SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
xMatters
Major Incident Management
Best practices
Real world case studies
Confidential and Proprietary
Hi…my name is Anne Deming
ademing@xmatters.com
Confidential and Proprietary 21/18/2019
How many MIM’s a month?
Confidential and Proprietary 31/18/2019
A recent survey on Major Incidents
•32% - once a year or less
•42% - at least several times a year
•13% - at least once a month
•13% - at least once a week
Confidential and Proprietary 41/18/2019
Must haves – we won’t bury the lead
•Stakeholder Alignment
•Rapid Engagement
• Determine who and when to engage Identifying technical vs. management
contacts
•Intelligent Responses
•Multi-modal Support
•Integrations with Operations
Confidential and Proprietary 51/18/2019
6
Thechallengeyou face….(becauseyoursystemsare yourbrand)
Confidential and Proprietary
Poor communicationduringMajor Incidentscan seriouslyimpact IT
7
CommonMajorIncidentCommunicationApproaches
Confidential and Proprietary 7
Manual
notifications
Email and
distribution lists
mass notification
No Precision No Reliability No
Accountability“Kitchen Sink”
approach results
in alert fatigue
Critical insights
slip through the
cracks
Limited follow-
through to
ensure action
8
Poor communicationduringa Major Incidenthas a bigimpact
Extended downtimes
& missed SLA
Loss of
revenue
Employee
burnout
Tarnished
image of IT
Frustrated
customers
Resolvers not held
accountable
Confidential and Proprietary
A Case study for a digital communications company
•Digital communications company
•Over 32 million connections to its network
•120 Million calls everyday in the network
• Connects people, families & businesses (their customers)
• Critical connectivity for tracking / payments on a transit system.
Confidential and Proprietary 91/18/2019
HIGHLIGHTS on using xMatters
•We transformed the way they manages incidents, with impressive results:
•Reduced the number of clicks to engage stakeholders
•2 minutes to send communications, an 88% reduction
•3 minutes to engage stakeholders, an 85% reduction
Confidential and Proprietary 101/18/2019
HOW?
•A mobile app
•Targeted messages
•Automated escalations
•Communications are easy-to-build, easy-to-send
•Templated communications
Confidential and Proprietary 111/18/2019
1212Confidential and Proprietary
There is a better way
Preparation - Creating effective communication plans
•Impact of outsourcing within global teams and 3rd party vendors
•Maintaining up-to-date contact info and schedules
•Developing standard communication
• Defining the communication content
• pre-determined templates
• pre-determined engagement timelines for communications
• pre-determine the blast radius (all or nothing is a bad idea)
Confidential and Proprietary 131/18/2019
Action – fire fighting
•Activating the communication plan
•Management of the recovery: Leadership roles, technical guidance
•Inspiring rapid response from tech teams
•Communicating effectively with necessary constituencies
•Tracking communication plan status
Confidential and Proprietary 141/18/2019
Reflection – the post mortem
•Root Cause Analysis after a Major Incident
•What types of information gathered during a major incident can be
leveraged to avoid recurrence.
•Tracking SLAs
•Aggregating data for compliance/audit purposes
•Remediating contact info errors
•Driving improved performance – identifying weaknesses in the
communication plan
Confidential and Proprietary 151/18/2019
A cheat sheet of questions to start the dialogue
• Who to contact and how to contact them.
• Incident Manager…When you assemble folks how does this happen?
• What about getting folks on the call?
• Consider the Staffing schedule: skeleton crew, 8-5 or are you 24x7?
• What is the timeframe for communication with the business?
• What about escalations? How do you handle them? There is MTTE and time to become affective. Some MIMs take 30 hours.
• A culture consideration: How to identify the right people to contact? Is it changing behavior or is enforcement an issue?
• How do you measure if you are overwhelming one resource vs. another are you tracking?
• How many steps are in your MIM process….Commonly we hear a 5 steps process. (Could yours be adjusted?)
• How & when will you engage 3rd party (hosting providers or technology vendors you need to engage) in during a Major
Incident?
• When outsources escalate back to customer….How will you handle SLAs on the customer side?
• Have you considered communication for upgrades or downgrades P2 to P1 or P1 to P2?
• Is there criteria to go straight to MIM, red alert and bypass triage?
Confidential and Proprietary 161/18/2019
Thank you….questions?
Confidential and Proprietary 171/18/2019

Weitere ähnliche Inhalte

Was ist angesagt?

Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesSlideTeam
 
Incident Management
 Incident Management Incident Management
Incident Managementiicecollege
 
Incident and Problem management simplified
Incident and Problem management simplifiedIncident and Problem management simplified
Incident and Problem management simplifiedValentyn Barmak
 
Andrew Vermes: Major Incident Management
Andrew Vermes: Major Incident ManagementAndrew Vermes: Major Incident Management
Andrew Vermes: Major Incident ManagementitSMF UK
 
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdfITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdfManishKumar526001
 
Incident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation SlidesIncident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation SlidesSlideTeam
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planningalanlund
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapDavid Sweigert
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationAxios Systems
 
June2007 Implementing Itil Problem Mgmt
June2007 Implementing Itil Problem MgmtJune2007 Implementing Itil Problem Mgmt
June2007 Implementing Itil Problem MgmtIT Service and Support
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem ManagementJosep Bardallo
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch_Services
 
ITIL Service Desk Tools
ITIL Service Desk ToolsITIL Service Desk Tools
ITIL Service Desk Toolsahmedshama
 
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...Jesse Andrew
 

Was ist angesagt? (20)

Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
 
Incident Management
Incident ManagementIncident Management
Incident Management
 
Incident Management
 Incident Management Incident Management
Incident Management
 
Incident and Problem management simplified
Incident and Problem management simplifiedIncident and Problem management simplified
Incident and Problem management simplified
 
Incident management
Incident managementIncident management
Incident management
 
Andrew Vermes: Major Incident Management
Andrew Vermes: Major Incident ManagementAndrew Vermes: Major Incident Management
Andrew Vermes: Major Incident Management
 
Problem Management
Problem ManagementProblem Management
Problem Management
 
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdfITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Problem Management
Problem ManagementProblem Management
Problem Management
 
Incident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation SlidesIncident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation Slides
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
June2007 Implementing Itil Problem Mgmt
June2007 Implementing Itil Problem MgmtJune2007 Implementing Itil Problem Mgmt
June2007 Implementing Itil Problem Mgmt
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographic
 
ITIL Service Desk Tools
ITIL Service Desk ToolsITIL Service Desk Tools
ITIL Service Desk Tools
 
Network Operations Center
Network Operations Center  Network Operations Center
Network Operations Center
 
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
 

Ähnlich wie Major Incident Management Best Practices Case Studies xMatters

Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar PresentationPeggy Winton
 
Optimizing the Student Recruitment Experience
Optimizing the Student Recruitment ExperienceOptimizing the Student Recruitment Experience
Optimizing the Student Recruitment ExperienceHobsons
 
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...Paine Publishing
 
Crisis Management and Protecting Your Reputation
Crisis Management and Protecting Your ReputationCrisis Management and Protecting Your Reputation
Crisis Management and Protecting Your ReputationTiffanyMiller57
 
Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy? Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy? Marketo
 
Ecycling Day planning
Ecycling Day planningEcycling Day planning
Ecycling Day planningCurtis Palmer
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
Shift left, best practices in knowledge management - SEE Hungary 2017
Shift left, best practices in knowledge management - SEE Hungary 2017Shift left, best practices in knowledge management - SEE Hungary 2017
Shift left, best practices in knowledge management - SEE Hungary 2017TOPdesk
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceSami Benafia
 
From the End of Information Chaos to Contextual Knowledge
From the End of Information Chaos to Contextual KnowledgeFrom the End of Information Chaos to Contextual Knowledge
From the End of Information Chaos to Contextual Knowledgei-SCOOP
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Dr Harvey Maylor, Cranfield University presentation Governance SIG May 2013
Dr Harvey Maylor, Cranfield University presentation Governance SIG May 2013Dr Harvey Maylor, Cranfield University presentation Governance SIG May 2013
Dr Harvey Maylor, Cranfield University presentation Governance SIG May 2013Association for Project Management
 
Intelligent Automation 2019
Intelligent Automation 2019Intelligent Automation 2019
Intelligent Automation 2019Ray Bugg
 
The shift to data driven marketing
The shift to data driven marketingThe shift to data driven marketing
The shift to data driven marketingGary Allemann
 
The Past, Present, and Future of Programmatic, Digiday Programmatic Summit, M...
The Past, Present, and Future of Programmatic, Digiday Programmatic Summit, M...The Past, Present, and Future of Programmatic, Digiday Programmatic Summit, M...
The Past, Present, and Future of Programmatic, Digiday Programmatic Summit, M...Digiday
 
Crowd-programmed initiatives (Dr Adrian Flint, Uni Bristol, and Chris Meyer z...
Crowd-programmed initiatives (Dr Adrian Flint, Uni Bristol, and Chris Meyer z...Crowd-programmed initiatives (Dr Adrian Flint, Uni Bristol, and Chris Meyer z...
Crowd-programmed initiatives (Dr Adrian Flint, Uni Bristol, and Chris Meyer z...ALNAP
 
IBM Case Study Agility & Analytics
IBM Case Study Agility & AnalyticsIBM Case Study Agility & Analytics
IBM Case Study Agility & AnalyticsVivastream
 
20140826 I&T Webinar_The Proliferation of Data - Finding Meaning Amidst the N...
20140826 I&T Webinar_The Proliferation of Data - Finding Meaning Amidst the N...20140826 I&T Webinar_The Proliferation of Data - Finding Meaning Amidst the N...
20140826 I&T Webinar_The Proliferation of Data - Finding Meaning Amidst the N...Steven Callahan
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
Lea Dit 2010 Td Presentation Au Email[1]
Lea Dit 2010 Td Presentation Au Email[1]Lea Dit 2010 Td Presentation Au Email[1]
Lea Dit 2010 Td Presentation Au Email[1]bradau1
 

Ähnlich wie Major Incident Management Best Practices Case Studies xMatters (20)

Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
Optimizing the Student Recruitment Experience
Optimizing the Student Recruitment ExperienceOptimizing the Student Recruitment Experience
Optimizing the Student Recruitment Experience
 
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
 
Crisis Management and Protecting Your Reputation
Crisis Management and Protecting Your ReputationCrisis Management and Protecting Your Reputation
Crisis Management and Protecting Your Reputation
 
Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy? Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy?
 
Ecycling Day planning
Ecycling Day planningEcycling Day planning
Ecycling Day planning
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Shift left, best practices in knowledge management - SEE Hungary 2017
Shift left, best practices in knowledge management - SEE Hungary 2017Shift left, best practices in knowledge management - SEE Hungary 2017
Shift left, best practices in knowledge management - SEE Hungary 2017
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
 
From the End of Information Chaos to Contextual Knowledge
From the End of Information Chaos to Contextual KnowledgeFrom the End of Information Chaos to Contextual Knowledge
From the End of Information Chaos to Contextual Knowledge
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Dr Harvey Maylor, Cranfield University presentation Governance SIG May 2013
Dr Harvey Maylor, Cranfield University presentation Governance SIG May 2013Dr Harvey Maylor, Cranfield University presentation Governance SIG May 2013
Dr Harvey Maylor, Cranfield University presentation Governance SIG May 2013
 
Intelligent Automation 2019
Intelligent Automation 2019Intelligent Automation 2019
Intelligent Automation 2019
 
The shift to data driven marketing
The shift to data driven marketingThe shift to data driven marketing
The shift to data driven marketing
 
The Past, Present, and Future of Programmatic, Digiday Programmatic Summit, M...
The Past, Present, and Future of Programmatic, Digiday Programmatic Summit, M...The Past, Present, and Future of Programmatic, Digiday Programmatic Summit, M...
The Past, Present, and Future of Programmatic, Digiday Programmatic Summit, M...
 
Crowd-programmed initiatives (Dr Adrian Flint, Uni Bristol, and Chris Meyer z...
Crowd-programmed initiatives (Dr Adrian Flint, Uni Bristol, and Chris Meyer z...Crowd-programmed initiatives (Dr Adrian Flint, Uni Bristol, and Chris Meyer z...
Crowd-programmed initiatives (Dr Adrian Flint, Uni Bristol, and Chris Meyer z...
 
IBM Case Study Agility & Analytics
IBM Case Study Agility & AnalyticsIBM Case Study Agility & Analytics
IBM Case Study Agility & Analytics
 
20140826 I&T Webinar_The Proliferation of Data - Finding Meaning Amidst the N...
20140826 I&T Webinar_The Proliferation of Data - Finding Meaning Amidst the N...20140826 I&T Webinar_The Proliferation of Data - Finding Meaning Amidst the N...
20140826 I&T Webinar_The Proliferation of Data - Finding Meaning Amidst the N...
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
Lea Dit 2010 Td Presentation Au Email[1]
Lea Dit 2010 Td Presentation Au Email[1]Lea Dit 2010 Td Presentation Au Email[1]
Lea Dit 2010 Td Presentation Au Email[1]
 

Mehr von NorthCoastHDI

Is AI the Future of IT Operations?
Is AI the Future of IT Operations?Is AI the Future of IT Operations?
Is AI the Future of IT Operations?NorthCoastHDI
 
Proactive Project Management w/Machine Learning
Proactive Project Management w/Machine LearningProactive Project Management w/Machine Learning
Proactive Project Management w/Machine LearningNorthCoastHDI
 
Learn More about HDI
Learn More about HDILearn More about HDI
Learn More about HDINorthCoastHDI
 
Good Practice Discussion - itSMF
Good Practice Discussion - itSMFGood Practice Discussion - itSMF
Good Practice Discussion - itSMFNorthCoastHDI
 
Continuous Service Improvement (CSI)
Continuous Service Improvement (CSI)Continuous Service Improvement (CSI)
Continuous Service Improvement (CSI)NorthCoastHDI
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
The Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast ChapterThe Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast ChapterNorthCoastHDI
 
NorthCoast HDI September 2014
NorthCoast HDI September 2014NorthCoast HDI September 2014
NorthCoast HDI September 2014NorthCoastHDI
 

Mehr von NorthCoastHDI (10)

Is AI the Future of IT Operations?
Is AI the Future of IT Operations?Is AI the Future of IT Operations?
Is AI the Future of IT Operations?
 
WiFi 101
WiFi 101WiFi 101
WiFi 101
 
Shift Left Strategy
Shift Left StrategyShift Left Strategy
Shift Left Strategy
 
Proactive Project Management w/Machine Learning
Proactive Project Management w/Machine LearningProactive Project Management w/Machine Learning
Proactive Project Management w/Machine Learning
 
Learn More about HDI
Learn More about HDILearn More about HDI
Learn More about HDI
 
Good Practice Discussion - itSMF
Good Practice Discussion - itSMFGood Practice Discussion - itSMF
Good Practice Discussion - itSMF
 
Continuous Service Improvement (CSI)
Continuous Service Improvement (CSI)Continuous Service Improvement (CSI)
Continuous Service Improvement (CSI)
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
The Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast ChapterThe Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast Chapter
 
NorthCoast HDI September 2014
NorthCoast HDI September 2014NorthCoast HDI September 2014
NorthCoast HDI September 2014
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Major Incident Management Best Practices Case Studies xMatters

  • 1. xMatters Major Incident Management Best practices Real world case studies Confidential and Proprietary
  • 2. Hi…my name is Anne Deming ademing@xmatters.com Confidential and Proprietary 21/18/2019
  • 3. How many MIM’s a month? Confidential and Proprietary 31/18/2019
  • 4. A recent survey on Major Incidents •32% - once a year or less •42% - at least several times a year •13% - at least once a month •13% - at least once a week Confidential and Proprietary 41/18/2019
  • 5. Must haves – we won’t bury the lead •Stakeholder Alignment •Rapid Engagement • Determine who and when to engage Identifying technical vs. management contacts •Intelligent Responses •Multi-modal Support •Integrations with Operations Confidential and Proprietary 51/18/2019
  • 6. 6 Thechallengeyou face….(becauseyoursystemsare yourbrand) Confidential and Proprietary Poor communicationduringMajor Incidentscan seriouslyimpact IT
  • 7. 7 CommonMajorIncidentCommunicationApproaches Confidential and Proprietary 7 Manual notifications Email and distribution lists mass notification No Precision No Reliability No Accountability“Kitchen Sink” approach results in alert fatigue Critical insights slip through the cracks Limited follow- through to ensure action
  • 8. 8 Poor communicationduringa Major Incidenthas a bigimpact Extended downtimes & missed SLA Loss of revenue Employee burnout Tarnished image of IT Frustrated customers Resolvers not held accountable Confidential and Proprietary
  • 9. A Case study for a digital communications company •Digital communications company •Over 32 million connections to its network •120 Million calls everyday in the network • Connects people, families & businesses (their customers) • Critical connectivity for tracking / payments on a transit system. Confidential and Proprietary 91/18/2019
  • 10. HIGHLIGHTS on using xMatters •We transformed the way they manages incidents, with impressive results: •Reduced the number of clicks to engage stakeholders •2 minutes to send communications, an 88% reduction •3 minutes to engage stakeholders, an 85% reduction Confidential and Proprietary 101/18/2019
  • 11. HOW? •A mobile app •Targeted messages •Automated escalations •Communications are easy-to-build, easy-to-send •Templated communications Confidential and Proprietary 111/18/2019
  • 13. Preparation - Creating effective communication plans •Impact of outsourcing within global teams and 3rd party vendors •Maintaining up-to-date contact info and schedules •Developing standard communication • Defining the communication content • pre-determined templates • pre-determined engagement timelines for communications • pre-determine the blast radius (all or nothing is a bad idea) Confidential and Proprietary 131/18/2019
  • 14. Action – fire fighting •Activating the communication plan •Management of the recovery: Leadership roles, technical guidance •Inspiring rapid response from tech teams •Communicating effectively with necessary constituencies •Tracking communication plan status Confidential and Proprietary 141/18/2019
  • 15. Reflection – the post mortem •Root Cause Analysis after a Major Incident •What types of information gathered during a major incident can be leveraged to avoid recurrence. •Tracking SLAs •Aggregating data for compliance/audit purposes •Remediating contact info errors •Driving improved performance – identifying weaknesses in the communication plan Confidential and Proprietary 151/18/2019
  • 16. A cheat sheet of questions to start the dialogue • Who to contact and how to contact them. • Incident Manager…When you assemble folks how does this happen? • What about getting folks on the call? • Consider the Staffing schedule: skeleton crew, 8-5 or are you 24x7? • What is the timeframe for communication with the business? • What about escalations? How do you handle them? There is MTTE and time to become affective. Some MIMs take 30 hours. • A culture consideration: How to identify the right people to contact? Is it changing behavior or is enforcement an issue? • How do you measure if you are overwhelming one resource vs. another are you tracking? • How many steps are in your MIM process….Commonly we hear a 5 steps process. (Could yours be adjusted?) • How & when will you engage 3rd party (hosting providers or technology vendors you need to engage) in during a Major Incident? • When outsources escalate back to customer….How will you handle SLAs on the customer side? • Have you considered communication for upgrades or downgrades P2 to P1 or P1 to P2? • Is there criteria to go straight to MIM, red alert and bypass triage? Confidential and Proprietary 161/18/2019
  • 17. Thank you….questions? Confidential and Proprietary 171/18/2019