Upcoming Programs
Select program for more details and for registration
Program | Date | Location |
---|
Infrastructure Playbook |
May 6-10, 2024 11:00 am - 2:00 pm ET |
Online, Facilitator-led |
Security Playbook |
May 13-17, 2024 11:00 am - 2:00 pm ET |
Online, Facilitator-led |
Applications Playbook |
June 3-7, 2024 11:00 am - 2:00 pm ET |
Online, Facilitator-led |
CIO Playbook |
June 10-14, 2024 11:00 am - 2:00 pm ET |
Online, Facilitator-led |
Data Playbook |
June 24-28, 2024 11:00 am - 2:00 pm ET |
Online, Facilitator-led |
Why Attend?
- Immersive, Role-specific TrainingCovers four key IT disciplines: CIO, Applications, Infrastructure, and Security. Focuses on developing IT management practices to help you systematically improve your IT department.
- Collaborate & Learn From Your PeersCollaborate and leverage your team and other industry experts to complete all activities and outputs in your playbook.
- Connect With Industry ExpertsPlaybook gives you the exclusive opportunity to meet with our world-class research analysts, as well as industry experts.
- Develop Your NetworkNetworking via small group breakouts expand your learning during Playbook.
- Walk Away With a Plan to Execute onBuild a playbook that allows you and your team to successfully execute on your core process improvements and strategic direction.
Feedback From Recent Training Program Attendees
- "The highlights of the CIO Playbook were networking with my peers and feeling a sense that we all experience the same challenges."
- "There were a lot of good takeaways in the Applications Playbook even for an organization that does not use Agile. I will be getting a lot of utility from the application and project portfolio management sections."
- "Getting the big picture on where to start the process. Now knowing that I need to create Data Literacy in my organization and cultivate a group of people to work on our data strategy were highlights of the Data Playbook."
- "Overall I found the Infrastructure Playbook program to be very interactive and considered the best part to be hearing the feedback of other professionals on the call."
- "I have a much better understanding of how the InfoTech blueprints fit together to help mature my Security program. This should help my team approach projects on our cybersecurity roadmap more efficiently. Achieved my objective of moving from a task and project based approach to policy, compliance and other key security program components to a more wholistic perspective."
"In the end we retain from our studies only that which we practically apply."
Goethe
In this spirit, we design all of our training programs.
Session Breakdowns
CIO Playbook
Business Context
Elicit the business goals and identify strategic initiatives that are most important to the organization.
Digital Business Strategy
A value-driven approach to digital transformation that allows you to identify what aspects of the business to transform, what technologies to embrace, what processes to automate, and what new business models to create.
IT Strategy
Align with the business by creating an IT strategy that documents the business context, key initiatives, and a strategic roadmap. To create a business-aligned IT strategy, you must understand what the business does and what the business will need. Only then can a carefully thought-out, strategic and tactical plan be created for execution.
Vendor Management
Effective vendor management is essential to ensure you receive the forecasted value from your vendors. This session will show you the benefits of a vendor management initiative in supporting your goals and objectives. You will learn why you should classify your vendor ecosystem and leverage a maturity gap assessment to create a 90 day 1-and 2-year vendor management maturity or implementation roadmap.
IT Governance
Identify the need for governance in your organization including demand and resource management, project approval and intake processes that will set you up for success to execute on your key strategic initiatives.
Applications Playbook
Applications Portfolio Management
Application portfolio management (APM) helps you transform your applications into a cohesive service catalog aligned to your business capabilities. Deliver More Value From Your Application Portfolio by understanding key practices such as application rationalization and modernization to help you become a trusted partner.
Digital Product Vision
Product organizations are under pressure to align the value they provide to the organization’s goals and overall company vision. You need to clearly convey your direction, strategy, and tactics to gain alignment, support, and funding from your organization. Build a product vision your organization can take from strategy through execution.
Agile Practices
It’s important to know that Agile transformation is a journey that will involve your entire organization and often requires a phased approach to be successful. Organizations that are accustomed to Waterfall often move initially to an iterative (aka Wagile*) approach before moving to a more fully Agile approach. Learn about Info-Tech’s step-by-step journey to agile transformation.
Data Strategy
Put a strategy in place to ensure data is available, accessible, well integrated, secured, of acceptable quality, and suitably visualized to fuel organization-wide decision making. Start treating data as strategic and corporate asset.
Project Portfolio Management Strategy
With the right PPM strategy, IT leaders can enable executive decision makers to make sense of the excess of project demand and prioritize those initiatives that are of the most value to the business — and that align with IT’s capacity to deliver.
Security Playbook
Security Strategy
Ensure alignment with business objectives, assess organizational risk and stakeholder expectations, enable a comprehensive current state assessment, and prioritize initiatives and building out a security roadmap.
Security Policies
Enhance your overall security posture with a defensible and prescriptive policy suite.
Data Classification
Understand where your data lives and who has access to it so that you can develop an appropriate data classification system by conducting interviews with data owners and by incorporating vendor solutions to make the process more manageable and end-user friendly.
Security Awareness & Training
Cyber attackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to properly prepare your end users to effectively defend your organization against security threats.
Risk Management
Develop a security risk management program to create a standardized methodology for assessing and managing the risk that information systems face.
Infrastructure Playbook
Infrastructure Roadmap
Follow the roadmap process to better interface with the business, becoming true strategic partners by aligning Infrastructure’s work with business value.
Disaster Recovery Planning
Create an effective, right- sized DRP: discover current capabilities, define business requirements, and close gaps to deliver service continuity.
Automation
Define your automation suite in terms of your business goals. Take stock of what you have now: RPA, AIOps, chatbots. Think about how to integrate and optimize what you have now, as well as roadmap your continual improvement.
Cloud Management
Evaluate workloads’ suitability for the cloud using Info-Tech’s methodology to select the optimal migration (or non- migration) path based on the value of cloud characteristics. Build a roadmap of initiatives for actions by workload and risk mitigation. Define a cloud vision to share with stakeholders.
Reduce the Chaos
The ability to respond and recover quickly from unplanned incidents is a critical path in becoming a strategic and trusted partner for the business.