Main
Log in

Governance & Planning

Conclusion: Organisations need to plan to quickly and successfully recover business operations by creating and updating business continuity plans (BCPs) supported by disaster recovery plans (DRPs). However, there are many challenges to overcome in order to keep these plans useful in readiness when business disruption eventuates.

Conclusion: Unless software testing practices are rigorous and enforced, system defects will continue and compromise meeting of service delivery objectives. Whilst defect-free code, and clean vendor software patches, are an objective, their realisation may be as elusive as the so-called paperless office.

To significantly reduce defects, and minimise risks, IT management must implement a program that elevates quality ahead of expediency and pragmatism, even if it is at the expense of the project’s schedule.

Conclusion: Some ICT strategies are technology-centric while others are business-centric. The technology-centric strategies are usually developed without business stakeholders’ involvement resulting in limited business buy-in. Business-centric strategies are based on business strategies but have a short life-span. This is because market forces require business strategies to change frequently. IBRS recommends that ICT strategies be derived from business and IT guiding principles.
The rationale is that guiding principles have a longer life-span than business strategies and can deliver the desired outcome such as:

  • leveraging new technology
  • involving business stakeholders in the development process
  • realising business value in a timely and cost-effective manner.

Conclusion: Agile teams will struggle to deliver a viable solution (or product) unless they can tap into the business knowledge of an astute product owner who can communicate the objectives of the product and work with the scrum to ensure it meets the stakeholder’s requirements. Without a proficient product owner, the Agile team may lack direction which would put successful outcomes at risk.

Conclusion: Australians have become increasingly concerned not only with what data is being held about them and others, but how this data is being used and whether the resulting information or analysis can or should be trusted by them or third parties.

The 2018 amendments to the Privacy Act for mandatory data breach notification provisions are only the start of the reform process, with Australia lagging a decade behind the US, Europe and UK in data regulation.

Therefore, organisations seeking to address the increasing concerns should look beyond existing data risk frameworks for security and privacy, moving instead to adopt robust ethical controls across the data supply chain1 that embodies principles designed to mitigate these new risks. Risks that include the amplification of negative bias that may artificially intensify social, racial or economic discord, or using data for purposes to which individual sources would not have agreed to.

Early adopters of effective data ethics will then have a competitive advantage over those who fail to address the concerns, particularly of consumers, as to how their data is used and if the results should be trusted.

Conclusion: Agility has been introduced into organisations as part of their approach to increase the cadence, or velocity, of design, development and implementation cycles for project delivery. Increased levels of activity and visibility are also integral to many social media solutions and their approach to online presence. However, strategic planning processes evolve slowly and for many organisations this critical business and technology planning activity is lagging behind and no longer supports the business objectives in the digital era.

Conclusion: Keeping the executive informed on how the ICT function is performing while advising it how to take advantage of changes in business technology is an ongoing challenge for every CIO or ICT manager.

Astute CIOs know that to get traction with the executive (or equivalent) they must deliver services required by stakeholders while contributing to strategy debates on how to use new technologies to meet the challenges of the future. Getting traction starts with presenting the right ICT-related information to the executive at the right time.

Related Articles:

"Can IBRS provide a Checklist for reporting to the Board on Cyber Security?" IBRS, 2017-06-29 01:41:08

"Digital transformation: Top 4 lessons" IBRS, 2018-10-04 13:03:00

"Mind the Gap in the IT and Business Partnership" IBRS, 2014-10-01 20:39:56

Conclusion: The 2018 CIO survey1 revealed that the CIO’s influence is stalling, with fewer CIOs on executive boards. However, improving business processing is still the #1 operational priority. To address this priority, CIOs and IT managers should use everyday tools such as calendars to better collaborate with their staff by exploiting and promoting the features of the tools at their fingertips.

Related Articles:

"Mind mapping at work Part 2: Business thinking and outcomes" IBRS, 2018-08-01 09:56:26

"Real-Time Co-Authoring Part 2" IBRS, 2015-12-02 20:08:00

Conclusion: While the current artificial intelligence (AI) initiatives are data-driven, there are instances whereby the current data is insufficient to predict the future. For example, answering the following questions might be challenging if the available data is only of a historical nature irrelevant for forecasting purposes:

  • Q1: What will be the effect on sales if the price is increased by 10 % as of the next quarter?
  • Q2: What would have happened to sales had we increased the price by 10 % six months ago?

The purpose of this note is to provide a framework that can be used to derive sales principles to answer the above questions. The same approach can be used to derive other business processes principles such as procurement, customer service and client complaints tracking.

Related Articles:

"Acknowledging the limits of machine learning during AI-enabled transformation" IBRS, 2019-01-06 22:29:52

"Analytics artificial intelligence maturity model" IBRS, 2018-12-03 09:44:43

"Machine learning will displace “extract, transform and load” in business intelligence and data integration" IBRS, 2018-02-01 10:03:37

Conclusion: Every dollar spent in supporting legacy systems or BAU (business as usual) represents a dollar that cannot be allocated to digital transformation initiatives. Conversely, organisations without legacy systems (digital natives) can be quicker to market with innovative solutions supporting the digital strategy, as there is no residual debt to repay.

Compounding the problem for organisations with legacy systems is that skilled IT professionals supporting them are likely to be fewer each year, as they leave for greener pastures or retire. To back fill, management must pay a premium to engage skilled contractors who will need time to understand the nuances of the legacy systems and become productive.

Related Articles:

"Digital transformation: More than a technology project" IBRS, 2018-06-01 04:04:24

"Innovation: Taking action in 2018" IBRS, 2018-08-01 09:14:16

"Make the process for allocating IT resources transparent" IBRS, 2018-06-01 04:17:01

In the News

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles