Conclusion: The new digital business model for IT is based on selecting, composing, and leveraging a dynamic range of Cloud based external services. Under the new IT paradigm people will work the way they want, when and where they want and with all the tools with which they are familiar; collaborate using a wide range of low-cost commodity services; and use their own devices (and in some cases their own applications) while those responsible for information governance seamlessly maintain control over the organisation’s enterprise information, privacy and security.
Governance & Planning
Conclusion: The Service Catalogue required by the ITIL framework has undergone several variations during the last 20 years. The rationale was to address the emerging service trends in in-house and outsourced modes of operations. However, while the original service catalogues’ objectives were achieved, they are inadequate in acquiring hybrid Cloud core services (e. g. storage) that should be delivered under outcome-based service contracts.
Conclusion: The term ‘digital disruption’ exerts a powerful cocktail of possibilities. While the term has limited application in specific cases, its general use has diluted its meaning. Whether this is significant may be judged individually but the general use of digital disruption to any and all events coinciding with the introduction of new technologies is misleading.
For the most part executives and strategists can understand technologies and their implementation as progressive evolution. This is especially true for buyers of technology. For some technology vendors and industries the effect of digital technologies may be disruptive, even destructive, insofar as markets, capital and stock value are lost.
Conclusion: Australian Organisations are actively developing and refining digital transformation strategies in recognition of the changing business and government operational environment. Innovation is generously mentioned in most strategies and there has been an increase in the number of Chief Digital Officer roles being offered and filled to assist organisations to achieve the transformation they are striving for. However, organisations need to actively develop innovation and entrepreneurial skills and capabilities across their organisations to ensure that they have broad skills to contribute to transformation and innovation programs and an entrepreneurial culture to support ongoing experimentation and change.
Conclusion: The return on investment in big data and associated analytics projects has been generally positive. It is more likely that returns over the longer term will grow too, provided strategic aims are established. The promise of big data hinges on information analysis, and therefore organisations must be clear as to use and application of the insight.
Conclusion: To improve the digital maturity of an organisation the CIO must encourage a team effort from business and technical areas within their organisation as well as strategic partners in the IT industry. Laggard IT vendors should be dropped in favour of digital leaders. The CIO will also need to convince their organisation to make early investments in long term capabilities that are critical to the adoption of new digital initiatives.
Conclusion: To ensure desktop investments are aligned to the organisation’s strategy, and the business benefits are clearly understood, IT organisations should create a Benefit Dependency Network. This is a benefits management tool that explicitly shows the linkages between technology investments and the business benefits, uncovers the business changes necessary to deliver these benefits, and clarifies the role of the business in harvesting those benefits.
Through the processes of building a Benefit Dependency Network, the IT organisation can engage the business in a meaningful discussion about business benefits and about the business changes needed to harvest them. Without a benefits analysis a major desktop investment is less likely to be approved and there are risks generating no value for the business, perpetuating the view that IT is a cost that must be reduced.
Conclusion: Non-IT executives are often reported as being concerned about the prospect of a cyber incident, but as security is not their area of expertise, responsibility for mitigation and preparation is often devolved to IT. This is a mistake, because as much as lack of any security could be devastating, applying the wrong controls to an organisation can be equally debilitating. Security is a response to risk, and it is the ongoing mandate of executives to demonstrate that they are guiding their organisation through foreseeable risks. Consequently, many organisations would benefit from the appointment of an information security officer who is able to translate between IT and the business and ensure that cyber risks are prepared for responsibly.
Conclusion: The Australian market presents serious problems to marketers. The situation has been foreseeable for the last two years. The situation is likely to soften further, which will constrain their capacity to seek growth.
Solutions are available and require reappraisal of strategies and objectives. Applying intelligence and the right tools should help organisations steer through the variety of conditions ahead.
Conclusion: Most organisations have some form of central approval process (Governance) based around agreed artefacts – few organisations have a built-in evergreening process to ensure governance controls are in line with emerging technology and business trends.