Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

12/21/2009
09:20 AM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: The Top 10 CIO Issues For 2010

For CIOs, 2010 will require new emphases on customers, revenue, external information, and a passion for rapid change.

While the business-technology world of 2010 will present a dramatically different outlook to CIOs versus the perspective they had 12 months earliers, we at InformationWeek's Global CIO think many of the core challenges and priorities will be similar. The glaring change, of course, is the absence this year of the all-consuming day-to-day struggle for mere survival that so many companies experienced in early 2009, and all the extraordinary cost-cutting that struggle demanded.

But the leaned-down, cranked-up expectations for CIOs that congealed so rapidly in last year's fight for survival remains, and that heightened sense of what CIOs must achievein spite of being in command of fewer resourcesis the overwhelming differentiator in the CIO 2010 agenda. To lean on a dominant clich from this past year, "the new normal" for CIOs in 2010 will be to accomplish a whole lot more with a whole lot less.

From our conversations throughout the year with hundreds of IT vendors, hundreds of CIOs, dozens of academics and analysts, and our own gleaned from covering this field since Abraham Lincoln's time, here's Global CIO's list of the Top 10 CIO Issues For 2010:

1) The Cloud Imperative. Cloud computing takes the top spot for focus and achievement in 2010 because in spite of all the questions and concerns still floating around it, the cloud offers CIOs huge potential for attacking priority #2 (flipping the 80/20 ratio on maintenance/innovation spending) and exploiting priority #3 (driving revenue growth). In the fourth quarter of this year, I've seen a dramatic surge in not only CIO interest in the cloud's capabilities and potential deployments, but also in IT-vendor emphasis on providing cloud-based solutions that are real, tangible, practical, and trustworthy. This is the big leap that successful CIOs must make in the coming year because no other architectural or platform approach will yield as much gain in lowering the cost of internal IT operations and liberating precious IT budget dollars to be deployed toward customer-centric growth opportunities. If by mid-year you have not developed and begun to execute upon an ambitious and enterprisewide cloud strategy, then by year-end the odds are good you'll no longer be a CIO.

2) The 80/20 Spending Trap. This intractable mindset has been something that we've bitched, kvetched, whined, and vehemed about throughout the year and I certainly wouldn't blame you for being tired of hearing about it. Yet in our recent webcast called "Welcome To The CIO Revolution: The Global CIO 2010 Agenda," an interactive polling question revealed that almost two-thirds of the audience said that here in December of 2009, they are spending at leat 70% and in some cases 80% of their IT budgets on internal operations. No one's questioning the importance of internal operations and the need to run a tight ship, but the bigger question is this: if the vast majority of your IT dollars are keeping the lights on, how in the world are you going to fund transformative and customer-centric projects? How are you going to make the CIO position and the IT organization part of the growth engine of the company instead of being a tactical cost center? When the economy improves, and when your CEO demands that you begin to launch some of those great ideas that have been collecting dust on the shelf for the past 15-18 months, do you really want your answer to be, "Hey, look, I agree with you philosophically, but the problem is I don't have any money left to help us grow because it's all being used exactly the way it was 10 or even 15 years ago, which is to fund old, stuffy, inflexible, and expensive systems and applications and people to manage all that." My guess is CEOs will be brandishing a zero-tolerance policy for such thinking in 2010and that's why cloud computing and its promise of offering more capability in less time and at lower cost deserves massive scrutiny from CIOs in 2010.

3) CIO-Led Revenue Growth And Customer Engagement. Let's look at the alternative: in 2010, you choose not to become part of the company's revenue engine, and you choose to continue to keep yourself and your IT team isolated from customers. Forgive my French, but then how in the heck can you expect to be taken seriously, particularly in today's challenging economy? How can you expect not to be regarded as a lumpy and obstructionist cost-center that needs to get the treatment that all cost centers get: relentlessly ground down until nothing remains? Where is/was it written that IT organizationsin spite of all their brains and all their capabilities and all their opportunitiesget a free pass when it comes to supplying the lifeblood of any business: revenue? CIOs who refuse to move in this direction will be ex-CIOs by June.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.
4) Mastering End-to-End Business Processes. File this one along with #3 above in the "Big Opportunities" folder. CIOs are one of the few types of executives who have the chance to see, analyze, and understand all of their companies' end-to-end business processes: that's a tremendous privilege, and a remarkable opportunity! Where's the waste? Where's the latency? How is the revenue mix changing? Where's a new-product opportunity? Where can we enhance our line of products and services with high-value new information about those products and services and the aggregate usage of them by customers? Which suppliers/partners are pulling their weight and which are not? How well or how poorly are we anticipating and reacting to shifting customer behavior? Think about your value to the company if you actively use your knowledge of and involvement in all those process-driven questionsand then think of your value to the company if you choose to shrug your shoulders and say it's just not part of your job? Such indifference might have been okay in 2008 or 2009; it will not be acceptable in 2010. Plus, you'll need to see around the corners:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18216
PUBLISHED: 2019-10-20
** DISPUTED ** The BIOS configuration design on ASUS ROG Zephyrus M GM501GS laptops with BIOS 313 relies on the main battery instead of using a CMOS battery, which reduces the value of a protection mechanism in which booting from a USB device is prohibited. Attackers who have physical laptop access ...
CVE-2019-18214
PUBLISHED: 2019-10-19
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.