Share or be left out: That was a common theme at this year’s MIT Sloan CIO Symposium. In today’s digital ecosystem, companies have to cooperate in order to compete, according to expert panelists. In this week’s Searchlight, Features Writer Jason Sparapani explores the idea of “coopetition” from this year’s symposium.
Also from the MIT Sloan CIO Symposium: IT executives explain why financial services companies should take a lesson from startups when making their digital transformation. Plus, Derek Roos, CEO and co-founder of cloud platform Mendix, talked with SearchCIO at the symposium about digital innovation, leadership and the importance of celebrating success.
Speaking of digital transformation, in this Conference Notebook, three digital leaders from CBS, IBM and SAP detail how they overcame one of the biggest digital transformation hurdles: resistance to change.
Adopting a DevOps model has its fair share of risks and rewards — take it from those who have been there. In this feature, IT leaders discuss their experiences with DevOps adoption and why strong leadership, good people skills, patience and financial know-how are crucial to the process.
What does humanity look like in an IoT age? In this opinion piece, SearchCIO columnist Harvey Koeppel explores the evolution of IoT and why it calls for new thinking and new value systems. Another crucial part of IoT is privacy and security. CTO Niel Nickolaisen explains why IoT privacy and security are moving to the top of CIO agendas. Lastly, our latest issue of CIO Decisions delves into IoT applications in the massive food supply industry.
Over on SearchCompliance…
Regulating big data is already a big part of information governance, but could it actually generate new revenue? In this tip, SearchCompliance expert Jeffrey Ritter details how to leverage big data and systems monitoring to create new wealth.
What’s on your calendar this year? This SearchCompliance events calendar lists upcoming GRC conferences you should consider attending in 2016.
Virtual assistants are coming of age. Viv, a new virtual assistant with advanced natural language processing skills that allow her to understand complex commands, is set to disrupt the customer experience. What does it mean for the enterprise? In this week’s Searchlight, Site Editor Fran Sales details the new AI-powered assistant and explores the potential impact it will have on businesses and IT departments.
Blockchain technology — a distributed ledger that underpins bitcoin and other cryptocurrencies — promises to change how we think about monetary exchanges and is gaining traction around the world. But what makes it so great? This photo story highlights seven blockchain benefits according to Don Tapscott, author, consultant and CEO of Tapscott Group.
A U.K. hotel chain realized it needed to get closer to customers who book via online travel sites. Its solution was to cut out the middleman and adopt an API strategy. SearchCIO contributor Mary K. Pratt explores how the hotel chose its API management tool and how its strategy better serves the digital customer.
Business operations will look very different in 10 years, according Alec Ross, former innovation adviser to Hillary Clinton and author of the bestselling book, The Industries of the Future. The reason: advances in robotics. In this installment of CIO Minute, Ross explains what IT executives can expect from cognitive robotics innovation.
Hyper-convergence infrastructure promises to shake up the enterprise. How exactly? This infographic outlines the technology’s benefits, drawbacks and key enterprise applications.
Over on SearchCompliance…
Our blockchain coverage doesn’t stop there! In this SearchCompliance feature, discover the cybersecurity concerns that come with the increasing use of bitcoin and blockchain technology and what regulations could be on the horizon.
The role of information governance has expanded in recent years as enterprise leaders have begun to realize that the vast amounts of data generated and stored by companies provides a wealth of readily available business data intelligence. In this Q&A, governance expert Jeffrey Ritter discusses how the quest for big data intelligence is forcing governance professionals to move into the business realm.
Are you managing unstructured data properly in the digital age? In this webcast, Ritter discusses how integrating automated information governance processes can help with managing unstructured data.
Lastly, in this IT Compliance Advisor blog post, Kyle Anixter, PMO manager of IT services at Curvature, details the business benefits of ISO 27001 certification.
IBM is seeking to speed innovation and discover new use cases for quantum computing. In an effort to do so, it created Quantum Experience, cloud-enabled quantum computing platform that anyone on any desktop or mobile device can access for free. The platform is the first of its kind, but is it really groundbreaking. On Searchlight, Associate Site Editor Brian Holak spoke with analysts and researchers to see what potential impact IBM Quantum Experience could have on the enterprise.
Standardization is an important ingredient to delivering great customer service, saving on costs and improving consistency and efficiency. But while standardizing processes can give companies an edge, too much of it can hurt companies and IT departments by taking away personalized service. To find the balance between standardization and personalization, Gartner analyst Bruce Robertson advises CIOs to use techniques such as customer journey mapping and design thinking, as well as tools such as the net promoter score (NPS), a metric that gauges customer experience and brand loyalty.
A mobile strategy is also a necessity for companies to remain competitive, as both customers and employees have made mobile devices their primary computing and engagement platform. IT departments and CIOs play a key role in developing and implementing this digital strategy, but because of a plethora of technical and cultural challenges, enterprises have been slow to deploy mobile apps. Kurt Marko, a technology analyst at MarkoInsights, says that mobile backend as a service (MBaaS), a cloud-based app design model, can help CIOs take the hybrid approach of connecting on-premises applications and data.
What else was new on SearchCIO and SearchCompliance?
- How Apple’s revenue dip plays 2016’s slower tech market
- VDI technology helps Australian agency deliver blood
- Compliance news roundup: Multifactor authentication a major part of PCI DSS 3.2
Hyper-convergence, a system that allows integrated technologies to be managed as a single system through a common toolset, is set to shake up the enterprise and how we think of data center economics. How should CIOs respond to the emergence of hyper-converged infrastructures? These four articles delve into the concept and explore the CIO imperative:
•Mike Matchett, senior analyst and consultant at The Taneja Group, details five key considerations for CIOs when evaluating hyper-converged architectures.
•CTO and SearchCIO columnist Niel Nickolaisen shares the five critical questions he asked before making the move to hyper-converged architectures.
•CIOs and IT executives outline the benefits and drawbacks of hyper-converged infrastructures.
•CIOs and IT executives examine the question of hardware cost savings.
Apple’s latest earnings report shows something that hasn’t happened in 13 years: a decline. Does it signal a great fall for the tech giant? In this week’s Searchlight, Features Writer Jason Sparapani explores the earnings decline and what it means for the company and enterprises at large. Plus: Amazon and Facebook revenues soar, and ‘Snowden’ trailer goes online.
In this four-part webcast on enterprise security architecture, Johna Till Johnson, CEO at Nemertes Research, touches on next-generation security strategies and best practices, business risk portfolio management, emerging technologies and more:
Part 1: Using next-gen enterprise security to combat cyber-weaponry
Part 2: Five steps for developing an enterprise security roadmap
Part 3: Delving into business risk portfolio management and determining the product classes that should be considered
Part 4: A photo story detailing the technology areas to consider when crafting an enterprise security roadmap
Is your organization invested in mobile and cloud computing? It should be, according to consultant Bob Egan. In this Q&A, he explains why spending money on mobile cloud is not only beneficial to productivity but also to business competitiveness.
CEOs: Are you being held hostage by IT? In this tip, IT executive Kevin McDonald describes why it’s important that company leaders know what IT is up to when it comes to cybersecurity, and why IT process documentation is a must-have best practice.
In this TotalCIO blog post, Senior News Writer Nicole Laskowski explores an interesting workplace redesign that’s taken right from cruise ships and hotels: beach toweling. What is it? If employees leave a desk unoccupied for more than two hours, they are to take everything with them. Laskowski goes through the reasoning and potential benefits.
Over on SearchCompliance…
In this two-part feature covering a recent privacy forum hosted by the Massachusetts Attorney General’s Office, Site Editor Fran Sales first explores why a lack of adequate privacy legislation is putting consumers at risk and how a consumer bill of rights could be a first step in addressing the problem. In part two, the panelists at the privacy forum ponder whether U.S. states can fill the gaps in consumer privacy regulation and share tips for fostering transparency.
Add cybersecurity to the list of insurance options to consider. In today’s risk-laden business environment, more companies are turning to liability coverage to protect data assets. But a number of questions about this emerging market still remain.
On the IT Compliance Advisor blog, Sarah Holland, senior analyst of public policy and government relations at Google, explains why maintaining a certain company culture is key to assuring consumer privacy.
Intel just announced that it’s cutting 12,000 jobs in a restructuring effort that shifts focus away from PCs and onto growing technologies like wearables and IoT. In this week’s Searchlight, Site Editor Fran Sales explores the job cuts, how Intel plans to catch up to the PC revolution and the imperative for CIOs in meeting employees’ evolving computing needs. Also in Searchlight: Google faces even more EU antitrust charges and messaging app Viper announced that it encrypts all its messages.
When a cyberassault happens, it can be hard to keep a cool head. But, according to SearchCIO expert Harvey Koeppel, it can make all the difference. In this article, Koeppel recounts the steps he took when a cybersecurity threat halfway across the globe threatened his company just two weeks into his new CIO job and explains what that taught him about cybersecurity and the CIO role.
It’s time for another #CIOChat! Join SearchCIO — in partnership with MIT CISR — on Wednesday, April 27, at 3 p.m. EST to talk about new business models for the digital economy, what it takes to be an ecosystem driver and the challenges that IT executives face in today’s digital economy. Joining us as our guest expert will be Stephanie Woerner, research scientist at MIT CISR.
Over on SearchCompliance
In this webcast with vArmour CISO Demetrios Lazarikos, learn how to adapt information governance strategies to accommodate advancing technology such as mobility, cloud computing and IoT.
Digitization continuously challenges governance, risk and compliance processes, but it does have its benefits. In this handbook, learn how organizations are drawing business value from GRC analytics data and developing strategies to incorporate analytics best practices that benefit company-wide business processes.
Facebook CEO Mark Zuckerberg wants consumers to think of businesses as their friend. Sounds like a stretch? With the company’s new “chatbots,” it could soon be a reality. Facebook opened up its Messenger app to developers so they create these robots, which are powered by artificial intelligence and could offer consumers another channel to engage with businesses. Associate Site Editor Brian Holak talks to enterprise mobility experts to get their take.
How can CIOs sell the notion that IT is prepared to partner with the business to drive innovation? At the recent Gartner Business Intelligence and Analytics Summit, Guy Kawasaki, former chief evangelist at Apple, lays out a 10-step guide on how to foster the art of innovation.
Companies are using data lakes to navigate growing pools of complex data. But they need governance to get the most out of these tools, or risk disaster. Read more in the April issue of CIO Decisions. And on the latest issue of our SearchCIO handbook, read about how Soundsgood, a Paris-based startup, is partnering with streaming platform APIs from Spotify, YouTube and others so its users can curate and share playlists across those services.
Here’s what else was on SearchCIO:
- Why are big banks partnering on blockchain technology?
- High-performance mobile experiences should be your top priority
- How to nurture strong CIO-CFO relationships
What was new on SearchCompliance:
- Privacy forum: Consumer privacy starts with consumer empowerment
- How one healthcare company fosters patient trust using real-time interaction
- FCC’s new privacy proposal could stifle innovation
Blockchain, the distributed-ledger technology the cryptocurrency bitcoin is based on, is garnering a lot of attention. Although it isn’t mainstream yet, that could change after this week’s announcement that Microsoft is partnering with big banks to develop the technology. In this Searchlight, features writer Jason Sparapani details the partnership and looks at the future implications of blockchain adoption. Also in Searchlight: IT spending expected to dip and Trump hotels get hacked — again.
If you missed any of the action from Fusion CEO-CIO Symposium, we’ve got you covered. In this Instagram roundup, Senior News Writer Nicole Laskowski chronicles sessions on disruptive business models and digital investments via SearchCIO’s new Instagram account.
As SearchCompliance expert David Loshin explains, healthcare fraud is not a new problem; it’s been happening for over twenty years. Luckily, new proactive strategies that utilize data analytics are proving useful to organizations in helping combat multiple forms of healthcare fraud. Loshin details the techniques in this tip.
Speaking of healthcare, malware intrusions at hospitals is a growing problem, as exemplified in recent ransomeware attacks at hospitals across the U.S. In this TotalCIO blog post, Features Writer Jason Sparapani explores the reason there’s so many of these cyberattacks on healthcare organizations.
No organization is safe from cyberthreats in the digital age. In this SearchCompliance webcast, Diane Carlisle, IGP, CRM, executive director of content at ARMA International, explains how a strong information governance program goes a long way in alleviating cybersecurity challenges.
This week, our reporters flew to Madison, Wis. to get the latest scoop at this year’s Fusion CEO-CIO Symposium, which this year focused on delivering customer experience through disruptive business models. Check out these videos to get business and IT experts’ take on various topics:
- How CIOs can prepare for the “cognitive enterprise“
- Augmented and virtual reality technologies in the enterprise
- Why CIOs will need to invest in AI to meet customer expectations
- Colony Brands’ journey to cloud first started with the data warehouse
- Using two-speed IT to meet customer expectations
- People: The biggest workplace transformation hurdle
One day, Niel Nickolaisen had an epiphany. In the midst of a meeting about the state of his company’s products, it occurred to the CTO and SearchCIO columnist that perhaps it was time to start thinking of his company as a platform, laying its vertical products on their side so that the company can interoperate better. In his column, Nickolaisen lists four lessons he learned on his company’s journey to a platform-based business model.
If you’ve been keeping up with the Apple-FBI case, you’ll know that the FBI finally dropped its legal action against the Silicon Valley giant this past Monday, saying that it has found a “third party” to access the encrypted data on the San Bernardino shooter’s iPhone. But that hasn’t stopped technology and security experts from thinking of similar scenarios in the future, nor has it solved existing data privacy issues. It could give customers more sway in the privacy debate, however. Read more on these issues that Features Writer Jason Sparapani delves into in three blog posts.
Most companies don’t understand what it costs to get work done, but that’s set to change soon, thanks to a new economic arrangement called the on-demand economy. Thanks to performance analytics combined with certain technology platforms, a new era of strategic work management will result in improved cost control, increased revenue and a greater agility to adapt to market fluctuations, say labor experts.
Here’s what else was on SearchCIO this week:
- Do you need a cloud access security broker (CASB)?
- The 1 networking rule: It’s not about you
- Why CPOs should focus on innovation, value to beat odds
- Enterprise 3D printing guide infographic
Over on SearchCompliance..
This week, 1,500 cybersecurity professionals gathered at the SecureWorld Boston Conference to get the latest on security best practices in cloud, IoT, mobility and the supply chain. Associate Site Editor Brian Holak delves into what was covered, from incident response, data inventorying and more.
Speaking of customer privacy, various data privacy experts and researchers gathered last week at a public forum, hosted by Massachusetts Attorney General’s Office, to discuss how exactly to draw the line between protecting consumer privacy and helping the government keep the public safe. One panelist, Carol Rose, the executive director of ACLU of Massachusetts, called for greater transparency and accountability, and suggested an open, democratic public debate as a start.
Digitization can bring many benefits to a company’s regulatory compliance processes, such as automated big data management tools. But digitization and the storage of unstructured data that goes along with it can complicate these processes. In this webcast, Steve Weissman, founder of Holly Group, lays out some of these modern information governance challenges, the “big-box” theory of data governance and more.
With Big Brother watching, what could go wrong? Biometric surveillance is drawing attention — and trepidation — in the wake of the tragic terrorist attacks in Brussels. In this week’s Searchlight, analysts discuss the present and future use of biometrics technology in national security efforts and share their logistic and privacy concerns.
Before starting your data lake implementation there are some things you need to know. In this Conference Notebook installment, learn three key ingredients that can make or break your company’s data lake system. Also, experts discuss why data lake governance is a critical component in modern data architecture.
Building a customer base is a dilemma every fledgling platform company faces. In this article, read about the experiences of Thumbtack, an online marketplace for home and other professional services, and get best practices for attaining critical mass.
CISOs have the important job of discerning the right technology to use and laying down the right policy, so just what skillset is required for the job? In this article, Features Writer Jason Sparapani and senior IT executives explore the balance of technical skills and business polish that are necessary for the CISO role.
3D printing is making its way into the enterprise. What should CIOs know? In this Essential Guide, catch up on SearchCIO’s recent 3D technology coverage including expert advice and columns.
The Internet of Things seems to be making its way into nearly every industry. The food industry is no exception. In this blog post, Site Editor John Moore talks about food grown locally with assistance from IoT in the form of sensors and mobile applications. Also on the blogs, Sparapani discusses the importance of communication and cooperation among public and private sectors following an attack on the power grid.
This year marked a change in the way finance industry regulators regulate. In this feature, find out how the Financial Industry Regulatory Authority is moving away from checkbox-style regulations and focusing instead on companies’ compliance culture.
Security is no longer just an IT issue — it’s a boardroom issue. In this blog post, Site Editor Fran Sales highlights cybersecurity issues the board should focus on when scoping potential risks.
Who should CISOs report to? That has been a longstanding question in the IT field, but, as cybersecurity rises to the tops of the business and IT priority ladders, it has taken a on new sense of urgency. Features Writer Jason Sparapani explores the CISO reporting structure in today’s threat-laden digital business environment.
Speaking of cyberthreats, the U.S. government is starting to assess the digital currencies that are associated with the growing number of cybercrimes such as the recent ransomware attacks on big-name news organizations, as well as blockchain, the technology that underpins these currencies. In this week’s Searchlight, Site Editor Fran Sales explains the ransomware attacks in relation to blockchain and discusses the urgent blockchain security questions that are on Congress’ and IT executives’ minds. Also in Searchlight, Apple is considering boosting iCloud encryption, and Amazon wants your face to be the new password.
Cybersecurity is no longer just an IT concern; it’s a business one. But communicating the value of GRC analysis to the board and determining accountability is easier said than done. In this feature, Sales explores the board’s role in managing cybersecurity and supply chain risks.
The Internet of Things (IoT) has arrived, and the enterprise will never be the same again. In this Essential Guide, get strategic best practices for getting your enterprise IoT initiative off the ground, and find out how IoT is impacting several IT disciplines and how IT executives should respond.
But that’s not all we have on IoT. In this SearchCompliance webcast, learn how a lack of focus on IoT security challenges during the design stage could create a number of data protection vulnerabilities.