SlideShare a Scribd company logo
1 of 10
Download to read offline
Major Incident
Management
The definitive guide to resolving
critical IT incidents fast
Best Practices in
2Confidential and Proprietary
28/31/16
45%
of IT professionals reported their business
down just 15minutes or lessis impacted if IT is
of those surveyed said poor incident
communication increases downtime
91%
DID YOU
GET IT?
NO I’M
ON PTO!
WHO
HAS IT?
IT’S NOT
MY JOB
I
DON’T
KNOW SR. MGMT
NEEDS AN
UPDATE LIKE
NOW!
of the IT pros said they have ignored IT
alerts and communications
41%
P3
P1
P2
P3
P2
P3
P1
P2
P2
P1
P1
P2
P2
P3
P2
P1
P1
P2
P3
P3
P1
P3
P3
P3
said issue resolution would be accelerated by
a response system that initiates steps with a
single click
on a mobile device
85%
WILL JOIN
UNAVAILABLE
WE NEED YOU ON
THE CONFERENCE
BRIDGE RIGHT NOW
FOR A MAJOR ISSUE
INVOLVING ACME
CORP.
3
What Is a Major Incident?
With so much riding on IT, it is no longer good enough to
say, “I know it when I see it.” And yet, each company
will have its own exact definition based on three criteria:
• Urgency: effect on deadlines
• Impact: impact to the business
• Severity: impact to end users
Confidential and Proprietary
4
Intelligent Communication – Reduce Mean Time to Restore
Confidential and Proprietary
48/31/16
20 ENGAGE 20 TRIAGE 45 FIND & ASSEMBLE 30 RESOLVE 35 RESTORE
120
SLAMANUAL
COMMUNICATION
MANUAL
COMMUNICATION
Before
After
35 RESTORE30 RESOLVE520 TRIAGE5
120
SLA
NUMBER
OF CALLS
NUMBER
OF CALLS
5Confidential and Proprietary
6
Steps to Restoration:
Confidential and Proprietary
Identify: A support rep
spots a major incident.
Engage: The rep alerts
the major incident
managers on duty.
Triage: A major
incident manager
verifies the incident.
Assemble: The
incident resolution
team gathers.
Resolve: The team
restores service.
Post Mortem: The
MIM team reviews the
process.
7
The Need for Better Communication
ITIL, DevOps and ITSM processes have
created great efficiency gains
Most organizations have absorbed that
efficiency – looking for more
Communication is the next opportunity
for innovation
Confidential and Proprietary
78/31/16
8
Our Customers’ Experience
Reduce Mean Time to Respond by 70%
Reduce Resource Engagement times by 95%
Reduce Service Desk Call Volumes by 75%
Improve Alert Acknowledgement to 97%
Confidential and Proprietary
88/31/16
9
A Cautionary Tale:
Confidential and Proprietary
A major U.S. retailer announced that it had suffered a
data breach. Its security software had detected the attack
and sent an alert months earlier, but IT employees missed
them. “They are bombarded with alerts,” said Shane
Shook, an executive with Cylance Inc. “They get so
many that they just don’t respond to everything. It is
completely understandable how this happened.”
10Confidential and Proprietary

More Related Content

What's hot

ITIL Incident management
ITIL Incident managementITIL Incident management
ITIL Incident managementManageEngine
 
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...Jesse Andrew
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesSlideTeam
 
Incident and Problem management simplified
Incident and Problem management simplifiedIncident and Problem management simplified
Incident and Problem management simplifiedValentyn Barmak
 
June2007 Implementing Itil Problem Mgmt
June2007 Implementing Itil Problem MgmtJune2007 Implementing Itil Problem Mgmt
June2007 Implementing Itil Problem MgmtIT Service and Support
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
 
ITIL Incident Management Workflow - Process Guide
	 ITIL Incident Management Workflow - Process Guide	 ITIL Incident Management Workflow - Process Guide
ITIL Incident Management Workflow - Process GuideFlevy.com Best Practices
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryEC-Council
 
Upgrade To BMC Remedy ITSM 7.6
Upgrade To BMC Remedy ITSM 7.6Upgrade To BMC Remedy ITSM 7.6
Upgrade To BMC Remedy ITSM 7.6Vyom Labs
 
itSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem ManagementitSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem ManagementEric Sambraus
 
Andrew Vermes: Major Incident Management
Andrew Vermes: Major Incident ManagementAndrew Vermes: Major Incident Management
Andrew Vermes: Major Incident ManagementitSMF UK
 
ITSM and Service Catalog Overview
ITSM and Service Catalog OverviewITSM and Service Catalog Overview
ITSM and Service Catalog OverviewChristopher Glennon
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL IntroductionRavi Kiran
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationAxios Systems
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoveryKrutiShah114
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem ManagementJosep Bardallo
 

What's hot (20)

ITIL Incident management
ITIL Incident managementITIL Incident management
ITIL Incident management
 
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
 
Incident and Problem management simplified
Incident and Problem management simplifiedIncident and Problem management simplified
Incident and Problem management simplified
 
June2007 Implementing Itil Problem Mgmt
June2007 Implementing Itil Problem MgmtJune2007 Implementing Itil Problem Mgmt
June2007 Implementing Itil Problem Mgmt
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Problem Management
Problem ManagementProblem Management
Problem Management
 
ITIL Incident Management Workflow - Process Guide
	 ITIL Incident Management Workflow - Process Guide	 ITIL Incident Management Workflow - Process Guide
ITIL Incident Management Workflow - Process Guide
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
Upgrade To BMC Remedy ITSM 7.6
Upgrade To BMC Remedy ITSM 7.6Upgrade To BMC Remedy ITSM 7.6
Upgrade To BMC Remedy ITSM 7.6
 
itSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem ManagementitSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem Management
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
Andrew Vermes: Major Incident Management
Andrew Vermes: Major Incident ManagementAndrew Vermes: Major Incident Management
Andrew Vermes: Major Incident Management
 
ITSM and Service Catalog Overview
ITSM and Service Catalog OverviewITSM and Service Catalog Overview
ITSM and Service Catalog Overview
 
Problem Management
Problem ManagementProblem Management
Problem Management
 
Problem Management
Problem ManagementProblem Management
Problem Management
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL Introduction
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
 

Viewers also liked

Organizational politics word assignment
Organizational politics word assignmentOrganizational politics word assignment
Organizational politics word assignmentSaad Khan
 
Textiles history, properties and performance and applications
Textiles   history, properties and performance and applicationsTextiles   history, properties and performance and applications
Textiles history, properties and performance and applicationsHussain Khan
 
Production and operations_management
Production and operations_managementProduction and operations_management
Production and operations_managementQamar Farooq
 
What if Process Safety risks were as visible as Health and Safety Risks?
What if Process Safety risks were as visible as Health and Safety Risks?What if Process Safety risks were as visible as Health and Safety Risks?
What if Process Safety risks were as visible as Health and Safety Risks?Amor Group
 
Managerial economics book
Managerial economics book Managerial economics book
Managerial economics book Babasab Patil
 
Treatment plan for Implants in funtional zone
Treatment plan for Implants in funtional zoneTreatment plan for Implants in funtional zone
Treatment plan for Implants in funtional zoneVinay Kadavakolanu
 
Complete textile dictionary
Complete textile dictionaryComplete textile dictionary
Complete textile dictionarySamrat Dewan
 
১৯৭১ ভিতরে বাইরে - এ.কে.খন্দকার (১ম খণ্ড)[By mostaque]
১৯৭১ ভিতরে বাইরে - এ.কে.খন্দকার (১ম খণ্ড)[By mostaque]১৯৭১ ভিতরে বাইরে - এ.কে.খন্দকার (১ম খণ্ড)[By mostaque]
১৯৭১ ভিতরে বাইরে - এ.কে.খন্দকার (১ম খণ্ড)[By mostaque]Hussain Khan
 
Interlining Procedure (Types & Methods)
Interlining Procedure (Types & Methods)Interlining Procedure (Types & Methods)
Interlining Procedure (Types & Methods)ABU TALEB TARAQUE
 
Histology of oral mucous membrane and gingiva
Histology of oral mucous membrane and gingivaHistology of oral mucous membrane and gingiva
Histology of oral mucous membrane and gingivaVinay Kadavakolanu
 
Petronas health, safety and environment guidelines (HSE)
Petronas health, safety and environment guidelines (HSE)Petronas health, safety and environment guidelines (HSE)
Petronas health, safety and environment guidelines (HSE)Easwaran Kanason
 
Practical oral histology ii
Practical oral histology iiPractical oral histology ii
Practical oral histology iiTitey
 
Physical Properties of Fibe,rs
Physical Properties of Fibe,rsPhysical Properties of Fibe,rs
Physical Properties of Fibe,rsAmrita Rastogi
 

Viewers also liked (19)

Weaving motion beat up
Weaving motion beat upWeaving motion beat up
Weaving motion beat up
 
Organizational politics word assignment
Organizational politics word assignmentOrganizational politics word assignment
Organizational politics word assignment
 
Textiles history, properties and performance and applications
Textiles   history, properties and performance and applicationsTextiles   history, properties and performance and applications
Textiles history, properties and performance and applications
 
Lectra assignment
Lectra assignmentLectra assignment
Lectra assignment
 
Production and operations_management
Production and operations_managementProduction and operations_management
Production and operations_management
 
A book of Man Made Fibre
A book of Man Made FibreA book of Man Made Fibre
A book of Man Made Fibre
 
What if Process Safety risks were as visible as Health and Safety Risks?
What if Process Safety risks were as visible as Health and Safety Risks?What if Process Safety risks were as visible as Health and Safety Risks?
What if Process Safety risks were as visible as Health and Safety Risks?
 
Managerial economics book
Managerial economics book Managerial economics book
Managerial economics book
 
Major project report
Major project reportMajor project report
Major project report
 
Treatment plan for Implants in funtional zone
Treatment plan for Implants in funtional zoneTreatment plan for Implants in funtional zone
Treatment plan for Implants in funtional zone
 
Complete textile dictionary
Complete textile dictionaryComplete textile dictionary
Complete textile dictionary
 
১৯৭১ ভিতরে বাইরে - এ.কে.খন্দকার (১ম খণ্ড)[By mostaque]
১৯৭১ ভিতরে বাইরে - এ.কে.খন্দকার (১ম খণ্ড)[By mostaque]১৯৭১ ভিতরে বাইরে - এ.কে.খন্দকার (১ম খণ্ড)[By mostaque]
১৯৭১ ভিতরে বাইরে - এ.কে.খন্দকার (১ম খণ্ড)[By mostaque]
 
Laminating
Laminating Laminating
Laminating
 
Aries woman
Aries womanAries woman
Aries woman
 
Interlining Procedure (Types & Methods)
Interlining Procedure (Types & Methods)Interlining Procedure (Types & Methods)
Interlining Procedure (Types & Methods)
 
Histology of oral mucous membrane and gingiva
Histology of oral mucous membrane and gingivaHistology of oral mucous membrane and gingiva
Histology of oral mucous membrane and gingiva
 
Petronas health, safety and environment guidelines (HSE)
Petronas health, safety and environment guidelines (HSE)Petronas health, safety and environment guidelines (HSE)
Petronas health, safety and environment guidelines (HSE)
 
Practical oral histology ii
Practical oral histology iiPractical oral histology ii
Practical oral histology ii
 
Physical Properties of Fibe,rs
Physical Properties of Fibe,rsPhysical Properties of Fibe,rs
Physical Properties of Fibe,rs
 

Similar to Best Practices in Major Incident Management

Major Incident Management Trends: 2016 Survey Report
Major Incident Management Trends: 2016 Survey ReportMajor Incident Management Trends: 2016 Survey Report
Major Incident Management Trends: 2016 Survey ReportxMatters Inc
 
State of on call report 2014
State of on call report 2014State of on call report 2014
State of on call report 2014Todd Vernon
 
The Perfect Storm - How We Talk About Disasters
The Perfect Storm - How We Talk About DisastersThe Perfect Storm - How We Talk About Disasters
The Perfect Storm - How We Talk About DisastersDevOps.com
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksAbhishek Sood
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Business Meets IT presentation: Business Continuity
Business Meets IT presentation: Business ContinuityBusiness Meets IT presentation: Business Continuity
Business Meets IT presentation: Business ContinuityWilliam Visterin
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
service metrics at ITSMFUSA 2008
service metrics at ITSMFUSA 2008service metrics at ITSMFUSA 2008
service metrics at ITSMFUSA 2008guest904c03
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...Citrin Cooperman
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarLumension
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security ChallengesJorge Sebastiao
 
To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security Catherine Arizan
 

Similar to Best Practices in Major Incident Management (20)

Major Incident Management Trends: 2016 Survey Report
Major Incident Management Trends: 2016 Survey ReportMajor Incident Management Trends: 2016 Survey Report
Major Incident Management Trends: 2016 Survey Report
 
Symantec Infographic
Symantec InfographicSymantec Infographic
Symantec Infographic
 
State of on call report 2014
State of on call report 2014State of on call report 2014
State of on call report 2014
 
The Perfect Storm - How We Talk About Disasters
The Perfect Storm - How We Talk About DisastersThe Perfect Storm - How We Talk About Disasters
The Perfect Storm - How We Talk About Disasters
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Business Meets IT presentation: Business Continuity
Business Meets IT presentation: Business ContinuityBusiness Meets IT presentation: Business Continuity
Business Meets IT presentation: Business Continuity
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
service metrics at ITSMFUSA 2008
service metrics at ITSMFUSA 2008service metrics at ITSMFUSA 2008
service metrics at ITSMFUSA 2008
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
 
To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Best Practices in Major Incident Management

  • 1. Major Incident Management The definitive guide to resolving critical IT incidents fast Best Practices in
  • 2. 2Confidential and Proprietary 28/31/16 45% of IT professionals reported their business down just 15minutes or lessis impacted if IT is of those surveyed said poor incident communication increases downtime 91% DID YOU GET IT? NO I’M ON PTO! WHO HAS IT? IT’S NOT MY JOB I DON’T KNOW SR. MGMT NEEDS AN UPDATE LIKE NOW! of the IT pros said they have ignored IT alerts and communications 41% P3 P1 P2 P3 P2 P3 P1 P2 P2 P1 P1 P2 P2 P3 P2 P1 P1 P2 P3 P3 P1 P3 P3 P3 said issue resolution would be accelerated by a response system that initiates steps with a single click on a mobile device 85% WILL JOIN UNAVAILABLE WE NEED YOU ON THE CONFERENCE BRIDGE RIGHT NOW FOR A MAJOR ISSUE INVOLVING ACME CORP.
  • 3. 3 What Is a Major Incident? With so much riding on IT, it is no longer good enough to say, “I know it when I see it.” And yet, each company will have its own exact definition based on three criteria: • Urgency: effect on deadlines • Impact: impact to the business • Severity: impact to end users Confidential and Proprietary
  • 4. 4 Intelligent Communication – Reduce Mean Time to Restore Confidential and Proprietary 48/31/16 20 ENGAGE 20 TRIAGE 45 FIND & ASSEMBLE 30 RESOLVE 35 RESTORE 120 SLAMANUAL COMMUNICATION MANUAL COMMUNICATION Before After 35 RESTORE30 RESOLVE520 TRIAGE5 120 SLA NUMBER OF CALLS NUMBER OF CALLS
  • 6. 6 Steps to Restoration: Confidential and Proprietary Identify: A support rep spots a major incident. Engage: The rep alerts the major incident managers on duty. Triage: A major incident manager verifies the incident. Assemble: The incident resolution team gathers. Resolve: The team restores service. Post Mortem: The MIM team reviews the process.
  • 7. 7 The Need for Better Communication ITIL, DevOps and ITSM processes have created great efficiency gains Most organizations have absorbed that efficiency – looking for more Communication is the next opportunity for innovation Confidential and Proprietary 78/31/16
  • 8. 8 Our Customers’ Experience Reduce Mean Time to Respond by 70% Reduce Resource Engagement times by 95% Reduce Service Desk Call Volumes by 75% Improve Alert Acknowledgement to 97% Confidential and Proprietary 88/31/16
  • 9. 9 A Cautionary Tale: Confidential and Proprietary A major U.S. retailer announced that it had suffered a data breach. Its security software had detected the attack and sent an alert months earlier, but IT employees missed them. “They are bombarded with alerts,” said Shane Shook, an executive with Cylance Inc. “They get so many that they just don’t respond to everything. It is completely understandable how this happened.”