization End-to-end advisory role (E2E) E2E — Independent senior-level challenge and advice throughout the program. Regular update meetings with key project stakeholders and steering committee meetings. Possible Targeted Assessments (TA) TA1 — Program governance and fundamentals review TA2 — Risk profiling or assessment; program management approach and risk profiling TA3 — Third-party contractor management and sourcing review TA4 — Value and benefits realization design review TA5 — Business change strategy review TA6 — Business process and controls design review TA7 — Data strategy review TA8 – Security authorization and SOD design review TA9 — System change management and ITGC review TA10 — Test strategy review TA11 — RICEFs identification and scoping review TA12 — Organization or operating model design review TA13 — Global template “fit for purpose” review TA14 — Template fit gap analysis review TA15 — IT infrastructure and environments review TA16 — Data cleanse and collect review TA17 — Testing execution reviews (unit, assembly) TA18 — Business change management execution review TA19 — Testing execution reviews (integration, user, performance) TA20 — Business process and controls testing review TA21 — Data load and conversion and trial cutover review TA22 — Support and operational readiness review TA23 — Application security and SoD configuration review TA24 — Businesspreparedness reviews (business continuity and disaster recovery) TA25 — Key go-live issues review (business impact assessment) TA26 — Early-life support to stabilization review TA27 — Outcomes and benefits realization review TA28 — Post implementation operational controls validation reviews TA29 — Program lessons learned review TA30 — Next release and user adoption strategic review * SAP ASAP methodology **Oracle – AIM methodology, for example, can be used as required Insights on IT risk | September 2011 15 Questions to build program confidence The answers to key questions help build program confidence There are many questions about key confidence elements of large IT programs that must be answered in order to build and sustain confidence in the program’s ability to deliver. These questions are common to many large IT programs. In the absence of an independent analysis of program risk, management’s challenge is to determine how well it can trust the information that is being provided to it. The question asked increasingly by executives entrusted with IT programs is: who is checking and verifying that the information I am getting from the program team is complete, accurate and considers the key risk? Confidence element Key questions for IT programs Program governance Does the business case have integrity? How complex is the program and and is our organization capable of delivering? Are the right governance, change and decision-making processes in place, and are they performing effectively? Project management Are the right processes in place so the program is planned, managed and tracked effectively? Does our organization have the right resources and quality, risk and communication processes in place? Solution integrity Are the technology solution and its supporting infrastructure and interfaces tested, proven and ready? Data integrity Is the financial and business data to drive business processes and effective management information and reporting tested, proven and ready? Business readiness Are the new business operating models, processes and controls tested, approved and ready for deployment? Are the organization and its people trained and ready to use the new solution? Support readiness Are the support organization, processes and tools ready to support the new solution? Post go-live activities Are the activities to support post go-live and the sustainability and adoption of the solution in place and ready? IT PRM: high value at relatively low cost Investments in PRM are typically quite small compared to the overall program budgets and business revenues put at risk. In our experience, independent IT PRM roles should account for approximately 2% to 6% of the overall program budget. Although this may vary depending on the project’s risk profile, it is broadly in line with what we see in progressive organizations. While the costs are relatively low, the benefits of PRM are significant. These include: • Improved visibility and transparency of program risks and performance • Increased confidence in the integrity of business case and projected benefits • Enhanced management control of the program • Increased likelihood that the program will be delivered on time, on budget and with projected benefits 16 • Early identification of program-critical risks and issues • Practical services to address problems as they arise • More informed decision-making as a result of independent reporting • Access to independent professional advice on leading program practices • Potentially reduced or eliminated surprises Insights on IT risk | September 2011 Next steps The assessment, as discussed in this paper, is the start of a journey focused on improving risk management in major change programs and projects. The results of the assessment can highlight a number of necessary next steps, including: • Assistance in implementation of program risk management assessment for all key programs/projects for continuous monitoring • Improvement of the program risk management tools and enablers • Predictive analytics and root cause analysis and modeling of key relationships between key project factors • Analysis to highlight hidden issues, risk and identification of the root cause of issues such as a detailed program schedule analysis • Utilization of analytics simulations to predict program outcomes to undertake appropriate actions if necessary To help better understand next steps, the graphic below — what we call “the cube” — is a detailed framework and facilitator. The cube focuses on three primary dimensions: program governance, project management and technical solution. This framework is an extension of the IT Program Confidence Wheel (shown on page 11). The two are mutually complementary although the cube is primarily used for complex or critical organization program initiatives and facilitates a full life-cycle approach. Figure 10: Program Risk Management Cube Capability and Program governance BeneÕt realization and sustainability maturity Complexity proÕle Organizational change management Business case integrity Decision framework Scope management Jakckgjakkm]ka\]flaÕ]\l`Yl j]imaj]eYfY_]e]flYll]flagf Jakckgjakkm]ka\]flaÕ]\3 fgeYfY_]e]flYll]flagfj]imaj]\ Fgjakckgjakkm]ka\]flaÕ]\ Performance management Time management Human resource management BeneÕts, design and realization Compliance and regulatory Governance effectiveness Cost management Cutover and support Communications management Insights on IT risk | September 2011 Sustainability model Data management Risk management Processes, controls, and predictability Controls Security, BC and DR Integration management Project management Methodology and development Requirements, engineering and design Procurement management Quality management Technical infrastructure Testing and validation Technical solution Requirements development, quality and transition 17 Ernst & Young Assurance | Tax | Transactions | Advisory About Ernst & Young Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, our 141,000 people are united by our shared values and an unwavering commitment to quality. We make a difference by helping our people, our clients and our wider communities achieve their potential. Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. For more information about our organization, please visit www.ey.com About Ernst & Young’s Advisory Services The relationship between risk and performance improvement is an increasingly complex and central business challenge, with business performance directly connected to the recognition and effective management of risk. Whether your focus is on business transformation or sustaining achievement, having the right advisors on your side can make all the difference. Our 20,000 Advisory professionals form one of the broadest global advisory networks of any professional organization, delivering seasoned multidisciplinary teams that work with our clients to deliver a powerful and superior client experience. We use proven, integrated methodologies to help you achieve your strategic priorities and make improvements that are sustainable for the longer term. We understand that to achieve your potential as an organization you require services that respond to your specific issues, so we bring our broad sector experience and deep subject-matter knowledge to bear in a proactive and objective way. Above all, we are committed to measuring the gains and identifying where the strategy is delivering the value your business needs. It’s how Ernst & Young makes a difference. © 2011 EYGM Limited. All Rights Reserved. EYG no. AU0966 In line with Ernst & Young’s commitment to minimize its impact on the environment, this document has been printed on paper with a high recycled content. This publication contains information in summary form and is therefore intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. Neither EYGM Limited nor any other member of the global Ernst & Young organization can accept any responsibility for loss occasioned to any person acting or refraining from action as a result of any material in this publication. On any specific matter, reference should be made to the appropriate advisor. The opinions of third parties set out in this publication are not necessarily the opinions of the global Ernst & Young organization or its member firms. Moreover, they should be viewed in the context of the time they were expressed. IT Risk Management at Ernst & Young At Ernst & Young, our services focus on our individual clients’ specific business needs and issues because we recognize that each is unique to that business. IT is a key to allowing modern organizations to compete. It offers the opportunity to become closer to customers and more focused and faster in responses, and can redefine both the effectiveness and efficiency of operations. But as opportunity grows, so does risk. Effective IT Risk Management helps you to improve the competitive advantage of your IT operations, by making these operations more cost efficient and managing down the risks related to running your systems. Our 6,000 IT Risk professionals draw on extensive personal experience to give you fresh perspectives and open, objective advice — wherever you are in the world. We work with you to develop an integrated, holistic approach to your IT risk or to deal with a specific risk and information security issue. We understand that to achieve your potential you need tailored services as much as consistent methodologies. We work to give you the benefit of our broad sector experience, our deep subject-matter knowledge and the latest insights from our work worldwide. It’s how Ernst & Young makes a difference. For more information on how we can make a difference in your organization, contact your local Ernst & Young professional or a member of our team listed below. Contacts Global Norman Lonergan (Advisory Services Leader, London) +44 20 7980 0596 [email protected] Paul van Kessel (IT Risk and Assurance Services Leader, Amsterdam) +31 88 40 71271 [email protected] Robert Patton (Americas Leader, Atlanta) +1 404 817 5579 [email protected] Andrew Embury (Europe, Middle East, India and Africa Leader, London) +44 20 7951 1802 [email protected] Doug Simpson (Asia-Pacific Leader, Sydney) +61 2 9248 4923 [email protected] Naoki Matsumura (Japan Leader, Tokyo) +81 3 3503 1100 [email protected] Bernie Wedge (Americas Leader, Atlanta) +1 404 817 5120 [email protected] Manuel Giralt Herrero (Europe, Middle East, India and Africa Leader, Madrid) +34 91572747 [email protected] Troy Kelly (Asia Pacific Leader, Hong Kong) +85 2 2629 3238 [email protected] Giovanni Stagno (Japan Leader, Chiyoda-ku) +81 3 3506 2411 [email protected] Advisory Services IT Risk and Assurance Services