Peface | p. xiii |
Acknowledgments | p. xv |
The Authors | p. xix |
Core Skills and Career Development | p. 1 |
CIO Roles-A Sampler | p. 2 |
No One Is Planning Your Career | p. 3 |
Strategic Planning | p. 6 |
Technical Expertise | p. 8 |
The Generations | p. 8 |
What Affects Compensation? | p. 9 |
CIO Viruses | p. 11 |
The Magic "AND" | p. 12 |
References | p. 13 |
Information Technology Governance | p. 15 |
CIO Success Pills-For Best Results, Take with Governance | p. 15 |
Alignment-How to Avoid Growing Weeds | p. 16 |
First Step-Make Sure a Business Strategy Exists | p. 16 |
Prioritization | p. 19 |
Alignment Tools | p. 19 |
Value Delivery | p. 22 |
IT Risk Management | p. 23 |
Compliance | p. 24 |
Ten Steps to Sarbanes-Oxley Compliance | p. 25 |
Resource Management | p. 31 |
Performance Management | p. 31 |
The Nut-and-Bolt Stuff-Managing Your Own Department with Governance | p. 32 |
References | p. 34 |
Information Technology Finance | p. 37 |
Budgeting | p. 38 |
Constructing the Budget | p. 40 |
Rational Buying | p. 43 |
Managing the IT Investment | p. 46 |
SOP No. 98-1 | p. 50 |
Cost Management | p. 52 |
Gray Areas and the Tilt | p. 54 |
Chargeback | p. 56 |
Looking Financially Smart | p. 57 |
Managing Contracts | p. 59 |
Summary | p. 61 |
References | p. 62 |
Project Management | p. 63 |
Project Organization | p. 64 |
Systems Development Methodologies | p. 65 |
Informal Approach-Code First, Fix Later | p. 65 |
Traditional Approach-Waterfall | p. 67 |
Rapid Prototyping/Rapid Application Development (RAD) | p. 68 |
Agile Methodologies | p. 68 |
Rational Unified Process (RUP) | p. 71 |
Out of Scope/Embedded Project | p. 73 |
Project Dynamics | p. 73 |
Why Do Projects Fail? | p. 73 |
Planning the Work | p. 75 |
Project Risk Assessment | p. 76 |
Scope of the Job-The Program Management Office's (PMO) Dilemma | p. 81 |
A Practitioner's Perspective | p. 83 |
The Future of Project Management | p. 86 |
References | p. 86 |
Creating Good Enough Code | p. 89 |
How Do You Do Good Code? | p. 89 |
How Important Are Coding Standards? | p. 90 |
Toolboxes Are Useful | p. 91 |
Some Example Guidelines | p. 91 |
Release Philosophy | p. 91 |
Porting | p. 92 |
The Ultimate Answer-Hire Good Developers and Keep Them Happy | p. 93 |
References | p. 93 |
Enterprise Architecture | p. 95 |
Develop the Business Model | p. 98 |
Business Drivers and Selling the Enterprise Architecture (EA) | p. 100 |
Information Architecture and Process Modeling Perspective | p. 101 |
Technology Architecture Perspective | p. 105 |
Road Map to an Effective Architecture | p. 107 |
Business Architecture | p. 107 |
IT Architecture | p. 108 |
Pushing Out the EA-Communicating with Management and Employees | p. 109 |
The Outsourcing Alternative | p. 110 |
Tools | p. 111 |
Enforcement and Governance of the EA | p. 111 |
Architectural Maturity | p. 114 |
Putting It All Together | p. 116 |
References | p. 118 |
Mergers and Acquisitions | p. 119 |
The CIO's Golden Opportunity | p. 120 |
The CIO's Two Responsibilities | p. 120 |
Due Diligence | p. 120 |
Staff Due Diligence | p. 123 |
IT Integration | p. 124 |
One Approach to Integration | p. 126 |
Success Factors | p. 128 |
References | p. 128 |
Sourcing | p. 129 |
The Pendulum of Opinion | p. 129 |
The Traditional Pros and Cons | p. 130 |
Pro-From the Provider's Perspective | p. 130 |
Con-From the Customer's Perspective | p. 131 |
To Outsource or Not to Outsource? | p. 133 |
Xshoring | p. 134 |
The Proximity Factor | p. 135 |
Keeping Xshoring and Sourcing in Perspective | p. 136 |
Sourcing Is More Than IT Services | p. 137 |
References | p. 137 |
Business Intelligence and Analytics | p. 139 |
Getting Started-Selling Business Intelligence (BI) | p. 140 |
Value Proposition | p. 141 |
Core Components | p. 145 |
Data Warehouse | p. 145 |
A Data Warehouse Alternative | p. 147 |
Predictive Analytics and Data Mining | p. 148 |
The Nuts and Bolts of Predictive Analytics | p. 150 |
Data Mining | p. 151 |
Survey of Business Uses | p. 151 |
Security and Data Quality | p. 151 |
Effective Implementation | p. 153 |
Distributing the Intelligence | p. 155 |
Organizational Structure | p. 156 |
Roadblocks | p. 156 |
What Elephant? | p. 158 |
The Bottom Line | p. 158 |
References | p. 159 |
Security | p. 161 |
The Sources of Risk | p. 162 |
It's about the Money-Script Kiddies Persona Non Grata | p. 162 |
Defense in Depth | p. 162 |
Tools and Defense Automation | p. 163 |
Frameworks | p. 165 |
Telephone Security | p. 166 |
A Checklist for Building Security | p. 167 |
Some Comments from Security Practitoners | p. 168 |
References | p. 176 |
Training | p. 179 |
Tools | p. 180 |
User Needs Vary | p. 181 |
How Much Training Is Needed? | p. 181 |
Seminars or Vendor-Specific Training for IT | p. 182 |
The Harsh Punishment of Silo Knowledge | p. 182 |
Knowledge Management | p. 183 |
Effective Use of Consultants | p. 185 |
Becoming a Skilled Buyer of Professional Services | p. 185 |
On One Side of the Table: The Consultant's Objective | p. 186 |
On the Other Side of the Table: The CIO's Objective | p. 186 |
Matching Interests | p. 187 |
Some Miscellaneous Defense Tactics | p. 189 |
Knowledge Transfer | p. 191 |
A Few Closing Comments about Consultants | p. 191 |
Reference | p. 191 |
Operations | p. 193 |
Tree Houses Are Great for Kids | p. 193 |
Management Frameworks | p. 193 |
Change, Configuration, and Release Management | p. 194 |
Help Desk, Incident and Problem Management | p. 195 |
Capacity Management, Service Levels, Availability, Job Scheduling | p. 195 |
Day-to-Day Management | p. 197 |
Some Common-Sense Approaches to Good Operations | p. 197 |
Cloud Computing | p. 198 |
The Bottom Line-Discipline | p. 199 |
References | p. 199 |
Futures | p. 201 |
Society and Demographics | p. 202 |
Technology | p. 203 |
References | p. 206 |
CIO Interviews | p. 207 |
Appendices | |
Examples of Key IT General Controls | p. 225 |
Eamples of Key IT Application Controls | p. 231 |
Project Management Artifact Examples | p. 237 |
IT Risk Assessment Checklist | p. 247 |
Due Diligence Checklist for Mergers and Acquisitions (Business) | p. 257 |
Due Diligence Checklist for Mergers and Acquisitions-IT | p. 281 |
Example IT Policies and Direction for "XYZ Corp" | p. 285 |
Recommended Reading | p. 315 |
Index | p. 317 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.