Four Common Mistakes in IT Portfolio Management - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5
Four Common Mistakes in IT Portfolio Management-5

Often the portfolio only addresses new, major project initiatives – IT services and smaller projects are not under the umbrella of PfM – and yet these “non-big” activities typically consume 60 percent to 70 percent of the IT budget – the lion’s share is untouched by PfM disciplines.


According to Vaughan Merlyn, IT Portfolio Management is at the heart and soul of leveraging IT for business value, and yet most IT organizations do a poor job of managing IT investments as a portfolio. At its best, IT Portfolio Management (PfM) is a way to:

  • Define your investment strategy for IT – including needs for risk/return, innovation, common enterprise-wide capability.
  • Make that strategy visible and understandable to business executives to allow dialog and debate to reach agreement with key business stakeholders.
  • Monitor performance of the IT portfolio.
  • Adjust the portfolio based upon actual performance of IT investments.
  • Adjust the portfolio based upon changing business conditions. 

At its worst, PfM is simply a laundry list of projects or a collection of laundry lists, one or more for each business unit and corporate function. Mr. Merlyn has developed this list of common mistakes that are made in PfM.


Related Topics : IBM Looks to Redefine Industry Standard Servers, AMD, Processors

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.