Four Common Mistakes in IT Portfolio Management - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5
Next Four Common Mistakes in IT Portfolio Management-4 Next

Not thinking about risk/return profiles in a meaningful way tends to emphasize low-risk, low-return initiatives and starves the enterprise of the more innovative and potentially “game changing” IT plays.

According to Vaughan Merlyn, IT Portfolio Management is at the heart and soul of leveraging IT for business value, and yet most IT organizations do a poor job of managing IT investments as a portfolio. At its best, IT Portfolio Management (PfM) is a way to:

  • Define your investment strategy for IT – including needs for risk/return, innovation, common enterprise-wide capability.
  • Make that strategy visible and understandable to business executives to allow dialog and debate to reach agreement with key business stakeholders.
  • Monitor performance of the IT portfolio.
  • Adjust the portfolio based upon actual performance of IT investments.
  • Adjust the portfolio based upon changing business conditions. 

At its worst, PfM is simply a laundry list of projects or a collection of laundry lists, one or more for each business unit and corporate function. Mr. Merlyn has developed this list of common mistakes that are made in PfM.

 

Related Topics : IBM Looks to Redefine Industry Standard Servers, AMD, Processors

 
More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.