SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Combining ITIL, SixSigma
and ToC in streamlining IT
Bogdan Dragomir
Bogdan Dragomir
Job Positions
Bogdan Dragomir is a security professional with over 24 years of experience in the IT field over 5 years as a
Regional Security Manager with Savvis Communications currently partner and COO at Vernance LLC responsible
for overseeing GRC and management training and consulting practice
657-200-5506
bdragomir@vernance.com
www.vernance.com
https://www.linkedin.com/in/bogdandrago
Information Technology Infrastructure
Library (ITIL)
• ITIL defines a framework to deliver and support IT services.
• Multiple components of the framework; each component has a
well defined set of recommended practices and procedures
• Can be adopted individually or as a whole.
• Covered processes include
• Design coordination
• Service catalogue management
• Service-level management
• Availability management
• Capacity management
• IT service continuity management
• Security management
• Supplier management
Information Technology
Infrastructure Library (Continued)
• ITIL Goals types and objectives:
• Strategy - Achieve organizational objectives and meet
customer needs
• Design - Define a plan for delivering the business objectives
• Transition - Improved capability for introducing new services
• Operations - Ensure services management in supported
environments.
• Improvement - Ensure dynamic services and adaptability to
large-scale improvements
SixSigma
• Born for and mainly used in manufacturing sector
• Based on empirical and statistical methods and data based
tools.
• Works primarily at the level of a local systems chain link and
considers its interaction with the immediate supplier and
customer processes.
• Aims to identify and remove defects causes and minimize
deliverable (product or business process) quality variations.
• Uses two methodologies DMAIC and DMADV
• Target 3.4 DPMO
Theory of Constraints
• A more flexible approach
• Logic based/uses logic-based tools
• Recognizes variation as an inherent business necessity.
• Focuses on building processes adaptable enough to deal
with current variations
• Uses a five steps process improvement
• identify constraint,
• Exploit constraint,
• subordinate everything else to the constraint,
• elevate the constraint
• Repeat
IT services Criteria
• Agility
• measure the ability of a IT Services chain to respond to
marketplace CHANGES to gain or maintain competitive
advantage
• Adaptability
• measure the maximum quantity of production CHANGE the
organization can achieve and sustain in a fix amount of time.
• Responsiveness
• measure the time to fulfill demand.
• Flexibility
• measure the number of days it takes to respond to a demand
CHANGE,
6δ vs ToC Differences
6δ ToC
Hard Data based Logic based tools
Quality tools for problem solving
(Causal loop Diagrams; Control Charts;
Cause and Effect; etc)
Unique approach to problem solving
considering problem’s reality context (The
more complex a situation, the more
inherent simplicity there is in it. )
Targets minimizing variation Targets to minimize effects of the variation
“Quality is more important than
quantity. One home run is much
better than two doubles.” – Steve
Jobs
Six Sigma & Toc to achieve performant
ITIL compatible processes
• Target performant ITIL process
• Main phases DMAIC – to define and minimize the
variation related to IT services
• Main approach ToC - to determine the bottleneck (the
unique constraint that determine the variation (above),
to eliminate the bottleneck and ensure optimization
sustainability, to determine next constraint in need of
optimization
DMAIC
Define
• Understand the expectations of the customer using voice of the
customer techniques,
• Using ToC identify the process (not the constraint) that need to
be improved.
• Ensure synergy between ITIL and SixSigma goals and alignment to
business strategy.
DMAIC
Measure
• Asses the “as is” process state;
• define defects in the context of IT Services (i.e.
<unacceptable_deviation> from expected results);
• define CtQ parameters.
• Determine objectives in the business context.
DMAIC
Analyze
• Analyze the data gathered during the previous phase;
• determine all trivial “variation” source(s),
• use ToC to determine the main constraint (vital variable)
based on the documented UDE.
• “An UDE should be serious, be a condition not a lack of an activity, not
blame anyone, happen frequently, have a serious negative outcome,
not incorporate the solution within the statement.” - TOCICO3
Thinking Process Committee, Nov 2007
• One would use this phase to run multiple scenario
simulations and prioritize constraints as per their placement
in the critical chain.
DMAIC
Improve
This is the phase where applying ToC will swift SixSigma and
increase its focus tremendously.
Since we moved the SixSigma approach using ToC approach in
the previous phase, during the Improve phase we will use ToC
to Exploit, Subordinate and Elevate the main constraint (main-
constraint was determined in the Analyze phase) to ensure
increased overall performance.
Note: Exploiting the constraint should be done by maximizing its
efficiency up to the point where the constraint is moving to the
next node.
DMAIC
Control
• Ensure that the process around optimized main-constraint
can perform sustainable
• implement controls to prevent the process from reverting
back to its prior state.
• Document lesson learn and use them in the next (D)MAIC
iteration targeting the new constraint.
Note: During the next iteration you could use a shortened
version of D-Phase focusing on checking if the previous
determinations are still valid and relevant.
Conclusion
• Each school of thought has its own benefits and
strengths.
• Results depend on user expertise
• There is no best or better
• Have different approach
• Have the same ultimate target (Solve a problem)
Quality in a product or service is not what the supplier
puts in. It is what the customer gets out and is willing to
pay for. A product is not quality because it is hard to make
and costs a lot of money, as manufacturers typically
believe. This is incompetence. Customers pay only for
what is of use to them and gives them value. Nothing else
constitutes quality.”
~Peter Drucker.
?
QUESTIONS
657-200-5506
bdragomir@vernance.com
www.vernance.com
https://www.linkedin.com/in/bogdandrago
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Business Process Re-engineering
Business Process Re-engineeringBusiness Process Re-engineering
Business Process Re-engineering
rinkimusaddi
 
ATH2013-Krishnamurty Pammi- Power your business through implementing Lean
ATH2013-Krishnamurty Pammi- Power your business through implementing LeanATH2013-Krishnamurty Pammi- Power your business through implementing Lean
ATH2013-Krishnamurty Pammi- Power your business through implementing Lean
India Scrum Enthusiasts Community
 
System Design and Analysis 2
System Design and Analysis 2System Design and Analysis 2
System Design and Analysis 2
Boeun Tim
 
Integrated Project Management And Solution Delivery Process
Integrated Project Management And Solution Delivery ProcessIntegrated Project Management And Solution Delivery Process
Integrated Project Management And Solution Delivery Process
Alan McSweeney
 

Was ist angesagt? (20)

Business Process Re-engineering
Business Process Re-engineeringBusiness Process Re-engineering
Business Process Re-engineering
 
BUSINESS PROCESS ANALYSIS
BUSINESS PROCESS ANALYSISBUSINESS PROCESS ANALYSIS
BUSINESS PROCESS ANALYSIS
 
ATH2013-Krishnamurty Pammi- Power your business through implementing Lean
ATH2013-Krishnamurty Pammi- Power your business through implementing LeanATH2013-Krishnamurty Pammi- Power your business through implementing Lean
ATH2013-Krishnamurty Pammi- Power your business through implementing Lean
 
Tools and Techniques of Quality Planning
Tools and Techniques of Quality PlanningTools and Techniques of Quality Planning
Tools and Techniques of Quality Planning
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
 
Gears agile
Gears agileGears agile
Gears agile
 
BABOK v3 KA Task Summary v0.15
BABOK v3 KA Task Summary v0.15BABOK v3 KA Task Summary v0.15
BABOK v3 KA Task Summary v0.15
 
Operations Management
Operations ManagementOperations Management
Operations Management
 
ACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem SolvingACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem Solving
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Changes in CMMI-DEV and SCAMPI-A v1.3 - An Implementation Perspective
Changes in CMMI-DEV and SCAMPI-A v1.3 - An Implementation PerspectiveChanges in CMMI-DEV and SCAMPI-A v1.3 - An Implementation Perspective
Changes in CMMI-DEV and SCAMPI-A v1.3 - An Implementation Perspective
 
Integrated project management and solution delivery process 10082017 dt
Integrated project management and solution delivery process 10082017 dtIntegrated project management and solution delivery process 10082017 dt
Integrated project management and solution delivery process 10082017 dt
 
Applying Lean Sigma Into Validation
Applying Lean Sigma Into ValidationApplying Lean Sigma Into Validation
Applying Lean Sigma Into Validation
 
System Design and Analysis 2
System Design and Analysis 2System Design and Analysis 2
System Design and Analysis 2
 
L4 RE Processes
L4 RE ProcessesL4 RE Processes
L4 RE Processes
 
Integrated Project Management And Solution Delivery Process
Integrated Project Management And Solution Delivery ProcessIntegrated Project Management And Solution Delivery Process
Integrated Project Management And Solution Delivery Process
 
Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5
 
DecisionsFirst Modeler and IBM ODM Demonstration
DecisionsFirst Modeler and IBM ODM Demonstration DecisionsFirst Modeler and IBM ODM Demonstration
DecisionsFirst Modeler and IBM ODM Demonstration
 
Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)
 
Six Sigma Green Belt Training Part 7
Six Sigma Green Belt Training Part 7Six Sigma Green Belt Training Part 7
Six Sigma Green Belt Training Part 7
 

Ähnlich wie Combining ITIL, Six Sigma and Theory of Constraints in streamlining IT quality

How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
ptulachan
 
Sdec10 lean package implementation
Sdec10 lean package implementationSdec10 lean package implementation
Sdec10 lean package implementation
Terry Bunio
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babu
Hem Rana
 
90 days to make a difference - approach
90 days to make a difference - approach90 days to make a difference - approach
90 days to make a difference - approach
Stuart Creasey
 

Ähnlich wie Combining ITIL, Six Sigma and Theory of Constraints in streamlining IT quality (20)

OM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhh
OM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhhOM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhh
OM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhh
 
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
 
Corebanking transformation – a wining formula
Corebanking transformation – a wining formulaCorebanking transformation – a wining formula
Corebanking transformation – a wining formula
 
Six sigma control in total quality management copy
Six sigma control in total quality management   copySix sigma control in total quality management   copy
Six sigma control in total quality management copy
 
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfSabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
 
Agile and Its Impact on Productivity
Agile and Its Impact on ProductivityAgile and Its Impact on Productivity
Agile and Its Impact on Productivity
 
CRM Implementations and Upgrades
CRM Implementations and UpgradesCRM Implementations and Upgrades
CRM Implementations and Upgrades
 
The Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six SigmaThe Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six Sigma
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projects
 
Sdec10 lean package implementation
Sdec10 lean package implementationSdec10 lean package implementation
Sdec10 lean package implementation
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babu
 
Session 5
Session 5Session 5
Session 5
 
Course 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptxCourse 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptx
 
How to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8DHow to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8D
 
Six sigma it_service_delivery
Six sigma it_service_deliverySix sigma it_service_delivery
Six sigma it_service_delivery
 
90 days to make a difference - approach
90 days to make a difference - approach90 days to make a difference - approach
90 days to make a difference - approach
 
PMI Presentation2
PMI Presentation2PMI Presentation2
PMI Presentation2
 
Lean pilots by Mariya Breyter from Dun & Bradstreet
Lean pilots by Mariya Breyter from Dun & BradstreetLean pilots by Mariya Breyter from Dun & Bradstreet
Lean pilots by Mariya Breyter from Dun & Bradstreet
 
SSCG 8D Problem Solving
SSCG 8D Problem SolvingSSCG 8D Problem Solving
SSCG 8D Problem Solving
 
Ibm test data_management_v0.4
Ibm test data_management_v0.4Ibm test data_management_v0.4
Ibm test data_management_v0.4
 

Mehr von PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

Mehr von PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Combining ITIL, Six Sigma and Theory of Constraints in streamlining IT quality

  • 1. Combining ITIL, SixSigma and ToC in streamlining IT Bogdan Dragomir
  • 2. Bogdan Dragomir Job Positions Bogdan Dragomir is a security professional with over 24 years of experience in the IT field over 5 years as a Regional Security Manager with Savvis Communications currently partner and COO at Vernance LLC responsible for overseeing GRC and management training and consulting practice 657-200-5506 bdragomir@vernance.com www.vernance.com https://www.linkedin.com/in/bogdandrago
  • 3. Information Technology Infrastructure Library (ITIL) • ITIL defines a framework to deliver and support IT services. • Multiple components of the framework; each component has a well defined set of recommended practices and procedures • Can be adopted individually or as a whole. • Covered processes include • Design coordination • Service catalogue management • Service-level management • Availability management • Capacity management • IT service continuity management • Security management • Supplier management
  • 4. Information Technology Infrastructure Library (Continued) • ITIL Goals types and objectives: • Strategy - Achieve organizational objectives and meet customer needs • Design - Define a plan for delivering the business objectives • Transition - Improved capability for introducing new services • Operations - Ensure services management in supported environments. • Improvement - Ensure dynamic services and adaptability to large-scale improvements
  • 5. SixSigma • Born for and mainly used in manufacturing sector • Based on empirical and statistical methods and data based tools. • Works primarily at the level of a local systems chain link and considers its interaction with the immediate supplier and customer processes. • Aims to identify and remove defects causes and minimize deliverable (product or business process) quality variations. • Uses two methodologies DMAIC and DMADV • Target 3.4 DPMO
  • 6.
  • 7. Theory of Constraints • A more flexible approach • Logic based/uses logic-based tools • Recognizes variation as an inherent business necessity. • Focuses on building processes adaptable enough to deal with current variations • Uses a five steps process improvement • identify constraint, • Exploit constraint, • subordinate everything else to the constraint, • elevate the constraint • Repeat
  • 8. IT services Criteria • Agility • measure the ability of a IT Services chain to respond to marketplace CHANGES to gain or maintain competitive advantage • Adaptability • measure the maximum quantity of production CHANGE the organization can achieve and sustain in a fix amount of time. • Responsiveness • measure the time to fulfill demand. • Flexibility • measure the number of days it takes to respond to a demand CHANGE,
  • 9. 6δ vs ToC Differences 6δ ToC Hard Data based Logic based tools Quality tools for problem solving (Causal loop Diagrams; Control Charts; Cause and Effect; etc) Unique approach to problem solving considering problem’s reality context (The more complex a situation, the more inherent simplicity there is in it. ) Targets minimizing variation Targets to minimize effects of the variation
  • 10. “Quality is more important than quantity. One home run is much better than two doubles.” – Steve Jobs
  • 11. Six Sigma & Toc to achieve performant ITIL compatible processes • Target performant ITIL process • Main phases DMAIC – to define and minimize the variation related to IT services • Main approach ToC - to determine the bottleneck (the unique constraint that determine the variation (above), to eliminate the bottleneck and ensure optimization sustainability, to determine next constraint in need of optimization
  • 12. DMAIC Define • Understand the expectations of the customer using voice of the customer techniques, • Using ToC identify the process (not the constraint) that need to be improved. • Ensure synergy between ITIL and SixSigma goals and alignment to business strategy.
  • 13. DMAIC Measure • Asses the “as is” process state; • define defects in the context of IT Services (i.e. <unacceptable_deviation> from expected results); • define CtQ parameters. • Determine objectives in the business context.
  • 14. DMAIC Analyze • Analyze the data gathered during the previous phase; • determine all trivial “variation” source(s), • use ToC to determine the main constraint (vital variable) based on the documented UDE. • “An UDE should be serious, be a condition not a lack of an activity, not blame anyone, happen frequently, have a serious negative outcome, not incorporate the solution within the statement.” - TOCICO3 Thinking Process Committee, Nov 2007 • One would use this phase to run multiple scenario simulations and prioritize constraints as per their placement in the critical chain.
  • 15. DMAIC Improve This is the phase where applying ToC will swift SixSigma and increase its focus tremendously. Since we moved the SixSigma approach using ToC approach in the previous phase, during the Improve phase we will use ToC to Exploit, Subordinate and Elevate the main constraint (main- constraint was determined in the Analyze phase) to ensure increased overall performance. Note: Exploiting the constraint should be done by maximizing its efficiency up to the point where the constraint is moving to the next node.
  • 16. DMAIC Control • Ensure that the process around optimized main-constraint can perform sustainable • implement controls to prevent the process from reverting back to its prior state. • Document lesson learn and use them in the next (D)MAIC iteration targeting the new constraint. Note: During the next iteration you could use a shortened version of D-Phase focusing on checking if the previous determinations are still valid and relevant.
  • 17. Conclusion • Each school of thought has its own benefits and strengths. • Results depend on user expertise • There is no best or better • Have different approach • Have the same ultimate target (Solve a problem)
  • 18. Quality in a product or service is not what the supplier puts in. It is what the customer gets out and is willing to pay for. A product is not quality because it is hard to make and costs a lot of money, as manufacturers typically believe. This is incompetence. Customers pay only for what is of use to them and gives them value. Nothing else constitutes quality.” ~Peter Drucker.