SlideShare uma empresa Scribd logo
1 de 36
Baixar para ler offline
Challenges	
  of	
  Outsourcing	
  the	
  
Mainframe	
  
Rui	
  Miguel	
  Feio	
  
RSM	
  Partners	
  
	
  
Date	
  of	
  presenta:on	
  (04/11/2015)	
  
Session	
  <FG>	
  
Delivering	
  the	
  best	
  in	
  z	
  services,	
  soJware,	
  hardware	
  and	
  training.	
  Delivering	
  the	
  best	
  in	
  z	
  services,	
  soJware,	
  hardware	
  and	
  training.	
  
World	
  Class,	
  Full	
  Spectrum,	
  z	
  Services	
  
Challenges	
  of	
  Outsourcing	
  	
  
the	
  Mainframe	
  
Rui	
  Miguel	
  Feio	
  
Security	
  Lead	
  
Agenda	
  	
  
•  Introduc:on	
  
•  Outsourcing	
  the	
  Mainframe	
  
•  Outsourced	
  in	
  1,	
  2,	
  3…	
  
•  An	
  Outsourcing	
  Study	
  Report	
  
•  Is	
  Outsourcing	
  a	
  Bad	
  Thing?	
  
•  References	
  and	
  Resources	
  
•  Ques:ons?	
  
Introduc:on	
  
Rui	
  Miguel	
  Feio	
  is…	
  
–  Security	
  lead	
  at	
  RSM	
  Partners	
  
–  Mainframe	
  technician	
  specialising	
  in	
  mainframe	
  security	
  
–  Has	
  been	
  working	
  with	
  mainframes	
  for	
  the	
  past	
  16	
  years	
  
–  Started	
  as	
  an	
  MVS	
  Systems	
  Programmer	
  
–  Experience	
  in	
  other	
  pla^orms	
  as	
  well	
  
–  Has	
  worked	
  in	
  both	
  sides	
  of	
  the	
  fence:	
  
•  For	
  outsource	
  service	
  provider	
  companies	
  
•  For	
  companies	
  that	
  have	
  been	
  outsourced	
  
Outsourcing	
  the	
  
Mainframe	
  
Why	
  Consider	
  Outsourcing?	
  
Companies	
  see	
  Outsourcing	
  as	
  a	
  way	
  to:	
  
•  Reduce	
  opera:onal	
  costs:	
  
–  Opera:ons,	
  maintenance,	
  labour	
  
•  Improve	
  services,	
  technology	
  
•  Address	
  problems:	
  
–  Security	
  
–  Legacy	
  applica:ons	
  	
  
–  Infrastructure	
  
–  Re:ring	
  IT	
  experts	
  
•  Ul:mately	
  improve	
  business	
  landscape,	
  increase	
  share	
  values,	
  
distribute	
  beber	
  dividends,	
  and	
  pay	
  higher	
  bonuses	
  
Choosing	
  an	
  Outsourcer	
  
•  Typically	
  companies	
  select	
  an	
  Outsourcer	
  based	
  on:	
  
–  The	
  Outsourcer’s	
  name	
  and	
  size	
  
–  Cost	
  
•  Companies	
  don’t	
  focus	
  on:	
  
–  Other	
  companies’	
  sa:sfac:on	
  with	
  the	
  Outsourcer	
  
–  Technical	
  requirements	
  
–  Risks,	
  challenges,…	
  
–  What	
  the	
  outsource	
  encompasses	
  
The	
  Decision	
  Makers	
  
•  The	
  outsourcing	
  decision	
  makers	
  typically:	
  
–  Have	
  a	
  short	
  term	
  management	
  aetude	
  
–  Don’t	
  have	
  a	
  “feel	
  the	
  Company”	
  Culture	
  
–  Are	
  not	
  interested	
  on	
  aJer	
  the	
  facts	
  
–  Are	
  not	
  liable	
  for	
  making	
  the	
  wrong	
  decisions	
  
–  In	
  some	
  cases	
  are	
  egocentric	
  
–  May	
  or	
  may	
  not	
  have	
  an	
  understanding	
  of	
  what	
  a	
  mainframe	
  is	
  
and	
  the	
  importance	
  of	
  it	
  for	
  the	
  company	
  
The	
  Focus	
  
•  The	
  focus	
  of	
  the	
  decision	
  maker	
  is:	
  
–  Pass	
  the	
  responsibility	
  to	
  a	
  3rd	
  party	
  
–  Bonus	
  =	
  costs	
  reduc:on	
  +	
  increase	
  share	
  values	
  
–  Pass	
  responsibility	
  +	
  Bonus	
  
•  Important	
  aspects	
  are	
  overlooked	
  or	
  seen	
  as	
  :cks	
  in	
  a	
  box	
  only	
  
without	
  actually	
  considering	
  if	
  they	
  are	
  real	
  or	
  if	
  they	
  apply:	
  
–  Technical	
  benefits	
  
–  Business	
  benefits	
  (performance,	
  availability,	
  support)	
  
The	
  Outsourcing	
  Conundrum	
  
•  Companies	
  see	
  outsourcing	
  as	
  a	
  way	
  to	
  save	
  money	
  
•  On	
  the	
  other	
  hand	
  outsourcers	
  want	
  to	
  make	
  money	
  
•  Can	
  you	
  see	
  a	
  problem	
  here?	
  
Let’s	
  Meet	
  to	
  Discuss	
  
•  All	
  par:es	
  get	
  involved	
  but	
  not	
  all	
  of	
  them	
  have	
  a	
  saying:	
  
–  Outsourcer	
  people	
  
–  Decision	
  makers	
  
–  Managers	
  
–  Project	
  managers	
  
–  Project	
  managers	
  
–  Project	
  managers	
  
–  And	
  some	
  more	
  project	
  managers	
  
–  Some	
  technical	
  people…	
  
The	
  Company’s	
  Aetude	
  
•  ‘Blinded’	
  with	
  the	
  idea	
  of	
  saving	
  money	
  most	
  of	
  the	
  :me	
  a	
  
company:	
  
–  Assumes	
  everything	
  will	
  be	
  covered	
  by	
  the	
  outsource	
  
–  Doesn’t	
  read	
  the	
  the	
  documenta:on	
  provided	
  
–  Does	
  not	
  review	
  their	
  own	
  documents	
  (processes,	
  procedures,	
  
etc.)	
  
–  Does	
  not	
  consider	
  proper	
  knowledge	
  transfer	
  
–  Does	
  not	
  ask	
  pertaining	
  ques:ons	
  	
  
–  Fails	
  to	
  listen	
  
–  Fails	
  to	
  assume	
  responsibility	
  (IT	
  infrastructure	
  has	
  a	
  direct	
  
impact	
  in	
  the	
  business)	
  
Technical	
  Team’s	
  Input	
  
•  The	
  technical	
  people	
  try	
  to	
  highlight	
  poten:al	
  problems,	
  risks,	
  
challenges…	
  
•  But	
  they	
  tend	
  to	
  be	
  ignored:	
  
–  Blah,	
  blah,	
  blah,	
  problem,	
  blah,	
  blah,	
  blah,	
  risk	
  
–  Are	
  you	
  being	
  difficult	
  because	
  you’re	
  afraid	
  you	
  might	
  lose	
  
your	
  job?	
  
–  They	
  can’t	
  communicate	
  outside	
  the	
  technical	
  terms	
  
–  No	
  one	
  understands	
  them	
  
What	
  the	
  Technician	
  Thinks	
  
The	
  “Elephant”	
  in	
  the	
  Room	
  
What	
  the	
  Decision	
  Makers	
  Think	
  
Outsourced	
  in	
  1,	
  2,	
  3…	
  
Typical	
  Issues	
  AFTER	
  Outsourcing	
  
•  Things	
  don’t	
  work	
  as	
  expected…	
  
•  Deficient	
  technical	
  exper:se	
  	
  
•  Lack	
  of	
  proper	
  support	
  
•  What	
  happened	
  to	
  the	
  technical	
  knowledge	
  transfer?	
  
•  “But	
  I	
  thought	
  that	
  was	
  included	
  in	
  the	
  Outsourcing”	
  
•  Outsourcer	
  points	
  out	
  to	
  what	
  was	
  agreed	
  between	
  both	
  par:es	
  
•  Expecta:ons	
  are	
  not	
  met	
  and	
  frustra:on	
  sebles	
  in	
  
What	
  Tends	
  to	
  Happen…	
  	
  
•  Most	
  of	
  the	
  :mes	
  the	
  Outsourcer	
  will:	
  
–  Provide	
  technical	
  and	
  non-­‐technical	
  documenta:on	
  constructed	
  
with	
  a	
  greater	
  emphasis	
  in	
  legal	
  terms	
  
–  Technical	
  documenta:on	
  does	
  not	
  describe	
  how	
  things	
  are	
  
done	
  (processes	
  and	
  procedures)	
  	
  
–  Allocate	
  the	
  same	
  technical	
  resource	
  to	
  more	
  than	
  one	
  client	
  
–  Charge	
  for	
  every	
  piece	
  of	
  work	
  not	
  covered	
  by	
  the	
  agreement	
  
(remember	
  the	
  lack	
  of	
  processes?)	
  
Why?	
  Because	
  the	
  Outsourcer…	
  
•  In	
  order	
  to	
  make	
  money	
  the	
  outsourcer	
  will:	
  
-­‐  Save	
  money	
  on	
  training	
  
-­‐  Save	
  money	
  on	
  the	
  technical	
  team:	
  
-­‐  Technical	
  resources	
  shared	
  amongst	
  different	
  clients	
  
-­‐  Reduce	
  the	
  number	
  of	
  technical	
  individuals	
  
-­‐  Replace	
  experienced	
  members	
  by	
  cheaper	
  inexperienced	
  
personnel	
  
-­‐  Only	
  cover	
  the	
  minimum	
  contracted	
  services	
  
-­‐  Charge	
  for	
  any	
  extra	
  service	
  including	
  security	
  
The	
  Company	
  Faces	
  Reality	
  
•  Ok,	
  there’s	
  a	
  problem	
  with	
  the	
  Outsourcing	
  but	
  we	
  need	
  to	
  reduce	
  
costs…	
  
•  Remember	
  how	
  costs	
  affect	
  the	
  bonuses?	
  
•  So	
  in	
  order	
  to	
  keep	
  the	
  costs	
  low,	
  the	
  company:	
  
–  Will	
  only	
  address	
  and	
  pay	
  for	
  what	
  is	
  really	
  required	
  –	
  typically	
  
audit	
  findings	
  
–  Will	
  not	
  review	
  processes	
  (internal	
  and	
  from	
  the	
  outsourcer)	
  
–  Will	
  not	
  review	
  reports	
  with	
  the	
  aben:on	
  they	
  deserve	
  (e.g.	
  
monitoring,	
  aler:ng,	
  access)	
  
–  Risk	
  wise	
  –	
  “We	
  have	
  a	
  mainframe.	
  No	
  one	
  hacks	
  the	
  
mainframe.”	
  
Where	
  Have	
  I	
  Seen	
  this	
  Before?	
  
An	
  Outsourcing	
  Study	
  
Report	
  
Mainframe	
  Outsourcing	
  Report	
  
•  Study	
  commissioned	
  by	
  Compuware	
  to	
  the	
  independent	
  research	
  
company	
  Vanson	
  Bourne	
  in	
  September	
  2012:	
  
–  “Mainframe	
  Outsourcing:	
  Removing	
  the	
  Hidden	
  Costs”	
  
•  Study	
  methodology:	
  
–  520	
  Chief	
  Opera:on	
  Officers	
  (CIOs)	
  interviewed	
  
–  Large	
  enterprises	
  across	
  a	
  range	
  of	
  industries	
  from:	
  
•  U.S.A	
  
•  Europe:	
  UK,	
  France,	
  Germany,	
  Italy,	
  Benelux	
  
•  Japan	
  
•  Australia	
  
Why	
  Outsourcing?	
  
•  65%	
  of	
  companies	
  outsource	
  mainframe	
  infrastructure	
  and/or	
  
management	
  to	
  reduce	
  costs.	
  
•  68%	
  of	
  companies	
  outsource	
  because	
  their	
  in-­‐house	
  team	
  no	
  
longer	
  has	
  legacy	
  mainframe	
  knowledge.	
  
Sa:sfac:on	
  With	
  the	
  Outsource	
  
•  67%	
  of	
  companies	
  are	
  dissa:sfied	
  with	
  the	
  quality	
  of	
  new	
  
applica:ons	
  or	
  services	
  provided	
  by	
  outsourcers	
  
•  71%	
  are	
  frustrated	
  by	
  the	
  hidden	
  costs	
  
•  65%	
  believe	
  staff	
  churn	
  within	
  outsourcers	
  nega:vely	
  impacts	
  the	
  
quality	
  and	
  turnaround	
  :me	
  of	
  work	
  
Interes:ng	
  Facts	
  
•  37%	
  of	
  respondents	
  do	
  not	
  have	
  comprehensive	
  documenta:on	
  for	
  
exis:ng	
  legacy	
  applica:ons.	
  
•  80%	
  of	
  respondents	
  believe	
  knowledge	
  transfer	
  issues	
  impact	
  
outsourcer	
  quality	
  
•  54%	
  have	
  had	
  to	
  increase	
  investment	
  in	
  tes:ng	
  and	
  
troubleshoo:ng	
  due	
  to	
  the	
  poor	
  performance	
  of	
  work	
  being	
  
delivered	
  by	
  outsourcers	
  
Now	
  What?	
  
Is	
  Outsourcing	
  a	
  Bad	
  
Thing?	
  
The	
  BIG	
  Ques:on!!	
  
•  Is	
  outsourcing	
  the	
  mainframe	
  a	
  bad	
  thing	
  then?	
  
–  In	
  most	
  cases	
  Yes!	
  
•  Focused	
  on	
  the	
  wrong	
  things	
  
•  Failed	
  to	
  look	
  into	
  things	
  properly	
  
•  Failed	
  to	
  assume	
  responsibility	
  
•  Failed	
  to	
  listen	
  
•  Failed	
  to	
  plan	
  
•  Failed	
  in	
  almost	
  everything!	
  
But	
  Does	
  it	
  Have	
  to	
  Be	
  Bad?	
  
•  Is	
  there	
  any	
  hope	
  for	
  the	
  outsource?	
  
–  Yes!	
  	
  
–  You	
  just	
  need	
  to	
  learn	
  from	
  other	
  companies’	
  experience	
  
–  Select	
  the	
  right	
  Outsourcer	
  with	
  a	
  proven	
  experience	
  in	
  
mainframe	
  outsources	
  
–  Organise	
  yourself,	
  get	
  the	
  documenta:on	
  in	
  place	
  
–  Have	
  the	
  appropriate	
  teams	
  engaged	
  in	
  the	
  outsourcing	
  plan	
  
–  Listen,	
  ask	
  ques:ons,	
  have	
  your	
  saying	
  and	
  put	
  them	
  in	
  wriben	
  
and	
  get	
  the	
  outsourcer	
  to	
  agree	
  on	
  them	
  
–  Make	
  sure	
  you	
  understand	
  what	
  you’re	
  paying	
  for	
  and	
  what	
  
you’re	
  geeng	
  in	
  return	
  
–  Make	
  sure	
  all	
  processes	
  are	
  well	
  defined	
  and	
  described	
  
References	
  &	
  Resources	
  
References	
  &	
  Resources	
  
•  “Mainframe	
  Outsourcing:	
  Removing	
  the	
  Hidden	
  Costs”,	
  Compuware	
  
•  “IT	
  Key	
  Metrics	
  Data	
  2015:	
  Key	
  Outsourcing	
  Measures:	
  Outsourcing	
  
Profiles:	
  by	
  Industry”,	
  Gartner	
  
•  “Smarter	
  Outsourcing	
  for	
  SI	
  and	
  Client”,	
  Micro	
  Focus	
  
•  Windsor	
  Group:	
  www.windzr.com/blog/topic/mainframe-­‐outsourcing	
  
•  Compuware:	
  www.compuware.com	
  
•  Gartner:	
  www.gartner.com	
  
•  Vanson	
  Bourne:	
  www.vansonbourne.com	
  
•  Micro	
  Focus:	
  www.microfocus.com	
  
•  B.	
  A.	
  Baracus:	
  en.wikipedia.org/wiki/B._A._Baracus	
  
Ques:ons?	
  
	
  
Want	
  to	
  kill	
  yourself	
  aJer	
  this?	
  
Not	
  just	
  yet…	
  Don’t	
  do	
  it!!	
   There’s	
  more!...	
  
Rui	
  Miguel	
  Feio,	
  RSM	
  Partners	
  	
  
ruif@rsmpartners.com	
  
mobile:	
  +44	
  (0)	
  7570	
  911459	
  
linkedin:	
  www.linkedin.com/in/rfeio	
  
www.rsmpartners.com	
  
Contact	
  
Session feedback – Do it online at conferences.gse.org.uk/2015/feedback/nn
Session feedback
•  Please submit your feedback at
http://conferences.gse.org.uk/2015/feedback/FG
•  Session is <FG>
This is the last
slide in the deck
36

Mais conteúdo relacionado

Semelhante a Challenges of Outsourcing the Mainframe: Risks, Knowledge Gaps and Unexpected Costs

Evaluating Blockchain Companies
Evaluating Blockchain CompaniesEvaluating Blockchain Companies
Evaluating Blockchain CompaniesMike Slinn
 
Career Conversation Technology Consulting
Career Conversation Technology ConsultingCareer Conversation Technology Consulting
Career Conversation Technology ConsultingSupportGCI
 
Technology Consulting by Prasanna
Technology Consulting by PrasannaTechnology Consulting by Prasanna
Technology Consulting by PrasannaSupportGCI
 
Mentoring Day - The Need for Technical Business Analysis - Thomas Varsamidis.pdf
Mentoring Day - The Need for Technical Business Analysis - Thomas Varsamidis.pdfMentoring Day - The Need for Technical Business Analysis - Thomas Varsamidis.pdf
Mentoring Day - The Need for Technical Business Analysis - Thomas Varsamidis.pdfVasoPolimerou
 
HR Software - Find Your Match
HR Software - Find Your MatchHR Software - Find Your Match
HR Software - Find Your MatchCascadeHR
 
Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?Kris Shenk
 
A brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UXA brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UXLarry Burks
 
2 project initiation, identification and selection
2 project initiation, identification and selection2 project initiation, identification and selection
2 project initiation, identification and selectionDr.R. SELVAM
 
Anton Nekic IS PPM Overhead or Competitive Advantage v2-4
Anton Nekic IS PPM Overhead or Competitive Advantage v2-4Anton Nekic IS PPM Overhead or Competitive Advantage v2-4
Anton Nekic IS PPM Overhead or Competitive Advantage v2-4Anton Nekic
 
Requirements engineering process in software engineering
Requirements engineering process in software engineeringRequirements engineering process in software engineering
Requirements engineering process in software engineeringPreeti Mishra
 
Large scale it projects
Large scale it projectsLarge scale it projects
Large scale it projectsGunjan Rana
 
Navigating the Build vs. Buy Decision for Your Finance Technology Needs
Navigating the Build vs. Buy Decision for Your Finance Technology NeedsNavigating the Build vs. Buy Decision for Your Finance Technology Needs
Navigating the Build vs. Buy Decision for Your Finance Technology NeedsGotransverse
 
Simplifying Financial Performance Management
Simplifying Financial Performance ManagementSimplifying Financial Performance Management
Simplifying Financial Performance ManagementCFO Group
 
Uncovering the Business Value of Managed IT Services
Uncovering the Business Value of Managed IT ServicesUncovering the Business Value of Managed IT Services
Uncovering the Business Value of Managed IT ServicesNet at Work
 
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016Daljit Banger
 
Technology Exports, Forecasting & Global Trends in Technology Management
Technology Exports, Forecasting & Global Trends in Technology ManagementTechnology Exports, Forecasting & Global Trends in Technology Management
Technology Exports, Forecasting & Global Trends in Technology ManagementSomya Goel
 
req engg (1).ppt
req engg (1).pptreq engg (1).ppt
req engg (1).pptWaniHBisen
 

Semelhante a Challenges of Outsourcing the Mainframe: Risks, Knowledge Gaps and Unexpected Costs (20)

Evaluating Blockchain Companies
Evaluating Blockchain CompaniesEvaluating Blockchain Companies
Evaluating Blockchain Companies
 
Career Conversation Technology Consulting
Career Conversation Technology ConsultingCareer Conversation Technology Consulting
Career Conversation Technology Consulting
 
Technology Consulting by Prasanna
Technology Consulting by PrasannaTechnology Consulting by Prasanna
Technology Consulting by Prasanna
 
Mentoring Day - The Need for Technical Business Analysis - Thomas Varsamidis.pdf
Mentoring Day - The Need for Technical Business Analysis - Thomas Varsamidis.pdfMentoring Day - The Need for Technical Business Analysis - Thomas Varsamidis.pdf
Mentoring Day - The Need for Technical Business Analysis - Thomas Varsamidis.pdf
 
Technology audit
Technology auditTechnology audit
Technology audit
 
Sadchap02
Sadchap02Sadchap02
Sadchap02
 
HR Software - Find Your Match
HR Software - Find Your MatchHR Software - Find Your Match
HR Software - Find Your Match
 
Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?
 
A brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UXA brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UX
 
2 project initiation, identification and selection
2 project initiation, identification and selection2 project initiation, identification and selection
2 project initiation, identification and selection
 
Outsoursing
OutsoursingOutsoursing
Outsoursing
 
Anton Nekic IS PPM Overhead or Competitive Advantage v2-4
Anton Nekic IS PPM Overhead or Competitive Advantage v2-4Anton Nekic IS PPM Overhead or Competitive Advantage v2-4
Anton Nekic IS PPM Overhead or Competitive Advantage v2-4
 
Requirements engineering process in software engineering
Requirements engineering process in software engineeringRequirements engineering process in software engineering
Requirements engineering process in software engineering
 
Large scale it projects
Large scale it projectsLarge scale it projects
Large scale it projects
 
Navigating the Build vs. Buy Decision for Your Finance Technology Needs
Navigating the Build vs. Buy Decision for Your Finance Technology NeedsNavigating the Build vs. Buy Decision for Your Finance Technology Needs
Navigating the Build vs. Buy Decision for Your Finance Technology Needs
 
Simplifying Financial Performance Management
Simplifying Financial Performance ManagementSimplifying Financial Performance Management
Simplifying Financial Performance Management
 
Uncovering the Business Value of Managed IT Services
Uncovering the Business Value of Managed IT ServicesUncovering the Business Value of Managed IT Services
Uncovering the Business Value of Managed IT Services
 
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
 
Technology Exports, Forecasting & Global Trends in Technology Management
Technology Exports, Forecasting & Global Trends in Technology ManagementTechnology Exports, Forecasting & Global Trends in Technology Management
Technology Exports, Forecasting & Global Trends in Technology Management
 
req engg (1).ppt
req engg (1).pptreq engg (1).ppt
req engg (1).ppt
 

Mais de Rui Miguel Feio

(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
 
(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2Rui Miguel Feio
 
(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)Rui Miguel Feio
 
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2Rui Miguel Feio
 
2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)Rui Miguel Feio
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Rui Miguel Feio
 
RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)Rui Miguel Feio
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)Rui Miguel Feio
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)Rui Miguel Feio
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Rui Miguel Feio
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
 
Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)Rui Miguel Feio
 
How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)Rui Miguel Feio
 
Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Rui Miguel Feio
 
How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)Rui Miguel Feio
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)Rui Miguel Feio
 
The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)Rui Miguel Feio
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Rui Miguel Feio
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Rui Miguel Feio
 

Mais de Rui Miguel Feio (20)

(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
 
(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)
 
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
 
2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
 
RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)
 
How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)
 
Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2
 
Cybercrime Inc. v2.2
Cybercrime Inc. v2.2Cybercrime Inc. v2.2
Cybercrime Inc. v2.2
 
How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Challenges of Outsourcing the Mainframe: Risks, Knowledge Gaps and Unexpected Costs

  • 1. Challenges  of  Outsourcing  the   Mainframe   Rui  Miguel  Feio   RSM  Partners     Date  of  presenta:on  (04/11/2015)   Session  <FG>  
  • 2. Delivering  the  best  in  z  services,  soJware,  hardware  and  training.  Delivering  the  best  in  z  services,  soJware,  hardware  and  training.   World  Class,  Full  Spectrum,  z  Services   Challenges  of  Outsourcing     the  Mainframe   Rui  Miguel  Feio   Security  Lead  
  • 3. Agenda     •  Introduc:on   •  Outsourcing  the  Mainframe   •  Outsourced  in  1,  2,  3…   •  An  Outsourcing  Study  Report   •  Is  Outsourcing  a  Bad  Thing?   •  References  and  Resources   •  Ques:ons?  
  • 4. Introduc:on   Rui  Miguel  Feio  is…   –  Security  lead  at  RSM  Partners   –  Mainframe  technician  specialising  in  mainframe  security   –  Has  been  working  with  mainframes  for  the  past  16  years   –  Started  as  an  MVS  Systems  Programmer   –  Experience  in  other  pla^orms  as  well   –  Has  worked  in  both  sides  of  the  fence:   •  For  outsource  service  provider  companies   •  For  companies  that  have  been  outsourced  
  • 6. Why  Consider  Outsourcing?   Companies  see  Outsourcing  as  a  way  to:   •  Reduce  opera:onal  costs:   –  Opera:ons,  maintenance,  labour   •  Improve  services,  technology   •  Address  problems:   –  Security   –  Legacy  applica:ons     –  Infrastructure   –  Re:ring  IT  experts   •  Ul:mately  improve  business  landscape,  increase  share  values,   distribute  beber  dividends,  and  pay  higher  bonuses  
  • 7. Choosing  an  Outsourcer   •  Typically  companies  select  an  Outsourcer  based  on:   –  The  Outsourcer’s  name  and  size   –  Cost   •  Companies  don’t  focus  on:   –  Other  companies’  sa:sfac:on  with  the  Outsourcer   –  Technical  requirements   –  Risks,  challenges,…   –  What  the  outsource  encompasses  
  • 8. The  Decision  Makers   •  The  outsourcing  decision  makers  typically:   –  Have  a  short  term  management  aetude   –  Don’t  have  a  “feel  the  Company”  Culture   –  Are  not  interested  on  aJer  the  facts   –  Are  not  liable  for  making  the  wrong  decisions   –  In  some  cases  are  egocentric   –  May  or  may  not  have  an  understanding  of  what  a  mainframe  is   and  the  importance  of  it  for  the  company  
  • 9. The  Focus   •  The  focus  of  the  decision  maker  is:   –  Pass  the  responsibility  to  a  3rd  party   –  Bonus  =  costs  reduc:on  +  increase  share  values   –  Pass  responsibility  +  Bonus   •  Important  aspects  are  overlooked  or  seen  as  :cks  in  a  box  only   without  actually  considering  if  they  are  real  or  if  they  apply:   –  Technical  benefits   –  Business  benefits  (performance,  availability,  support)  
  • 10. The  Outsourcing  Conundrum   •  Companies  see  outsourcing  as  a  way  to  save  money   •  On  the  other  hand  outsourcers  want  to  make  money   •  Can  you  see  a  problem  here?  
  • 11. Let’s  Meet  to  Discuss   •  All  par:es  get  involved  but  not  all  of  them  have  a  saying:   –  Outsourcer  people   –  Decision  makers   –  Managers   –  Project  managers   –  Project  managers   –  Project  managers   –  And  some  more  project  managers   –  Some  technical  people…  
  • 12. The  Company’s  Aetude   •  ‘Blinded’  with  the  idea  of  saving  money  most  of  the  :me  a   company:   –  Assumes  everything  will  be  covered  by  the  outsource   –  Doesn’t  read  the  the  documenta:on  provided   –  Does  not  review  their  own  documents  (processes,  procedures,   etc.)   –  Does  not  consider  proper  knowledge  transfer   –  Does  not  ask  pertaining  ques:ons     –  Fails  to  listen   –  Fails  to  assume  responsibility  (IT  infrastructure  has  a  direct   impact  in  the  business)  
  • 13. Technical  Team’s  Input   •  The  technical  people  try  to  highlight  poten:al  problems,  risks,   challenges…   •  But  they  tend  to  be  ignored:   –  Blah,  blah,  blah,  problem,  blah,  blah,  blah,  risk   –  Are  you  being  difficult  because  you’re  afraid  you  might  lose   your  job?   –  They  can’t  communicate  outside  the  technical  terms   –  No  one  understands  them  
  • 14. What  the  Technician  Thinks  
  • 15. The  “Elephant”  in  the  Room  
  • 16. What  the  Decision  Makers  Think  
  • 17. Outsourced  in  1,  2,  3…  
  • 18. Typical  Issues  AFTER  Outsourcing   •  Things  don’t  work  as  expected…   •  Deficient  technical  exper:se     •  Lack  of  proper  support   •  What  happened  to  the  technical  knowledge  transfer?   •  “But  I  thought  that  was  included  in  the  Outsourcing”   •  Outsourcer  points  out  to  what  was  agreed  between  both  par:es   •  Expecta:ons  are  not  met  and  frustra:on  sebles  in  
  • 19. What  Tends  to  Happen…     •  Most  of  the  :mes  the  Outsourcer  will:   –  Provide  technical  and  non-­‐technical  documenta:on  constructed   with  a  greater  emphasis  in  legal  terms   –  Technical  documenta:on  does  not  describe  how  things  are   done  (processes  and  procedures)     –  Allocate  the  same  technical  resource  to  more  than  one  client   –  Charge  for  every  piece  of  work  not  covered  by  the  agreement   (remember  the  lack  of  processes?)  
  • 20. Why?  Because  the  Outsourcer…   •  In  order  to  make  money  the  outsourcer  will:   -­‐  Save  money  on  training   -­‐  Save  money  on  the  technical  team:   -­‐  Technical  resources  shared  amongst  different  clients   -­‐  Reduce  the  number  of  technical  individuals   -­‐  Replace  experienced  members  by  cheaper  inexperienced   personnel   -­‐  Only  cover  the  minimum  contracted  services   -­‐  Charge  for  any  extra  service  including  security  
  • 21. The  Company  Faces  Reality   •  Ok,  there’s  a  problem  with  the  Outsourcing  but  we  need  to  reduce   costs…   •  Remember  how  costs  affect  the  bonuses?   •  So  in  order  to  keep  the  costs  low,  the  company:   –  Will  only  address  and  pay  for  what  is  really  required  –  typically   audit  findings   –  Will  not  review  processes  (internal  and  from  the  outsourcer)   –  Will  not  review  reports  with  the  aben:on  they  deserve  (e.g.   monitoring,  aler:ng,  access)   –  Risk  wise  –  “We  have  a  mainframe.  No  one  hacks  the   mainframe.”  
  • 22. Where  Have  I  Seen  this  Before?  
  • 23. An  Outsourcing  Study   Report  
  • 24. Mainframe  Outsourcing  Report   •  Study  commissioned  by  Compuware  to  the  independent  research   company  Vanson  Bourne  in  September  2012:   –  “Mainframe  Outsourcing:  Removing  the  Hidden  Costs”   •  Study  methodology:   –  520  Chief  Opera:on  Officers  (CIOs)  interviewed   –  Large  enterprises  across  a  range  of  industries  from:   •  U.S.A   •  Europe:  UK,  France,  Germany,  Italy,  Benelux   •  Japan   •  Australia  
  • 25. Why  Outsourcing?   •  65%  of  companies  outsource  mainframe  infrastructure  and/or   management  to  reduce  costs.   •  68%  of  companies  outsource  because  their  in-­‐house  team  no   longer  has  legacy  mainframe  knowledge.  
  • 26. Sa:sfac:on  With  the  Outsource   •  67%  of  companies  are  dissa:sfied  with  the  quality  of  new   applica:ons  or  services  provided  by  outsourcers   •  71%  are  frustrated  by  the  hidden  costs   •  65%  believe  staff  churn  within  outsourcers  nega:vely  impacts  the   quality  and  turnaround  :me  of  work  
  • 27. Interes:ng  Facts   •  37%  of  respondents  do  not  have  comprehensive  documenta:on  for   exis:ng  legacy  applica:ons.   •  80%  of  respondents  believe  knowledge  transfer  issues  impact   outsourcer  quality   •  54%  have  had  to  increase  investment  in  tes:ng  and   troubleshoo:ng  due  to  the  poor  performance  of  work  being   delivered  by  outsourcers  
  • 29. Is  Outsourcing  a  Bad   Thing?  
  • 30. The  BIG  Ques:on!!   •  Is  outsourcing  the  mainframe  a  bad  thing  then?   –  In  most  cases  Yes!   •  Focused  on  the  wrong  things   •  Failed  to  look  into  things  properly   •  Failed  to  assume  responsibility   •  Failed  to  listen   •  Failed  to  plan   •  Failed  in  almost  everything!  
  • 31. But  Does  it  Have  to  Be  Bad?   •  Is  there  any  hope  for  the  outsource?   –  Yes!     –  You  just  need  to  learn  from  other  companies’  experience   –  Select  the  right  Outsourcer  with  a  proven  experience  in   mainframe  outsources   –  Organise  yourself,  get  the  documenta:on  in  place   –  Have  the  appropriate  teams  engaged  in  the  outsourcing  plan   –  Listen,  ask  ques:ons,  have  your  saying  and  put  them  in  wriben   and  get  the  outsourcer  to  agree  on  them   –  Make  sure  you  understand  what  you’re  paying  for  and  what   you’re  geeng  in  return   –  Make  sure  all  processes  are  well  defined  and  described  
  • 33. References  &  Resources   •  “Mainframe  Outsourcing:  Removing  the  Hidden  Costs”,  Compuware   •  “IT  Key  Metrics  Data  2015:  Key  Outsourcing  Measures:  Outsourcing   Profiles:  by  Industry”,  Gartner   •  “Smarter  Outsourcing  for  SI  and  Client”,  Micro  Focus   •  Windsor  Group:  www.windzr.com/blog/topic/mainframe-­‐outsourcing   •  Compuware:  www.compuware.com   •  Gartner:  www.gartner.com   •  Vanson  Bourne:  www.vansonbourne.com   •  Micro  Focus:  www.microfocus.com   •  B.  A.  Baracus:  en.wikipedia.org/wiki/B._A._Baracus  
  • 34. Ques:ons?     Want  to  kill  yourself  aJer  this?   Not  just  yet…  Don’t  do  it!!   There’s  more!...  
  • 35. Rui  Miguel  Feio,  RSM  Partners     ruif@rsmpartners.com   mobile:  +44  (0)  7570  911459   linkedin:  www.linkedin.com/in/rfeio   www.rsmpartners.com   Contact  
  • 36. Session feedback – Do it online at conferences.gse.org.uk/2015/feedback/nn Session feedback •  Please submit your feedback at http://conferences.gse.org.uk/2015/feedback/FG •  Session is <FG> This is the last slide in the deck 36