have come more dominant factors . By |
1 . they need a different approach to |
2017 the typical IT organization will |
technology and investment , |
spend up to 30 percent of its budget on |
2 . they need new digital suppliers , |
risk , security and compliance , and will |
3 . they need to create an innovation |
allocate 10 percent of their people to |
competency . |
these security functions . That ’ s triple the |
To accelerate the creation of a new |
levels of 2011 . You can ’ t control the |
digital technology platform , leading |
hackers . You can control your own |
companies are acting as venture |
infrastructure by using more automation , |
investors . They are not waiting for |
more outsourcing , and more network- |
current suppliers to build digital |
based algorithms . Simplify your systems . |
capabilities . Instead , they are investing in |
We must move away from trying to |
small technology startups . They are |
achieve the impossible perfect |
buying a stake in their future , guiding |
protection , and instead invest in |
their direction . |
detection and response . The average malware lies dormant , unnoticed , for more than seven months before it is activated or detected . IT leaders must get better at sensing these dormant threats . |
Even if you aren ’ t a CIO technology venture investor , the landscape for the technology buyer will change . If you are going out to buy products and services , you will need new capabilities that most
Mode 1 suppliers don ’ t have , or are
|
CIOs need to rethink their security and |
struggling to deliver . |
risk investments . Enterprises should move their investments from 90 percent prevention / 10 percent detection and response , to a 60 / 40 split . |
The new suppliers of digital platforms must be : able to support fast-fail projects ; in the cloud , on demand , and highly automated with short-term |
Venture Investors |
engagements and pay-as-you-go |
For CIOs to truly transform , they need three |
models ; and provide real-time insights |
things : |
with advanced automation . |