have come more dominant factors. By |
1. they need a different approach to |
2017 the typical IT organization will |
technology and investment, |
spend up to 30 percent of its budget on |
2. they need new digital suppliers, |
risk, security and compliance, and will |
3. they need to create an innovation |
allocate 10 percent of their people to |
competency. |
these security functions. That’ s triple the |
To accelerate the creation of a new |
levels of 2011. You can’ t control the |
digital technology platform, leading |
hackers. You can control your own |
companies are acting as venture |
infrastructure by using more automation, |
investors. They are not waiting for |
more outsourcing, and more network- |
current suppliers to build digital |
based algorithms. Simplify your systems. |
capabilities. Instead, they are investing in |
We must move away from trying to |
small technology startups. They are |
achieve the impossible perfect |
buying a stake in their future, guiding |
protection, and instead invest in |
their direction. |
detection and response. The average malware lies dormant, unnoticed, for more than seven months before it is activated or detected. IT leaders must get better at sensing these dormant threats. |
Even if you aren’ t a CIO technology venture investor, the landscape for the technology buyer will change. If you are going out to buy products and services, you will need new capabilities that most
Mode 1 suppliers don’ t have, or are
|
CIOs need to rethink their security and |
struggling to deliver. |
risk investments. Enterprises should move their investments from 90 percent prevention / 10 percent detection and response, to a 60 / 40 split. |
The new suppliers of digital platforms must be: able to support fast-fail projects; in the cloud, on demand, and highly automated with short-term |
Venture Investors |
engagements and pay-as-you-go |
For CIOs to truly transform, they need three |
models; and provide real-time insights |
things: |
with advanced automation. |