Skip to main content

ITSM Work Sessions: Lessons Learned

Over the last few years I have facilitated several Information Technology Service Management (ITSM) work sessions within the oil and gas and utility industries. The challenge was to build consensus through identifying what is important, making recommendations and decisions, and establish direction that would enable the IT organization to improve processes and services offered to their customers. This article briefly outlines a number of lessons learned that came from our experiences.

An ITSM Work Session should provide the foundation for your organization to create the blueprint to propel IT services and business value forward. In establishing an ITSM initiative the following key groups must be involved:

Strategic: CIO and Directors to establish strategic intent, vision and enterprise objectives

Tactical: Directors and Managers to establish improvement objectives, priorities and program charter

Operational: Managers and Key Stake-holders to establish solution, roadmap, business case and project charters.

Fundamental to any ITSM session, when engaging these groups, is to develop a clear problem definition, defined and approved by the executives or senior steering committee. This is an area in which IT often falls short. The lack of a clear problem definition negatively impacts the tactical and operational levels of the organization, and limits the ability to move forward.

When working with your teams, build an understanding of all the work that is taking place in the IT department right now, and how it fits within the ITSM support and delivery relationship models. Discussion, training and clarity will be required to ensure your people understand the ITSM relationship and delivery model. By engaging people in a defined work exercise, your teams can map out and see how their work aligns with your ITSM program requirements. This is effective in establishing leadership and team buy-in.

Establish a clear understanding of your points of pain (PoPs) and the IT maturity. PoPs can be established through focused brainstorming sessions. Once collected, your PoPs should be looked at from an organizational and process maturity perspective. This is often missed, as IT has a habit of looking only at processes and tools to solve problems. Align your PoPs with the industry maturity model standards (non-existence, chaos, reactive, proactive, service, value). It is important that the content be translated into a service management maturity grid and aligned with the Information Technology Infrastructure Library (ITIL) process categories. Work to obtain various IT teams, customers and business representatives’ perspective on the ITSM organizational and process maturity levels. This builds some reality into the PoPs and maturity levels thinking by dislodging IT from a position of working in isolation.

Build a business case and program plan that can be activated by your people. At this point you are seeking clear recommendations and improvement objectives (what), benefit realization (why), tactical needs (how) and time frame (when) for which to move your organization forward with your ITSM program. This is the foundation for your ITSM program business case and charter that will be divided into project and operational requirements. You will need a solid approved business case and charter to enable you to navigate the challenges that will unfold on your journey and to clearly articulate the streams of work to be completed. There needs to be an executive team or steering committee assigned to provide clear strategic guidance. When forming and using a steering committee, their mandate must be strategic and clear. Tactical, task-based reporting can be left to the project management teams and their need for task-based results and status meetings.

Recognize that ITSM is not an IT tool solution. From a business perspective, IT needs to stop chasing tool solutions, and “flavor-of-the-month quick fixes.” Ultimately, the ITSM program is a business organizational change program that seeks to align IT with the business objectives and requirements, improve processes and change culture in an effort to control or decrease costs, increase productivity and contribute to the bottom-line. ITSM programs need to be effectively operationalized. Therefore change management and communication must be at the forefront.

Work with your teams to have them answer “WIIFM” and “WIIFT” questions (what is in it for me and what is in it for them). Ensure you established the fears, uncertainties and doubts (FUDs). Be prepared to have a long FUDs list. These will need to be acknowledged and managed within the context of the ITSM program and the change management and communications plan. Use your teams and people to establish a communication plan that takes into consideration your target audience and communication needs. Every organization has an approach to communications that may or may not align with their corporate culture. Prepare a clear communications strategy and follow it.

The information in this article is based on feedback obtained during facilitated ITSM work sessions and the work of dedicated IT professionals. Efforts focused on consideration for the strategic, tactical and operational requirements. Ultimately the goal was to improve IT. It can be done. Good luck.

Richard Lannon and BraveWorld Inc. ©2007


Richard Lannon is an international business and technology industry veteran turned corporate speaker, facilitator, trainer and advisor. He specializes in aligning the enterprise and technical skills to common business objectives. Richard helps organizations and professionals identify what’s important, establish direction and build skills that positively impact their bottom line. He provides the blueprint for your organization to be SET (Structured, Engaged and Trained). His clients call him the SETability Expert. He can be reached at [email protected] or 403-630-2808.

Congratulations and Condemnation!

Congratulations to John Dean for his analysis of what to do with a nearly infinite list of specific identity transactions (see March 2nd blog for the list, and John’s April blog for his ideas). 

Improve on it if you can, but I like his idea of grouping identity transactions by the “certainty” required, and using known technologies (Human Chip Insertion, Fingerprints, DNA, Retina prints, id cards) to “produce” the needed certainty.  Each “identifier” stakeholder can simply select the level of certainty they require from such a system.  This is a huge simplification, and seems to be a doable analysis.  There is evidence for the accuracy of many tests, AND we will have to consider the usual 4-D time/space complications (DNA is reliable, and is easy to plant at a crime scene).

Condemnation upon John for his focus on the “identifier” stakeholder, instead of “we the identified”, who live on the other side of such transactions (mostly). 

Leaving out the identified in these analyses is (increasingly) the cause of problems like identity theft, loss of privacy, deprivation of due process (sure, you can fix your erroneous credit record – have fun with your new full-time hobby), erosion of civil rights, and much, much more (the teen suicide who was berated on-line by the adult mother of another teen?).

Leaving us out of the requirements gives John access to a seemingly EASY solution – “chip insertion”.  The risk of crooks “stealing” someone else’s chip for illegal purposes can be dealt with by rigging the chips to self-destruct if removed or fiddled with.  I leave the problem of “counterfeit” chips for a later discussion (solution, as usual, is premature,so nyah, nyah, nyah, Mr. Dean).

This kind of solution is especially tempting for management, in spite of being clearly odious to the “workers. 

The day is coming where, if you are a convicted drug user, or a crummy boyfriend, or a whistleblower, or just a cranky person, people will be able to single you out electronically – even treat you the way we treat convicted pedophiles, just by accessing your history based on your chip id. 

Convicted pedophiles and other sexual criminals already know what this is like – no chance to really start over, always labeled.  The process created by the “identifiers” is great for labeling one for life; not so great for allowing for change and forgiveness. 

The current system protects the interests of the “identifier” stakeholders (John, language is important – can we just call them fascists?).  It assumes recidivism, and does not measure rehabilitation.  Remember – Civil Liberties are not just for people that you like.

One can claim that measuring rehabilitation is a different problem from identification.  Unlike John Dean, my perceptive readers immediately realize that if we can’t measure rehabilitation, then crime, or any “unapproved behavior” becomes a life sentence in the system John advocates.  Do you really want the letter L tattooed on your forehead for life, just because you once littered?

We’ll deal with such “identifier” requirements next time.  In the meantime, as a proof of concept for John’s analysis approach, would you agree with the following estimates of how much certainty is currently required for the following identity transactions?.

Amount of certitude required to identify:

  1. A terrorist = 0.1% (if we harass 1,000 people to actually catch one terrorist, we are satisfied – witness Guantanamo).
  2. Oneself for a driver’s license = 10% (or commerce will shut down – i.e., it is easy to fake the id required)
  3. Oneself to buy coffee and donuts = 95.0% (5% of transactions are “fraudulent”?)
  4. A death penalty convict = 70% (30% of death row inmates may not belong there, the states’ “management” are not investigating their own mistakes, of course). 
  5. A safe sex partner (varies by individual from 99.5% for those who want to witness your HIV test in person, no cheating, to 0% for Larry Craig, Senator from Idaho, who would prefer to know nothing about anyone next to him in a bathroom stall).

I finish with an important success point – small teams.  I want to make the point that our two person “team” (John Dean and myself) is (so far) enormously productive.

In perhaps 20 total person hours of actual focused, asynchronous but responsive work, we have enough grip on the scope to already despair of the sheer scope of the problem – this is good progress!

Next month (unless John tees me off again) we will contrast John’s “certainty” requirements with the requirements that “we the identified” might want to add.

Stay tuned – if we get the requirements right, it may only take one generation to finish this, and none to soon!

Staying Power

CIO Survey Reveals Most Effective Retention Methods

In the information technology (IT) industry, money talks, but it’s not the only employee-loyalty tool, a new survey shows. When chief information officers (CIOs) were asked to identify the most effective ways to keep IT staff, compensation (27 per cent) topped the list. Providing flexible schedules was close behind, cited by 21 per cent of respondents; another 17 per cent said opportunities for professional development helped to improve retention rates.

The survey was developed by Robert Half Technology, a leading provider of information technology professionals. It was conducted by an independent research firm and is based on telephone interviews with 270 CIOs across Canada.

CIOs were asked, “Which of the following elements have you found most effective at improving IT staff retention?”

Increased compensation…………………………. 27%
Offering flexible schedules………………………. 21%
Professional development or training……… 17%
Telecommuting………………………………………….. 7%
Extra vacation days or time off……………………. 4%
Granting company stock or options…………… 3%
None………………………………………………………….. 1%
Don’t know/other……………………………………… 20%
TOTAL……………………………………………………. 100%

Attractive compensation is a key component of an effective retention program as it shows employees their contributions are valued. A corporate culture that includes work/life balance and training options is also highly valued by IT professionals and is crucial for retaining top performers in a competitive hiring environment.

Effective Retention Programs would include the following components to improve staff retention rates:

Pay competitively. Periodically benchmark employee compensation against industry-standard ranges to ensure your salaries are keeping pace. Robert Half Technology produces an annual Salary Guide with salary ranges for more than 60 IT positions.

Support work/life balance. To prevent teams from burning out, ensure that workloads are realistic. Encourage employees to ask for help when they need it, and consider bringing in project professionals to help during peak periods.

Offer and promote training. Provide IT staff access to the courses and certification programs they need to grow their careers. Make sure employees are aware of professional development opportunities.


Sandra Lavoy

is a vice-president with Robert Half Technology, a leading provider of IT professionals on a project and full-time basis. Robert Half Technology has more than 100 locations in North America, South America, Europe and the Asia-Pacific region, and offers online job search services at www.rht.com. For more information, please call 1-800-793-5533.

Ten Tips for Writing Effective E-mail Messages

  1. Plan the message before you write it. Before writing, ask yourself, “Why am I writing this – what do I want my reader to know and/or do?” When you have the answer, state it at the beginning of your message – this is your main point. 

  1. Organize the information in your message to support the main point. Delete any unnecessary information. Use short paragraphs and bullet points for lists – these make the message easier to read on a screen. 
  2. Identify the right recipients. Don’t send the message to people who don’t need the information. 
  3. Check the content of the message. Make sure there is nothing confidential, personal, inappropriate, or offensive. 
  4. Check the tone of the message. Make sure it doesn’t sound angry, rude, or abrupt. 
  5. Choose the appropriate salutation and closing. Depending on the audience, salutations and closings can be formal, informal, or casual. 
  6. Proofread the message. Fix any grammar, punctuation, and spelling errors. 
  7. Craft a compelling subject line that will tell the reader exactly what the message is about and allow the reader to file and find the message easily later on. 
  8. Make sure attachments are attached. It’s usually best to include attachments as PDFs. 
  9. Include a signature with your contact information. Be sure to include your name, company name, and phone number.

© Copyright 2008 Write It Well


Natasha Terk,

President of Write It Well (www.writeitwell.com), works with a team of skilled instructional designers and trainers to develop and deliver customized on-site and online training solutions about written communications.

Getting Back To Basics

Second Fundamental: Creating a Common Vocabulary

Right now, there is more information available than ever before about business analysis.

As someone who has dedicated his career to this essential discipline, I find this fact both exciting and a little frightening. On one hand, it demonstrates that business leaders have embraced business analysis as a key element to success. However, on the other hand, I worry that such a mountain of information, opinions and tools may simply be too overwhelming for those looking to bring business analysis to their organization.

That’s why in April I began what will be a series of five articles covering how to cut through the vastness of information and get back to the very basics of effective business analysis. In my first article in the series, I discussed the importance of understanding overall business goals. The next step is developing a common vocabulary to be shared by your entire team.

A Glossary of Terms

At the very beginning of a project, it is absolutely essential that you and your team develop a glossary of terms, which is a type of requirement model that lists in alphabetical order the terms, definitions and aliases that may be required to support the development of your solution. The document will ultimately be the foundation from which all of your requirements are developed.

As obvious a suggestion as this might seem to be, I would estimate – and it’s a generous estimation, mind you – that only about 10 percent of organizations today actually take the time up front to create a glossary of terms.

What is the difference between a client, a user and a customer? What is an executive sponsor? Are sponsors and stakeholders the same? What is the difference between business requirements, user requirements and specifications? And, what about all of those acronyms that we only vaguely understand? What do those mean? These questions and many others should be discussed and agreed upon and then documented in your glossary of terms.

The easiest way to do this is through brainstorming sessions with key personnel. Once everyone is in the same room – either real or virtual – the group should work together to hammer out as many essential terms as possible. In order to build consensus on definitions, the facilitators of these brainstorming sessions should use voting techniques in lieu of all-out dictatorship.

Avoid Confusion Today . . . And Tomorrow

With tight deadlines and demanding stakeholders always a concern, it’s tempting to bypass the busy work of developing a glossary and assume everyone is on the same page.  I can tell you from firsthand experience this type of shortsightedness will do nothing but hurt you – both today and tomorrow.

It’s a simple fact: words and phrases mean different things to different people  -especially when we enter the always-dicey realm of corporate jargon. If terms aren’t understood from the get go, misunderstandings of expectations, wants and deliverables are inevitable, and they could lead to conflicts throughout the life of a project. A comprehensive, well-put-together glossary will save you valuable time and energy, allowing you to focus your efforts not on simply communicating but on developing the most effective solution.

Create a Living Document and Share It

Technology has been wonderful for businesspeople – and not just because it allows us to secretly watch hockey highlights from our desks.  Technology today has made it easier than ever to create, share and store information. A glossary of terms is no longer a bunch of pages that you bind together and then stick somewhere on your bookshelf.  You should always think of a glossary of terms as a living document that has the power to evolve and grow along with projects, programs and organizations.

Even after a project has been long completed and celebrated, its glossary of terms is still valuable and should still be maintained because it can be used as a baseline for future projects.  Aside from some unique particulars, the terms and acronyms will be applicable to teams throughout your organization.

And, this brings me to the sharing of information. If your organization has an Intranet site or one shared location for information, glossaries of terms should be housed there and made available to everyone. Glossaries are excellent tools for educating new employees and saving them from having to smile and nod at all of your confusing acronyms for their first six months on the job.  Knowledge sharing is an easy, efficient way to help increase another kind of sharing – profit sharing.

Next Time: Requirements Sources

Next time, for my third article in this five-part series, I’ll cover how to determine the sources from which you will extract your requirements.  In the meantime, I’ll allow you to document your own definitions for extract and requirements.

This is the second in a five part series of articles by Glenn Brûlé.


Glenn R. Brûlé

has more than 18 years experience in many facets of business, including project management, business analysis, software design and facilitation. At ESI (www.esi-intl.com), he is responsible for supporting a global team of business consultants working with Fortune 1000 organizations. As the Director at Large for the International Institute of Business Analysis (IIBA), Brûlé’s primary responsibility is to form local chapters of the IIBA around the world by working with volunteers from organizations across various industries, including financial services, manufacturing, pharmaceutical, insurance and automotive, as well as government agencies.