1. Identify, acquire and maintain IT resources and capabilities (information, services, infra and applications and people
2. Evaluate Direct and Monitor sourcing strategies to ensure existing resources are taken into account to optimize IT resource utilization
3. Integration of IT resource management into the enterprise's strategic and tactical planning
4. Alignment of IT resource management processes with ent resource mgmt processes
5. Resource gap analysis process
6. Policies to guide IT resource sourcing strategies that include SLAs and changes to sourcing strategies
7. Policies and processes are in place for the assessment, training and development of staff to address enterprise requirements and personal/professional growth
1. IT resource planning methods
2. Human resource procurement, assessment, training and development methodologies
3. Processes for acquiring application, information and infrastructure resources
4. Outsourcing and offshoring approaches -> investment program, OLAs and SLAs
5. Methods used to record and monitor IT resource utilization and availability
6. Methods used to evaluate and report on IT resource performance
7. Knowledge of interoperability, standardization and economies of scale
8. Data management and data governance concepts
9. Service Level Management concepts
1. IT Risk management processes to identify, analyze, mitigate, manage, monitor and communicate IT risk
2. Legal and regulatory compliance requirements are addressed through IT risk management
3. IT risk management is aligned with Ent. risk management (ERM) framework
4. Senior level mgmt sponsorship for IT risk management
5. IT risk management policies, procedures and standards are developed and communicated
6. Ensure the identification of key risk indicators (KRIs)
7. Timely reporting and proper escalation of risk events and responses to appropriate levels of mgmt
1. Application of risk management at strategic, portfolio, program, project and operations levels
2. Risk management frameworks and standards (RISK IT, ISO 31000, COSO ERM, etc.
3. Relationship of the risk management approach to legal and regulatory compliance
4. Methods to align IT and ent. Risk management (ERM)
5. Relationship of the risk mgmt approach to business resiliency (BCP and DRP)
6. Risk, Threat, Vulnerabilities and Opportunities inherent in the use of IT
7.Types of business risk, exposures and threats (external environment, internal fraud, information security)
8. Risk appetite and risk tolerance
9. Quantitative and Qualitative risk assessment methods
10. Risk mitigation strategies related to IT in the enterprise
11. Methods to monitor effectiveness of mitigation strategies and/or controls
12. Stakeholder analysis and communication techniques
13. Methods to establish key risk indicators (KRIs)
14. Methods to manage and report the status of identified risk
1. IT enabled investments are managed as a portfolio of investments
2. IT enabled investments are managed through economic lifecycle
3. Business ownership and accountability for IT enabled investments are established
4. IT investment management practices align with ent. investment practices
5. IT enabled investment portfolios, IT processes and IT services are evaluated and benchmarked
6. Outcome and performance measures are established and evaluated to assess progress towards ent and IT objectives
7. Outcome and performance measures are monitored and reported to key stakeholders in a timely manner
8. Ensure that improvement initiatives are identified, prioritized, initiated and managed based on the outcome and performance measures
1. IT Investment mgmt processes, including the economic life cycle of investments