- Table View
- List View
IT Governance Simultaneously Empowers and Controls
by Jeanne W. Ross Peter WeillEffective IT governance is the single most important predictor of the value an organization generates from IT. This chapter provides an overview of IT governance and a framework for linking it to corporate governance that will enable organizations to deliver superior results on their IT investments. This chapter was originally published as chapter 1 of "IT Governance: How Top Performers Manage IT Decision Rights for Superior Results."
IT Governance and Information Security: Guides, Standards, and Frameworks (Advances in Cybersecurity Management)
by Yassine Maleh Mamoun Alazab Abdelkebir Sahid Mustapha BelaissaouiIT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms exposes organizations to ever-growing risks. Understanding the threats, assessing the risks, adapting the organization, selecting and implementing the appropriate controls, and implementing a management system are the activities required to establish proactive security governance that will provide management and customers the assurance of an effective mechanism to manage risks. IT Governance and Information Security: Guides, Standards, and Frameworks is a fundamental resource to discover IT governance and information security. This book focuses on the guides, standards, and maturity frameworks for adopting an efficient IT governance and information security strategy in the organization. It describes numerous case studies from an international perspective and brings together industry standards and research from scientific databases. In this way, this book clearly illustrates the issues, problems, and trends related to the topic while promoting the international perspectives of readers. This book offers comprehensive coverage of the essential topics, including: IT governance guides and practices; IT service management as a key pillar for IT governance; Cloud computing as a key pillar for Agile IT governance; Information security governance and maturity frameworks. In this new book, the authors share their experience to help you navigate today’s dangerous information security terrain and take proactive steps to measure your company’s IT governance and information security maturity and prepare your organization to survive, thrive, and keep your data safe. It aspires to provide a relevant reference for executive managers, CISOs, cybersecurity professionals, engineers, and researchers interested in exploring and implementing efficient IT governance and information security strategies.
IT Governance in Hospitals and Health Systems (HIMSS Book Series)
by Roger KropfWithout a governance structure, IT at many hospitals and healthcare systems is a haphazard endeavor that typically results in late, over-budget projects and, ultimately, disparate systems. IT Governance in Hospitals and Health Systems offers a practical "how to" in creating an information technology governance process that ensures the IT projects supporting a hospital or health systems' strategy are completed on-time and on-budget. The authors define and describe IT governance as it is currently practiced in leading healthcare organizations, providing step-by-step guidance of the process to readers can replicate these best practices at their own hospital or health system. The book provides an overview of what IT governance is and why it is important to healthcare organizations. In addition, the book examines keys to IT governance success, as well as common mistakes to avoid; governance processes, workflows and project management; and the important roles that staff, a board of directors and committees play. Special features in the book include case studies from hospitals and health systems that have successfully developed an effective IT governance structure for their organization.
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002 (It Governance Ser.)
by Alan Calder Steve WatkinsFaced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes and across industries, and deals with the strategic and operational aspects of information security. Now in its seventh edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their information security management systems (ISMS) and protect themselves against cyber threats. The new edition covers changes in global regulation, particularly GDPR, and updates to standards in the ISO/IEC 27000 family, BS 7799-3:2017 (information security risk management) and the latest standards on auditing. It also includes advice on the development and implementation of an ISMS that will meet the ISO 27001 specification and how sector-specific standards can and should be factored in. With information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, IT Governance is the definitive guide to implementing an effective information security management and governance system.
IT Investment: Making a Business Case (Computer Weekly Professional Ser.)
by Dan Remenyi Michael Sherwood-SmithFrequently not enough attention is given to producing a comprehensive business case or to producing an economic justification for an information systems investment. In fact many organizations are not clear as to what constitutes a sound business case and how to go about producing one. This Professional level book for the Computer Weekly Professional Series will show how to go about justification for I.T. spend. This book is designed for all those who are involved in the decision to invest in information systems. This book is especially relevant to senior business executives, senior financial managers and IT executives. Business consultants, computer and corporate advisors will also find the ideas and material addressed in this text of particular benefit as will anyone involved in corporate and strategic planning.In addition, senior students such as those working towards their MBAs will find this book of use.A business case is a statement or a series of statements that demonstrate the economic value of a particular intervention, a course of action or a specific investment. A business case is not simply a financial forecast of the hardware and software costs and the expected benefits. A business case for an information systems investment involves a comprehensive understanding of both the likely resources as well as the business drivers which will assist business managers improve their performance and thereby obtain a stream of benefits from the investment.In general there are approximately six steps in producing a business case for an information systems investment.1. Determine the high-level business outcomes that will be clearly and comprehensively expressed as a set of opportunities the organization can take advantage of, or problems that need to be rectified.2. Identify the corporate critical success factors that will be supported or enhanced by the operation of the completed information systems project or investment.3. Create a list of specific and detailed outcomes or benefits, their appropriate metrics, measuring methods and responsibility points that are represented by the stakeholders.4. Quantify the contribution made by the outcomes, which requires associating numbers or benefit values with outcomes where this is possible.5. Highlight the risks associated with the project.Fundamental to this new approach to developing a business case for information systems investment is the fact that it incorporates much more than the financial numbers which are typically found in the standard approach to a feasibility study. This approach looks behind the financial numbers to the improvements in business performance which are facilitated by information systems and which are the real drivers of the benefits. Furthermore, this approach to developing a business case allows the organization to manage the process so that the required results are achieved.
IT Leadership Manual: Roadmap to Becoming a Trusted Business Partner (Wiley CIO #577)
by Alan R. GuibordSavvy advice for developing the necessary skills to become a vital part of any management team Today's IT leaders are faced with an unprecedented leadership and organizational challenge. The entire landscape has changed over the past few years and it is now time for leaders and organizations to re-invent themselves to meet the new order. IT leaders need to redefine their role into one of being a trusted business advisor. IT Leadership Manual provides you with a set of specific recommendations and suggestions to assist you in your self-evaluations and to develop a personal plan for the future. It helps you build the leader in you, as well as how to become a formidable competitor in your own right. Essential coverage of one of the most demanded IT topics Helps you redefine your role from IT leader into trusted business advisor Discusses leadership style, building out your network, achieving balance, the art of sales, and more Written for IT managers and executives Helps you transform from the backroom support service to a recognized member of the leadership team Gives you the tools to migrate to today's expectations; Innovation, collaboration, influencer, trusted advisor Traditional skills no longer apply. Organizations are now demanding a new set of expectations from IT leaders. IT Leadership Manual reveals how you can adopt new styles to make the transformation from IT manager to top management.
IT Maintenance: Applied Project Management
by Michael F. Malinoski PMPIT Maintenance: Applied Project Management modifies project management best practices to improve how IT system maintenance is managed. By taking a fresh look at increasing value and quality of system maintenance in a straightforward and practical way, this book helps readers understand how to apply modified project management best practices. From IT maintenance managers, project managers, and team members to CIOs, readers will: • Discover cost savings associated with reducing staff Improve reporting status and metrics •Build greater customer satisfaction Learn how to perform work consistently • Decrease staff stress level by stabilizing expectations •Streamline team operations •Decrease the manager's ongoing workload PLUS! This practical reference is organized by process groups similar to the PMBOK® — providing you with applied step-by-step guidance.
IT Management in the Digital Age: A Roadmap For The It Department Of The Future (Management for Professionals)
by Nils Urbach Frederik AhlemannThis book examines the massive changes currently taking place in the business world and commonly known under the label “digitalization.” In addition, it describes the significant impacts of technological innovations on processes, products, services and business models. The digital transformation resulting from these developments leads to disruption for many enterprises and industries. While for many years, IT departments mainly concentrated on fulfilling the requirements of business departments effectively and efficiently by means of high-quality IT services and operations, today’s IT departments are increasingly expected to actively co-design and co-create the enterprise. This book describes how information technology enables innovation for businesses, and how IT departments can proactively and in a timely manner collaborate with the business departments of their corporation to leverage these innovations. It also delineates the implications of digitalization for the structures, processes and people in today’s IT departments. IT leaders and managers who are responsible for corporate IT, as well as practice-oriented researchers, will find valuable inspirations and guidance in this book, the central mission of which is to encourage and enable a more proactive role for IT in the digital transformation processes."This book demonstrates the impact of digital transformation on IT organizations and their management. It also presents potential risks for technology availability, security and data protection. The authors develop a vision of what IT management should look like in ten years if it is to continue playing an important role in the company. The book seeks to motivate IT executives and managers with IT responsibility to actively adapt their thinking and their IT organizations before they are forced to react to external pressure. Definitely worth reading!" Sven Kreimendahl, Director Business Technology Services, Campana & Schott
IT Management: The art of managing IT based on a solid framework leveraging the company´s political ecosystem
by Lionel Pilorget Thomas SchellThis book focuses on the art of managing IT. A simple and robust framework is proposed to describe and to structure the essential elements of IT management. The authors pay particular attention to didactic aspects in order to facilitate the retention of models presented as well as to promote reflection on the subjects introduced. Thanks to a concentrate of good practices, each company will rapidly be in a position to build their proper IT ecosystem.
IT Outsourcing Contracts: A Legal and Practical Guide
by Jimmy DesaiThis book provides an overview of the IT outsourcing relationshipand life cycle. The process begins with an organizationconsidering whether or not IT outsourcing would be of benefit andthen the issues which would need to be considered in order toanswer this question accurately are discussed. If an organizationbelieves that an IT outsourcing deal could be of benefit, it willthen need to choose a suitable supplier to perform its IToutsourcing. The issues to consider regarding an IT supplier arealso set out in this book. Having selected an IT supplier, anorganization will then need to agree key terms (includingidentifying and agreeing any contentious issues which are so-called deal breakers). Agreeing the IT outsourcing contract isnot the end but the start of the IT outsourcing relationship andthis relationship will need to be managed and developed over thecourse of the contract. Sooner or later the IT outsourcingarrangement will have to come to an end and so an exit plan willneed to be formulated and implemented. This life cycle needs tobe fully understood by anyone involved in this kind of IToutsourcing transaction and this book provides useful informationabout this life cycle.
IT Performance Management
by Peter Wiggers Maritha de Boer-de Wit Henk KokIT Performance Management addresses the way organizations should balance the demand and the supply of information technology, optimizing the cost and maximizing the business value of IT.In this book several aspects of IT performance management are described. The way this management is executed and the techniques, which should be used, depend on the maturity of the relationship between the IT function and the lines of business of an organization. The foundation of the authors' approach is based on the flow of money and related management objectives. However, performance management is primarily based on perceptions. Therefore, this book introduces the IT value perception model. This model describes four separate levels of perception for the business value of IT. If the demand and the supply of IT do not share the same perception level, the balance is lost, which will lead to friction and inefficiency within an organization. This book is not about what is good or what is bad, but rather is about the 'what', the 'why' and to a limited extent the 'how' of managing the performance of IT. Therefore, the book finishes with a 'back-to-business' section in which a self-assessment checklist, a potential growth path and ten next steps are provided. This enables the reader to start applying this book in his every day working environment immediately. IT Performance Management: * Provides an overview of best practices and available thinking on the subject of IT cost and value* Describes the subject of IT cost and value related to management issues on IT strategy, portfolio management, service management, architecture and sourcing * Addresses differing degrees of maturity between IT and the business, illustrated by case studies
IT Priorities: Prioritizing Among a Portfolio of Projects
by Robert D. Austin Richard L. Nolan Shannon O'Donnell"The Adventures of an IT Leader" invites readers to "walk in the shoes" of Jim Barton, the new CIO of the fictional IVK Corporation, as he spends a difficult year learning effective information technology leadership, sidestepping the pitfalls that make the CIO job the most volatile, high-turnover job in the business. Barton is asked to assess IT's current approach to resource allocation and propose improvements to increase return on investment. In IT, this means understanding and improving processes for figuring out which projects deserve investment. This chapter follows Barton as he considers the worthiness of a project to improve data security--and encounters unforeseen challenges along the way. This chapter is excerpted from "The Adventures of an IT Leader."
IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value
by Sanjiv PurbaProject or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it’s been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project’s outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.
IT Project Management: A Geek's Guide to Leadership (Best Practices in Portfolio, Program, and Project Management)
by Byron A. LoveThis book’s author, Byron Love, admits proudly to being an IT geek. However, he had found that being an IT geek was limiting his career path and his effectiveness. During a career of more than 31 years, he has made the transition from geek to geek leader. He hopes this book helps other geeks do the same. This book addresses leadership issues in the IT industry to help IT practitioners lead from the lowest level. Unlike other leadership books that provide a one-size-fits-all approach to leadership, this book focuses on the unique challenges that IT practitioners face. IT project managers may manage processes and technologies, but people must be led. The IT industry attracts people who think in logical ways—analytical types who have a propensity to place more emphasis on tasks and technology than on people. This has led to leadership challenges such as poor communication, poor relationship management, and poor stakeholder engagement. Critical IT projects and programs have failed because IT leaders neglect the people component of "people, process, and technology." Communications skills are key to leadership. This book features an in-depth discussion of the communications cycle and emotional intelligence, providing geek leaders with tools to improve their understanding of others and to help others understand them. To transform a geek into a geek leader, this book also discusses: Self-leadership skills so geek leaders know how to lead others by leading themselves first Followership and how to cultivate it among team members How a geek leader’s ability to navigate disparate social styles leads to greater credibility and influence Integrating leadership into project management processes The book concludes with a case study to show how to put leadership principles and practices into action and how an IT geek can transform into an effective IT geek leader.
IT Quality Management
by Wolfgang W. OsterhageIn a comprehensive approach this book covers the end-to-end process from request management to change management, error management and migration management to acceptance testing and final data clean up. It is based upon nearly twenty years of experience in tests, acceptance and certification, when introducing medium to large IT systems including complex software for administrations and industry in many countries. There exist a variety of methodologies with different characteristics having emanated from various schools and consultancies to support such activities. However, it is obvious that because of the diversity in organisational levels in companies the rigor of application of such methodologies quite often suffers with regard to more pragmatic approaches. In view of economic considerations this may be unavoidable. For this reason no new or consolidated methodology shall be presented but an approach oriented on practical criteria coming closer to reality and offering methods, which can provide assistance on a case-by-case basis.
IT Release Management: A Hands-on Guide
by Dave HowardWhen implemented correctly, release management can help ensure that quality is integrated throughout the development, implementation, and delivery of services, applications, and infrastructure. This holistic, total cost of ownership approach allows for higher levels of system availability, is more cost effective to maintain, and increases overall s
IT Savvy
by Jeanne W. Ross Peter WeillDigitization of business interactions and processes is advancing full bore. But in many organizations, returns from IT investments are flatlining, even as technology spending has skyrocketed.These challenges call for new levels of IT savvy: the ability of all managers-IT or non-IT-to transform their company's technology assets into operational efficiencies that boost margins. Companies with IT-savvy managers are 20 percent more profitable than their competitors.In IT Savvy, Peter Weill and Jeanne Ross-two of the world's foremost authorities on using IT in business-explain how non-IT executives can acquire this savvy. Concise and practical, the book describes the practices, competencies, and leadership skills non-IT managers need to succeed in the digital economy. You'll discover how to:-Define your firm's operating model-how IT can help you do business-Revamp your IT funding model to support your operating model-Build a digitized platform of business processes, IT systems, and data to execute on the model-Determine IT decision rights-Extract more business value from your IT assetsPacked with examples and based on research into eighteen hundred organizations in more than sixty countries, IT Savvy is required reading for non-IT managers seeking to push their company's performance to new heights.
IT Security Controls: A Guide to Corporate Standards and Frameworks
by Virgilio Viegas Oben KuyucuUse this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure.The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.). To connect the book with the real world, a number of well-known case studies are featured to explain what went wrong with the biggest hacks of the decade, and which controls should have been in place to prevent them. The book also describes a set of well-known security tools available to support you.What You Will LearnUnderstand corporate IT security controls, including governance, policies, procedures, and security awarenessKnow cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scansUnderstand technical IT security controls for unmanaged and managed devices, and perimeter controlsImplement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and more Who This Book Is For IT security managers, chief information security officers, information security practitioners, and IT auditors will use the book as a reference and support guide to conduct gap analyses and audits of their organizations’ IT security controls implementations.
IT Security Management
by Alberto Partida Diego AndinaIT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers". They will add value to the business, improving the information security stance of organisations.
IT Security Risk Control Management
by Raymond PomponInformation security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security Risk Control Management provides step-by-step guidance for IT professionals on how to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes. What You Will Learn: Build a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constantly changing threats Prepare for and pass such common audits as PCI-DSS, SSAE-16, and ISO 27001 Calibrate the scope, and customize security controls to fit into an organization's culture Implement the most challenging processes, pointing out common pitfalls and distractions Frame security and risk issues to be clear and actionable so that decision makers, technical personnel, and users will listen and value your advice Who This Book Is For: IT professionals moving into the security field; new security managers, directors, project heads, and would-be CISOs; and security specialists from other disciplines moving into information security (e. g. , former military security professionals, law enforcement professionals, and physical security professionals)
IT Service Management
by Fritz KleinerEin erfolgreich eingeführtes und gelebtes IT Service Management ist für eine Unternehmung ein essentieller Faktor. Eine schlechte Verfügbarkeit, große Ausfälle von wichtigen Informatik-Komponenten/Services oder eine zu teure Informatik können den Unternehmenserfolg massiv beeinträchtigen. Meistens werden in solchen Fällen teure Informatik-Berater eingekauft, welche dem Unternehmen helfen, das IT Service Management inkl. der IT Kosten zu optimieren. Fritz Kleiner zeigt basierend auf seinem grossen Erfahrungsschatz als Senior Consultant und Principal mit vielen Praxisbeispielen auf, wie IT Service Management ganzheitlich in einer Unternehmung eingeführt und betrieben werden kann. Mit diesem Buch wird der Leser befähigt, das IT Service Management-Konzept zu verstehen und weitgehend selbständig erfolgreich im Unternehmen zu etablieren.
IT Strategy and Innovation
by Heather Smith James D. McKeenDesigned for courses where the goal is to understand how IT delivers organizational value, this text can be used in IT Strategy and IT Management courses at the undergraduate and graduate levels. The text combines the experiences and insights of many senior IT managers from leading-edge organizations with thorough academic research to bring important issues in IT management to life and demonstrate how IT strategy is put into action in contemporary businesses. Edition 5.0 is updated with 11 new chapters and 3 new mini cases.
IT Strategy for Non-IT Managers: Becoming an Engaged Contributor to Corporate IT Decisions
by Amrit TiwanaHow non-IT managers can turn IT from an expensive liability into a cost-effective competitive tool. Firms spend more on information technology (IT) than on all other capital assets combined. And yet despite this significant cash outlay, businesses often end up with IT that is uneconomical and strategically feeble. What is missing in many organizations' IT strategy is the business acumen of managers from non-IT departments. This book presents tools for non-IT managers to turn IT from an expensive liability into a cost-effective competitive tool. It equips readers with the concepts and analytical skills necessary to understand IT needs and opportunities from both sides of the business–IT divide. Each chapter opens with a jargon decoder–nontechnical explanations of the key ideas in the chapter—and ends with a checklist summarizing non-IT factors to consider in IT decisions. Chapters cover such topics as infusing competitive firepower into IT strategy; amalgamating software and data for a hard-to-duplicate competitive advantage; making choices that meet today's business needs without handicapping future strategy; establishing who decides what about IT strategies; sourcing IT and its challenges; protecting IT assets against disaster in ways that IT professionals cannot; and recognizing the business potential of emerging technologies. Examples are drawn from large corporations, small businesses, and nonprofits around the world. The book is suitable for use in the MBA core IT course, and is aimed especially at students in professional or executive MBA programs. It will also be a valuable reference for managers.
IT Strategy: Making IT Fit for the Digital Transformation
by Volker JohanningCreate an IT strategy for your company with this book.In seven consecutive steps, this book presents the development of an IT strategy for manufacturing companies with the possibility of practical implementation using ready-made worksheets. It looks at all the issues relevant to an IT strategy, from deriving the IT strategy from the corporate strategy to creating the application and sourcing strategy. The role of IT in the company and the role of the CIO are examined in detail, and the demand/supply model is presented in detail as a structural organisation. In this book, the reader learns how to transfer the IT strategy into a roadmap for implementation, how to use a portfolio to control the projects and how to implement and control the goals of the IT strategy with a specially developed IT strategy cockpit. The second edition takes greater account of digitalisationThis second edition focuses on manufacturing companies in order to take into account the industry focus of any IT strategy. It also considers the distinction from digitalisation and digitalisation strategies and contains additional explanations on agile methods, DevOps as well as bi-modal IT structures. As a result, the existing 7-step concept for developing an IT strategy has become more focused and has taken on the current issues of IT and digitalisation, which continue to develop at a rapid pace.In terms of content, the book on creating IT strategies focuses on the following areas:- Fundamentals of IT strategy as well as differentiation from a digitalisation strategy.- Reasons for an IT strategy- As-is analysis of IT- Analysis of the corporate strategy- IT application strategy- Sourcing strategy- IT organisation and IT governance- Practical implementation: budgeting, IT roadmap and IT project portfolio- Monitoring and control of the IT strategy with the IT strategy cockpit The author primarily addresses CIOs and IT managers of medium-sized to large companies and groups in the manufacturing industry. In addition, the book is suitable for the following target groups:- IT staff, IT controlling and IT management level employees.- IT management consultants- CFOs, CEOs, managing directors and board members of manufacturing companies
IT and the Board of Directors: What Should the Board's Responsibilities Be?
by Robert D. Austin Richard L. Nolan Shannon O'Donnell"The Adventures of an IT Leader" invites readers to "walk in the shoes" of Jim Barton, the new CIO of the fictional IVK Corporation, he spends a difficult year learning effective information technology leadership, sidestepping the pitfalls that make the CIO job the most volatile, high-turnover job in the business. This chapter joins Barton as he and his team prepare to make a presentation to the board addressing the history and results of IT management at the company, department strengths and weaknesses, and the opportunities and risks moving forward. One of Barton's goals for the presentation is to encourage the board and senior management team to become more involved in decision making about IT matters. This chapter is excerpted from "The Adventures of an IT Leader."