Unique Approach to Mitigate External Threats
Using Technology to Mitigate Risk Management Costs
With respect to IT risk management, technology can cost-effectively eliminate or mitigate external threats originating from email or web-based sources. Examples would be identification and elimination of malware intended to destroy or steal data assets or to extort (ransomware). We use software to scan incoming email and validate web addresses (URL’s) as “safe.”
Technology can also be used to identify vulnerabilities in our network Infrastructure, thus supporting elimination/ mitigation efforts. Examples are scanning all physical network computing hardware asset to report known vulnerabilities.
Artificial Intelligence—The Key to Cost Reduction
Artificial intelligence (algorithms) are leading to cost reduction and improved accuracy/consistency in underwriting, claims management, and fraud detection. I’m also excited about the development and innovations relating to the “Internet of Things.” I’m referring to smart devices of various types that monitor, respond, or report on situations or conditions. Some examples I’m seeing are water-leak detection in homes and auto reporting to insurance companies.
Technology can also be used to identify vulnerabilities in our network Infrastructure, thus supporting elimination/ mitigation efforts
Emergence of Connectedness through Mobile Devices
Mobile devices have provided us with immediate access to information anywhere. Whether that is for business needs, personal needs, or entertainment, smart mobile devices provide immediate access regardless of where we happen to be at any given moment. Such access has led to a ‘connectedness’ through social networking as mobile devices allow real-time access to friends and family regardless of where you are.
Another aspect of technology in daily life is that information resources are immediately accessible. Want to find a restaurant or gas station close to where you happen to be? That information is instantly available. There is an incredible and expanding wealth of readily available information for training/development and inquiry.
Unique Skills for Effective Technology Leadership
Communication, collaboration, and people management skills will always be the foundation of effective technology leadership. Another critical component is the ability to deeply understand the business needs of the organization and evaluate opportunities afforded by technology.
Evolution of Operating Model
I would say the operating model now calls for a more team-based approach and more collaboration, both within IT and across business units. A perfect example of this is the increased use of agile methodologies over more traditional sequential development. There is also an increased emphasis on effective staff recruiting and retention. We are focusing more and more on employee engagement and individual development plans.
Overcoming Enterprises Challenges
Genuine collaboration across business units and across the enterprise as a whole is a challenge.
Another is maintaining enterprise focus and alignment on critical goals and objectives. Another challenge is to maintain the ability to evaluate enterprise-beneficial opportunities in an incredibly fast-changing technology environment.
A high performance organization must also have the right personnel to meet its goals. Hiring, developing, and retaining persons with skills, aptitudes, and personal orientation that support a high performance organization is critical.
Deliverables with Time-bound Agile Sprints
We do; we set deliverables with time-bound Agile sprints. We are implementing agile delivery methodologies at the product level. We use scrum and Kanban. Within IT, DevOps initiatives are being used for faster build-deployment of systems. We are just starting to use enterprise-level agile methodologies across all teams.
Law Firms Find New Opportunities in the Cloud
Towards a More Powerful Legal Architecture
Growth in eDiscovery Analytics Means Growth in Profits for Law Firms
The Goldilocks Theory for Risk Management
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....