SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
Leading Business
Transformation
Jay Ferro, Chief Information Officer
July 22, 2014Health IT Summit
Denver, CO CONFIDENTIAL ACS Information Technology 1
CONFIDENTIAL ACS Information Technology 2
My Story and Our Story
• Who I Am
• Who We Are
• The Transformation
Story
• In the Beginning . . .
• The Journey So Far
• Report Card and
Outlook
• End (States)
Who I Am
POSITION
• Chief Information Officer, American Cancer
Society
EDUCATION
• AB & MBA, University of Georgia
FAMILY
• Three sons: Trey (15), Connor (13) and
Alex (10)
NOMINATIONS
• 2013 Top 10 CIO Breakaway Leader –
Winner
• 2012, 2013 ATP (Assoc. Telecom Pro) –
Finalist
• 2011 Georgia CIO of the Year – Winner
• 2010 Georgia CIO of the Year – Finalist
BOARDS
• Board Chair, Georgia CIO Leadership
Association
• Board Chair, TechBridge
• Co-Chair, United Way, Technology Unit
• Advisory Board, Women In Technology
• Alumni Board, Terry College of Business
CONFIDENTIAL ACS Information Technology 3
http://www.twitter.com/jayferro
More Importantly
CONFIDENTIAL ACS Information Technology 4
Who We Are
CONFIDENTIAL ACS Information Technology 5
Who We Are
• Founded in 1913, ACS is the nation’s largest
voluntary public health organization.
• The American Cancer Society is the most
trusted source of cancer information.
• As the largest nongovernmental funder of
cancer research and having spent more than
$3.6 billion on cancer research since 1946,
we’ve played a role in nearly every cancer
breakthrough in recent history.
CONFIDENTIAL ACS Information Technology 6
CONFIDENTIAL ACS Information Technology 7
Society Engagement Platforms
CONFIDENTIAL ACS Information Technology 8
What Does Your
Dollar Do?
CONFIDENTIAL ACS Information Technology 9
CONFIDENTIAL ACS Information Technology 10
A History of Innovation
• We have supported 47 investigators before they
went on to win Nobel Prizes. From:
– Hermann Joseph Muller, PhD, 1946, Nobel Prize in
Physiology or Medicine
To:
– James E. Rothman, PhD, 2013, Nobel Prize in
Physiology or Medicine
The Transformation Story
CONFIDENTIAL ACS Information Technology 11
CONFIDENTIAL ACS Information Technology 12
We moved toward a
business without
barriers to realize our
lifesaving mission
without boundaries.
1 legal entity
Leverage and
move resources
Coordinated
efforts
Scalability for
future growth
Now
12 Divisions
Grassroots
Organization
Divisional
Operating
Model
Autonomy
to make
impact at
local level
Then &
CONFIDENTIAL ACS Information Technology 13
Every good story has . . .
Beginning Journey End (States)
In the Beginning . . .
(or, Where I Came In)
CONFIDENTIAL ACS Information Technology 14
CONFIDENTIAL ACS Information Technology 15
State of IT in 2011
Findings:
• The application, data, information and infrastructure architectures reflect the changes over
the past several decades, and will need re-architecting and evolution to support the growth
and mission of “One ACS” in the years to come.
• ~90% of IT spend on “lights on” activities
Application Architecture:
• Accidental and decentralized development resulted in ~600 applications that did meet
business needs
• The resulting architecture is disjointed and costly to maintain
• Low penetration into Social & Mobile space
Data & Information Architecture:
• Data distributed across the enterprise in over ~1,500 silo’ed databases.
• The amount of data relatively small, though the diversity & distribution is immense and
creates numerous issues including inaccurate reporting, & misleading results.
Infrastructure Architecture:
• ~2,000 servers across 3 primary data centers & several hundred secondary locations
• Single point of failures: matrix of aging to end-of-life equipment with limited DR/BC
CONFIDENTIAL ACS Information Technology 16
Assessment Results
• The key findings from
discussions across the
enterprise were
synthesized into the seven
(7) Signature IT Strategies.
These strategies guide the
IT team as they establish a
solid foundation that can
support ambitious
business goals
CONFIDENTIAL ACS Information Technology 17
Guiding Principles & Outcomes
PRINCIPLES
• Simplified
• Standardized
• Secure
• Efficient
• Effective
OUTCOMES
• Customer-driven
• Enabling the
Mission
• Aligned
• Capable
• Transparent
• Innovative
CONFIDENTIAL ACS Information Technology 18
Technology Roadmap
CONFIDENTIAL ACS Information Technology
Talent Strategy &Training
Realign Organization
IT Risk Management
ITIL Based Processes & Agile (SDLC)
PMO & Balanced Scorecard
Consolidate Data Centers
Harden, Right-sized Network
Virtualize ACS Environment
Email Collaboration Platform
Tactical & Strategic Disaster Recovery
Service Oriented / Integration Architecture
Data Management Platform
BI, Analytics & Reporting Architecture
Common Services / Enterprise Service Bus Deployment
Identity & Access Management
Intranet & Internet Platform
2012 2013 2014 2015 2016
PeopleProcess
Arch.Infrastructure
Change Management Program - Recruiting, Training, Performance Management & Communications
Technology
Apps.
Application Rationalization
Mobility Strategy & Applications
Stabilize
Improve
Transform
Streamlined suppliers
Unified Communication & SIP
Application Upgrades Application Replacements
Skills analysis
The Journey So Far
CONFIDENTIAL ACS Information Technology 19
CONFIDENTIAL ACS Information Technology 20
Culture Change, Not Culture Clash
• SMAC and the Society
• Process Improvement
– 30-60-90 Journey
– The Innovation Process
• Transparency and Communication
– Inside and Outside of IT
– Performance
– Recognition
• Partnerships
• Document Collaboration
• Access to Data/Apps on the Go
• Big Data? Big Solutions
• Transforming Customer Support
• Running the Numbers
• IT Progress Report Card
• Business Focus
• Lessons Learned
SMAC in the Middle
• Social: Engagement, connection,
collaboration, community, and
crowdsourcing
• Mobile: Value through micro-
moments, innovation on the move,
event interconnections
• Analytics: Delivering value through
patterns and predictions
• Cloud: Business agility, economies of
scale, collaboration, competitiveness
CONFIDENTIAL ACS Information Technology 21
Interconnection
CONFIDENTIAL ACS Information Technology 22
SMAC and the Society
Before 2012
•Facebook / Twitter / Instagram
•Low penetration
•Outdated chat client
Now & Near Future
•Social media login / integration for
programs and promotion
•Enterprise chat / collaboration
•Yammer enterprise social media
Before 2012
• Company-sponsored expense
• BYOD launched: ~320 devices
• Unsecured, unofficial apps
Now & Near Future
• BYOD: 3,500+ devices
• Enterprise App Store with third-party and
in-house apps
• Secure mobile gateway
• Mobile payment app and event support
Before 2012
• Outdated infrastructure
• Unsupported reporting software
• Weekly data refresh
Now & Near Future
• Enterprise data warehouse/platform
• Daily data refresh
• Latest enterprise reporting software
• Mobility and greater BI
Before 2012
•Outdated intranet, project sites
•Decentralized servers /
environment
Now & Near Future
•SharePoint intranet, project and
team sites
•Centralized servers, support
•OneDrive storage
SOCIAL
MOBILE CLOUD
ANALYTICS
CONFIDENTIAL ACS Information Technology 23
CONFIDENTIAL ACS Information Technology 24
The
Innovation
Process
CONFIDENTIAL ACS Information Technology 25
Quick Wins! 30-60-90!
• Quick Wins program provides standard
processes and brings relief to pain points
– Reduced risk: transparency, improved controls
– Improved quality
– Greater productivity: effective use of resources
– Improved timeliness: faster turnaround, proactive
escalations
March 2012
Quick Wins program
implemented
March 2013
310 Quick Wins launched
128 Completed
Integrated Quick Wins
into Enterprise demand
management
March 2014
424 Quick Wins launched
192 Completed
CONFIDENTIAL ACS Information Technology 26
Transparency & Communication
Inside IT:
• Communication
– Newsletters
– Emails (CIO Update, Jay’s Open Door)
– Social media (Yammer)
• Performance
– Restructure duties, teams
– Set expectations
• Recognition
– IT CODE Spirit of Excellence
Outside IT:
• Project Deployments
– Employ Change Champions
– Generate excitement
• Communication
– Targeted and project-related emails
– Annual Performance Report
– Nationwide survey
– Social media (Yammer)
– Open Door policy
CONFIDENTIAL ACS Information Technology 27
IT CODE & Spirit of Excellence Award
CONFIDENTIAL ACS Information Technology 28
Partnerships
• Enterprise-wide
– Business needs
– Apps and solutions
– Support mission
and
transformation
• Talent/HR
– Training needs
– Recognition and
awards
• Marketing &
Revenue
– Communications
assistance
• Project Management
– Organized,
efficient projects /
timelines
• Finance
– Budget planning
CONFIDENTIAL ACS Information Technology 29
CONFIDENTIAL ACS Information Technology 30
Access Data/Apps on the Go
• Mobility Strategy
– BYOD
– Enterprise App Store – Customized and in-
house apps
• Application virtualization
• Slow, but steady move toward cloud and
SaaS where appropriate
42%Increase in
connected
BYOD
devices in
6 months
CONFIDENTIAL ACS Information Technology 31
Data Management Solutions
• Enterprise Data Warehouse
Appliance
– Daily data refresh
• Enterprise Business Intelligence
Platform
– Faster, more advanced reporting
with up-to-date data
– Mobile reporting
CONFIDENTIAL ACS Information Technology 32
Transforming Customer Support
• Increase
frequency of and
areas of
measurement
• Survey
• Prioritize pain
points
• Be open to
feedback and
changes
• Develop action
plans to fix
issues / correct
course
89
90
91
92
93
94
95
96
97
98
99
10/18/2012 1/26/2013 5/6/2013 8/14/2013 11/22/2013 3/2/2014 6/10/2014 9/18/2014
PercentCustomerSatisfaction
Year
% Customer Satisfaction 2012 to Present
CONFIDENTIAL ACS Information Technology 33
Running the Numbers
150%
$6 m
9,000
12% 10%
Increase in
customer
service
Increase in
first-contact
resolutions
email accounts
in 2 monthsin telecom savings each year
Increase in
sites with
enterprise Wi-Fi
Migrated
40%
Increase in
cancer.org site visits
while saving
$500,000
in site support costs
Report Card
CONFIDENTIAL ACS Information Technology 34
CONFIDENTIAL ACS Information Technology 35
• Lotus Notes mail servers reduced from 139
to 12
• Domain controllers reduced from 147 to 53
• Migration and sunset of >200 Enterprise
apps
• Consolidation of 7 GLs to 1
• 150% increase in sites with Enterprise Wi-Fi
capabilities
• 50% increase in standard Avaya VOIP sites
• 4,800 new computers issued during 2012
• Cost reductions realized for hardware
and/or software maintenance
• Records Management Program (6 months of
email)
• Streamlined project portfolio to align with
the business needs
• Our BYOD program (tablets and
smartphones) increased from 319 to 3,500+
• Monitoring 12,000+ endpoints
• 99.5% of all computers have latest McAfee
• 99.5% of all computers have latest
Encryption
• Identity and Access Management
• Active Directory cleanup, using
FIM/tools we already owned
• Office 365 Migration
• 9,000 email accounts in mere months
• Industry-standard email and apps
• New Intranet – SharePoint for collaboration,
communication
• Digital Asset Management
• Application virtualization
• Integrated Yammer into SharePoint
• MS Lync meetings
• SharePoint 2013 – team sites, project sites
• Reduced data latency for critical reports
from weekly to nightly
• Internal firewalls
• Endpoint & email DLP
• Upgraded to Cisco VPN & site to site
• Active Directory domain
consolidation
• Server/router/network
consolidation
• Uniform patch management
process
• Latest BusinessObjects upgrade
• OneDrive for Business – document
access anywhere
• Mobile reporting
• Visual dashboards
• Alert notifications
• Better search/navigation
• Quarterly compliance and
certification of system access
• Network authentication
CONFIDENTIAL ACS Information Technology 36
End (States)
CONFIDENTIAL ACS Information Technology 37
Our Outlook
LESSONS LEARNED
• Collaborate or die
• Quick Wins Strategy – What can you do in
30–60– 90 days
• Build credibility through transparency and
frequent communications
• Always understand the culture of the
organization and change appetite
• Live to fight another day!
• Learn from your peers – internal and
external
• Change people or change people
• Trust your gut
• Don’t reinvent the wheel! “R&D”
CONFIDENTIAL ACS Information Technology 38
0
10
20
30
40
50
60
70
80
2012
2013
2014
Beyond 2014
IT Spend Focus Areas
Stabilize Improve Transform
Reduced spend on ‘keep the lights on’ activities adds to the
bottom line and means more funding for new technology
solutions and process improvements.
CONFIDENTIAL ACS Information Technology 39
CONFIDENTIAL ACS Information Technology 40
CONFIDENTIAL ACS Information Technology 41

Mais conteúdo relacionado

Mais procurados

Integrate Big Data into Your Organization with Informatica and Perficient
Integrate Big Data into Your Organization with Informatica and PerficientIntegrate Big Data into Your Organization with Informatica and Perficient
Integrate Big Data into Your Organization with Informatica and PerficientPerficient, Inc.
 
The Digital Enterprise - Alfresco Summit Keynote 2014
The Digital Enterprise - Alfresco Summit Keynote 2014The Digital Enterprise - Alfresco Summit Keynote 2014
The Digital Enterprise - Alfresco Summit Keynote 2014John Newton
 
Building your skills for a Cloud World
Building your skills for a Cloud WorldBuilding your skills for a Cloud World
Building your skills for a Cloud WorldChristian Verstraete
 
Building a Business Case for Innovation: Project Considerations for Cloud, Mo...
Building a Business Case for Innovation: Project Considerations for Cloud, Mo...Building a Business Case for Innovation: Project Considerations for Cloud, Mo...
Building a Business Case for Innovation: Project Considerations for Cloud, Mo...Fred Isbell
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlAIIM International
 
The Business Value of Metrics Driven Information Governance
The Business Value of Metrics Driven Information GovernanceThe Business Value of Metrics Driven Information Governance
The Business Value of Metrics Driven Information GovernanceEarley Information Science
 
RES.Damron CV Jan 2016
RES.Damron CV Jan 2016RES.Damron CV Jan 2016
RES.Damron CV Jan 2016Celeste Damron
 
Cousino Sheldon
Cousino SheldonCousino Sheldon
Cousino SheldonTom Egner
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data ScienceUsama Fayyad
 
TSPi-Corporate-Presentation-Short-052813
TSPi-Corporate-Presentation-Short-052813TSPi-Corporate-Presentation-Short-052813
TSPi-Corporate-Presentation-Short-052813Ramon F. La Torre
 
Itag usama bigdata-6-2015-full
Itag usama bigdata-6-2015-fullItag usama bigdata-6-2015-full
Itag usama bigdata-6-2015-fullUsama Fayyad
 
The journey to trusted data and better decisions
The journey to trusted data and better decisionsThe journey to trusted data and better decisions
The journey to trusted data and better decisionsFelix Liao
 
The fork in the road - the Application Modernization Roadmap for Notes/Domin...
The fork in the road -  the Application Modernization Roadmap for Notes/Domin...The fork in the road -  the Application Modernization Roadmap for Notes/Domin...
The fork in the road - the Application Modernization Roadmap for Notes/Domin...John Head
 
Who am I to you? Digital’s relationship with technology and data | Heads of D...
Who am I to you? Digital’s relationship with technology and data | Heads of D...Who am I to you? Digital’s relationship with technology and data | Heads of D...
Who am I to you? Digital’s relationship with technology and data | Heads of D...CharityComms
 
AU - ibm innovation quitzau 30 04-2015
AU -  ibm innovation quitzau 30 04-2015AU -  ibm innovation quitzau 30 04-2015
AU - ibm innovation quitzau 30 04-2015Anders Quitzau
 

Mais procurados (20)

Web focus overview presentation 2015
Web focus overview presentation 2015Web focus overview presentation 2015
Web focus overview presentation 2015
 
Integrate Big Data into Your Organization with Informatica and Perficient
Integrate Big Data into Your Organization with Informatica and PerficientIntegrate Big Data into Your Organization with Informatica and Perficient
Integrate Big Data into Your Organization with Informatica and Perficient
 
The Digital Enterprise - Alfresco Summit Keynote 2014
The Digital Enterprise - Alfresco Summit Keynote 2014The Digital Enterprise - Alfresco Summit Keynote 2014
The Digital Enterprise - Alfresco Summit Keynote 2014
 
Building your skills for a Cloud World
Building your skills for a Cloud WorldBuilding your skills for a Cloud World
Building your skills for a Cloud World
 
Building a Business Case for Innovation: Project Considerations for Cloud, Mo...
Building a Business Case for Innovation: Project Considerations for Cloud, Mo...Building a Business Case for Innovation: Project Considerations for Cloud, Mo...
Building a Business Case for Innovation: Project Considerations for Cloud, Mo...
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
 
The Business Value of Metrics Driven Information Governance
The Business Value of Metrics Driven Information GovernanceThe Business Value of Metrics Driven Information Governance
The Business Value of Metrics Driven Information Governance
 
RES.Damron CV Jan 2016
RES.Damron CV Jan 2016RES.Damron CV Jan 2016
RES.Damron CV Jan 2016
 
Cousino Sheldon
Cousino SheldonCousino Sheldon
Cousino Sheldon
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science
 
TSPi-Corporate-Presentation-Short-052813
TSPi-Corporate-Presentation-Short-052813TSPi-Corporate-Presentation-Short-052813
TSPi-Corporate-Presentation-Short-052813
 
CTAM Making Analytics Actionable RJA FINAL
CTAM Making Analytics Actionable RJA FINALCTAM Making Analytics Actionable RJA FINAL
CTAM Making Analytics Actionable RJA FINAL
 
Dr. Frank Harper Jr. - Pakistan CIO Summit Keynotes
Dr. Frank Harper Jr. - Pakistan CIO Summit KeynotesDr. Frank Harper Jr. - Pakistan CIO Summit Keynotes
Dr. Frank Harper Jr. - Pakistan CIO Summit Keynotes
 
Itag usama bigdata-6-2015-full
Itag usama bigdata-6-2015-fullItag usama bigdata-6-2015-full
Itag usama bigdata-6-2015-full
 
The journey to trusted data and better decisions
The journey to trusted data and better decisionsThe journey to trusted data and better decisions
The journey to trusted data and better decisions
 
The fork in the road - the Application Modernization Roadmap for Notes/Domin...
The fork in the road -  the Application Modernization Roadmap for Notes/Domin...The fork in the road -  the Application Modernization Roadmap for Notes/Domin...
The fork in the road - the Application Modernization Roadmap for Notes/Domin...
 
Who am I to you? Digital’s relationship with technology and data | Heads of D...
Who am I to you? Digital’s relationship with technology and data | Heads of D...Who am I to you? Digital’s relationship with technology and data | Heads of D...
Who am I to you? Digital’s relationship with technology and data | Heads of D...
 
AU - ibm innovation quitzau 30 04-2015
AU -  ibm innovation quitzau 30 04-2015AU -  ibm innovation quitzau 30 04-2015
AU - ibm innovation quitzau 30 04-2015
 
Case Study of NYCHA's IT PMO
Case Study of NYCHA's IT PMOCase Study of NYCHA's IT PMO
Case Study of NYCHA's IT PMO
 
Introduction 2014
Introduction 2014Introduction 2014
Introduction 2014
 

Semelhante a Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at the American Cancer Society" with Jay Ferro, CIO, American Cancer Society

Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...Health IT Conference – iHT2
 
Mergenthaler mis300 1203 a-01 ph 1 ip
Mergenthaler mis300 1203 a-01 ph 1 ipMergenthaler mis300 1203 a-01 ph 1 ip
Mergenthaler mis300 1203 a-01 ph 1 ipSabrina Mergenthaler
 
Newcastle Intro 2015
Newcastle Intro 2015Newcastle Intro 2015
Newcastle Intro 2015Lee Schlenker
 
OneIS CANHEIT V03 NN
OneIS CANHEIT V03 NNOneIS CANHEIT V03 NN
OneIS CANHEIT V03 NNMark Roman
 
Fate of the Chief Data Officer
Fate of the Chief Data OfficerFate of the Chief Data Officer
Fate of the Chief Data OfficerTamarah Usher
 
Getting Data Quality Right
Getting Data Quality RightGetting Data Quality Right
Getting Data Quality RightDATAVERSITY
 
Valuing the data asset
Valuing the data assetValuing the data asset
Valuing the data assetBala Iyer
 
Data Governance in a big data era
Data Governance in a big data eraData Governance in a big data era
Data Governance in a big data eraPieter De Leenheer
 
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...Enterprise Management Associates
 
Founding a Data Democracy: How Ivy Tech is Leading a Revolution in Higher Edu...
Founding a Data Democracy: How Ivy Tech is Leading a Revolution in Higher Edu...Founding a Data Democracy: How Ivy Tech is Leading a Revolution in Higher Edu...
Founding a Data Democracy: How Ivy Tech is Leading a Revolution in Higher Edu...Brendan Aldrich
 
[WSO2Con Asia 2018] Get on the Bus for the Journey
[WSO2Con Asia 2018] Get on the Bus for the Journey[WSO2Con Asia 2018] Get on the Bus for the Journey
[WSO2Con Asia 2018] Get on the Bus for the JourneyWSO2
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
 
Rise of the Data Democracy
Rise of the Data DemocracyRise of the Data Democracy
Rise of the Data DemocracyBrendan Aldrich
 
FINAL_Autumn 2015 Global AR Council Member Meeting Presentation - Optimizing ...
FINAL_Autumn 2015 Global AR Council Member Meeting Presentation - Optimizing ...FINAL_Autumn 2015 Global AR Council Member Meeting Presentation - Optimizing ...
FINAL_Autumn 2015 Global AR Council Member Meeting Presentation - Optimizing ...Larry Yokell
 
CI or FS Poly Cleared Job Fair Handbook | May 18
CI or FS Poly Cleared Job Fair Handbook | May 18 CI or FS Poly Cleared Job Fair Handbook | May 18
CI or FS Poly Cleared Job Fair Handbook | May 18 ClearedJobs.Net
 
Basics of BI and Data Management (Summary).pdf
Basics of BI and Data Management (Summary).pdfBasics of BI and Data Management (Summary).pdf
Basics of BI and Data Management (Summary).pdfamorshed
 

Semelhante a Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at the American Cancer Society" with Jay Ferro, CIO, American Cancer Society (20)

Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
 
Mergenthaler mis300 1203 a-01 ph 1 ip
Mergenthaler mis300 1203 a-01 ph 1 ipMergenthaler mis300 1203 a-01 ph 1 ip
Mergenthaler mis300 1203 a-01 ph 1 ip
 
Future ready
Future readyFuture ready
Future ready
 
Newcastle Intro 2015
Newcastle Intro 2015Newcastle Intro 2015
Newcastle Intro 2015
 
OneIS CANHEIT V03 NN
OneIS CANHEIT V03 NNOneIS CANHEIT V03 NN
OneIS CANHEIT V03 NN
 
Fate of the Chief Data Officer
Fate of the Chief Data OfficerFate of the Chief Data Officer
Fate of the Chief Data Officer
 
Getting Data Quality Right
Getting Data Quality RightGetting Data Quality Right
Getting Data Quality Right
 
Valuing the data asset
Valuing the data assetValuing the data asset
Valuing the data asset
 
Bus 615 group presentation
Bus 615 group presentationBus 615 group presentation
Bus 615 group presentation
 
Data Governance in a big data era
Data Governance in a big data eraData Governance in a big data era
Data Governance in a big data era
 
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
 
Data Science and Analytics
Data Science and Analytics Data Science and Analytics
Data Science and Analytics
 
Founding a Data Democracy: How Ivy Tech is Leading a Revolution in Higher Edu...
Founding a Data Democracy: How Ivy Tech is Leading a Revolution in Higher Edu...Founding a Data Democracy: How Ivy Tech is Leading a Revolution in Higher Edu...
Founding a Data Democracy: How Ivy Tech is Leading a Revolution in Higher Edu...
 
[WSO2Con Asia 2018] Get on the Bus for the Journey
[WSO2Con Asia 2018] Get on the Bus for the Journey[WSO2Con Asia 2018] Get on the Bus for the Journey
[WSO2Con Asia 2018] Get on the Bus for the Journey
 
RowanDay2.pptx
RowanDay2.pptxRowanDay2.pptx
RowanDay2.pptx
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Rise of the Data Democracy
Rise of the Data DemocracyRise of the Data Democracy
Rise of the Data Democracy
 
FINAL_Autumn 2015 Global AR Council Member Meeting Presentation - Optimizing ...
FINAL_Autumn 2015 Global AR Council Member Meeting Presentation - Optimizing ...FINAL_Autumn 2015 Global AR Council Member Meeting Presentation - Optimizing ...
FINAL_Autumn 2015 Global AR Council Member Meeting Presentation - Optimizing ...
 
CI or FS Poly Cleared Job Fair Handbook | May 18
CI or FS Poly Cleared Job Fair Handbook | May 18 CI or FS Poly Cleared Job Fair Handbook | May 18
CI or FS Poly Cleared Job Fair Handbook | May 18
 
Basics of BI and Data Management (Summary).pdf
Basics of BI and Data Management (Summary).pdfBasics of BI and Data Management (Summary).pdf
Basics of BI and Data Management (Summary).pdf
 

Mais de Health IT Conference – iHT2

Mais de Health IT Conference – iHT2 (20)

2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit 2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
 

Último

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Último (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at the American Cancer Society" with Jay Ferro, CIO, American Cancer Society

  • 1. Leading Business Transformation Jay Ferro, Chief Information Officer July 22, 2014Health IT Summit Denver, CO CONFIDENTIAL ACS Information Technology 1
  • 2. CONFIDENTIAL ACS Information Technology 2 My Story and Our Story • Who I Am • Who We Are • The Transformation Story • In the Beginning . . . • The Journey So Far • Report Card and Outlook • End (States)
  • 3. Who I Am POSITION • Chief Information Officer, American Cancer Society EDUCATION • AB & MBA, University of Georgia FAMILY • Three sons: Trey (15), Connor (13) and Alex (10) NOMINATIONS • 2013 Top 10 CIO Breakaway Leader – Winner • 2012, 2013 ATP (Assoc. Telecom Pro) – Finalist • 2011 Georgia CIO of the Year – Winner • 2010 Georgia CIO of the Year – Finalist BOARDS • Board Chair, Georgia CIO Leadership Association • Board Chair, TechBridge • Co-Chair, United Way, Technology Unit • Advisory Board, Women In Technology • Alumni Board, Terry College of Business CONFIDENTIAL ACS Information Technology 3 http://www.twitter.com/jayferro
  • 4. More Importantly CONFIDENTIAL ACS Information Technology 4
  • 5. Who We Are CONFIDENTIAL ACS Information Technology 5
  • 6. Who We Are • Founded in 1913, ACS is the nation’s largest voluntary public health organization. • The American Cancer Society is the most trusted source of cancer information. • As the largest nongovernmental funder of cancer research and having spent more than $3.6 billion on cancer research since 1946, we’ve played a role in nearly every cancer breakthrough in recent history. CONFIDENTIAL ACS Information Technology 6
  • 8. Society Engagement Platforms CONFIDENTIAL ACS Information Technology 8
  • 9. What Does Your Dollar Do? CONFIDENTIAL ACS Information Technology 9
  • 10. CONFIDENTIAL ACS Information Technology 10 A History of Innovation • We have supported 47 investigators before they went on to win Nobel Prizes. From: – Hermann Joseph Muller, PhD, 1946, Nobel Prize in Physiology or Medicine To: – James E. Rothman, PhD, 2013, Nobel Prize in Physiology or Medicine
  • 11. The Transformation Story CONFIDENTIAL ACS Information Technology 11
  • 12. CONFIDENTIAL ACS Information Technology 12 We moved toward a business without barriers to realize our lifesaving mission without boundaries. 1 legal entity Leverage and move resources Coordinated efforts Scalability for future growth Now 12 Divisions Grassroots Organization Divisional Operating Model Autonomy to make impact at local level Then &
  • 13. CONFIDENTIAL ACS Information Technology 13 Every good story has . . . Beginning Journey End (States)
  • 14. In the Beginning . . . (or, Where I Came In) CONFIDENTIAL ACS Information Technology 14
  • 15. CONFIDENTIAL ACS Information Technology 15 State of IT in 2011 Findings: • The application, data, information and infrastructure architectures reflect the changes over the past several decades, and will need re-architecting and evolution to support the growth and mission of “One ACS” in the years to come. • ~90% of IT spend on “lights on” activities Application Architecture: • Accidental and decentralized development resulted in ~600 applications that did meet business needs • The resulting architecture is disjointed and costly to maintain • Low penetration into Social & Mobile space Data & Information Architecture: • Data distributed across the enterprise in over ~1,500 silo’ed databases. • The amount of data relatively small, though the diversity & distribution is immense and creates numerous issues including inaccurate reporting, & misleading results. Infrastructure Architecture: • ~2,000 servers across 3 primary data centers & several hundred secondary locations • Single point of failures: matrix of aging to end-of-life equipment with limited DR/BC
  • 16. CONFIDENTIAL ACS Information Technology 16 Assessment Results • The key findings from discussions across the enterprise were synthesized into the seven (7) Signature IT Strategies. These strategies guide the IT team as they establish a solid foundation that can support ambitious business goals
  • 17. CONFIDENTIAL ACS Information Technology 17 Guiding Principles & Outcomes PRINCIPLES • Simplified • Standardized • Secure • Efficient • Effective OUTCOMES • Customer-driven • Enabling the Mission • Aligned • Capable • Transparent • Innovative
  • 18. CONFIDENTIAL ACS Information Technology 18 Technology Roadmap CONFIDENTIAL ACS Information Technology Talent Strategy &Training Realign Organization IT Risk Management ITIL Based Processes & Agile (SDLC) PMO & Balanced Scorecard Consolidate Data Centers Harden, Right-sized Network Virtualize ACS Environment Email Collaboration Platform Tactical & Strategic Disaster Recovery Service Oriented / Integration Architecture Data Management Platform BI, Analytics & Reporting Architecture Common Services / Enterprise Service Bus Deployment Identity & Access Management Intranet & Internet Platform 2012 2013 2014 2015 2016 PeopleProcess Arch.Infrastructure Change Management Program - Recruiting, Training, Performance Management & Communications Technology Apps. Application Rationalization Mobility Strategy & Applications Stabilize Improve Transform Streamlined suppliers Unified Communication & SIP Application Upgrades Application Replacements Skills analysis
  • 19. The Journey So Far CONFIDENTIAL ACS Information Technology 19
  • 20. CONFIDENTIAL ACS Information Technology 20 Culture Change, Not Culture Clash • SMAC and the Society • Process Improvement – 30-60-90 Journey – The Innovation Process • Transparency and Communication – Inside and Outside of IT – Performance – Recognition • Partnerships • Document Collaboration • Access to Data/Apps on the Go • Big Data? Big Solutions • Transforming Customer Support • Running the Numbers • IT Progress Report Card • Business Focus • Lessons Learned
  • 21. SMAC in the Middle • Social: Engagement, connection, collaboration, community, and crowdsourcing • Mobile: Value through micro- moments, innovation on the move, event interconnections • Analytics: Delivering value through patterns and predictions • Cloud: Business agility, economies of scale, collaboration, competitiveness CONFIDENTIAL ACS Information Technology 21 Interconnection
  • 22. CONFIDENTIAL ACS Information Technology 22 SMAC and the Society Before 2012 •Facebook / Twitter / Instagram •Low penetration •Outdated chat client Now & Near Future •Social media login / integration for programs and promotion •Enterprise chat / collaboration •Yammer enterprise social media Before 2012 • Company-sponsored expense • BYOD launched: ~320 devices • Unsecured, unofficial apps Now & Near Future • BYOD: 3,500+ devices • Enterprise App Store with third-party and in-house apps • Secure mobile gateway • Mobile payment app and event support Before 2012 • Outdated infrastructure • Unsupported reporting software • Weekly data refresh Now & Near Future • Enterprise data warehouse/platform • Daily data refresh • Latest enterprise reporting software • Mobility and greater BI Before 2012 •Outdated intranet, project sites •Decentralized servers / environment Now & Near Future •SharePoint intranet, project and team sites •Centralized servers, support •OneDrive storage SOCIAL MOBILE CLOUD ANALYTICS
  • 24. CONFIDENTIAL ACS Information Technology 24 The Innovation Process
  • 25. CONFIDENTIAL ACS Information Technology 25 Quick Wins! 30-60-90! • Quick Wins program provides standard processes and brings relief to pain points – Reduced risk: transparency, improved controls – Improved quality – Greater productivity: effective use of resources – Improved timeliness: faster turnaround, proactive escalations March 2012 Quick Wins program implemented March 2013 310 Quick Wins launched 128 Completed Integrated Quick Wins into Enterprise demand management March 2014 424 Quick Wins launched 192 Completed
  • 26. CONFIDENTIAL ACS Information Technology 26 Transparency & Communication Inside IT: • Communication – Newsletters – Emails (CIO Update, Jay’s Open Door) – Social media (Yammer) • Performance – Restructure duties, teams – Set expectations • Recognition – IT CODE Spirit of Excellence Outside IT: • Project Deployments – Employ Change Champions – Generate excitement • Communication – Targeted and project-related emails – Annual Performance Report – Nationwide survey – Social media (Yammer) – Open Door policy
  • 27. CONFIDENTIAL ACS Information Technology 27 IT CODE & Spirit of Excellence Award
  • 28. CONFIDENTIAL ACS Information Technology 28 Partnerships • Enterprise-wide – Business needs – Apps and solutions – Support mission and transformation • Talent/HR – Training needs – Recognition and awards • Marketing & Revenue – Communications assistance • Project Management – Organized, efficient projects / timelines • Finance – Budget planning
  • 30. CONFIDENTIAL ACS Information Technology 30 Access Data/Apps on the Go • Mobility Strategy – BYOD – Enterprise App Store – Customized and in- house apps • Application virtualization • Slow, but steady move toward cloud and SaaS where appropriate 42%Increase in connected BYOD devices in 6 months
  • 31. CONFIDENTIAL ACS Information Technology 31 Data Management Solutions • Enterprise Data Warehouse Appliance – Daily data refresh • Enterprise Business Intelligence Platform – Faster, more advanced reporting with up-to-date data – Mobile reporting
  • 32. CONFIDENTIAL ACS Information Technology 32 Transforming Customer Support • Increase frequency of and areas of measurement • Survey • Prioritize pain points • Be open to feedback and changes • Develop action plans to fix issues / correct course 89 90 91 92 93 94 95 96 97 98 99 10/18/2012 1/26/2013 5/6/2013 8/14/2013 11/22/2013 3/2/2014 6/10/2014 9/18/2014 PercentCustomerSatisfaction Year % Customer Satisfaction 2012 to Present
  • 33. CONFIDENTIAL ACS Information Technology 33 Running the Numbers 150% $6 m 9,000 12% 10% Increase in customer service Increase in first-contact resolutions email accounts in 2 monthsin telecom savings each year Increase in sites with enterprise Wi-Fi Migrated 40% Increase in cancer.org site visits while saving $500,000 in site support costs
  • 34. Report Card CONFIDENTIAL ACS Information Technology 34
  • 35. CONFIDENTIAL ACS Information Technology 35 • Lotus Notes mail servers reduced from 139 to 12 • Domain controllers reduced from 147 to 53 • Migration and sunset of >200 Enterprise apps • Consolidation of 7 GLs to 1 • 150% increase in sites with Enterprise Wi-Fi capabilities • 50% increase in standard Avaya VOIP sites • 4,800 new computers issued during 2012 • Cost reductions realized for hardware and/or software maintenance • Records Management Program (6 months of email) • Streamlined project portfolio to align with the business needs • Our BYOD program (tablets and smartphones) increased from 319 to 3,500+ • Monitoring 12,000+ endpoints • 99.5% of all computers have latest McAfee • 99.5% of all computers have latest Encryption • Identity and Access Management • Active Directory cleanup, using FIM/tools we already owned • Office 365 Migration • 9,000 email accounts in mere months • Industry-standard email and apps • New Intranet – SharePoint for collaboration, communication • Digital Asset Management • Application virtualization • Integrated Yammer into SharePoint • MS Lync meetings • SharePoint 2013 – team sites, project sites • Reduced data latency for critical reports from weekly to nightly • Internal firewalls • Endpoint & email DLP • Upgraded to Cisco VPN & site to site • Active Directory domain consolidation • Server/router/network consolidation • Uniform patch management process • Latest BusinessObjects upgrade • OneDrive for Business – document access anywhere • Mobile reporting • Visual dashboards • Alert notifications • Better search/navigation • Quarterly compliance and certification of system access • Network authentication
  • 37. End (States) CONFIDENTIAL ACS Information Technology 37
  • 38. Our Outlook LESSONS LEARNED • Collaborate or die • Quick Wins Strategy – What can you do in 30–60– 90 days • Build credibility through transparency and frequent communications • Always understand the culture of the organization and change appetite • Live to fight another day! • Learn from your peers – internal and external • Change people or change people • Trust your gut • Don’t reinvent the wheel! “R&D” CONFIDENTIAL ACS Information Technology 38 0 10 20 30 40 50 60 70 80 2012 2013 2014 Beyond 2014 IT Spend Focus Areas Stabilize Improve Transform Reduced spend on ‘keep the lights on’ activities adds to the bottom line and means more funding for new technology solutions and process improvements.