About Municipal Strategic Planning

bullseye and arrow

When candidates run for municipal Council, they do so not only because they have a passion for helping their communities, but they also often have ideas and goals for the community.   

From my experience, the most successful municipalities are those where Council and staff work as a team to achieve identified goals. That’s why it’s imperative to undertake a strategic planning process early in a new Council term.  The process serves important learning and teamwork objectives for both Council members and staff and really starts to get the team pulling in the same direction.

Many great articles have been written by various municipal scholars and organizations on strategic planning, so I’m not going to start reinventing the wheel here, but there is merit in taking a look at a few great examples that will remind us all of what Municipal Strategic Planning is, the value of Strategic Planning for communities and how a municipality goes about undertaking a strategic planning process.

What is Strategic Planning?

#1 – Source: MMAH Municipal Councillors Guide

Strategic planning is a process by which an organization defines its strategy or direction, and makes decisions about allocating its resources – both financial and staff resources needed to pursue this strategy. Through the strategic planning process, a municipal council can develop strategies, goals, objectives and action plans to achieve the future it desires. Once a strategic plan is adopted, a municipality may wish to measure its success over time and review the plan periodically to ensure that it still aligns with current issues, challenges and realities.

Why is it important for Municipalities?

#2 – Source: Bill Winegard, Municipal Strategic Planning Associates

Undertaking a strategic planning process at the beginning of each Council term is critically important to successful municipal governance by:

  • identifying where consensus lies among members of Council
  • establishing priorities for the term and indicators of success
  • enunciating at a meaningful level the commitment of the Council and Corporation to the community and the results that the community should expect
  • aligning the efforts of staff with the direction of Council
  • motivating Council members, staff, and other partners to work purposefully, and to monitor and take pride in their accomplishments
  • sketching out a council term action plan sequence that keeps the most important things top of mind
  • balancing a promising vision with feasible resources

How Do We Undertake a Strategic Planning Process?

#3 – Source: AMCTO – Continually Improving Municipalities to Achieve Strategic Success

A strategic plan is not static, but should be a guiding document which sets out the vision and priorities of the municipality. In this way, it establishes a framework that the municipality’s operations can align with. Strategic success is often seen as being able to achieve the initiatives in the plan.

However, equally important but often overlooked, is the need to ensure service delivery yields value for money for taxpayers. This can be accomplished by linking daily operations with the strategic goals of the organization and developing mechanisms to ensure a continual improvement of organizational performance.

#4 – Source: ICMA Blog Post on Strategic Planning, by Sara McGuffin, Town Manager, Amherst, Virginia 

Through this (strategic planning) process, small communities can remember what makes them unique, focus their efforts on what unites them, and move toward a better future, and do so in a way that pulls the community closer, rather than drives it apart.

Strategic planning that involves the community, incorporates the unique vision and goals of the community, is agreed to by the elected body, and tied firmly to our budgets, will keep residents, staff, and elected representatives focused on the business, as well as the vision, of government and how to make the community a better place.

Are there any Tools to help Small Municipalities with Strategic Planning?

#5 – Source: ICMA Strategic Planning in Small Communities – A Manager’s Manual, by Sara McGuffin, Town manager, Amherst, Virginia 

The Canadian Association of Municipal Administrators (CAMA) recently circulated this tool from the International City/County Managers Association (ICMA).  

This resource will help local government leaders remember what they know and find additional tools to do their budgeting and strategic planning better. You can also download the introduction to the manual by Sara McGuffin here.

Summary:

When developed with the insights of Council, staff and the public, a strategic plan represents a shared view of the municipality’s future, encourages public commitment and supports the ability for the municipality to move towards achieving the identified, mutual goals.

By, Susan Shannon, AMCT

CEO, muniSERV.ca

 

Share

Change takes time. The Future is approaching.

So, our first piece of advice is to start thinking about it now. And yes, you can ease into the future; it does not have to happen tomorrow.

When organizations are planning out their new, or enhanced physical security needs we are often asked what are the trends that are likely to shape physical security in the future?

The same question is usually followed up with… “If we do this, or if we buy this, will this sustain us in the future?”

Which also can be interpreted to… “So, we don’t have to buy something else, and that this will last us a long time, right?”

Good questions, but always a challenge to answer. Many factors play out as resistance or even catalysts to these questions and their subsequent decisions. Risk exposure, budgets, actual realized events, change in the organization’s focus, change in the organization’s leadership, campaign promises, or even change in some environments, regulation or legislation “forcing” a change, all impact the ‘future’ question.

What are those future trends shaping physical security? Some trends outlined in the list below may be a surprise, some may appear too futuristic.

  1. Increased use of biometric security measures: Biometric security measures, such as fingerprint scanners and facial recognition technology, are becoming more popular as they offer a high level of accuracy and are difficult to bypass.
  2. Rise of smart security systems: Smart security systems are becoming more common, and these systems often use artificial intelligence (AI) and machine learning to analyze video footage and detect potential threats.
  3. Greater emphasis on cybersecurity: As more security systems become connected to the internet, cybersecurity is becoming an increasingly important consideration. Companies are investing in measures to protect against cyber-attacks that could compromise their security systems.
  4. Increased use of drones: Drones or Remotely Piloted Aircraft System(s) (RPAS) are being used more frequently for security purposes, such as patrolling large areas, inspecting high-risk locations or even in response to incidents in providing real-time surveillance.
  5. Greater use of virtual reality (VR) and augmented reality (AR) in training: VR and AR are being used to train security personnel in simulated environments, allowing them to practice their skills and respond to potential threats in a safe and controlled setting.
  6. Integration of physical and cybersecurity: As threats evolve and become more sophisticated, it is increasingly important for physical security and cybersecurity to work together to provide comprehensive protection. This integration may involve integrating cybersecurity measures into physical security systems, such as installing firewall protection on security cameras.

Biometrics, smart security systems, cybersecurity emphasis and the integration of physical and cybersecurity have been on our radar for several years now and have been introduced into our past and current projects with great adoption by our client base.

The trend not mentioned here but remains a constant for us, is the due diligence required to ensure the “paperwork” is complete, up to date, used and enforced. Your policies, and procedures, training programs, guidance documents and standards are the backbones for all these physical security tools to work in the manner they were intended for your organization.

Of course, great planning and the execution of that plan is essential. Planning is a cyclical process that can start, stop, and reset when required. The future is changing. Be prepared.

Plan the Work. Work the Plan.

Reach out. We can help.

Should your Municipality need assistance, contact Michael White Group International today, and we will be happy to answer your questions. Visit michaelwhitegroup.com/contact/

Share

Free Webinar – Learn From Municipalities Using Service Request Management Software

 

Join us for a free webinar

Hosted by AccessE11 and OMLI, discover how these municipalities have utilized powerful service request management software to bring major improvements to their municipality.

Tuesday, September 27, 2022 – 12:00 p.m. to 1:00 p.m.

Learn how Hastings Highlands, St. Thomas and Meaford, Ontario, benefited from service request management software to meet the needs of their citizens. 

Register Here

Presented in partnership with 

Share

What is Boolean Logic?

Girl encircled by search icons and AI

What is Boolean Logic?

Have you ever wondered how a computer can do something like balance a check book, or spell-check a document? If you want to understand the answer to this question down at the very core, the first thing you need to understand is something called Boolean Logic.   [i]

Why do you need to understand Boolean Logic?

Well, as the use of artificial intelligence (AI) increases, it will be important for us all to understand it.  I am no expert on it by any means, but here’s my take on what I understand to be the very basic fundamentals of it, in the simplest and broadest of terms.

The term “Boolean” refers to a system of logic developed by the mathematician and early computer pioneer, George Boole.

A Boolean search is a query technique that utilizes Boolean Logic to connect individual keywords or phrases within a single query.
Boolean searching allows the user to combine or limit words and phrases in an online search in order to retrieve relevant results.  Boolean searching includes three key Boolean operators: AND, OR, and NOT which are used to limit, broaden and define the search results.
When these “operators” are used between two keywords, the search will result as follows:
  • A Boolean search for “Cats AND Dogs” will retrieve all documents that contain both words
  • A Boolean search for “Cats NOT Dogs”, will retrieve only documents that contain the word “Cats”
  • A Boolean search for “Cats OR Dogs”, will retrieve documents that contain either the word “Cats” or the word, “Dogs”
Wildcard Characters (? and *) are also used in Boolean Logic. 
  • “?” matches a single character (i.e. the search string “re?” will match both rest and rent)
  • “*” matches multiple characters (i.e. the wildcard search “res*”, will match rest, rested and resting.[ii]
Quotation marks require words to be searched as a phrase, in the exact order you type them. For example, when searching for posts about Asset Management, using the quotation marks will search for the phrase exactly as it appears (i.e., “Asset Management”).  It would not return  documents that contain both the words, Asset and Management, in any other combination.
There are other elements to Boolean Logic, but I don’t want to get you too far into the weeds.  
The main thing I wanted to achieve with this article is; a) to provide an introduction to Boolean Logic, for those of us who are new to it and, b) for you to understand that combining Boolean strings with AI-powered search filters to conduct a search, utilizes a search engine to its fullest, most comprehensive potential for optimum search results.
Susan Shannon, CEO
muniSERV.ca

[i] How Boolean Logic Works, by Marshal Brain, Science Direct

[ii] Gnowit Guide to Boolean Logic – Boolean Primer

Share

UCaaS is critical for any authority service improvement

what is UCaaS?

Unified Communications as a Service (UCaaS)  is a network of cloud-based telephone system that controls the flow of calls coming in and out of your organization. We replace your on-premises PBXs, as well as your SIP, PRIs, and POTS lines. UCaaS enables you to use a variety of hosted programs and services (including instant messaging, video conferencing, file sharing, and email) over the Internet from any location and at any time.  In addition, UCaaS provides security, allows flexibility, and integrates well with your other software applications including MS Teams. UCaaS systems are updated frequently by the provider ensuring that your communication methods will always be up-to-date in our ever-evolving world.

Why UCaaS is critical for all customer-guided corporations?

 
GUARANTEES YOUR BUSINESS CONINUITY & SECURITY

Experteers can easily answer this for all municipalities and companies who care about their customers.

First of all we have to emphasize about the importance of continuity in all circumstances, UCaaS provides the best option to avoid your business any hiccups along the road because of any reasons. UCaaS is available on any communication device, laptop, or PC anywhere at anytime to be able to efficiently communicate with your customers.

Security is another crucial requirement for all connected networks, voice calls, video conferencing, and instant messaging are parts of all departments communications to enable them to work properly and deliver services. Experteers, as part of security provider, enable first layer of security by having all our servers in Canada, maintaining 100% availability by having four communication centers in main four cities in Canada in Montreal, Calgary, Vancouver, and Toronto, and to maintain the second layer of security by having all SOC certified centers.

INCORPORATES THE LATEST FEATURES

When you have UCaaS, you’ll be able to use all the latest functions and features without any additional cost. You’ll also have the assurance that your information is kept safe and secure in a reliable data center. Having the ability to keep your communications up-to-date allows you to remain competitive and helps to increase your overall performance.

 

OFFERS FLEXIBILITY AND SCALABILITY

UCaaS allows organizations to add and remove users (for example, temporary employees) without any significant infrastructure changes or capital investments. UCaaS also provides seamless work experiences for your employees since they are cloud-based and accessible from any location – great for those working remotely.

 

PROMOTES PRODUCTIVITY

By using a UCaaS system, your productivity increases. All of your employees have unified communications support that is sharable amongst all departments, and UCaaS integrates well with your other software applications (like CRM). UCaaS keeps communication lines open and provides ways for your employees to log into various devices to access their information (such as voicemails).

 

LAST BUT NOT LEAST

SAVES YOU MONEY

When switching to UCaaS, there are minimal upfront hardware costs – you only need phones. You will also have the ability to choose the services you need (and not waste money on the ones you do not). UCaaS allows you to concentrate on growing your business by decreasing your dependence on capital investments.

 

UCaaS

 

We at EXPERTEERS are helping municipalities, utility companies, and medical centers increase employee productivity by adding a state of the art Unified Communications Solution, enhancing collaboration and increasing employee efficiency.

  • Enable your team to work remotely (hybrid)
  • Train employees more efficiently with sentiment analysis
  • Monitor key performance metrics with automated reports
  • Boost company performance through detailed analytics & collaboration
  • .. and more

Let us help you improve your client experience, call us at EXPERTEERS to learn how we can help enable your business for success in 2022.

 

Experteers is a system integrator SI and managed service provider MSP for the following services:

– SASE / SD-WAN: to secure all ur networking between all branches.

– NGFW: Next Generation Fire Wall centralized to keep all networks secured in almost real-time updated system.

– NMS: Network Managed System to keep your visibility on all network elements and servers to improve your systems availability.

– Cyber-Security on all endpoints and servers

EXPERTEERS CORPORATION

WWW.EXPERTEERS.COM

Share

Spotlight on the DEI Journey

Predictive Success Webinar Series

Many business leaders are grappling with where to start their Diversity, Equity & Inclusion Journey – there’s work to be done!

Organizations like the Mennonite Economic Development Associates (MEDA) have learned that transformative change starts from the inside, out.

What does change look like in a time when so many organizations continue to face capacity issues?

What role does your Board of Directors need to play to wake and shake up the sleeping giant?

What are some of the courageous steps that you’ll need to take to lead the journey through uncharted territory?

Join us for Spotlight on the DEI Journey with Dr. Dorothy Nyambi, where we’ll uncover answers to these and other questions.

Learn more and register

Spotlight on the DEI Journey Webinar Flyer Final

Share

Find your Dream Employee in 2022

Your next hire, on us.

Find your Dream Employee in 2022 with The Predictive Index® – New Talent Optimization Software from Predictive Success

See the power of predictive analytics in hiring a perfect fit. Your all star candidate is in the driver’s seat. Seize the opportunity by offering them the perfect job fit, backed by scientific data.

This Complementary Offer is Valid for muniSERV Members: One free job model and five free PI Behavioural Assessments® for your top candidates. 

To redeem: Contact Mitch LePage, your Managing Principal with Predictive Success at [email protected] or (905) 430-9788 x110

See the full brochure on this special offer: MuniSERV Offer – Your Next Hire on Us with Predictive Success

Share

2022 Security Risk Budget Outlook

Moving on up

At the onset of the pandemic, Security Risk budgets decreased as organizations shuttered their doors and employees left the office, and organizations under duress looked for places to cut costs. Many found their savings in the Security budget. But now, the potential to double or triple budgets in 2022 maybe a reality.

Our research shows approximately two-thirds of security budgets increased in 2021 from 2020, but still have yet to reach or return to 2019 levels. 2022 has the potential to change that.

As organizations are set to come back to life in 2022 security risk events have not gone away. In fact, the COVID-19 pandemic created new security challenges. The new challenges have yet to be solved, and as schools and businesses reopen / remain open during potential future surges, the security risks of the past return as well. In order to protect themselves from past, current, and future threats, organizations need to reinvest in physical security.

Really watch

Real camera surveillance and real-time monitoring integrated with a uniformed security guard force that is properly trained may be for some organizations the order of the day. High-caliber uniforms security guards and training necessary to protect against threats to an organization cost more than $15-20 an hour. Challenges will emerge to protect your organization, your information, your IP, your personnel. All of this may lead to an explosion of security requirements, and the budget.

Another factor contributing to budget increases in 2022 is executive protection. According to the Ontic 2021 Mid-Year Outlook: State of Protective Intelligence Report, 58% of CEOs and senior leaders who expressed a stance on political issues received physical threats. Senior Public Officials and local health department leadership who encouraged health measures like vaccination or mask-wearing have also become targets of physical threats. Against the backdrop of this increased threat landscape, executive protection has grown in importance among physical security professionals.

An inner look

These aforementioned types of threats could also come from inside an organization. Leadership will either take a stand, or not take a stand. The personnel of an organization expect their leaders to take a stand, whatever that might be, for or against a particular issue or concern. Unfortunately, pent up frustration surrounding decisions may not even be pandemic related, and at times still result in leaders being threatened. In many areas of the country, threats against “leadership” is foreign territory for many organizations.

Integration

The threat landscape has always been uncertain and rapidly changing. With many advancements in approach, strategy, and technology, organizations can protect themselves with integrated security risk strategies.

As both physical and cyber threats compound, organizations are tasked with protecting themselves on all sides. With increased and realized threats there is one unfortunate downside. Higher security costs as risks to supply chains, cyber and physical security risks increase. During this pandemic many organizations have unfortunately learned that their security profile may not be or has been at a level they had hoped it to be. New gaps have been found, existing weaknesses have become even weaker and due to other impacts of the pandemic, organizations may have struggled to get the necessary supplies, purchases and even personnel in a manner to which they were once accustomed.

Plug it

Identify your shortfalls, your gaps and plug the holes. A comprehensive risk assessment will assist in that process. If organizations fail to plug those holes, and as they begin to re-open even more, they unfortunately will remain or fall back into a vulnerable position.

Proactive hard work

Technology enhancements, uniformed security, executive protection, education, and plain old attentiveness and proactive behaviour towards security risks to quickly address existing and newfound challenges brought forth because of the pandemic will require increases in security budgets in 2022.

Now more than ever we need to move beyond reactive, and proactively secure our organizations.

It all simply starts with a plan.

We can Help.

Plan the Work. Work the Plan.

 

Should your Municipality need assistance, contact Michael White Group International today, and we will be happy to answer your questions. Visit michaelwhitegroup.com/contact/

 

Share

CHANGE OF DATE – Free Training Webinar – Living Through a Ransomware Breach

                 

NOTICE OF CHANGE OF DATE

Due to circumstances outside our control we have had to re-schedule this free training webinar to December 17th.  Our apologies for the change in date.

muniSERV is proud to partner with industry expert Valencia Risk, to invite you to a complimentary 90-minute emergency cybersecurity awareness session on December 17th at 2:00pm EST, Living through a Ransomware Breach.

Presented by Aron Feuer 25 year veteran of the cybersecurity industry, and developed in collaboration with our senior colleague Richard McDonald (former CIO of CSIS and CSE). This session is intended to inform City managers, CAOs CFOs, IT and IT and cybersecurity staff responsible for respond to a breach.

Session Audience

This session is for City, Town and Municipal employees that would be involved in a breach response or information protection. We invite CAO, CFO, CIO, Legal, and Emergency response executives, Council, and Privacy professionals to attend.

Session Description:

When an attack hits, executives must act quickly. In a ransomware breach, City managers are coming in cold, navigating uncharted waters with untested tools and playbooks. This session will describe the importance of being prepared for an attack through sharing the experience of a ransomware outbreak – from initial breach to recovery.  Attendees will learn:

  • What to expect from their cyber-insurance provider, MSSP, and tech partners
  • Where to act fast, and how to make informed decisions during a breach
  • What to measure for Cybersecurity health
  • Why a cybersecurity audit or assessment isn’t the best tool
  • Protecting yourself when you work from home
  • Recovering from a breach post-incident

To register for this event send your RSVP to [email protected]

About Aron Feuer, Managing Director of Valencia IIP

Aron is the managing director of cybersecurity at Valencia. Before Valencia Aron founded Cygnos IT Security as head hacker, and sold the firm to Grant Thornton in 2015. Valencia IIP specializes in cybersecurity, privacy, and cloud. Aron’s work is with the federal government, cities, provinces, fortune firms, national retailers. He’s responded to hacks by Anonymous, lead classified security projects for the government, and run hundreds of penetration tests, risk assessments, simulations and security incident responses. His certifications include CISSP, CISA, CRISC, CRMA, CDPSE and CIPP/C, MCSE

Share

Tips to Run a Successful In-Person Meeting

Over the last two years, many of us had to learn how to connect differently than we were used to. Instead of putting on our best suit, we’re still in our jammies from the waist down. Instead of shaking hands we’re pushing unmute.

Slowly but surely, the world is beginning to open back up. Where it’s safe to do so, many meetings are returning to an in-person format. Since we’ve all become accustomed to doing things virtually, it may take a little time and effort to get back into the swing of the face-to-face meetings. Here are a few tips to help make your meetings run as smoothly as possible.

Set the Agenda:

Municipalities know this, but meetings always run more efficiently when there is an agenda to follow. Having a clear agenda helps set the expectations. If the conversation starts going off track, you can always point back to the agenda items to steer things in the right direction. Setting out estimated times each agenda item should take for discussion, will also help provide direction and keep folks on track.

Start on Time. End on Time.

While it may seem polite to wait for some late arrivals to join, there’s a bigger downside to holding off until everyone is in the room. First and foremost, this sets a bad precedent. Accommodating the latecomers shows the others that arrival times are lax. This can spiral out of control quickly. Secondly, the attendees who’ve prioritized arriving on time are now feeling frustrated that their time isn’t being seen as valuable.

Set Ground Rules:

Having a few basic ground rules around meeting etiquette can help provide great flow in your meeting. Some solid rules, or expectations, can be something simple like; participate, get focus, maintain momentum, and reach closure. If you list these rules at the top of your agenda, both new and returning attendees will understand the direction of the meeting.

End with an Action Plan:

We’ve all been in meetings where the conversation seems to go around in circles without resolving anything. It’s important to establish a plan of action for the agenda items that need follow-up. Assigning certain people to particular tasks and plotting out a course of accountability will ensure that your meetings have purpose and value to all of those involved. We’ve conducted meetings by video teleconference for so long, (and honestly, we’ve become pretty good at them), it will be an adjustment for everyone to start attending again in person. But a well-organized meeting, and Chairperson with good leadership skills, will get us all back
in the swing of things soon.

Oh, and one more thing – dig out that suit again. Things may have changed over the last couple of years, but it’s still not considered socially acceptable to wear pajama bottoms to an in-person meeting.

Share