Leveraging Business Intelligence To Improve Business Operations
Designing the IT Organization for Service Management
IT Strategic Planning Cannot Be Carried Out In A Silo
Information Security is More than Information Technology
Tire Data, IT and Data Science: Revolutionizing the Tire Industry...
Tim Eisenmann, Chief Analytics Officer & SVP of Advanced Analytics, American Tire Distributors
Thank you for Subscribing to CIO Applications Weekly Brief
Trends in the IT Infra World
By Michael York, Director, Cloud Operations, Easterseals Bay Area
The challenge that business will face with infrastructure will be around security to detect, prevent and mitigate cyber threats. As more infrastructure moves outside of the static firewall and VPN technologies, IT needs to focus on the data.
Within the next 5-years, Serverless consumption will be a top driver of organizational innovation
Currently, most infrastructure teams still collect logs from the firewall or other systems and try to correlate trends. What I am seeing is that as data is moving outside the firewall, old-school methods for infrastructure security do not support this. We need to focus on real-time data management policies to support our new remote workforce.
As these trends evolve and challenges start to grow, I believe that the major task for organizational CIOs should be around leveraging data to drive business performance and innovation. There are two main components that should not be overlooked; 1. Gain visibility, control, and protection into their data; 2. Emphasis on using artificial intelligence to responsibility assist human decision making. What is missing from technology vendors today is tooling integrations, so data is democratized. To gain insights to make better decisions with our data, vendors cannot lock our data in their tools.
The entire C-Suite and Board need to understand that the organization will be breached at some point. As cyber-risks escalate, the organization needs to be asking how prepared is my organization and how resilient is our organization after a breach has occurred. From a cyber perspective, organizations need to concentrate; 1) having a cyber incident management plan; 2) training; 3) focus on cyber risk. What we should not forget is that no plan is perfect and to gain confidence, the plan must be tested, and drills performed. Security is everyone’s responsibility and training is key for not only the security and IT team but for the whole organization.
Many organizations today provide their staff computers and cellular phones that are managed and owned by the organization. Over the next couple of years, I see most organizations moving towards BYOD because of their push to locate their data in the cloud. Giving staff flexibility of where to work and how they work will offer organizations the ability to hire the best staff without location boundaries.