Four Common Mistakes in IT Portfolio Management - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5
Next Four Common Mistakes in IT Portfolio Management-4 Next

Not thinking about risk/return profiles in a meaningful way tends to emphasize low-risk, low-return initiatives and starves the enterprise of the more innovative and potentially “game changing” IT plays.

According to Vaughan Merlyn, IT Portfolio Management is at the heart and soul of leveraging IT for business value, and yet most IT organizations do a poor job of managing IT investments as a portfolio. At its best, IT Portfolio Management (PfM) is a way to:

  • Define your investment strategy for IT – including needs for risk/return, innovation, common enterprise-wide capability.
  • Make that strategy visible and understandable to business executives to allow dialog and debate to reach agreement with key business stakeholders.
  • Monitor performance of the IT portfolio.
  • Adjust the portfolio based upon actual performance of IT investments.
  • Adjust the portfolio based upon changing business conditions. 

At its worst, PfM is simply a laundry list of projects or a collection of laundry lists, one or more for each business unit and corporate function. Mr. Merlyn has developed this list of common mistakes that are made in PfM.


Related Topics : IBM Looks to Redefine Industry Standard Servers, AMD, Processors

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.