Do
Implement real ongoing tasks with owners to make transformation a reality. This should be aligned to published policy and Inform, Operate, and Optimize the lifecycle.
Check
Perform measurement and monitoring of performance aligned to defined North Star metrics. Audit and review the effectiveness of tasks and activities.
Act
Own ongoing improvement to the program so it delivers sustainable evolving value, including monitoring non-conformity, iterative improvements, and scope/ value definition adjustment.
ITAM Program Operations
Four Areas of Excellence
Implementation and Management
Program operations and enablement for core processes.
- Scope expectation and alignment
- Tracking of program activities
- Risks and blockers identified and managed proactively
- Evolve to a more mature management system
- Clear stakeholder responsibilities and engagement
- Implementation and adoption of policy and process
- Proactively reduce risk
- Benefit realization from investment in design and policy creation
Software Inventory and Compliance Monitoring
Normalize data, manage and track license compliance.
- Vendor and inventory quality assurance and visibility
- Renewal calendar and defined activities to inform procurement to reduce software spend
- Normalized entitlement mapped and uploaded in tooling
- Adequately configured platforms and tools
- Defined risk profiles and action paths
- Risks identified and mitigated outside of software audits
Stakeholder Intelligence
Identify and track realizations of governance assurance, cost savings and risk avoidance.
- Commercial and optimization realization trends
- Program performance – savings, risk mitigation
- Aligned Management System delivering regulatory assurance
- Tangible reporting to leadership and stakeholders on existing risks and the value of the program
- Stakeholder piece of mind and internal publicity
Verification and Compliance
Track KPIs, identify discrepancies and their root causes, policy failures and risks. Prioritize and execute mitigations and fixes.
- Reduced software risk
- Satisfied, informed stakeholders
- Proactive audit response
- Maintained risk register, actions owned and tracked
- Clear escalation paths for policy/process non-adherence