Three Key Takeaways from the 2016 State of IT Report

As 2015 winds down, IT leaders and their teams are looking at internal needs and external conditions in formulating plans and setting budget priorities for the coming year.

The recently released 2016 State of IT Report from Spiceworks provides a wealth of information about how IT teams are formulating plans for the year ahead.

The report covers IT budgets, spending and staffing plans; the trends and concerns keeping IT pros up at night; and a look forward at technology adoption trends.

Among the abundance of facts and stats presented, here are three noteworthy findings, along with additional observations.

IT pros will “need to keep doing more… with less.” (Here’s one strategy to help.)

One of the key top-level conclusions reported by Spiceworks is: “IT pros don’t expect their IT staff to increase in 2016, which means they’ll need to keep doing more… with less.”

How IT can do more with less

At the same time, more than half of IT organizations say “end-user need” is a key purchase driver.

Continue reading “Three Key Takeaways from the 2016 State of IT Report”

The CIO’s Role in Stellar Customer Experience – Hunter Muller

The role of the CIO has shifted dramatically in the past few years, from the traditional focus on “keeping the lights on” to playing a more strategic part in aligning IT with the business, as well as embracing trends like the consumerization of IT.

Yet in his new book The Big Shift in IT Leadership, author Hunter Muller “contends that many CIOs remain focused inward, only concerned with technology,” according to Anita Bruzzese on The Fast Track blog.

The Big Shift in IT Leadership: How Great CIOs Leverage the Power of Technology for Strategic Business Growth in the Customer-Centric EconomyAs Bruzzese writes, “The best CIOs, (Muller) says, know that results beat out technology. Having great technology doesn’t mean much if customers aren’t having a good user experience.”

Muller believes CIOs should not only contribute their expertise to efforts aimed at providing a great customer experience (for both internal and external “customers”), but to take a leadership role in this area.

He views IT leaders as uniquely positioned for this task, because CIOs “have total visibility across the organization,” and with that access, “have a golden opportunity to help develop innovative strategies and spur collaborations that will have a big impact on the organization’s overall success.”

Continue reading “The CIO’s Role in Stellar Customer Experience – Hunter Muller”

New CIO Role: Eight Ways to be a Chief Integration Officer

The confluence of disruptive business models, emerging technologies (cloud computing, IoT, wearables) and the consumerization of IT has dramatically redefined the role of the CIO. While there’s no question the CIO’s job description is evolving (a Google search for “changing role of the CIO”–in quotes–yields more than 30,000 results), there’s no clear consensus on exactly what that means.

The CIO as Chief Integration OfficerBut a recent research report from Deloitte and accompanying summary suggest a new twist on the title: the CIO as “chief integration officer.” In this role, the CIO “integrates” technology, ideas, and processes across business functions to drive innovation and improve business performance.

The full report is well worth investigating, though it runs to 150 pages; the summary is an informative, quicker read. Continue reading “New CIO Role: Eight Ways to be a Chief Integration Officer”

Data Breaches and Enterprise Information Security: A Better Response

From major retailers to news services to government agencies, headlines about major data breaches are now alarmingly common.

Of course, hacking is nothing new. Initially the province of underground hobbyists, hacking burst into public consciousness with the release of the 1983 movie War Games. Though it’s now quaintly nostalgic, clips from the film were actually shown in the U.S. Congress at the time as “a ‘realistic representation’ of the dangers of hacking,” and inspired passage of the Computer Fraud and Abuse Act (CFAA) within a year.

How to respond to data breachesToday, despite heightened awareness (and extensive investments in data protection technologies), the number and cost of data breaches continue to rise as foreign governments and cyber criminals seek to steal information for commercial and military advantage.

Continue reading “Data Breaches and Enterprise Information Security: A Better Response”