SlideShare a Scribd company logo
1 of 44
PROPRIETARY & CONFIDENTIAL
Building the Framework for Successful IT
05.03.2017
Create an Enterprise
Architecture Strategy in 3 Steps
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 2
The information and materials provided and referenced to herein are not intended
to constitute legal, regulatory, accounting, medical or financial advice and do not
create an attorney-client or other fiduciary relationship between Change
Healthcare or its representatives and any third party. Additionally, Change
Healthcare does not guarantee the accuracy of the information contained herein.
The interpretations, extrapolations, views and opinions of each individual
presenter are not necessarily the views of Change Healthcare. Change
Healthcare disclaims any and all liability for any reliance you may place on the
information contained herein.
Disclaimer
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 3
 Bob Hoover
716-225-3262
bhoover@changehealthcare.com
 Mauricio ‘MJ’ Jimenez
305-215-2156
mj@changehealthcare.com
Introductions
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
4
CHANGE. Business needs
and Technology are
constantly changing
Why Do Healthcare
Organizations Need an
Enterprise Architecture
Strategy?
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 5
 Exchange Government Markets Growth and
Privatization
 Changing Demographics
 Retail Transformation
 Digitization of Healthcare IT
The healthcare industry is
facing a DYNAMIC MARKET,
creating both challenges and
opportunities
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 6
 Social networking connecting patients to providers, patients to
patients, etc.
 Agile Development and Implementation
 Cloud technologies and solutions
 Recent large investments by providers (for EMR’s and meaningful use)
 Big Data and the use of data in healthcare – a long way to catch up to
other industries
 Tele-Health allowing for consultations with clinicians in more
convenient locations than the medical office or hospital
 Using smartphones to deliver care management services to high-risk
patients daily, securely and with personal communications
 Technology allowing patients to learn more about their personal health
issues and treatments and the quality of their providers
 Health data transmitted to caregivers via mobile devices or in-home
monitors
CHANGE in Technology
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
7
Establish an ENTERPRISE
ARCHITECTURE STRATEGY
How do to manage
so much change?
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
8
What is
Enterprise Architecture?
EA is CONCEPTUAL BLUEPRINT
that defines the structure and
operation of an organization
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Enterprise Architecture Defined
9
 Framework which guides investment and design decisions and
specifies standards, interfaces and common services for the
deployment and management of IT assets, in support of business
objectives.
 Defines an environment that is adaptable to unforeseen requirements
and future system changes.
 EA is the link between the Business Strategy, the IT strategy and IT
implementation.
 It is an integral part of the strategic planning process and provides
guidance to those implementing and managing IT resources (data,
applications and technology).
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
EA Methodologies Available
10
GOVERNMENT
 The Federal Enterprise Architecture
PROPRIETARY
 The Zachman Framework for Enterprise Architectures
 The Gartner Methodology
GROUP DEVELOPED
 The Open Group Architectural Framework (TOGAF)
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
TOGAF
11
TECHNOLOGYBUSINESS APPLICATION INFORMATION
 The Open Group is a global consortium that enables the achievement
of business objectives through IT standards.
 Open Group Standard, is a proven enterprise architecture
methodology and framework used to improve business efficiency.
 It is the most prominent and reliable enterprise architecture standard.
DOMAINS
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 12
TOGAF Four Domain Areas
• Hardware
• Software
• Network Infrastructure
• Logical Data Models
• Physical Data Models
• Data Management
Resources
• Application Blueprint
• Component Interactions
• Service Definitions
• Relationship to Business
Processes
• Business Strategy
• Governance
• Organization
• Key Business Processes
Business
Architecture
Application
Architecture
Technology
Architecture
Information
Architecture
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
FINANCIALS
(AR/AP)
GENERAL
LEDGER
CUSTOMER
SERVICE
BENEFITS
PROVIDER
PROFILING
DATA
WAREHOUSE
DATA
ACCESS
REPORTING
PROVIDER
CREDENTIALING
UNDERWRITING/
ACTUARIAL
AUTH/REFERRAL (UM)
CONTENT VENDOR
CM/DM
PREDICTIVE
MODELING
REIMBURSEMENT
CAPITATION
APPEALS &
GRIEVANCES
13
The Application Architecture of a Health Plan
CLAIMS
AUDIT
FRAUD &
ABUSE
CLAIMS/
ENCOUNTER
PROCESSING
OTHER
CLAIMS
PROVIDER
CONTRACTS
LEGEND
Core Applications
Non-Core Applications
Auto MBR Acquisition
Care Management
Provider Systems
PRACTICE
MGMT
MEDICAL
RECORDS
AGENT/ BROKER
MANAGEMENT
MEMBERSHIP,
INDIVIDUAL, GROUP
BILLING
MARKETING
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
14
What is the intent of
Enterprise Architecture
Strategy?
The intent of an EA strategy is to
determine how an organization can
MOST EFFECTIVELY ACHIEVE ITS
IT’S CURRENT AND FUTURE
OBJECTIVES
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
15
How do we apply EA
to make a difference?
Develop a Change Framework with
CONSTANT CHANGE AS THE FIRST
PRINCIPLE and understand that healthcare
organizations need the latitude to develop or
procure their own solutions.
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 16
Three Steps to an
Enterprise Architecture
3
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 17
Three Steps to an Enterprise Architecture
Establish a Change
Framework2
Communication &
Transparency3
Business Alignment
1
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
1
Business Alignment
18
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 19
DEFINITION: ”We define Alignment among Business, Systems and
Information as a way to quantify the coherency level in relation to the
business necessity, the systems offer and information management”
Enterprise Architecture: Business and IT Alignment – C. Pereira, P. Sausa - ACM Symposium of Applied Computing
Where do we see these misalignments?
 Business Process and Information
 Business Process and Applications
 Applications and Information
 IT and Information
 Applications and IT
1 Business Alignment
Business
Architecture
Application
Architecture
Technology
Architecture
Information
Architecture
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 20
BUSINESS
ARCHITECTURE
APPLICATION
ARCHITECTURE
TECHNOLOGY
ARCHITECTURE
INFORMATION
ARCHITECTURE
1 Business Alignment – Visual Representation
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 21
Business
Architecture
Application
Architecture
IT
Architecture
Information
Architecture
1 Business Alignment - Examples
Business Architecture and Information
Architecture
 Information entities must have a business
definition, description and a set of attributes
 Attributes are related to business processes
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 22
1 Business Alignment - Examples
Business
Architecture
Application
Architecture
IT
Architecture
Data
Architecture
Business Architecture and Application
Architecture
 Application properties are classified as
availability (up time), scalability (ability to scale
up performance), profile based accesses
(ability to identify who does each task).
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 23
a) Each business process should be supported by the minimum number of applications.
b) Business activities should be supported by a single application.
c) Critical business processes should be supported by scalable and highly available
applications.
d) Critical business processes/activities should be supported by different applications than
the noncritical business processes/activities.
e) Each application's functionality should support at least one business process activity.
Otherwise, it plays no role in supporting the business.
f) Information required for critical processes should be also supported by scalable and
highly available systems.
g) Business processes activities requiring on-line/batch support should be supported by
applications running on different infrastructures, making easier the tuning of the systems
for operating window.
C. Pereira, P. Sausa , J. Marquez - Enterprise Architecture Alignment Heuristics – MS Development Network
1 Business Alignment Heuristics
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 24
Three Steps to an Enterprise Architecture
Establish a Change
Framework2
Communication &
Transparency3
Business Alignment
1
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
2
Establish a
Change Framework
25
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
26
Change Management?
Or
Change Framework?
Change Framework speaks to
CHANGES TO THE ARCHITECURE
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 27
Change Framework will determine:
 The circumstances under which the enterprise architecture, or
parts of it, will be permitted to change after deployment, and
the process by which that will happen
 The circumstances under which the architecture development
cycle will be initiated again to develop a new architecture
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 28
“There are many valid approaches to change management, and various
management techniques and methodologies that can be used to manage
change; for example, project management methods such as PRINCE2,
service management methods such as ITIL, management consultancy
methods such as Catalyst, and many others. An enterprise that already
has a change management process in place in a field other than
architecture (for example, in systems development or project
management) may well be able to adapt it for use in relation to
architecture.”
Architecture Change Management – ADM - TOGAF® 9.1
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 29
 The goal of the change framework is ensure that the EA strategy
achieves its original business value. Including managing changes to
the EA in a coordinated, strategic manner.
 The change framework will continually monitor:
 governance requests,
 changes in technology,
 changes in the business environment (i.e. growth / decline),
 capacity and performance
 CRITICAL The governance body establish criteria to judge whether a
Change Request warrants just an architecture update or whether it
warrants starting a new architecture evolution cycle.
 IMPORTANT Avoid "creeping elegance", and the governance body
must continue to look for changes that relate directly to business
value.
Architecture Change Management – ADM - TOGAF® 9.1
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 30
Types of Changes
 Simplification Change: A simplification change can normally be
handled via change management techniques.
 Incremental Change: An incremental change may be capable of
being handled via change management techniques, or it may
require partial re-architecting, depending on the nature of the
change
 Re-architecting Change: A re-architecting change requires putting
the whole architecture through the architecture development cycle
again.
Architecture Change Management – ADM - TOGAF® 9.1
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 31
Three Steps to an Enterprise Architecture
Establish a Change
Framework2
Communication &
Transparency3
Business Alignment
1
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
3
Communication
& Transparency
32
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 33
3 Communication & Transparency
COMMUNICATE,
COMMUNICATE,
COMMUNICATE!
COMMUNICATION
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 34
3 Communication & Transparency
 Organizations often fail to realize the full potential of EA due to a lack
of communication.
 Key to communication is to start with “the end” in mind. This is how you
manage expectations.
 Meeting with stakeholders to get their “buy-in”. Ask them:
 What does the EA strategy mean to you?
 Why are you doing the EA strategy?
 What are their expectation for the
end-result of the EA strategy?
COMMUNICATION
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 35
3 Communication & Transparency
 Transparency is information as a basis for decision making and control.
 Management of business requires transparency and that every
implementation of strategy depends on clearly defined goals and
access to all relevant information.
 Complete openness creates a trusted strong foundation to build upon.
 EA creates transparency by establishing a foundation for the
identification and control of measures that enable IT efficiency,
effectiveness and reliability.
TRANSPARENCY
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Case Study #1
It’s not always about the Core
36
 In the past, a common IT strategy was the single vendor approach
 Get everything you can from a single vendor to minimize the complexity
of integration
 The core was the master and all other systems were downstream
 Replacing the core was and is all encompassing and limited the Plans
ability to address any other business needs
 Today – we use architecture to:
 Address integration needs across all platforms
 Build on common a information architecture to ensure data consistency and
availability
 Leverage common technologies to delver efficiencies and minimize
complexity
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 37
 ACA
 Defined requirements
 Determined they focused on:
 Enrollment
 Financial (billing and AR)
 Layer capabilities around core as opposed to replacing
Case Study #1
It’s not always about the Core (continued)
Business
Architecture
Application
Architecture
Technology
Architecture
Information
Architecture
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Case Study #2
The enterprise has landed?
38
 Today technology is mobile which presents several complications
including:
 Security
 Connectivity
 We can’t just select a “cool” application (app), we need to understand:
 The business case
 What technology utilizes and how if fits with our architecture
 How the data aligns with our information architecture
 What standards are utilized
 Integration with other enterprise application
 Security framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 39
 Health Risk Assessment
 Determine requirements including:
 Data requirements and fit with current HRA
 Integration from architecture and current HRA application
 Security
 Existing mobile devices supported
Case Study #2
The enterprise has landed? (continued)
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Case Study #3
Information is the Key
40
 From our perspective, key to the long-term future of Health Plans is
their ability to use information to add value to programs such as:
 Value-based programs
 Population health
 Risk analysis
 Care Coordination
 Etc....
 Health Plans have historically under invested in both people and
technology to support this need
 Information Architecture must be defined
 Governance must be established
 There is no end as this is an ongoing journey
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 41
 Data model – what is your DNA
 Logical Model
 Where reporting occurs at what levels within your architecture
 What tools in your architecture support reporting
 Database
 ETL
 Tools
Case Study #3
Information is the Key (continued)
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
IN SUMMARY
42
 Establish Governance
 Business and IT owning the architecture process
 Business driving the use of technology (Business Architecture)
1 Business Alignment
2 Create a Change Framework
3 Communication and Transparency
 Communicate, communicate, communicate.
 Will only gain buy-in when the rationale behind the decision is
understood.


 Maintain Established EA
 Allow for change
 Managing the change
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Q&A
??
?
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 44
Thank You
 Bob Hoover
716-225-3262
bhoover@changehealthcare.com
 Mauricio ‘MJ’ Jimenez
305-215-2156
mj@changehealthcare.com

More Related Content

What's hot

Object Oriented Business Capability Map - IIBA 2022 - Draft.pptx
Object Oriented Business Capability Map - IIBA 2022 - Draft.pptxObject Oriented Business Capability Map - IIBA 2022 - Draft.pptx
Object Oriented Business Capability Map - IIBA 2022 - Draft.pptxAustraliaChapterIIBA
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1Mohamed Zakarya Abdelgawad
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core conceptsPaul Sullivan
 
On business capabilities, functions and application features
On business capabilities, functions and application featuresOn business capabilities, functions and application features
On business capabilities, functions and application featuresJörgen Dahlberg
 
Business Focused IT Strategy
Business Focused IT StrategyBusiness Focused IT Strategy
Business Focused IT Strategymuhammadsjameel
 
Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureAlan McSweeney
 
An Introduction into the design of business using business architecture
An Introduction into the design of business using business architectureAn Introduction into the design of business using business architecture
An Introduction into the design of business using business architectureCraig Martin
 
Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2Jean Gehring
 
Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...Alan McSweeney
 
Implementing Effective Enterprise Architecture
Implementing Effective Enterprise ArchitectureImplementing Effective Enterprise Architecture
Implementing Effective Enterprise ArchitectureLeo Shuster
 
Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)Fahmi Abdul Latip
 
Incorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureIncorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureAlan McSweeney
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureAlan McSweeney
 
Enterprise Architecture & Project Portfolio Management 2/2
Enterprise Architecture & Project Portfolio Management 2/2Enterprise Architecture & Project Portfolio Management 2/2
Enterprise Architecture & Project Portfolio Management 2/2Jean Gehring
 
Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)Rob Akershoek
 
A tailored enterprise architecture maturity model
A tailored enterprise architecture maturity modelA tailored enterprise architecture maturity model
A tailored enterprise architecture maturity modelPaul Sullivan
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept WorkshopAlan McSweeney
 
IT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of ITIT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of ITThe Open Group SA
 
Enterprise Architecture, Project Management & Digital Transformation
Enterprise Architecture, Project Management & Digital TransformationEnterprise Architecture, Project Management & Digital Transformation
Enterprise Architecture, Project Management & Digital TransformationRiaz A. Khan, OpenCA, TOGAF
 

What's hot (20)

Object Oriented Business Capability Map - IIBA 2022 - Draft.pptx
Object Oriented Business Capability Map - IIBA 2022 - Draft.pptxObject Oriented Business Capability Map - IIBA 2022 - Draft.pptx
Object Oriented Business Capability Map - IIBA 2022 - Draft.pptx
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core concepts
 
On business capabilities, functions and application features
On business capabilities, functions and application featuresOn business capabilities, functions and application features
On business capabilities, functions and application features
 
Business Focused IT Strategy
Business Focused IT StrategyBusiness Focused IT Strategy
Business Focused IT Strategy
 
Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT Architecture
 
An Introduction into the design of business using business architecture
An Introduction into the design of business using business architectureAn Introduction into the design of business using business architecture
An Introduction into the design of business using business architecture
 
Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2
 
Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
 
Implementing Effective Enterprise Architecture
Implementing Effective Enterprise ArchitectureImplementing Effective Enterprise Architecture
Implementing Effective Enterprise Architecture
 
Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)
 
Incorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureIncorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution Architecture
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise Architecture
 
Enterprise Architecture & Project Portfolio Management 2/2
Enterprise Architecture & Project Portfolio Management 2/2Enterprise Architecture & Project Portfolio Management 2/2
Enterprise Architecture & Project Portfolio Management 2/2
 
Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)
 
A tailored enterprise architecture maturity model
A tailored enterprise architecture maturity modelA tailored enterprise architecture maturity model
A tailored enterprise architecture maturity model
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept Workshop
 
IT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of ITIT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of IT
 
Enterprise Architecture, Project Management & Digital Transformation
Enterprise Architecture, Project Management & Digital TransformationEnterprise Architecture, Project Management & Digital Transformation
Enterprise Architecture, Project Management & Digital Transformation
 

Similar to Create an Enterprise Architecture Strategy in 3 Steps

Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersAndrew Ames
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersEMC
 
Wicker, Paul EXPANDED RESUME
Wicker, Paul EXPANDED RESUMEWicker, Paul EXPANDED RESUME
Wicker, Paul EXPANDED RESUMEPaul Wicker
 
ESI International - Healthcare
ESI International - HealthcareESI International - Healthcare
ESI International - HealthcareBeckie Palmer
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure managementShoaib Patel
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?PECB
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadlineaccenture
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Adaptable Architecture – the Backbone of Digital Business Models
Adaptable Architecture – the Backbone of Digital Business ModelsAdaptable Architecture – the Backbone of Digital Business Models
Adaptable Architecture – the Backbone of Digital Business ModelsWorkday, Inc.
 
Successful Change Management with ERM
Successful Change Management with ERMSuccessful Change Management with ERM
Successful Change Management with ERMAggregage
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)Gord Reynolds
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Ubisecure
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data IntegrationAnalytiX DS
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...AnalytixDataServices
 
The prominence of it lifecycle assurance
The prominence of it lifecycle assuranceThe prominence of it lifecycle assurance
The prominence of it lifecycle assuranceMaveric Systems
 
Business Intelligence Productionization
Business Intelligence ProductionizationBusiness Intelligence Productionization
Business Intelligence ProductionizationDavid Moore
 

Similar to Create an Enterprise Architecture Strategy in 3 Steps (20)

Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT System
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Wicker, Paul EXPANDED RESUME
Wicker, Paul EXPANDED RESUMEWicker, Paul EXPANDED RESUME
Wicker, Paul EXPANDED RESUME
 
ESI International - Healthcare
ESI International - HealthcareESI International - Healthcare
ESI International - Healthcare
 
Bb capabilities
Bb capabilitiesBb capabilities
Bb capabilities
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure management
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Adaptable Architecture – the Backbone of Digital Business Models
Adaptable Architecture – the Backbone of Digital Business ModelsAdaptable Architecture – the Backbone of Digital Business Models
Adaptable Architecture – the Backbone of Digital Business Models
 
Successful Change Management with ERM
Successful Change Management with ERMSuccessful Change Management with ERM
Successful Change Management with ERM
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data Integration
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
 
The prominence of it lifecycle assurance
The prominence of it lifecycle assuranceThe prominence of it lifecycle assurance
The prominence of it lifecycle assurance
 
Business Intelligence Productionization
Business Intelligence ProductionizationBusiness Intelligence Productionization
Business Intelligence Productionization
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 

Recently uploaded

nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...indiancallgirl4rent
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhSheetaleventcompany
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availablegragmanisha42
 
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipurgragmanisha42
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Memriyagarg453
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Sheetaleventcompany
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...indiancallgirl4rent
 
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetErnakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMuzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...chandigarhentertainm
 

Recently uploaded (20)

nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
 
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetErnakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMuzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
 

Create an Enterprise Architecture Strategy in 3 Steps

  • 1. PROPRIETARY & CONFIDENTIAL Building the Framework for Successful IT 05.03.2017 Create an Enterprise Architecture Strategy in 3 Steps
  • 2. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 2 The information and materials provided and referenced to herein are not intended to constitute legal, regulatory, accounting, medical or financial advice and do not create an attorney-client or other fiduciary relationship between Change Healthcare or its representatives and any third party. Additionally, Change Healthcare does not guarantee the accuracy of the information contained herein. The interpretations, extrapolations, views and opinions of each individual presenter are not necessarily the views of Change Healthcare. Change Healthcare disclaims any and all liability for any reliance you may place on the information contained herein. Disclaimer
  • 3. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 3  Bob Hoover 716-225-3262 bhoover@changehealthcare.com  Mauricio ‘MJ’ Jimenez 305-215-2156 mj@changehealthcare.com Introductions
  • 4. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 4 CHANGE. Business needs and Technology are constantly changing Why Do Healthcare Organizations Need an Enterprise Architecture Strategy?
  • 5. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 5  Exchange Government Markets Growth and Privatization  Changing Demographics  Retail Transformation  Digitization of Healthcare IT The healthcare industry is facing a DYNAMIC MARKET, creating both challenges and opportunities
  • 6. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 6  Social networking connecting patients to providers, patients to patients, etc.  Agile Development and Implementation  Cloud technologies and solutions  Recent large investments by providers (for EMR’s and meaningful use)  Big Data and the use of data in healthcare – a long way to catch up to other industries  Tele-Health allowing for consultations with clinicians in more convenient locations than the medical office or hospital  Using smartphones to deliver care management services to high-risk patients daily, securely and with personal communications  Technology allowing patients to learn more about their personal health issues and treatments and the quality of their providers  Health data transmitted to caregivers via mobile devices or in-home monitors CHANGE in Technology
  • 7. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 7 Establish an ENTERPRISE ARCHITECTURE STRATEGY How do to manage so much change?
  • 8. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 8 What is Enterprise Architecture? EA is CONCEPTUAL BLUEPRINT that defines the structure and operation of an organization
  • 9. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Enterprise Architecture Defined 9  Framework which guides investment and design decisions and specifies standards, interfaces and common services for the deployment and management of IT assets, in support of business objectives.  Defines an environment that is adaptable to unforeseen requirements and future system changes.  EA is the link between the Business Strategy, the IT strategy and IT implementation.  It is an integral part of the strategic planning process and provides guidance to those implementing and managing IT resources (data, applications and technology).
  • 10. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL EA Methodologies Available 10 GOVERNMENT  The Federal Enterprise Architecture PROPRIETARY  The Zachman Framework for Enterprise Architectures  The Gartner Methodology GROUP DEVELOPED  The Open Group Architectural Framework (TOGAF)
  • 11. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL TOGAF 11 TECHNOLOGYBUSINESS APPLICATION INFORMATION  The Open Group is a global consortium that enables the achievement of business objectives through IT standards.  Open Group Standard, is a proven enterprise architecture methodology and framework used to improve business efficiency.  It is the most prominent and reliable enterprise architecture standard. DOMAINS
  • 12. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 12 TOGAF Four Domain Areas • Hardware • Software • Network Infrastructure • Logical Data Models • Physical Data Models • Data Management Resources • Application Blueprint • Component Interactions • Service Definitions • Relationship to Business Processes • Business Strategy • Governance • Organization • Key Business Processes Business Architecture Application Architecture Technology Architecture Information Architecture
  • 13. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL FINANCIALS (AR/AP) GENERAL LEDGER CUSTOMER SERVICE BENEFITS PROVIDER PROFILING DATA WAREHOUSE DATA ACCESS REPORTING PROVIDER CREDENTIALING UNDERWRITING/ ACTUARIAL AUTH/REFERRAL (UM) CONTENT VENDOR CM/DM PREDICTIVE MODELING REIMBURSEMENT CAPITATION APPEALS & GRIEVANCES 13 The Application Architecture of a Health Plan CLAIMS AUDIT FRAUD & ABUSE CLAIMS/ ENCOUNTER PROCESSING OTHER CLAIMS PROVIDER CONTRACTS LEGEND Core Applications Non-Core Applications Auto MBR Acquisition Care Management Provider Systems PRACTICE MGMT MEDICAL RECORDS AGENT/ BROKER MANAGEMENT MEMBERSHIP, INDIVIDUAL, GROUP BILLING MARKETING
  • 14. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 14 What is the intent of Enterprise Architecture Strategy? The intent of an EA strategy is to determine how an organization can MOST EFFECTIVELY ACHIEVE ITS IT’S CURRENT AND FUTURE OBJECTIVES
  • 15. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 15 How do we apply EA to make a difference? Develop a Change Framework with CONSTANT CHANGE AS THE FIRST PRINCIPLE and understand that healthcare organizations need the latitude to develop or procure their own solutions.
  • 16. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 16 Three Steps to an Enterprise Architecture 3
  • 17. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 17 Three Steps to an Enterprise Architecture Establish a Change Framework2 Communication & Transparency3 Business Alignment 1
  • 18. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 1 Business Alignment 18
  • 19. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 19 DEFINITION: ”We define Alignment among Business, Systems and Information as a way to quantify the coherency level in relation to the business necessity, the systems offer and information management” Enterprise Architecture: Business and IT Alignment – C. Pereira, P. Sausa - ACM Symposium of Applied Computing Where do we see these misalignments?  Business Process and Information  Business Process and Applications  Applications and Information  IT and Information  Applications and IT 1 Business Alignment Business Architecture Application Architecture Technology Architecture Information Architecture
  • 20. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 20 BUSINESS ARCHITECTURE APPLICATION ARCHITECTURE TECHNOLOGY ARCHITECTURE INFORMATION ARCHITECTURE 1 Business Alignment – Visual Representation
  • 21. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 21 Business Architecture Application Architecture IT Architecture Information Architecture 1 Business Alignment - Examples Business Architecture and Information Architecture  Information entities must have a business definition, description and a set of attributes  Attributes are related to business processes
  • 22. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 22 1 Business Alignment - Examples Business Architecture Application Architecture IT Architecture Data Architecture Business Architecture and Application Architecture  Application properties are classified as availability (up time), scalability (ability to scale up performance), profile based accesses (ability to identify who does each task).
  • 23. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 23 a) Each business process should be supported by the minimum number of applications. b) Business activities should be supported by a single application. c) Critical business processes should be supported by scalable and highly available applications. d) Critical business processes/activities should be supported by different applications than the noncritical business processes/activities. e) Each application's functionality should support at least one business process activity. Otherwise, it plays no role in supporting the business. f) Information required for critical processes should be also supported by scalable and highly available systems. g) Business processes activities requiring on-line/batch support should be supported by applications running on different infrastructures, making easier the tuning of the systems for operating window. C. Pereira, P. Sausa , J. Marquez - Enterprise Architecture Alignment Heuristics – MS Development Network 1 Business Alignment Heuristics
  • 24. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 24 Three Steps to an Enterprise Architecture Establish a Change Framework2 Communication & Transparency3 Business Alignment 1
  • 25. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 2 Establish a Change Framework 25
  • 26. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 26 Change Management? Or Change Framework? Change Framework speaks to CHANGES TO THE ARCHITECURE 2 Establish a Change Framework
  • 27. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 27 Change Framework will determine:  The circumstances under which the enterprise architecture, or parts of it, will be permitted to change after deployment, and the process by which that will happen  The circumstances under which the architecture development cycle will be initiated again to develop a new architecture 2 Establish a Change Framework
  • 28. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 28 “There are many valid approaches to change management, and various management techniques and methodologies that can be used to manage change; for example, project management methods such as PRINCE2, service management methods such as ITIL, management consultancy methods such as Catalyst, and many others. An enterprise that already has a change management process in place in a field other than architecture (for example, in systems development or project management) may well be able to adapt it for use in relation to architecture.” Architecture Change Management – ADM - TOGAF® 9.1 2 Establish a Change Framework
  • 29. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 29  The goal of the change framework is ensure that the EA strategy achieves its original business value. Including managing changes to the EA in a coordinated, strategic manner.  The change framework will continually monitor:  governance requests,  changes in technology,  changes in the business environment (i.e. growth / decline),  capacity and performance  CRITICAL The governance body establish criteria to judge whether a Change Request warrants just an architecture update or whether it warrants starting a new architecture evolution cycle.  IMPORTANT Avoid "creeping elegance", and the governance body must continue to look for changes that relate directly to business value. Architecture Change Management – ADM - TOGAF® 9.1 2 Establish a Change Framework
  • 30. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 30 Types of Changes  Simplification Change: A simplification change can normally be handled via change management techniques.  Incremental Change: An incremental change may be capable of being handled via change management techniques, or it may require partial re-architecting, depending on the nature of the change  Re-architecting Change: A re-architecting change requires putting the whole architecture through the architecture development cycle again. Architecture Change Management – ADM - TOGAF® 9.1 2 Establish a Change Framework
  • 31. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 31 Three Steps to an Enterprise Architecture Establish a Change Framework2 Communication & Transparency3 Business Alignment 1
  • 32. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 3 Communication & Transparency 32
  • 33. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 33 3 Communication & Transparency COMMUNICATE, COMMUNICATE, COMMUNICATE! COMMUNICATION
  • 34. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 34 3 Communication & Transparency  Organizations often fail to realize the full potential of EA due to a lack of communication.  Key to communication is to start with “the end” in mind. This is how you manage expectations.  Meeting with stakeholders to get their “buy-in”. Ask them:  What does the EA strategy mean to you?  Why are you doing the EA strategy?  What are their expectation for the end-result of the EA strategy? COMMUNICATION
  • 35. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 35 3 Communication & Transparency  Transparency is information as a basis for decision making and control.  Management of business requires transparency and that every implementation of strategy depends on clearly defined goals and access to all relevant information.  Complete openness creates a trusted strong foundation to build upon.  EA creates transparency by establishing a foundation for the identification and control of measures that enable IT efficiency, effectiveness and reliability. TRANSPARENCY
  • 36. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Case Study #1 It’s not always about the Core 36  In the past, a common IT strategy was the single vendor approach  Get everything you can from a single vendor to minimize the complexity of integration  The core was the master and all other systems were downstream  Replacing the core was and is all encompassing and limited the Plans ability to address any other business needs  Today – we use architecture to:  Address integration needs across all platforms  Build on common a information architecture to ensure data consistency and availability  Leverage common technologies to delver efficiencies and minimize complexity
  • 37. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 37  ACA  Defined requirements  Determined they focused on:  Enrollment  Financial (billing and AR)  Layer capabilities around core as opposed to replacing Case Study #1 It’s not always about the Core (continued) Business Architecture Application Architecture Technology Architecture Information Architecture
  • 38. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Case Study #2 The enterprise has landed? 38  Today technology is mobile which presents several complications including:  Security  Connectivity  We can’t just select a “cool” application (app), we need to understand:  The business case  What technology utilizes and how if fits with our architecture  How the data aligns with our information architecture  What standards are utilized  Integration with other enterprise application  Security framework
  • 39. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 39  Health Risk Assessment  Determine requirements including:  Data requirements and fit with current HRA  Integration from architecture and current HRA application  Security  Existing mobile devices supported Case Study #2 The enterprise has landed? (continued)
  • 40. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Case Study #3 Information is the Key 40  From our perspective, key to the long-term future of Health Plans is their ability to use information to add value to programs such as:  Value-based programs  Population health  Risk analysis  Care Coordination  Etc....  Health Plans have historically under invested in both people and technology to support this need  Information Architecture must be defined  Governance must be established  There is no end as this is an ongoing journey
  • 41. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 41  Data model – what is your DNA  Logical Model  Where reporting occurs at what levels within your architecture  What tools in your architecture support reporting  Database  ETL  Tools Case Study #3 Information is the Key (continued)
  • 42. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL IN SUMMARY 42  Establish Governance  Business and IT owning the architecture process  Business driving the use of technology (Business Architecture) 1 Business Alignment 2 Create a Change Framework 3 Communication and Transparency  Communicate, communicate, communicate.  Will only gain buy-in when the rationale behind the decision is understood.    Maintain Established EA  Allow for change  Managing the change
  • 43. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Q&A ?? ?
  • 44. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 44 Thank You  Bob Hoover 716-225-3262 bhoover@changehealthcare.com  Mauricio ‘MJ’ Jimenez 305-215-2156 mj@changehealthcare.com