Use this template to elevate the construction of your IVR call flow tree by creating customer personas that allow you to better understand your key demographic.
|
|
Identify stakeholders, what’s in it for them, what the impact will be, and how you will communicate the changes to your cloud operations.
|
|
Use this template to communicate the cloud operations diagram to key stakeholders.
|
|
The Security Policy Lifecyle is the “policy of policies” which outlines the various steps in a security policy program and shows the high-level security governance within...
|
|
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
Use this template to record the key details required for effective problem management – both proactive and reactive. Outline a problem management workflow, record the...
|
|
Use this template to record the key details required for effective critical incident management, including a list of critical IT services, a list of key upper tier...
|
|
The Workflow Library provides examples of typical workflows that make up the bulk of the incident management and request fulfillment processes at the service desk.
|
|
Use this template to narrate a story that describes the need and expectations of your mobile application initiative to get buy-in from stakeholders and interested parties.
|
|
Use this template in conjunction with the Utilities Industry Business Reference Architecture
|
|