dxc merger it integration journey · extract& go • transfer required non-sensitive data only...

36
DXC Proprietary and Confidential November 29, 2017 DXC merger IT integration journey CAB client spotlight | Erich Windmuller, CIO, DXC

Upload: duongcong

Post on 05-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

DXC Proprietary and Confidential

November 29, 2017

DXC merger IT integration journeyCAB client spotlight | Erich Windmuller, CIO, DXC

November 29, 2017 2DXC Proprietary and Confidential

10 month journey to both disentangle and integrate

10 Months Value Capture Requirements

Hewlett Packard Enterprise

Computer Sciences Corporation

626 Offices

2,300 Applications 4 Data Centers

60 New Legal Entities200,000 People

Entangled Network

308 Offices

431 Applications

38 Data Centers

66,000 People

53,000 Servers

70+ Countries

3,500 Servers

60+ Countries

Began May 2016

CSRA(PublicSector)

CSC$7B

2015

Completed April 2017

DXCTechnology

$26B

HPE ES$19B2016Hewlett

PackardEnterprise

$30B

DXC Proprietary and Confidential November 29, 2017

Journey to an integrated DXC: pathway to future state

Architecture driven future state

The challenge

Divestiture Approach

(Spin)

Integration Approach(Merge)

Day 1mobilization

November 29, 2017 4DXC Proprietary and Confidential November 29, 2017 4DXC Proprietary and Confidential

April 1“And that, in simple terms, is how we’ll

do the split by April 1

November 29, 2017 5DXC Proprietary and Confidential

HPE IT guiding principles for the divestiture heavily influenced DXC Day 1 IT landscape

Minimize impact to HPE business processes during separation

Minimize clone as much as possible to reduce one-time costs and maximize logical separation

For shared applications, provide logical access to application data through contingent user access for buyer

Host shared applications (TSA applications) in the shared HPE network zone

Host ES business dedicated applications in new separate network compartments

DXC Implications• Shared infrastructure for Day 1

(shared space)

• Shared cyber security risk and responsibilities

• Reliance on shared apps used by multiple companies

• Transition Service Agreements (TSA) for shared support requiring future investment to untangle

November 29, 2017 6DXC Proprietary and Confidential

31% of the portfolio was shared by ES and HPE with only 8% were targeted for physical separation for Day 1

Verify inventory of apps for scope within respective work-streams

Validate app BU usage and other details within app inventory

Validate app disposition and rationale and provide confirmation

Step 1 – Verify Application Scope Step 2 – Validate BU Usage Step 3 – Finalize Disposition

Disposition Type Description Criteria % of PortfolioRetain • Minimal work needed to prep for separation • Apps exclusively used by HPE

• No shared data• Shared apps that are planned to be sunset for HPE ES

58%

Give & Go • Move app into HPE ES network compartment • Dedicated HPE ES apps that will be transferred• Scope of work may include branding changes, Re-IP, access and interface changes

11%

Clone & Go • Clone application and/or data • Shared application• Application can be cloned without a data cleansing requirement• TSA cannot be done due to technical considerations

2%

Extract & Go • Transfer required non-sensitive data only • Shared application• Has sensitive data that cannot be transferred due to legal/regulatory/business requirements• Extract data relevant to HPE ES and provide to Buyer for integration (One Time)

1%

TSA • Logical separation by configuration without physical separation

• One shared instance on Day 1 • Logical separation and configuration data

update for differentiated access

• Any shared app that does not have technical considerations warrants a clone• Finance apps, including apps that are critical to financial close – financial data extracted and data feed is

loaded on necessary apps for financial reporting • All Infrastructure/ITIO apps will be shared and hosted in the dirty network, with the exception of Tidal

Scheduler and related apps

23%

Clone, Cleanse & Go

• Clone complete application and cleanse data that should not be transferred

• Shared application• Losing data integrity is a key risk• Apps developed in-house have high complexity and could not be TSA’d for prior transaction

5%

DXC Proprietary and Confidential November 29, 2017

Journey to an integrated DXC: pathway to future state

Architecture driven future state

The challenge

Divestiture Approach

(Spin)

Integration Approach(Merge)

Day 1mobilization

November 29, 2017 8DXC Proprietary and Confidential

DXC integration approach drives business interlocks and ‘pressure tests’ the plan

Aug April 1stJuly Sept FebNov/Dec

Day 1

Take your workplans to thenext level of granularity in planning for Day1/100

Kick off the integration andstep into themindset ofworkstreamplanning and synergies

Map a clear path to Day 1/100, resolve outstanding issues and define contingency plans

Deliver your value capture plans

• Collaborate with other teams toidentify dependencies; define theway the new team will operate

• Open the aperture for synergiesand value-capture; set top-downtargets and priorities

1 2 3a 3b 4 5Workstream Day 1/100 Interdependencies Value Value Day 1/100

launch Vision & operating model Capture 1 capture 2 pressure-testing

November 29, 2017 9DXC Proprietary and Confidential

IT integration program structure governs the design and manages execution risk of two IT organizations

IT Integration Decision Team

••Allocation of project budget••Approve strategic program

decisions••Manage trade-offs for

budget, timeline, andresources

••Approve integrated plan

Workstream Lead

••Strategic direction andVision

••Overall goals and budget••Approve programs and

timeline across portfolio

Sub-workstreams

••Manage progress throughproject schedule

••Actively identify risks andexecute mitigation plans

••Actively manageinterdependencies

••Update status, risks, issues,dependencies, anddecisions

Architecture Review Board

••Overall engine drivingintegration

••Cross coordinate with IMO functional groups

••Work with IMO functionalareas to manage milestonesand interdependencies across functional areas

IT IMO

••Manage progress throughintegrated project scheduleand key milestones

••Manage risk mitigation andsub-workstreaminterdependencies

••Manage vendor support••Update tracking tool

real-time

Summit 2:• Work plan• Reference Architecture• Joint DMO & Day 1

Projects

Summit 3:• Interdependencies• Integrated Schedule• Day 100 Projects• Plan Roadmap• IT Operating Model

Summit 4:• Value Capture Plans• Day 1 and Day 100 plans

Summit 5:• Day 1 end user scenarios• Cybersecurity response

plan

Summit 1:IT Charter

Key IT Deliverables

November 29, 2017 10DXC Proprietary and Confidential

IT guiding principles for integration

Area Principle Selection and Basis

Corporate Priority Speed/Value Capture April 1 is the effective date of transaction. Compliance and connectivity are Day 1 priority.

Operating Model On Day 1 continue to use legacy processes

HPE carve out strategy for ES minimizes integration opportunities for Day 1 and impacts synergy capture where automation is required.

Cybersecurity Differentiator Cybersecurity posture for DXC to be better than CSC and HPE ES baseline.

Planning and Execution

Real Options Approach Given uncertainty in ITSA scope, asset assignment, and specific cost elements – Real Options Approach maximizes integration project reuse/reassignment.

Integration Project Prioritization

Cost within Budget Guardrail • DMO Alignment• Day 1 Functional Priorities• System Engineering Dependencies

Resource Utilization

Third Party Maximize use of cloud solutions, existing hardware, and strategic partner labor.

Solutions Customer Zero Align with anticipated catalog. Solutions should be exemplars of commercial offerings where possible.

November 29, 2017 11DXC Proprietary and Confidential

Key dependencies which impact on IT critical path

Legal Entity Details: Availability of Company Name, Company Code, Tax IDs, Banking Information in Design

OD&S Data Files: Employee/Job level details availability for testing

Real Estate decisions

Software contract assignment and usage rights

Commercial agreement with Hewlett Packard Enterprise

Integrated value capture targets

Infrastructure: Availability of required infrastructure to meet development and cutover timelines

Data Center Network Segregation: Separate logical networks to limit cross business access

Access/Authentication: Limit access to applications and data

Resource availability to work on integration

Data retention requirements

Security strategy for data centers, networks and sites

Business Factors IT Factors

November 29, 2017 12DXC Proprietary and Confidential

IT integration projectsComprehensive planning and governance – 615 process driven by EA

Develop list of processes across workstreams impacted

Develop Day 1 and Day 100 key design considerations

Schedule workshops with process owners to justify pros/cons

Finalize IT blueprint design by process workstreams

Establish guidelines for initiative prioritization

Prioritize synergy initiatives

Finalize list of pre Day 1, Day 1 and Day 100 projects

Develop Charters impacting design considerations

Develop timeline for execution of Project Charters

Process taxonomy

Design Consideration

Pros/Cons Analysis

List of Projectsasof6/22/2016

HPProjectNames Workstream StartDate CSCEquivalentInitiatives

CPQcorpnetConfigurationforDay1(IDAMandDirectoryServices) Infrastructure 0-30Days GlobalPass/CPQcorpnetIDAMServicesDay1Email Connectivity Infrastructure 0-30Days MyWorkStyleDay1EmployeeSupportCenterNeeds HR/Payroll IT 0-30Days Day1EmployeeSupportCenterNeeds

Day1Payroll/Time&LaborTransitionReadiness HR/Payroll IT 0-30Days Day1Payroll/Time&LaborTransitionReadiness

Day1TalentAcquisitionTransition HR/Payroll IT 0-30Days Day1TalentAcquisitionTransition

DocusignandAdobesign CorpServices 0-30Days Branding/CorpCommunicationsSystemsProjectHR/Payroll IT 0-30Days eFilingDataTransfer(employeesrecords)

HR/Payroll IT 0-30Days Learning&DevelopmentDay1ProjecteFilingDataTransfer(employeesrecords)

Learning&DevelopmentDay1Needs

SkypeforBusinessforDay1

TransferdatatoChicagosystemstosupportTaxprovisioningandT

Transfersummarizedfinancial datapostmonthendcloseandconsWANNetworkConnectivityBetweenEverettAndChicagoDC's

WorkdayClone(Everett)

IT Integration RoadmapInfrastructure 0-30Days MyWorkStyleaxfiling FinanceIT 0-30Days TaxSystemsProjectolidationtoChicago FinanceIT 0-30Days Financial ConsolidationProject

Infrastructure 0-30Days WANNetworkConnectivityBetweenEverettAnd

HR/Payroll IT 0-30Days WorkdayProjectHR/Payroll IT 0-30Days PositionManagementMappingProject

All 0-30Days PublicSector-ITDueDiligenceandPlanningInfrastructure 30-60DaysInfrastructure 30-60DaysCompliance&Legal 30-60DaysR&DPDELabsIT 30-60DaysR&DPDELabsIT 30-60Days

IT Integration Roadmap

November 29, 2017 13DXC Proprietary and Confidential

IT Portfolio ProcessThe IT Portfolio Management Task force leveraged the existing 615 IT Gating Process to develop a streamlined process to govern the volume, velocity, and characteristics of IT Integration projects.

Project Stand Up

Design, Build and

TestConcept, Business Case, and Plan

Deploy and

TransferIMO

BudgetARB

Approval

Objective

Business ProblemOpportunityCommitment to Move Forward

Validate project aligns with objectivesVia IT/Business Peer Review

Define the what, how, when, and who and validate via Peer Review

ARB Approval to proceed w/ Funding and Design

If funding Required, secure from IMO Budget Committee

Assign PMs, WBS/PO, Acquire Team

Plans and designs are executedTesting confirms requirements met

Cut-over to solution in productionTransfer Solution support to Run & Maintain

Outputs

•Project Request Form

•Bus Case•ARB Exemption approval

•IT IMO Leadership and Peer Approval

•Project Budget and Schedule

•ProjectScorecard

•ARB Approval of Concept, BusCase, Plan

•Finance Approval and AllocatedBudget

•CSC Design WBS

•HPE Project Approval to Start

•CSC and HPE POs

•DesignApproval Test Results

•Cutover/Backout Plan

•Biz Readiness Approval

•SolutionCutover

•Sign off from Service Mgmt

Next Steps

•Create Business Case

•Schedule Peer Review

•Proceed to Planning

•Request ARBReview

•Initiate Funding Request (if required)

•Design WBS Request

•Secure PM (CSC & HPE)

•Proceed to Design, Build, and Test

•Deploy and transfer Solution

•Close Project and Procurements

A. Projects or groups of projects are presented to the Architecture Review Board (ARB) to evaluate and validate the solution concept, business case and plan. B. Upon ARB solution approval, teams proceed w/ with funding request from the IMO Budget Committee (if required).C. Upon ARB and Funding Approval, a PM is assigned, WBS and POs created, team acquired, and project work executed on schedule to meet Day 1 / Day 100 readiness.

November 29, 2017 14DXC Proprietary and Confidential

46 IT projects focused on critical IT changes needed to enable Day 1

Workstream Existing on Day 1 Changes for Day 1

Desktop and Mobility Utilize Current Devices No Change

Finance Consolidation DXC Financial Consolidation System

Sales Account Planning, Opportunity Management Single Sales Platform (SFDC), Account Planning (Anaplan)Commission Planning and Execution (Xactly)

HR Recruiting DXC “Front End” to Recruiting (TALEO)

HR/Finance Payroll Systems No Change

Collaboration Email and Skype DXC email routing solution for external communication; Federated Skype

Legal Matters and Contracts New suite of legal and contract management tools and processes

Supply Chain Travel DXC Instance of Concur Travel

Marketing Lead Management Designate single lead management system (Eloqua)

Network System Access May require additional logon; DXC Connectivity between Data Center and Aggregation Site

Delivery Service Desk Interactive Voice Recognition Systems Updated

November 29, 2017 15DXC Proprietary and Confidential

For many months, 4 separate legal entities will operate with shared applications, infrastructure and security environments

• TSA’s were created for Cyber and application services due to lack of cloned systems

• A shared asset agreement was created to manage all the applications still used by both companies on day 1

• Majority of the infrastructure and applications are managed by DXC under a commercial agreement

• TSA Management is overhead that depletes time and energy from end state deliverables

TSA’s are easy to enter but hard to exit

Shared Business

Applications

Shared Security Apps &

Services

Shared Network Space

November 29, 2017 16DXC Proprietary and Confidential

HPE created a multi-tenant environment ‘Shared Space’ to enable its corporate transactions

• HPQ Net network access not limited to HPE and DXC (Legacy ES)

• Legacy ES systems tied to HPE.com, IP addresses, IDAM and Active Directory

• 252 DXC dedicated applications outside of DXC Dedicated Container

Shared space

• 304 shared applications governed by HPE security policies• HPE and legacy ES business apps have equal rights to use

under the Shared Assets Agreement

Shared applications

Shared space

HPI Compartment*

HPE Dedicated Applications

DXC Dedicated Container

(110)

Shared Applications (304)

HPE, HPI, HPS, DXC

DXC Dedicated Applications

(252 stranded)

November 29, 2017 17DXC Proprietary and Confidential

• Everyone has IT “dependencies” during a large merger and IT integration effort and important to set expectations early and often

• Defined end state architecture guides integration decisions –critical important to have a strong portfolio planning process with Architecture Review Board to drive standards and compatibility

• Systems sharing data/process approvals require master data governance

• Identity and Access Management strategy must be clear for all application owners and users

• Tight interlock in areas such as Workday/Salesforce/Ariba/ SAP as complex interdependencies exist

• Rebranding/readdressing of domains/IP’s is just hard work• Lack of physical separation during spin increases day 1

project activity• Rigorous cadence of planning and project reviews is a must

Mid point learnings

November 29, 2017 17DXC Proprietary and Confidential

November 29, 2017 18DXC Proprietary and Confidential

Pressure tested Day 1 IT services scenarios Defined to aid in business and end user readiness

End user expectations for Day 1

Key user scenarios defined and socializedwith technology and business leaders

Day 1 communication campaigns to explain IT changes to each set of legacy end users

IT readiness training for the help desk

# Scenario topic1 IT Support2 Send Email as DXC3 Authentication4 Use Collaboration Tools5 Request New IT Project6 Report Cyber Incidents7 PC Repair & Ordering8 Social Engineering Risks9 Remote Connectivity10 Connect to Office Network11 Cross-Company Contact12 Antivirus & Encryption13 Install/Uninstall Software14 Book Conference Rooms

November 29, 2017 19DXC Proprietary and Confidential

Pressure test #2. Send and receive email as DXC

ES and CSC employees will use their pre-Day 1 mailboxes to send and receive email

Mail delivered from external recipients to @dxc address will be routed to the appropriate @hpe or @csc mailboxes

Over time, mailboxes and email processes will integrate under DXC

Mail delivered to external recipients will have headers updated so it will appear to come from @dxc

DXC integratedExchange instance and

mail processes

CSC Exchange and Outlook

Legacy ESemployee

Legacy CSCemployee

External recipient / sender

ES Exchange and Outlook

HPEGlobal address book

@hpe

@dxc

@csc

@dxc

@csc

@dxc

@hpeSend and receive

email same as before Day 1

Send and receive email same as before Day 1

November 29, 2017 20DXC Proprietary and Confidential

DXC IT operating model leverages DXC offerings and delivery capabilities

Offerings

OCIOIT Enablement and Governance

Strategy Governance BRMs PMO Asset Management

Finance & Reporting

Vendor Management

Enterprise Architecture and Technology

Architecture Information Assurance(Cyber, ITGC & Risk) Master Data & Data Governance

Service ManagementInternal Service Catalog Service Assurance Service Brokering

Delivery

Infrastructure Services Security Services Application Services

DXC Proprietary and Confidential November 29, 2017

Journey to an integrated DXC: pathway to future state

Architecture driven future state

The challenge

Divestiture Approach

(Spin)

Integration Approach(Merge)

Day 1mobilization

November 29, 2017 22DXC Proprietary and Confidential

IMO control tower coordinated Day 1 activities to drive issue resolution and escalation

Situation Room

Escalation pathways

Accelerated governance cadence

DXC Runbook

• 24x7 support for issue resolution and escalation• Combined Plano/Tysons set up: Executive extension based in Tysons, with seamless interface back to Plano• DXC employees were made aware of the Situation Room on Thursday, March 30, and it will run through April 14,

with potential extension

• Issue resolution begins with traditional Help Desk paths, which employees will be familiar with on Day 1• Escalation pathways exist to identify and resolve most important issues for each function and region/industry

• Increased interaction frequency between DXC ELT, 1MO leadership, and Situation Room function leads to create greater bandwidth to resolve issues

• Coordinated by Situation Room Lead

• Day-by-day calendar through end of April• Hour-by-hour view of activities during Week -1 (March 27) to Week 2 (April14)• Overview of major system cut-overs around Day 1 (March 29 to April 5)

November 29, 2017 23DXC Proprietary and Confidential

Situation room structured to identify most critical issues at each level

Executive leadershipDXC ELT

Day 1 virtual war rooms / Region Day 1 Leaders

Sell

Legal MarCom

IT

Facilities

HR Finance

RegionLeaders

Region Day 1 Leads and Function Day 1 Rooms aid in resolving functional and region specific issues, escalating issues to Situation Room

Remote Situation Room Function Leads are L3/L4s on call to help resolve issues

On-site Situation Room Function Leads are L3/L4s coordinating with their respective Day 1 rooms and Help Desk(s), reporting most critical issues to Situation Room (in Tysons for Weeks -1 to +2)

Situation Room Lead is accountable for Day 1 execution and drives issues resolution among DXC ELT and SR Function Leads

Situation Room

Situation Room Lead + IMO PMO support (Tysons)

IMOCommand

Center

Sell IT HRMarcom

CybersecuritySCMDeliver

India/iWFM

SOCLegalFinance

FacilitiesBuildUSPS

November 29, 2017 24DXC Proprietary and Confidential

We established Day 1 approach to manage transition (for e.g. command centers, DEFCON model)

Geo 1 - AMS Geo 2 - EMEA Geo 3 - APJ

ITCCHouston

ITCCGalway

ITCCBangalore

Situation RoomTysons Corner

DEFCON ONEHIGHEST LEVEL OF CRITICALITY

All Hands On Deck

DEFCON TWOHIGH LEVEL OF CRITICALITY

All Hands On Deck

DEFCON THREEMEDIUM LEVEL OF CRITICALITY

Critical Resources Only

DEFCON FOURLOW LEVEL OF CRITICALITY

Normal Resources

Mar 27 – Mar 28

Mar 29– April 7

Mar 22 – Mar 26

DEFCON Timeline

April 18 – May 10

April 8 – April 17

DEFCON Model• All resources and leaders on-site and fully activated• Two executive updates per day – 4hr updates

• All resources and leaders on-site and fully activated• One executive update per day – 4hr updates

• Center leaders and required resources on-site and fully activated• Executive progress report delivered weekly – 8hr updates

• Operations are running on US time zones only• Normal staffing operations and normal status and reporting

DEFCON levels were adjusted

real time based on critical issues or business need

Command centers set up to ‘follow the

sun’

Command Centers

November 29, 2017 25DXC Proprietary and Confidential

Day 1 – IT War Room

Day 1 DXC

CSS Help Desk

GIS Help Desk

Common Service

Desk

Legacy CSC Users

Bus

ines

s A

s U

sual

Sup

port

Mod

el

Legacy ES Users

Collaboration Incident war room and process to work cross company issues in day 1Scope:

• All types of cross entity Incident

logging/Incident transfer

• Incident status update request

• Incident escalation request

• Reporting on all cross entity

Incident status & Escalations

• One stop shop for engaging all

Cross entity support teams

Virtual War Room

CA-AS Support

OMC

Cross Entity Issue

24/7

GBS L3 Support

Resolvers

Internal Transition/ Migration Team

Vendor / PWC Project team

Vendor Support

CSS L1/L2

GIS Infra / AD Support

Resolvers

Vendor / Deloitte Project teamVendor Support

Infra Support

Apps Support

Customer Care (Help Desk / Service Desk)

Access Management

Engineering Team

Business Support(HR / Finance)

November 29, 2017 26DXC Proprietary and Confidential

We implemented real-time dashboards to facilitate cutover tracking and monitoring of issuesCutover Tasks Tracker

Defect Tracker

Change Execution Tracker

Major Incident Tracker

• Ability to track sub-projects on real-time basis; same view between CEO and line, with clear prioritization, owners, timelines etc.

• Tools to identify fundamental dependencies (e.g. offering structure) that drive core programs such as Sales Training

• Weekly review of workstream health leading to agile way of resolving interdependencies.

Takeaways

November 29, 2017 27DXC Proprietary and Confidential

Successful IT Day 1 cutover: Flawless execution!No business or financial close impact

50,000 deployment hours spent leading

to Day 1

71 incidentsresolved – just 4 escalations

24 successfulapplicationcut overs

(17 in progress)

2,500 changes deployed to production IT systems

over 10 months

Command Centers in Houston, Galway, and Bangalore with

checkpoint calls every 4 hours

46 critical IT projects to enable business for Day 1

Orchestrated Day 1 Readiness

Communications

Created 4 Day 1 Readiness Videos, with 13,502 views

24x7 global IT “War Room”

operation

Deployed new DXC branded wallpaper and set intranet

home page for 85% of desktops by Day 4

Email enabled as dxc.com

Salesforce live, enabling our sales organization on Day 1

Business and IT system stability

during Day1

DXC Proprietary and Confidential November 29, 2017

Journey to an integrated DXC: pathway to future state

Architecture driven future state

The challenge

Divestiture Approach

(Spin)

Integration Approach(Merge)

Day 1mobilization

November 29, 2017 29DXC Proprietary and Confidential

Apps Rationalization programs must account for Enterprise Architecture and drive ….

Business

Information

Applications/systems

Infrastructure/software

Transformation view of the enterprise architecture – top down business vs. bottom up technology view• Future business architecture based on the

desired operating model• Information providing the right data to the right

individuals to make decisions• Applications aligned to the business and

enabling business services• Infrastructure providing a secure virtual

foundation supporting the demands of the enterprise architecture

November 29, 2017 30DXC Proprietary and Confidential

DXC Reference Architecture drives portfolio from 2,700 legacy to less than 750 end state applications

Infra

.Da

taAp

plic

atio

nCl

ient

Integration Service Management

CyberSecurity

Tolerate

Invest

Migrate

Eliminate

November 29, 2017 31DXC Proprietary and Confidential

Application Rationalization will be fulcrum to reduce the dependency on the shared spaceMethods

1. Retire app (eliminate)

2. Migrate application

3. Develop new application

4. Move to DXC compartment (forklift or clone)

Approach

• Overlay app rationalization disposition and timing

• Prioritize ES assets by risk profile to decommission or move to ES dedicated container where incremental security is available

66

132

16

57

137148

0

20

40

60

80

100

120

140

160

Retire Migrate Invest Tolerate Deliver Business in discovery

Application Rationalization Analysis

• 1 73 applications currently identified as requiring shared space exit• 2 285 applications require exit disposition decision

1

1

2

2

November 29, 2017 32DXC Proprietary and Confidential

Focus of the Day 100 and Day 270 projects are to complete integration and enable TSA exits

Workstream Day 100 Day 270/End State

Desktop and Mobility

No Change Single Skype, Sharepoint, One Drive

Marketing Rebrand applications to DXC

Finance Foreign Exchange Risk system Payroll TSA ExitAutomation of Intercompany orders across ERPsGlobal Platform to integrate regional SAP systems

Sales No Change Automate SFDC deal & customer functionality

HR No Change Single Source of Global HR Data (Workday),Global Recruiting Solution (Workday Recruiting)

Collaboration No Change Migration to new DXC Messaging and Email, Mobile Device Management, Unified Communication Consolidation, DirectAccess

Legal No Change Single contract repository & integration with SFDC

Supply Chain No Change Global Concur Expense system, Single Source for Contingent Labor Management (Fieldglass), Global Procurement Reporting and Analytics platform, Global instance for Procure to Pay (Ariba)

Cyber Security Implement multifactor authentication into the DXC application access process

DXC security incident detection and reporting, IDS/IPS target state, Detective/Preventive Controls

November 29, 2017 33DXC Proprietary and Confidential

Value Capture levers are identified and under implementation to achieve desired IT envelopeLever Category Top Strategies % Reduction

Mobility Policy Top talkers campaigns, strict adherence to policy 41%

MyWorkstyle Increased Skype Adoption for Audio Conferencing, optimization of video conferencing endpoints (based on usage) 35%

Applications Application Rationalization 12%

Labor Synergies, span of control, best shore strategy 14%

Software Contract Renegotiation 12%

Infrastructure Decommission servers and drive to cloud adoption 13%

IT Consumption Demand Print consumables reduction and print services optimization (duplex print, black and white, pull print) 9%

Network Realign office network architecture (MPLS vs ISP, circuit redundancy), content filtering 7%

Hardware 3 standard PC models and renegotiate contracts 6%

CyberSecurity 12%

Total 20%

OCIO Cost Profile

Fixed, 70%

Variable, 30%

November 29, 2017 34DXC Proprietary and Confidential

Integration results at a glance

99.9%Success rate

2,500+Deployments over only

10 months

Global Command Center resolved

all IT issues

1 60,000Person hours spent

Only 7 failed deployments

• Reference architecture planning and deployment throughout the end state portfolio.• All applications within combined portfolio identified with a rationalization disposition.• Recalibration of criticality of new reference architecture and standard understanding

of business process across both companies.

November 29, 2017 35DXC Proprietary and Confidential

What worked well

Close interlock and collaboration with the business throughout the processDevil is in the details

Collaboration across legacy companies and functions was key to pressure test IT Day 1 scenarios

Strong framework including rehearsals and published runbooks for the Situation Room and IT Command Centers accelerated resolution of cutover issues

Day 1 IT communications and end-user experience campaigns for self-help – help desk volumes for legacy ES users were flat after Day 1, with no spike in incidents

November 29, 2017 36DXC Proprietary and Confidential

Hindsight is 20/20: key lessons learned

• Many products are not easily manipulated for spin/merge activity. Do not underestimate the amount of planning, engineering and budget required to deal with these assets.

• Complexity will drive a two phase integration approach: Phase One – Get to Day 1, Phase Two – End State. First phase of integration will result in end-user pain and should be as short as possible.

• The decision not to move end state applications out of existing HPE shared network is a multi-million dollar decision.

• Security is foundational and needs to be integral to all IT integration efforts. Joint network planning required early to align on the intercompany points of connectivity and security posture.

• A well-defined process and understanding with the CFO for budget approval of IT integration project, with clarity of cost treatment for one time project costs vs ongoing Run & Maintain costs.

• Do not underestimate the value and need for an externally led Integrated Management Office (IMO) support, nor the associated overhead and impact to day-to-day operations.

• Include and leverage key technology vendors and partners to help offset investment needs and to ensure greater success.