Four Common Mistakes in IT Portfolio Management

Email     |     Share  
1 | 2 | 3 | 4 | 5
Previous Four Common Mistakes in IT Portfolio Management-1 Next

Click through for four common mistakes businesses make in their IT Portfolio Management (PfM), as outlined by Vaughan Merlyn.

According to Vaughan Merlyn, IT Portfolio Management is at the heart and soul of leveraging IT for business value, and yet most IT organizations do a poor job of managing IT investments as a portfolio. At its best, IT Portfolio Management (PfM) is a way to:

  • Define your investment strategy for IT – including needs for risk/return, innovation, common enterprise-wide capability.
  • Make that strategy visible and understandable to business executives to allow dialog and debate to reach agreement with key business stakeholders.
  • Monitor performance of the IT portfolio.
  • Adjust the portfolio based upon actual performance of IT investments.
  • Adjust the portfolio based upon changing business conditions. 

At its worst, PfM is simply a laundry list of projects or a collection of laundry lists, one or more for each business unit and corporate function. Mr. Merlyn has developed this list of common mistakes that are made in PfM.

 

Related Topics : IBM Looks to Redefine Industry Standard Servers, AMD, Processors

 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.