Main
Log in

Governance & Planning

Conclusion: Since the advent of the title of chief information officer (CIO), the reporting line for this critical role and those it has since spawned, such as the chief technology officer and chief digital officer, has been the subject of debate. The reality is that there is no right or wrong answer, but rather the reporting relationship of the CIO and his or her IT organisation is a function of the current value of IT to delivery of outcomes at a particular given point in time.

The reality is that the value of IT to delivery of business outcomes, despite the pervasiveness of technology in the modern enterprise, is not static and changes over time. Yet many CIOs and aspiring IT leaders see IT value as a function of organisational or IT maturity, relying on capability maturity models (CMM) to demonstrate value by looking ‘internally’ within the IT function. Instead, contemporary savvy IT leaders must look for alternative models that explain the organisational context external to IT itself and use that to align services that will be valued now such as the “IT Hierarchy of Needs”1.

Register to read more...

Conclusion: Increasing the IT literacy of business managers and professionals has sharpened their interest in buying off-the-shelf software to meet immediate business needs, but potentially without the expertise to implement and support it, often leading to unexpected requests for IT support. When the request is a surprise, and there is a compelling business priority, IT workforce plans must be put to one side and changed to find the resources needed. When the dust has settled and the surprise element is a thing of the past, the IT governance group is bound to ask, ‘How did this surprise occur and what can be done to ensure it does not happen again’? It is a reasonable question and one that needs a cogent response.

Register to read more...

Conclusion: In an age-diverse workforce, it is important that IT managers and professionals understand the different expectations and management styles of stakeholders and accommodate them to gain their support for IT-related initiatives being proposed.

Without understanding the management styles and expectations of age-diverse stakeholders, a level of disconnect may occur and business relationships could slip from being of mutual benefit to transactional and ineffective.

Register to read more...

Conclusion: ERP SW licensing or Software-as-a-Service (SaaS) has many permutations and influences one of the largest IT investments for most organisations. Vendors aim to integrate, at a minimum, shared corporate data from financial data, HR, operations and sales. The benefits of aligned data, reporting and processes helps C-level decision makers track and improve organisation performance.

The most common arguments for implementing an ERP system are the cost savings and productivity improvements1. Effective SW governance is essential to avoid eroding expected cost savings or efficiencies.

Large government departments, local government authorities, public listed corporate entities or privately owned entities are all likely to have significant investment in an ERP and will need continued investment in the ERP if ongoing value is to be extracted. Small to medium organisations tend to be more agile and may be able to migrate to a SaaS solution to take advantage of lower migration costs and more cost-effective licensing arrangements.

Either way, modernisation or migration programs are opportunities to renegotiate SW licensing costs provided the pros and cons have been assessed.

Register to read more...

Conclusion: IT auditors typically consult with, and report their findings to, the board’s Audit and Risk Committee. Their POW (program of work) or activities upon which they will focus may or may not be telegraphed in advance to stakeholders, including IT management.

To avoid getting a qualified audit report for IT, e. g. when internal (systems) controls are weak or IT risks are unmanaged, business and IT management must first get their house in order, by tightening controls and addressing risks before the possible arrival of the audit team. Failure to get the house in order, before an audit, could be career limiting for IT and business managers.

Register to read more...

Conclusion: Business ethics is not a new topic. It is as old as business itself and many of the issues and questions posed during ethical considerations are just as old. Digital ethics takes a fresh look at many of these issues from a new perspective, that of a technology-enabled society and the business community. Digital capabilities introduce new complexities and challenges to the business environment. Many ethical issues arising from technology advancements cannot be solved simply. However, without addressing these matters, the business community puts itself, its customers and the community at risk. Viewing ethical issues with a technology focus and adherence to ethical principles can mitigate some of these risks.

Register to read more...

Conclusion: Organisations understand that implementing projects is part of the natural workflow. Delivering projects that meet organisational expectations is expected and demanded. Project management offices (PMOs) have been established to support project management activities and provide some key elements such as project management methodologies, documentation, project manager recruitment and organisational reporting.

While many organisations have implemented a PMO, there are nearly as many organisations that continue to struggle with some key elements such as resourcing, benefits and prioritisation, and the PMO has an opportunity to provide real value to the organisation in addressing these areas.

Register to read more...

Conclusion: Enterprise architecture (EA) framework standards, such as the Zachman Framework or The Open Group Architecture Framework (TOGAF), are often promoted by advocates as complete solutions for organisations seeking to maximise business alignment and mitigate risk during major transformations through the use of an agreed set of structured planning practices.

However, the term ‘framework’ has become overloaded and not all industry offerings are created equal. Some frameworks provide well-defined content meta models while others provide detailed methodologies and some industry-specific reference models. Therefore, organisations must understand the elements that make up a complete EA framework, then ensure that they adopt aspects from multiple sources to provide complete coverage in support of a contemporary EA practice.

Register to read more...

Conclusion: Increasing competition where thin profit margins are the norm forces management to analyse business data more intently to identify ways to increase revenue and/or reduce operating costs. Similarly, in the public sector the aim is often to connect common data from multiple sources and determine if government programs are achieving their objectives.

To ensure the analysis is sound and the resulting scenarios can withstand scrutiny, management must rely on skilled and commercially astute data analysts1. The latter typically operate in small teams and may need to resolve data errors or inconsistent definitions of it to process the data correctly and interpret the results.

Register to read more...

Conclusion: Increasing emphasis in the media and in industry literature on cyber security and the risks of data breaches with service disruptions is likely to get extra attention in future from the board and their audit and risk committee (or ICT governance group).

Not only must the committee be concerned with risk prevention, astute members will also want to know how the organisation will recover from a data breach or ransomware attempt and restore the organisation’s operations, if an unexpected disruption to services occurs.

To minimise business risks, committee members must stay aware of local and international cyber security incidents, how they occurred and were addressed and what they need to do to make sure they are not replicated in their organisation.

Register to read more...

In the News

Outdated work from home policies bog down Aussie businesses - Computer Reseller News - 6 April 2020

IBRS analyst Dr. Joseph Sweeney provides best practice-advice on working from home in the current pandemic situation. Dr. Joseph Sweeney discusses current working from home policies which are...
Read More...

Centrelink crashes under demand for crisis payments - Australian Financial Review - 23 march 2020

IBRS workforce transformation advisor Joseph Sweeney said many government departments had to navigate difficult IT environments that were only part-way through their digital transformations, with...
Read More...

Inside EY's security work at ANZ - Australian Financial Review - 3 March 2020

"There is more security work to go round than there are resources. So I don't think the market is that crowded. It's important to remember that security is not something you buy and then it's done;...
Read More...

Google cloud boss looks to AI as it fights Amazon, Microsoft duopoly - Australian Financial Review - 2 March 2020

IBRS analyst Joe Sweeney has been tracking the three major Cloud vendors capabilities in AI and said Google is right to believe it has an edge over AWS and Microsoft when it comes to corpus (the...
Read More...

What should be in Australia’s next cyber security strategy? - Computer Weekly - 10 Feb 2020

Peter Sandilands, an advisor at analyst firm IBRS, called the discussion paper “a pre-judged survey” that is mostly looking for answers. He also questioned if the resulting recommendations would be...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap