Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

12/21/2009
09:20 AM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: The Top 10 CIO Issues For 2010

For CIOs, 2010 will require new emphases on customers, revenue, external information, and a passion for rapid change.

While the business-technology world of 2010 will present a dramatically different outlook to CIOs versus the perspective they had 12 months earliers, we at InformationWeek's Global CIO think many of the core challenges and priorities will be similar. The glaring change, of course, is the absence this year of the all-consuming day-to-day struggle for mere survival that so many companies experienced in early 2009, and all the extraordinary cost-cutting that struggle demanded.

But the leaned-down, cranked-up expectations for CIOs that congealed so rapidly in last year's fight for survival remains, and that heightened sense of what CIOs must achievein spite of being in command of fewer resourcesis the overwhelming differentiator in the CIO 2010 agenda. To lean on a dominant clich from this past year, "the new normal" for CIOs in 2010 will be to accomplish a whole lot more with a whole lot less.

From our conversations throughout the year with hundreds of IT vendors, hundreds of CIOs, dozens of academics and analysts, and our own gleaned from covering this field since Abraham Lincoln's time, here's Global CIO's list of the Top 10 CIO Issues For 2010:

1) The Cloud Imperative. Cloud computing takes the top spot for focus and achievement in 2010 because in spite of all the questions and concerns still floating around it, the cloud offers CIOs huge potential for attacking priority #2 (flipping the 80/20 ratio on maintenance/innovation spending) and exploiting priority #3 (driving revenue growth). In the fourth quarter of this year, I've seen a dramatic surge in not only CIO interest in the cloud's capabilities and potential deployments, but also in IT-vendor emphasis on providing cloud-based solutions that are real, tangible, practical, and trustworthy. This is the big leap that successful CIOs must make in the coming year because no other architectural or platform approach will yield as much gain in lowering the cost of internal IT operations and liberating precious IT budget dollars to be deployed toward customer-centric growth opportunities. If by mid-year you have not developed and begun to execute upon an ambitious and enterprisewide cloud strategy, then by year-end the odds are good you'll no longer be a CIO.

2) The 80/20 Spending Trap. This intractable mindset has been something that we've bitched, kvetched, whined, and vehemed about throughout the year and I certainly wouldn't blame you for being tired of hearing about it. Yet in our recent webcast called "Welcome To The CIO Revolution: The Global CIO 2010 Agenda," an interactive polling question revealed that almost two-thirds of the audience said that here in December of 2009, they are spending at leat 70% and in some cases 80% of their IT budgets on internal operations. No one's questioning the importance of internal operations and the need to run a tight ship, but the bigger question is this: if the vast majority of your IT dollars are keeping the lights on, how in the world are you going to fund transformative and customer-centric projects? How are you going to make the CIO position and the IT organization part of the growth engine of the company instead of being a tactical cost center? When the economy improves, and when your CEO demands that you begin to launch some of those great ideas that have been collecting dust on the shelf for the past 15-18 months, do you really want your answer to be, "Hey, look, I agree with you philosophically, but the problem is I don't have any money left to help us grow because it's all being used exactly the way it was 10 or even 15 years ago, which is to fund old, stuffy, inflexible, and expensive systems and applications and people to manage all that." My guess is CEOs will be brandishing a zero-tolerance policy for such thinking in 2010and that's why cloud computing and its promise of offering more capability in less time and at lower cost deserves massive scrutiny from CIOs in 2010.

3) CIO-Led Revenue Growth And Customer Engagement. Let's look at the alternative: in 2010, you choose not to become part of the company's revenue engine, and you choose to continue to keep yourself and your IT team isolated from customers. Forgive my French, but then how in the heck can you expect to be taken seriously, particularly in today's challenging economy? How can you expect not to be regarded as a lumpy and obstructionist cost-center that needs to get the treatment that all cost centers get: relentlessly ground down until nothing remains? Where is/was it written that IT organizationsin spite of all their brains and all their capabilities and all their opportunitiesget a free pass when it comes to supplying the lifeblood of any business: revenue? CIOs who refuse to move in this direction will be ex-CIOs by June.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.
4) Mastering End-to-End Business Processes. File this one along with #3 above in the "Big Opportunities" folder. CIOs are one of the few types of executives who have the chance to see, analyze, and understand all of their companies' end-to-end business processes: that's a tremendous privilege, and a remarkable opportunity! Where's the waste? Where's the latency? How is the revenue mix changing? Where's a new-product opportunity? Where can we enhance our line of products and services with high-value new information about those products and services and the aggregate usage of them by customers? Which suppliers/partners are pulling their weight and which are not? How well or how poorly are we anticipating and reacting to shifting customer behavior? Think about your value to the company if you actively use your knowledge of and involvement in all those process-driven questionsand then think of your value to the company if you choose to shrug your shoulders and say it's just not part of your job? Such indifference might have been okay in 2008 or 2009; it will not be acceptable in 2010. Plus, you'll need to see around the corners:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3035
PUBLISHED: 2021-04-20
An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.26. Checkov 1.0 versions are not impacted.
CVE-2021-3036
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to us...
CVE-2021-3037
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS conf...
CVE-2021-3038
PUBLISHED: 2021-04-20
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions...
CVE-2021-3506
PUBLISHED: 2021-04-19
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The hi...