GA-008 · Digital Transformation · Executive

Modernization of Legacy Government Systems

CIO Track standard · 10-hour executive lab · Executive Diploma

Detailed Workshop Overview

Modernization of Legacy Government Systems is a workshop-first GovAcademy microcredential focused on legacy system modernization, workflow decomposition and migration planning. Participants do not only study concepts; they convert a real agency problem into an implementation artifact, evidence package and executive-ready decision brief. The course is organized around public-sector constraints: compliance, procurement, accessibility, privacy, cybersecurity, data stewardship, continuity and interagency accountability. The course is structured for decision makers and emphasizes strategic choices, portfolio risk, governance and leadership communication. By the end of the course, participants have a reviewable artifact that can support a pilot, internal approval, audit preparation or transformation roadmap.

CategoryDigital Transformation
LevelExecutive
Duration10-hour executive lab
Pass Score80%
StandardCIO Track
CredentialExecutive Diploma

Microcredential5-hour Service Prototyping Microcredential

Short, narrow and evidence-oriented module built for continuous professional development.

Competency mappingAreas 3, 5 and 6 — service content, no-code problem solving and transformation leadership

Mapped to a six-area digital-competence model for public-sector roles.

Portfolio artifactservice blueprint, data model, API checklist and implementation backlog

The learner completes a concrete artifact, not only a passive knowledge quiz.

Target audience

Digital service teams, product owners, service designers, CDTO offices, operational managers and agency modernization units.

Prerequisites

Participants should know one citizen, business or internal administrative service that needs redesign, automation or measurement.

Core scenario

redesign a paper-heavy administrative procedure into a digital service prototype

Public Problem and Service Context

Public-sector problem

Government teams need a practical way to redesign government services around users, workflows, data exchange and implementation capability. This course frames legacy system modernization, workflow decomposition and migration planning as an operational capability, not a theoretical topic.

Deployment context

The course can be used by a single agency unit, an interagency cohort or a central digital academy. Typical use cases include modernization planning, internal policy refresh, new service launch, audit readiness, procurement preparation, incident readiness or executive portfolio review.

Who Should Attend

service ownerproduct managerCDTO office memberoperations leadcitizen experience researcher

Pre-work Before the Workshop

Participants receive better results when they bring a real agency problem. The course therefore begins before the live session with a short evidence-gathering assignment.

  1. Select one real agency workflow, service, system, policy or risk area connected to legacy system modernization, workflow decomposition and migration planning.
  2. Bring one existing document if available: policy, SOP, process map, audit finding, spreadsheet, intake form, vendor requirement or leadership memo.
  3. Identify the decision owner, operational owner, data owner and security/privacy reviewer for the selected case.
  4. Define the desired improvement in one measurable sentence: faster service, lower risk, clearer evidence, better user experience or stronger governance.
  5. List constraints that cannot be ignored: statute, procurement rule, data classification, budget, legacy system, workforce capacity or stakeholder resistance.

What Participants Will Be Able To Do

  1. Explain the institutional purpose and risk context of legacy-system modernization roadmap, dependency map and staged migration decision package.
  2. Map the user journey and service evidence.
  3. Prototype a one-stop workflow or internal tool.
  4. Define data fields, roles and handoffs.
  5. Prepare an implementation backlog and success metrics.
  6. Package the completed work as evidence for a GovAcademy microcredential.

Prototype Lab

This module uses a practical studio model. Participants work through the scenario: redesign a paper-heavy administrative procedure into a digital service prototype. The lab toolset includes one-stop-window prototype, process map, database fields, API checklist and citizen journey. The expected output is a live service prototype for a government procedure, designed in a no-code/service-design lab.

  • Service blueprint
  • No-code prototype
  • User journey map
  • Data field/API checklist
  • Implementation backlog

Technology Stack and Templates

The course is designed so that participants can work without advanced programming skills while still producing implementation-grade evidence.

service blueprintjourney mapAPI/data exchange canvasno-code prototype checklistbacklog and roadmap board
  • User journey worksheet
  • Service blueprint
  • API and data-field map
  • Prototype acceptance criteria
  • Implementation roadmap

Applied Case Study

Agency context

A public agency is attempting to improve legacy system modernization, workflow decomposition and migration planning while maintaining continuity, legal defensibility and public trust.

Challenge

The current state has fragmented ownership, incomplete documentation, unclear evidence and inconsistent decision paths around legacy system modernization, workflow decomposition and migration planning.

Decision points

  1. Which process, system or user group should be prioritized first?
  2. Which control, dataset, policy or workflow must be documented before implementation?
  3. Which stakeholder can approve the next phase and what evidence will convince them?
  4. Which risk is acceptable, which risk must be mitigated and which risk requires escalation?
Success metric

a service prototype or modernization roadmap that can move from concept to pilot with accountable ownership.

Minute-by-Minute Session Plan

00:00–00:25Mission framing

Participant action: Define the agency mission problem behind legacy system modernization, workflow decomposition and migration planning.

Facilitator output: Validated scope statement and measurable public-value goal.

00:25–00:55Current-state diagnosis

Participant action: Map the existing workflow, system, policy or risk path.

Facilitator output: Visible map of actors, handoffs, data, decisions and evidence gaps.

00:55–01:30Standard and control alignment

Participant action: Connect the case to relevant standards, controls, policies and governance requirements.

Facilitator output: Initial compliance and accountability map.

01:30–02:15Prototype sprint 1

Participant action: Draft the first artifact using the provided template.

Facilitator output: Working prototype or decision artifact version 0.1.

02:15–02:45Peer review and red-team challenge

Participant action: Challenge assumptions, missing users, risk gaps and implementation barriers.

Facilitator output: Prioritized improvement backlog.

02:45–03:35Prototype sprint 2

Participant action: Revise the artifact with governance, risk and operational details.

Facilitator output: Implementation-ready artifact version 0.2.

03:35–04:15Evidence packaging

Participant action: Prepare evidence for evaluator review and credential issuance.

Facilitator output: Credential evidence package with artifact, rationale and review checklist.

04:15–05:00Executive defense

Participant action: Present decision brief, trade-offs, risks and next-step recommendation.

Facilitator output: Final evaluator notes, pass/fail evidence and 30-day implementation plan.

Hands-on Labs

Lab 1 — Problem-to-service canvas

Task: Convert legacy system modernization, workflow decomposition and migration planning into a concrete service, policy or risk problem with named users and owners.

Output: One-page public-value canvas with scope, users, constraints and success signal.

Evaluated for clarity, realistic scope and mission relevance.

Lab 2 — Workflow and evidence map

Task: Draw the operational flow from intake to decision, including documents, systems, approvals, data and audit evidence.

Output: Workflow map with bottlenecks, evidence gaps and control points.

Evaluated for completeness, ownership and traceability.

Lab 3 — Prototype artifact

Task: Build a draft implementation artifact for legacy system modernization, workflow decomposition and migration planning using the course templates.

Output: a live service prototype for a government procedure, designed in a no-code/service-design lab

Evaluated for usability, governance alignment and implementation realism.

Lab 4 — Executive decision package

Task: Compress the artifact into a leadership-ready brief with risk, options, resources and next step.

Output: Decision memo, implementation sequence and credential evidence checklist.

Evaluated for executive clarity, trade-off analysis and measurable next action.

Workshop Agenda

Block 1Strategic framing

Frame legacy-system modernization roadmap, dependency map and staged migration decision package as an executive, operational and public-value challenge.

Block 2Operating model design

Define governance, roles, approvals, data ownership, risk ownership and implementation constraints.

Block 3Prototype studio

Build the artifact, service concept, roadmap or control package through guided group work.

Block 4Risk and policy review

Stress-test the artifact against security, privacy, ethics, accessibility, procurement and continuity requirements.

Block 5Executive defense

Present the decision brief, adoption roadmap, metrics and credential evidence package.

Detailed Module Structure

Module 01Problem framing and public value

Participants define the institutional problem behind legacy-system modernization roadmap, dependency map and staged migration decision package, identify the affected users and convert the need into measurable public value.

Produce a one-page problem statement and stakeholder map.

Module 02Workflow, data and evidence mapping

The current process is decomposed into actors, decisions, data fields, approvals, documents, systems and audit evidence.

Build a workflow map with handoffs, bottlenecks and control points.

Module 03Prototype or implementation artifact

The cohort creates a practical artifact using service blueprint, no-code prototype, user journey map and links it to operational requirements.

Build a draft prototype, checklist, dashboard, policy memo or control matrix.

Module 04Risk, compliance and inclusion review

Participants test the artifact against cybersecurity, privacy, accessibility, ethical, legal and operational constraints.

Document at least five risks with owner, mitigation and review trigger.

Module 05Executive communication and adoption

The result is translated into a concise decision brief for supervisors, procurement, legal, technology or executive stakeholders.

Prepare a briefing note with recommended next step, resources and success metric.

Module 06Credential evidence package

The learner packages the artifact, reflection, evidence and evaluation result for the GovAcademy credential record.

Submit the final artifact and evidence checklist for evaluation.

Required Deliverables

Completion is based on visible evidence. The participant or cohort must produce a practical package that can be reviewed internally by a supervisor, CDTO office, compliance lead or programme owner.

  • Problem statement for legacy-system modernization roadmap, dependency map and staged migration decision package.
  • Workflow map with users, decisions, data fields, documents, approvals and responsible owners.
  • No-code service form or one-stop-window prototype with routing and evidence requirements.
  • a live service prototype for a government procedure, designed in a no-code/service-design lab
  • service blueprint, data model, API checklist and implementation backlog
  • Executive briefing note with recommended next step, required approvals, risks and success metrics.
  • Credential evidence package prepared for evaluator review.

Governance Checks

Every artifact is reviewed against practical governance requirements, not only technical correctness. The goal is to make the output usable inside an actual public institution.

Governance checkUser need

Evidence of user problem, accessibility requirement and service channel assumption.

Governance checkProcess ownership

Named service owner, handoff points and SLA expectation.

Governance checkData interoperability

Data fields, source system, API or exchange method and validation rule.

Governance checkAdoption readiness

Training plan, change risk and operational support owner.

Portfolio Evidence Package

The credential is backed by submitted work product. The evidence package is intended to support supervisor review, internal capability tracking and digital credential verification.

  • Completed public-value canvas with mission problem, target users and measurable outcome.
  • Current-state and target-state workflow map with owners, handoffs and decision points.
  • Prototype or implementation artifact for legacy system modernization, workflow decomposition and migration planning.
  • Governance checklist covering security, privacy, accessibility, compliance, ethics and operational ownership.
  • Executive decision brief with options, risks, dependencies, resources and recommended next step.
  • Evaluator review record showing rubric scores, feedback and pass threshold evidence.

90-Day Implementation Path

First 7 days

Action: Confirm owner, scope and internal sponsor; circulate the artifact for factual validation.

Result: Validated artifact and named implementation owner.

Days 8–30

Action: Run one internal review with legal, security, privacy, procurement or operations stakeholders.

Result: Updated evidence package and approved pilot conditions.

Days 31–60

Action: Pilot the workflow, checklist, policy or prototype with one controlled user group or service line.

Result: Initial performance evidence and backlog of improvements.

Days 61–90

Action: Prepare scale decision: continue, revise, procure, integrate, train or retire the approach.

Result: Executive decision memo and roadmap for the next phase.

Quality Bar

  • The artifact must be specific enough that another team could understand how to use it.
  • Every major risk must have an owner, mitigation path and review trigger.
  • Data, system, policy and human decision points must be visible, not implied.
  • The final brief must show trade-offs, not only benefits.
  • The credential evidence must prove practical capability through work product, not attendance.

Competency Map

This course is mapped to a public-sector digital competence model, including data navigation, communication, content creation, cybersecurity, problem solving and strategic transformation.

  • Area 1: analyze user needs, operational data and service evidence.
  • Area 3: create digital service content, forms, workflows and reusable requirements.
  • Area 5: solve administrative problems through prototyping and iterative delivery.

Expanded Assessment Documentation

This course includes a full assessment documentation package so that evaluators can score consistently, administrators can preserve an audit trail and learners can understand exactly what evidence is required for credential release.

// Assessment Documentation Pack v2.0

Assessment documentation package

This assessment documentation pack defines how GA-008 — Modernization of Legacy Government Systems is evaluated, recorded and certified. It converts the course from attendance-based training into evidence-based capability verification. The learner must demonstrate that the a live service prototype for a government procedure, designed in a no-code/service-design lab is usable, documented, reviewable and defensible in a public-sector operating environment.

Assessor brief

The assessor reviews the submitted work as if it were going to an internal agency approval meeting. The review focuses on practical usability, governance evidence, public value, risk ownership, documentation quality and whether the learner can defend implementation choices under realistic constraints. Primary reviewer profile: CDTO office / transformation portfolio reviewer.

Weighted scoring model

ComponentWeightPass ruleEvidence
Knowledge and standards check15%

Terminology, statutory/compliance context and public-sector relevance are accurate.

Short-answer responses, standards mapping and oral clarification where needed.

Scenario analysis20%

The learner diagnoses the operational problem, stakeholders, constraints, risks and decision path.

Scenario worksheet, problem statement, stakeholder map and decision assumptions.

Practical artifact30%

The main artifact is complete enough to support internal review or pilot preparation.

service blueprint, data model, API checklist and implementation backlog

Governance documentation20%

The documentation covers service blueprint logic, delivery risk, user journey evidence and operating model feasibility.

Governance checklist, control notes, review log, owner matrix and mitigation plan.

Executive defense15%

The learner explains trade-offs, residual risk, next steps, implementation sequence and success metrics.

Five-minute defense, evaluator notes and final decision memo.

Evidence requirements

  • The artifact must be tied to a named public-sector service, policy, system, workflow, risk area or leadership decision.
  • The submission must show current state, target state, responsible owners, constraints, assumptions and implementation risks.
  • All claims must be supported by a visible evidence source: workshop template, control map, interview note, process map, checklist, dataset inventory, policy excerpt or decision memo.
  • The learner must identify what remains unverified, what needs legal/security/privacy review and what decision is required before implementation.
  • The evidence package must align with the 5-hour Service Prototyping Microcredential and support future wallet-ready credential verification.

Integrity controls

  • Use learner-specific cases or agency-specific scenarios to reduce generic copy-paste submissions.
  • Require versioned files and evidence references so that changes after assessor review are traceable.
  • Apply peer challenge before final submission to detect unsupported assumptions and missing stakeholders.
  • Require evaluator comments for every score below the satisfactory band.
  • Keep a minimal audit trail: date, assessor, rubric version, score, decision, evidence links and remediation status.
  • Do not issue the credential when attendance is complete but artifact evidence is incomplete.

Documentation pack

Assessment cover sheet

Purpose: Identifies learner, cohort, course code, artifact title, evaluator, pass score and certification decision.

Minimum standard: All required identity, course, evaluator and version fields completed.

Transformation evidence matrix

Purpose: Documents the core evidence for Modernization of Legacy Government Systems.

Minimum standard: Each major recommendation is linked to an owner, evidence source, risk and next action.

Scenario response worksheet

Purpose: Shows how the learner interpreted the public-sector problem and operating constraints.

Minimum standard: Includes user group, agency value, affected process, constraints and decision points.

Governance and risk checklist

Purpose: Confirms that security, privacy, accessibility, legal, procurement, ethics and operational ownership were considered.

Minimum standard: Every relevant control has status, owner, evidence note and unresolved issue flag.

Executive decision memo

Purpose: Compresses the assessment output into a leadership-ready recommendation.

Minimum standard: Clear recommendation, options, risks, dependencies, KPI, owner and 30/60/90-day next step.

Evaluator record

Purpose: Creates an audit-ready review record for internal QA and credential issuance.

Minimum standard: Scores, comments, remediation notes, date, assessor identity and final decision are recorded.

Review workflow

1. Submission intake

Owner: Programme coordinator

Action: Verify learner identity, course code, required files and consent for credential processing.

Record: Submission receipt and checklist status.

2. Completeness screen

Owner: Assessment administrator

Action: Check that all mandatory documents, templates and evidence links are present.

Record: Complete / incomplete decision with missing-item notes.

3. Technical or policy review

Owner: CDTO office / transformation portfolio reviewer

Action: Score the artifact against the rubric, review assumptions and mark unresolved risks.

Record: Rubric scores, evaluator comments and evidence references.

4. Executive defense

Owner: Lead facilitator or panel

Action: Ask the learner to defend choices, trade-offs, adoption path and residual risks.

Record: Defense notes and final clarification requests.

5. Certification decision

Owner: Credential officer

Action: Confirm pass threshold, remediation status and credential release eligibility.

Record: Pass / revise / fail decision and credential metadata.

Scoring scale

Excellent

Score range: 90–100%

Descriptor: Artifact is implementation-ready, governance evidence is complete, risk ownership is clear and the executive defense is strong.

Competent

Score range: 80–89%

Descriptor: Artifact is usable with minor revisions; documentation is mostly complete and the learner can explain trade-offs.

Pass with conditions

Score range: 75–79%

Descriptor: Minimum capability is demonstrated, but the evaluator must record required corrections before or after credential release depending on programme policy.

Revise and resubmit

Score range: 60–74%

Descriptor: Core understanding exists, but documentation, risk controls or artifact quality are insufficient for certification.

Not yet competent

Score range: 0–59%

Descriptor: Submission does not demonstrate practical capability or cannot be linked to defensible public-sector evidence.

Remediation policy

  • One remediation cycle is recommended for scores from 60% to 74%.
  • The evaluator must specify exactly which document, control, assumption or artifact component must be corrected.
  • The revised submission should be reviewed against the same rubric version unless the cohort rules state otherwise.
  • A learner who fails to submit mandatory evidence cannot receive a credential even if the knowledge check is passed.
  • Repeated generic or unsupported submissions should be escalated to programme QA review.

Certification decision rules

  • Credential eligible: final score at or above 80% and all mandatory evidence accepted.
  • Conditional pass: score meets minimum threshold but minor corrections must be recorded in the learner file.
  • Revise: score below threshold or major evidence gap; no credential until resubmission is accepted.
  • Fail: artifact is unusable, unsupported, non-original or disconnected from the assessment scenario.
  • Panel review: required when the evaluator and facilitator disagree on the final certification decision.

Audit trail

  • Learner name or learner ID, cohort ID, course code and assessment version.
  • Submission timestamp, file list, version numbers and evidence links.
  • Rubric scores by component, assessor comments and total score calculation.
  • Remediation requests, resubmission timestamp and final decision.
  • Credential metadata: issuer, credential type, course code, issue date, expiry/renewal rule if applicable and verification reference.

Documentation quality bar

  • The documentation can be understood by a supervisor who did not attend the workshop.
  • The main artifact can be reviewed by legal, security, privacy, procurement or operations without rewriting the submission from zero.
  • Every key recommendation has at least one evidence source and one responsible owner.
  • Metrics are operational, not decorative: time saved, risk reduced, adoption rate, compliance status, service quality or implementation readiness.
  • The final package shows what is ready now, what needs review and what cannot be implemented yet.

Assessor notes

  • Score the artifact, not the confidence of the presentation.
  • Reward clear ownership, documented constraints and realistic implementation sequencing.
  • Penalize vague strategy language that has no workflow, data, evidence or decision owner behind it.
  • Ask for clarification when a risk is named but no mitigation or owner is assigned.
  • Use the executive defense to test whether the learner understands consequences and trade-offs.
Minimum passing rule

Minimum passing result is 80%. A learner below the threshold receives a remediation decision rather than a credential release. A credential can only be issued when the final artifact, governance documentation and assessor record are complete.

Assessment Forms and Templates

The following forms define the operational documentation used during intake, scoring, executive defense and credential release.

Learner + programme coordinatorAssessment cover sheet

  • Learner ID
  • Course code
  • Cohort
  • Artifact title
  • Submission date
  • Consent for credential processing
  • Assessor assigned
LearnerScenario response worksheet

  • Public-sector problem
  • Affected user group
  • Current-state workflow
  • Target-state change
  • Constraints
  • Risks
  • Decision required
AssessorRubric scoring sheet

  • Component score
  • Weight
  • Evidence reference
  • Assessor comment
  • Correction required
  • Final weighted result
Facilitator / panelExecutive defense checklist

  • Trade-off explained
  • Residual risk
  • Owner named
  • Metric defined
  • Implementation sequence
  • Panel notes
Credential officerGA-008 credential release record

  • Final score
  • Pass threshold
  • Decision
  • Credential type
  • Issuer metadata
  • Verification reference
  • Release date

Assessment Rubric

CriterionWeightEvidence
Problem definition and public value20%

Clear user group, agency need, measurable benefit and realistic scope.

Workflow, data and governance quality25%

Accurate process map, required data fields, owners, approvals, evidence and dependencies.

Prototype / artifact quality25%

Usable artifact that can support implementation, procurement, policy adoption or operational review.

Risk, ethics, security and compliance20%

Documented risks, mitigations, privacy/accessibility/security controls and accountability model.

Executive communication10%

Concise decision brief with next steps, metrics, owner and adoption path.

Delivery Model and Credential

live workshop, prototype studio, peer review, final artifact and verifiable credential issuance. Pass threshold: 80%. Successful completion may qualify the learner for a Executive Diploma record in the GovAcademy credential registry. The target credential model is Verifiable Credential / EUDI Wallet-ready record, suitable for a digital portfolio, wallet-based presentation and institutional verification.

Instructor Playbook

This block is included so agency academies, CDTO offices and internal facilitators can run the course consistently across cohorts.

  • Start with the participant’s real agency problem and prevent the discussion from becoming generic theory.
  • Force early scoping: one workflow, one service, one risk pathway or one policy implementation problem.
  • Use peer review as a control mechanism: every team must challenge assumptions from another team.
  • Require evidence language: owner, data source, approval route, risk, control, metric and next step.
  • End with an executive defense so participants practice explaining the artifact under time pressure.

Course FAQ

Is this course lecture-based?

No. The course uses short briefings only where needed. Most time is spent mapping, prototyping, reviewing and preparing a credential evidence package.

Does the participant need programming skills?

No programming is required unless the agency chooses to extend the artifact into a technical prototype. The course is designed for officials, managers, analysts and transformation teams.

Can an agency cohort use its own internal case?

Yes. The strongest format is an agency cohort working on a real service, workflow, policy, risk or modernization challenge that can continue after the course.

What proves successful completion?

Completion requires attendance, artifact submission, evaluator review, minimum pass score and a usable evidence package for the credential record.

Request Course Enrollment

Submit a course request for an individual learner, internal team or agency cohort. No course prices are displayed on the platform; enrollment is handled as an institutional request.