TotalCIO


March 2, 2009  5:16 PM

CIO weekly wrap-up: Data protection, log management tools and SaaS CRM

Rachel Lebeaux Rachel Lebeaux Profile: Rachel Lebeaux

If you’re located anywhere on the East Coast, then I probably don’t need to tell you that we’re covered in several inches of snow, with more to come. Seriously, when will this winter end?

In the meantime, distract yourself with our latest SearchCIO.com content on data protection, log management tools, SaaS CRM and VoIP’s role in IT disaster recovery.

Data protection quiz for enterprise CIOs – Do you know how to protect your organization’s sensitive data? Take this quiz and find out.

Log management tool, SIM boxes combine to form security architecture – A new chief information security officer builds an information security architecture to analyze log files and create metrics for business discussions on compliance and security.

Using SaaS CRM for application integration gives users single sign-on – Learn how a financial services firm modernized system functionality by integrating Software as a Service CRM with 10 back-end systems in a $250k project. The result: time savings, new clients and big ROI.

When IT disaster recovery plan is put to the test, VoIP becomes savior – As floods test a utility’s IT disaster recovery plan, a Voice over Internet Protocol installation rescues business continuity efforts and shows the importance of DR planning for offices other than your headquarters.

February 27, 2009  5:25 PM

IT disaster recovery plans that work (with a bit of improvising)

EditorAnne Anne McCrory Profile: EditorAnne

It’s always refreshing to hear about a company that had to put its IT disaster recovery plan into action and comes out the other side having faced unexpected challenges with valor – and just enough battle scars to improve the plan for next time.

That was the case at Alliant Energy, as our Linda Tucci writes this week. The Midwest utility now has a 10-page document of lessons learned following the Iowa flooding last summer, when its Cedar Rapids, Iowa, high-rise was evacuated and IT had to RTTO (rise to the occasion).

One issue: The company’s IT disaster recovery plan focused on headquarters in Madison, Wis., and so didn’t contain contingency plans for things like the Cedar Rapids building (home to a redundant data center) shutting down. Luckily, the local leadership secured space around town and expanded a VoIP deployment then in process to get operations up and running much more quickly than they would have otherwise.

What’s in the rest of the 10 pages? Stay tuned; you’ll find more DR lessons learned in our disaster recovery and business continuity coverage to come.


February 19, 2009  9:39 PM

Qualities of a good leader in a recession: Your view?

Rachel Lebeaux Rachel Lebeaux Profile: Rachel Lebeaux

A story on SearchCIO.com this week about eight qualities of a good leader during a recession included a lot of leadership advice for IT professionals. While I was doing the interviews for this piece, a nugget from leadership expert Jason Jennings, about being a “fish out of water” leader, really stood out to me:

Jennings identifies several traits that set conventional leaders apart from great leaders, who he terms “fish out of water.” Conventional leaders cast themselves as larger than life and sure in their stances. They are secretive and avoid signs of weakness. A fish-out-of-water leader, meanwhile, is humble and expresses self-doubt when appropriate. He is honest and admits fault when necessary.

Unfortunately, many “conventional” business executives have made news in the past several months as corporate scandals and mammoth bailouts have grabbed headlines, Jennings said. And that’s why leaders should aim for something different.

“‘Fish out of water’ is a good way to describe people who buck conventional wisdom and don’t just go along,” Jennings said.

I couldn’t agree more strongly with Jennings on this. Clearly, the leadership model that has defined much of the past decade is not working out the way anybody hoped. A confident leader is one thing; a deluded manager with the attitude, “I’m sure I’m right and this is how it’s going to be done and I’m not interested in anybody else’s opinions on this” is not.

Sure, that might seem obvious to some, but I’m surprised how many workplace “leaders” I’ve encountered who don’t seem to understand that humility and honesty will get them further with their staff – and even their superiors – than blatant posturing.

Do you agree with the traits listed in our leadership qualities article? What leadership qualities do you view as crucial during tough times? Feel free to share your comments below.

Also, I’m thinking of writing a companion piece about the qualities of a good IT employee during a recession. If you’re a CIO or IT leader who would like to talk to me about what you look for in employees during rough times, please e-mail me.


February 16, 2009  3:08 PM

CIO weekly wrap-up: IT budgets in 2009, more NAC, data protection tips

Rachel Lebeaux Rachel Lebeaux Profile: Rachel Lebeaux

Happy Presidents Day! If you’re in the office today (or even if you’re not), check out the latest stories from SearchCIO.com:

Economic downturn hits IT budgets — Our comprehensive survey of IT spending plans for 2009 shows that the recession is taking a bite out of IT budgets, particularly for hardware purchases. Security and compliance spending is up, and the focus on business intelligence continues. Does this mesh with your organization’s spending patterns in 2009? Add your comments below!

Network access control case studies show varied options — Network access control is controversial but needed, experts say. Read our collection of case studies — including our latest story on why one architect chose Microsoft NAP — to learn how three universities have put the technology to work.

Seven tips to improving enterprise data protection — CIOs should take a holistic approach to enterprise data protection. Security expert Mark Egan offers seven tips for enhancing your data protection policy.

IT support costs trimmed via workforce realignment, remote access tool — The Salvation Army helps those in need, but sometimes it needs a bit of help, too. The organization is turning to workforce realignment and clientless remote access tools to stave off layoffs, cut costs and increase efficiencies during this recession.


February 13, 2009  4:42 PM

IT centralization grows as approach to IT consolidation

EditorAnne Anne McCrory Profile: EditorAnne

Of interest to me this week: stories of how CIOs are approaching IT consolidation not just in the data center, but also in their organizations. It’s no surprise that flat or reduced budgets impel a leader to look at roles and processes to find efficiencies, and often, when you’ve already done this time and again, your next choice is a massive restructuring.

Often that means IT centralization: Organizations that moved IT out into the business units to get closer to users are finding, as the Salvation Army did, that bringing them back together makes more economic sense, especially given technologies to manage branch offices remotely. Then there’s the move to combine disparate IT units, as is the case in Tulare County in California, where Lee Root, IT division manager, merged two county IT departments. That’s not unlike what Stephen Fletcher set out to do for the state of Utah — combine 24 separate IT departments and 1,000 IT employees into one central IT unit. When we spoke to him in 2007, he expected the effort to take three years.

IT centralization is no small effort — as Tulare County’s Root says, “We had to merge two separate workflows, two separate IT systems, two separate policies and we had to find a new way to manage IT services” — and large enterprise mergers have many times that number of systems and policies. Indeed, there are many other considerations, as Susan Cramm, former Taco Bell CIO, writes in a piece on IT Centralization or Decentralization, and the answer isn’t always soup-to-nuts centralization. Still, evaluating your organization with some centralization in mind makes too much sense not to consider in these tough economic times, and I expect we’ll see a lot more of it.


February 9, 2009  4:14 PM

CIO weekly wrap-up: SaaS contracts, vendor management, data protection

Rachel Lebeaux Rachel Lebeaux Profile: Rachel Lebeaux

Welcome back, readers! This past week at SearchCIO.com, we covered desktop virtualization, Software as a Service (SaaS) contract negotiations, IT vendor management offices and data protection services and strategies. Check out the full stories below!

Desktop virtualization not all about cost savings – Virtual desktops have strong security and management benefits, but looking to desktop virtualization to save money may be a stretch. Read this article to get an idea of the benefits and drawbacks.

In SaaS contract negotiations, focus on customization, future pricing – In a recession, everybody is looking to make and save money where possible. Changing pricing models, longer contracts and customization are making it harder to switch providers, so build safety nets into your SaaS contracts.

How to build an IT vendor management office or standards body – Vendor management offices and standards bodies can help large organizations save money on IT purchasing and better manage vendor relations, both critical during a recession. Read this story for advice on how to set up a vendor management office and insights into how they can properly assess vendors.

Data protection services and strategies for enterprise CIOs – Enterprise CIOs can improve data protection in their organizations by reviewing the strategies, case studies, tips and technologies in this extensive guide.


February 6, 2009  2:29 PM

Desktop virtualization tradeoffs and benefits: What did I miss?

Christina Torode Christina Torode Profile: Christina Torode

A couple of recent stories, “VDI vs. fat clients: The tradeoffs,” and “Virtual desktops and virtualized applications: An FAQ for IT executives,” caused a few readers to reach out to tell me I missed the boat on some of the key benefits of desktop virtualization.

One reader wrote:

“Your article today, ‘Virtual desktops and virtualized applications: An FAQ for IT executives,’ caught my eye. I did not notice any mention of disaster recovery/business continuity or security in your article.”

In response to the VDI vs. fat client article, another reader called me on having to be connected at all times when using VDI and not including a remedy for the high storage costs related to using this technology:

I think some of the benefits of VDI were missed by this article. Granted, you need to be network-connected, but one advantage is you can connect to your virtual session from any device that can bring up a Web session. We are currently piloting a VDI solution — I have been running on a VDI session for about six months utilizing an HP thin client device. When I go home, I can hop on my personally owned desktop and connect to all my corporate applications — no lugging a laptop around, no added cost of a laptop over a desktop and no concerns that I will lose corporate data if my laptop is lost or stolen.

“From the storage perspective — some of these problems can be solved by thin provisioning. Also, the next release of VMware VDI will help mitigate some of the added storage costs.

“While the points made are valid — the article could have expounded on the benefits a lot more.”

Yet another reader said the piece was spot on as far as the tradeoffs of VDI but again brought up the question of how to address storage costs:

“It essentially confirms my own line of thinking, having investigated a thin client desktop solution. It would have been nice to compare the actual storage needs in a table so we could see just how much more storage you need for a virtualized solution.”

Storage, disaster recovery and security are obviously top of mind for these readers. Where else did I miss the boat?


February 5, 2009  5:32 PM

Have some unbillable hours? Make time for IT education and training

Linda Tucci Linda Tucci Profile: Linda Tucci

Will the economic recession result in an uptick in IT education and training? That seems to be the case at some high-powered New York law firms, where attorneys with unbillable hours on their hands are showing an increased interest in how their IT systems work.

Karen Levy, director of global technology for Debevoise & Plimpton LLP, said that getting face time with the law firm rainmakers is a perennial challenge. They were too busy jetting around the world to talk to you, said Levy, a panelist at the Chief Information and Technology Officers Forum in New York this week.

Recently, Levy’s trainers were asked to do a presentation on Excel at a small subpractice group luncheon they assumed would be attended by junior associates.

“There were 25 partners in the room,” she said, adding, “which gave me a stomachache.” But the sea change gives CIOs an opening.

“I think for the past 15 years at these conferences we have had multiple sessions talking about how challenging it has been to get good training to our lawyers, who are so busy billing hours that it is actually too expensive for us to train them, because there is such opportunity costs,” she said.

“We now have this window of opportunity where they have a little more time, they want to be busy and we can tailor some training classes and keep their professional development going in the period of the downturn,” she said. Her team is developing specific IT education and training for the firm’s lawyers, as a result.

The flip side of that, chimed in Peter Lesser, director of global technology at Skadden, Arps, Slate, Meagher & Flom LLP, is that because the attorneys are less busy, “they call us more.”

His team is seeing an uptick in the number of calls to the call center. “People have so much spare time. If I was to do the math on the number of hours I’ve spent with our technology committee members, in the past eight weeks the hours have gone up tremendously, because even some of those partners are just less busy and they are trying to find ways to fill their time,” Lesser said, adding that it is incumbent on CIOs to take advantage of that time to educate their customers and build stronger relationships with power brokers.

“We have an opportunity to get in front of people that it was hard to get to before,” Lesser said.


February 4, 2009  3:42 PM

Economic recession to spur ‘dramatic increase’ in cybercrime

Linda Tucci Linda Tucci Profile: Linda Tucci

Bad times always bring a rise in crime. But this economic recession is setting us up for a wave of cybercrime. The broken economy, combined with increased digitization as retail and operations move online and ever-more sophisticated hackers, means more data is more vulnerable than ever. That was the warning from former federal prosecutor and securities fraud attorney Orin Snyder, speaking at a data security panel at yesterday’s LegalTech conference in New York.

“I think with the recession that is upon us we are going to see an even more dramatic increase in cybercrime and opportunistic hacking,” said Snyder, a litigation partner at the New York office of Gibson, Dunn & Crutcher.

Data breaches have exploded in recent years, despite better technology, despite greater awareness of cyberattacks, Snyder said.

The scenario?

“You have a recession creating more cybercriminals. There is more and more digitization every day as companies accelerate their move from bricks and mortars to the Internet as they are closing stores and centralizing online, and then, of course, the sophistication of the hacking,” Snyder said.

“I think that is almost an unholy trinity of events that will result in an even greater incidence in the coming years of data breach problems,” Snyder said.

Make that unholy quartet.

“What is unfortunate is that companies, as they are laying off and retrenching, are going to budget even less and less for prevention and technology to deal with data breach problems,” Snyder said.

As economic pressures mount, companies will also likely see dramatic increases in employee misuse of data, Snyder predicts, recounting a recent conversation with someone at a major financial institution. “They said that since September there has been a two-fold increase in petty financial crimes, employee-caused –$2,000, $4,000, $6,000 being taken out of bank customer’s account by an employee — not massive theft, but it all adds up.”

Joining Snyder in a discussion on data security was his colleague from Gibson Dunn, Alexander Southwell, also a former federal prosecutor and securities fraud expert; Adam Smith, chief legal officer at Terremark Worldwide Inc.; and panel moderator Alan Brill, senior marketing director of Kroll Ontrack Inc.


February 4, 2009  3:06 PM

Welcome to the ‘new’ TotalCIO blog for enterprise CIOs

Rachel Lebeaux Rachel Lebeaux Profile: Rachel Lebeaux

Well, it’s not entirely new — you can still rely on us for the collaboration, information and opinion we’ve provided all along to enterprise CIOs, both on TotalCIO and SearchCIO.com. But our blog for enterprise CIOs is now being housed in a different location, and I’d like to take a moment to introduce you to some of our new blog features and also some of the features on IT Knowledge Exchange.

Instead of a long list of categories, we now have a tag cloud. Click any topic in the tag cloud and you’ll see posts on only that topic. The tag cloud is dynamic, so the more a tag is used, the larger and darker it will appear. This helps you quickly see the most popular topics.

You’ll also notice we’ve integrated more of our related editorial content in the right sidebar. If you’re on a post and wish to know more about the same topic after reading the post, be sure to browse the links in the right sidebar.

We always appreciate it when you share our content on social networking sites and we’ve increased the number of bookmarking tools from four to 43. If you enjoy a post, please be sure to share.

Look near the top of the page and you’ll see a row of tabs. You can click the IT Blogs tab to find dozens of technology blogs, both user-generated and TechTarget editorial blogs. You can even request your own blog.

There is also a tab labeled IT Answers. This is where you can ask your own IT question and have it seen by thousands of IT Knowledge Exchange members. So be sure to pose your own question for enterprise CIOs, browse thousands of answers from other IT executives or help out a fellow IT pro by answering a question.

Thanks for stopping by!


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: