Risk
12/21/2009
09:20 AM
Bob Evans
Bob Evans
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Global CIO: The Top 10 CIO Issues For 2010

For CIOs, 2010 will require new emphases on customers, revenue, external information, and a passion for rapid change.

While the business-technology world of 2010 will present a dramatically different outlook to CIOs versus the perspective they had 12 months earliers, we at InformationWeek's Global CIO think many of the core challenges and priorities will be similar. The glaring change, of course, is the absence this year of the all-consuming day-to-day struggle for mere survival that so many companies experienced in early 2009, and all the extraordinary cost-cutting that struggle demanded.

But the leaned-down, cranked-up expectations for CIOs that congealed so rapidly in last year's fight for survival remains, and that heightened sense of what CIOs must achievein spite of being in command of fewer resourcesis the overwhelming differentiator in the CIO 2010 agenda. To lean on a dominant clich from this past year, "the new normal" for CIOs in 2010 will be to accomplish a whole lot more with a whole lot less.

From our conversations throughout the year with hundreds of IT vendors, hundreds of CIOs, dozens of academics and analysts, and our own gleaned from covering this field since Abraham Lincoln's time, here's Global CIO's list of the Top 10 CIO Issues For 2010:

1) The Cloud Imperative. Cloud computing takes the top spot for focus and achievement in 2010 because in spite of all the questions and concerns still floating around it, the cloud offers CIOs huge potential for attacking priority #2 (flipping the 80/20 ratio on maintenance/innovation spending) and exploiting priority #3 (driving revenue growth). In the fourth quarter of this year, I've seen a dramatic surge in not only CIO interest in the cloud's capabilities and potential deployments, but also in IT-vendor emphasis on providing cloud-based solutions that are real, tangible, practical, and trustworthy. This is the big leap that successful CIOs must make in the coming year because no other architectural or platform approach will yield as much gain in lowering the cost of internal IT operations and liberating precious IT budget dollars to be deployed toward customer-centric growth opportunities. If by mid-year you have not developed and begun to execute upon an ambitious and enterprisewide cloud strategy, then by year-end the odds are good you'll no longer be a CIO.

2) The 80/20 Spending Trap. This intractable mindset has been something that we've bitched, kvetched, whined, and vehemed about throughout the year and I certainly wouldn't blame you for being tired of hearing about it. Yet in our recent webcast called "Welcome To The CIO Revolution: The Global CIO 2010 Agenda," an interactive polling question revealed that almost two-thirds of the audience said that here in December of 2009, they are spending at leat 70% and in some cases 80% of their IT budgets on internal operations. No one's questioning the importance of internal operations and the need to run a tight ship, but the bigger question is this: if the vast majority of your IT dollars are keeping the lights on, how in the world are you going to fund transformative and customer-centric projects? How are you going to make the CIO position and the IT organization part of the growth engine of the company instead of being a tactical cost center? When the economy improves, and when your CEO demands that you begin to launch some of those great ideas that have been collecting dust on the shelf for the past 15-18 months, do you really want your answer to be, "Hey, look, I agree with you philosophically, but the problem is I don't have any money left to help us grow because it's all being used exactly the way it was 10 or even 15 years ago, which is to fund old, stuffy, inflexible, and expensive systems and applications and people to manage all that." My guess is CEOs will be brandishing a zero-tolerance policy for such thinking in 2010and that's why cloud computing and its promise of offering more capability in less time and at lower cost deserves massive scrutiny from CIOs in 2010.

3) CIO-Led Revenue Growth And Customer Engagement. Let's look at the alternative: in 2010, you choose not to become part of the company's revenue engine, and you choose to continue to keep yourself and your IT team isolated from customers. Forgive my French, but then how in the heck can you expect to be taken seriously, particularly in today's challenging economy? How can you expect not to be regarded as a lumpy and obstructionist cost-center that needs to get the treatment that all cost centers get: relentlessly ground down until nothing remains? Where is/was it written that IT organizationsin spite of all their brains and all their capabilities and all their opportunitiesget a free pass when it comes to supplying the lifeblood of any business: revenue? CIOs who refuse to move in this direction will be ex-CIOs by June.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.
4) Mastering End-to-End Business Processes. File this one along with #3 above in the "Big Opportunities" folder. CIOs are one of the few types of executives who have the chance to see, analyze, and understand all of their companies' end-to-end business processes: that's a tremendous privilege, and a remarkable opportunity! Where's the waste? Where's the latency? How is the revenue mix changing? Where's a new-product opportunity? Where can we enhance our line of products and services with high-value new information about those products and services and the aggregate usage of them by customers? Which suppliers/partners are pulling their weight and which are not? How well or how poorly are we anticipating and reacting to shifting customer behavior? Think about your value to the company if you actively use your knowledge of and involvement in all those process-driven questionsand then think of your value to the company if you choose to shrug your shoulders and say it's just not part of your job? Such indifference might have been okay in 2008 or 2009; it will not be acceptable in 2010. Plus, you'll need to see around the corners:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5694
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allow remote attackers to execute arbitrary SQL commands via the (1) agentPhNo, (2) controlPhNo, (3) agentURLPath, (4) agentControlKey, or (5) platformDD1 parameter to frameworkgui/attach2Agents.p...

CVE-2012-5695
Published: 2014-10-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS m...

CVE-2012-5696
Published: 2014-10-20
Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 does not properly restrict access to frameworkgui/config, which allows remote attackers to obtain the plaintext database password via a direct request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.