A Practical Approach for IT Governance

IT Governance For SMBs Desiring to Outsource

leave a comment »

IT Governance helps align IT activities to best meet Small to Mid-Sized Business (SMBs) requirements.  Most Governance methodologies start with alignment at the top.  This is a reasonable approach for all organizations where the traditional involvement of board-level executives in IT issues was to defer all key decisions to the company’s IT professionals. IT governance helps facilitate decision making across all stakeholders. This prevents IT from independently making and later being held solely responsible for poor decisions.

From a IT Governance standpoint, Small to Mid-Sized Businesses (SMBs) differ from the larger firms in two important aspects:  One, they are more nimble and need flexibility, and second, they tend to focus on shorter-term issues.  For SMBs, the guiding principle is to deliver value to the business without injecting onerous controls that stifle productivity.   To achieve it, the IT Governance framework should provide complete transparency on IT activities and make it simple for users to make, monitor and prioritize IT requests.  In order to achieve transparency, SMBs will need to establish controls and processes to deliver quality technology solutions on time and within allocated budgets.  From a management perspective, it is critical to effectively allocate and track resources and costs.

Outsourcing can actually enable effective IT Governance as it provides a scalable resource base to work in conjunction with internal IT resources.  To make outsourcing successful, the outsourcer’s governance framework must work seamlessly with the SMB’s IT Governance.  Mismatches in the Governance frameworks is one the principal causes of outsourcing failures.  Although mismatches can be best reduced by adopting a common process-centric framework, it is far from easy to implement common processes across two organizations.  A less expensive approach is to identify key risk areas in the process and establish clear mitigation strategies.

Written by Subbu Murthy

October 24, 2011 at 11:06 am

Posted in IT Governance

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: