Main
Log in

Alan Hansell

This email address is being protected from spambots. You need JavaScript enabled to view it.

Alan Hansell is an IBRS advisor who focuses on IT and business management. Alan is able to critique and comment on IT and business management trends, ways to justify and maximise the benefits from IT-related investment, IS management development and the role of the CIO. Alan has extensive experience in IT management, consulting and advising senior managers in matters related to IT investment. He was a Director in Gartner's Executive program and adviser to over 50 CIOs and business managers and before joining Gartner a consultant with DMR Group. He also worked as an IS professional, manager and industry consultant for IBM for nearly 30 years. Alan is a CPA and Associate of Governance Institute of Australia.

Conclusion: In a world where organisations increasingly rely on the successful performance of their business systems it is important IT management takes the lead in managing the risk of systems failure and cyber security breaches from all sources.

Boards are ultimately responsible for monitoring risks. They direct IT (and business) management to create a framework and strategy to manage systems, including data, and cyber security risks. The framework must include policies, supported by processes and practices to ensure business systems operate successfully and the data stored is not compromised.


Register to read more...


Conclusion: When multiple application software vendors claim they have the solution to an organisation’s requirements, challenge them to prove it by demonstrating their product’s differentiators and ability to process use cases.

To make the right buying decision, clients must insist the demonstration stretch the software’s functionality and the vendor’s grasp of its nuances. If this is not done, the likelihood of a wrong buying decision looms.

Vendors that do not know their software’s capabilities intimately, or are ill prepared to demonstrate them, should be rated accordingly and, unless there are mitigating circumstances, omitted from the final round in the procurement process. Vendors that are comfortable in demonstrating the software’s functionality and its ability to meet an organisation’s requirements should be seriously considered for inclusion in the final round of the procurement exercise.


Register to read more...


Conclusion: Consolidating information systems after a MoG change or a company acquisition is not only risky but also likely to be expensive. The problem is compounded when the benefits expected from the merger are out of reach or, in the case of a company acquisition, the buyer has paid too much, and the stakeholders are demanding accountability.

To maximise the probability of a successful merger from a business systems perspective, do not take claims made of the ICT systems’ integrity at face value. Verify them and develop plans to integrate the systems where feasible, while minimising risks and retaining skilled IT and business professionals.


Register to read more...


Conclusion: One of the least understood contributors in implementing IT projects successfully is the leadership provided by competent TTLs (Technical Team Leads). Their ability to steer projects in the right direction, maximise the contribution of team members and cement the relationship with sponsors, is pivotal.

IT professionals, with potential to act as TTLs, must manage their careers by seizing leadership training and mentoring opportunities so they have a head-start when assigned to a TTL role.


Register to read more...


Conclusion: Business and IT professionals struggle with how to frame their message so it engages the reader and has immediate impact. To get the reader’s attention, it is important to pose a business problem, or an unacceptable situation that is pre-occupying the reader, and provide a solution on the same page.


Register to read more...


IBRS iQ is a database of Client inquiries and is designed to get you talking to our Advisors about these topics in the context of your organisation in order to provide tailored advice for your needs.


Register to read more...


Conclusion: Most organisations do not know the extent of shadow or departmental IT. It is likely to range from using complex SaaS (Software-as-a-Service) solutions for core business systems to use of spreadsheets for simple applications, such as managing grants for local sporting organisations.

Unless there is a filter to assess requests for and identify non-compliant software, e. g. with inadequate security processes or using unapproved technical architecture, management conflicts are inevitable.


Register to read more...


Conclusion: One of the objectives of an IT workforce plan is to maximise the use of the skilled IT professionals and project managers and minimise their idle time. Managing the IT workforce plan is a complex task in most organisations as skill levels required may vary by project and by operational support roles.

To be successful, the manager of the plan must maintain a current and accurate skills inventory to assign the right IT professional(s) to the role. The manager also needs to ensure the role is correctly specified so an inexperienced IT professional is not assigned when an experienced one is needed.


Register to read more...


Conclusion: IT professionals who operate in a structured and predictable environment could find the role change to that of an IT manager more challenging than they had anticipated, as it typically requires a mind-set change from completing one or two tasks to managing people. To avoid disappointment, senior management must help new IT managers make the transition and cope with the nuances of the role.

To help them succeed, assign other IT managers, who have made the transition, to coach them. In this way they can learn how to act out the new role and come to grips with the politics of the organisation, or spheres of influence, and know how to interpret business priorities.


Register to read more...


In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles