Log in

Sourcing & Staffing

Conclusion: There are two compelling information security reasons for creating a sense of purpose and ownership within an organisation. The first is that a sense of purpose and ownership will empower staff so that they move from responding to basic security hygiene matters, towards pre-empting issues. The second reason is so that organisations look out beyond themselves and work towards a more resilient ecosystem.

This level of resilience maturity is vital and will be driven by leadership and a continuing commitment to talent development. Astute security leaders will use cultural indicators such as engagement and sense of purpose and ownership, as a guide to the ability of the organisation to withstand security incidents.

Conclusion: This month there has been an especially visible increase in managed service provider offerings and expansion globally. With the wide range and increased release speed of new technologies in the market, greater emphasis has been placed on adopting new technologies in business to support evolution and cost reduction. Approximately 70% of business leaders involved in company digital business transformation ranked new technology adoption as the top priority in a survey this month, resulting in an increased demand for tailored solutions with effective implementations in complex ICT environments.

Conclusion: Especially interesting this month was a Trial Services Agreements (TSA) between SkyFii and Wests Ashfield Leagues Club. The agreement spans four weeks, with very specific deliverables and KPIs. In IT outsourcing, where agreements and relationships can become difficult to manage or collapse due to a wide range of unforeseen complexities, TSAs are emerging as a solid review process to measure vendor skills and capacity to service specific customers. These TSAs are also an attractive avenue for vendors to display competencies sought by customers and a precursor to possible long-term relationships. Such arrangements can also provide a greater clarity when setting terms and establishing final agreements as well as clearer and sturdier ongoing vendor/customer relations.

Conclusion: This month, discussions regarding Big Data and analytics were prominent. With increasing volumes of information possessed by organisations, a clear and solid information management strategy is critical. To meet this rise in demand, new product and service offering levels and uptake in external information management services were high. The development of this service area has been driven by the recognition that this type of data management can provide organisations with insights for action, organise unstructured data more efficiently and will continue to evolve as vendors provide tailored solutions to meet customer needs.

Conclusion: Security leaders know that it is not enough for the security group to do its job; they must be seen to be doing their job. This need for communication between security and the business is resulting in organisations creating outreach roles. Many organisations have yet to realise that this communications gap directly impacts their risk management capabilities. While the security team may be executing its work with technical accuracy, it is not serving the true needs of the business. The key to bridging this gap is an outreach function.

Conclusion: This month has seen a number of large and high value outsourcing agreements. The Manchester United/Epson contract renewal was especially interesting and indicative of increased flexibility when vendors and buyers establish outsourcing agreements. Epson will continue to provide IT infrastructure and obtain advertising rights from Manchester United in a combined sponsorship/managed services agreement, established in 2010. These types of outcome-based, business-focused agreements which provide unique benefits to both parties can result in stronger relationship foundations, transparency, and a greater chance of success during the course of an arrangement and when resolving difficulties that may arise.

Conclusion: Prominent this month are a wide range of new projects and service offerings in the IT outsourcing industry. This growth has highlighted the necessity for flexible environments and models that can adapt to changing requirements and company demands. Recent announcements by outsourcing vendors CSC and HP to divide their operations indicates increased flexibility is required beyond not only new product models, but also business models and corporate structures. HP was founded in 1939, and CSC in 1959, with current restructures aimed at enhancing efficiency and services provided.

Conclusion: especially interesting this month was Datacom’s and the Department of Health’s infrastructure and support services agreement. In particular the service provision model which is outcomes-based with a consumption-based pricing model. These types of agreements highlight the demand for arrangements which are more transparent in order to reduce conflict, align interests, and increase contract flexibility to adapt to changes in customer needs or vendor capacities. By establishing stronger and clearer foundations, customers and vendors are more likely to have a sustainable and successful outsourcing agreement.

Conclusion: discussions regarding innovation in the ICT industry have been prominent this month, with a focus on investment in new technologies and collaborative arrangements for further development to support managed ICT services. With a dynamic and continuously evolving services landscape, there is a clear need to differentiate offerings, as well as innovate to support new service models, technologies, and changing customer demands. Flexibility is critical if vendors are to provide solutions that support the needs of its customers and the market. By combining knowledge, expertise, access to resources as well as products and services, businesses in disparate industries are providing tailored and alternative solutions to cater to market demands that are emerging at a fast rate.

Conclusion: this month, vendor collaborations for both development and education have been prominent. With increasingly complex IT environments and multiple vendors providing a range of services, it is necessary to understand the flow-on effects of adding new systems to technology infrastructure as well as possess resolutions to difficulties which can have a dramatic impact on business and company IT. Understanding, developing strategies, and establishing response measures for critical issues which can arise in specific environments is a necessity. Collaborative development and educational initiatives help to support these needs. In March, IBRS’ James Turner will be speaking in a webinar dedicated to data loss prevention, with a focus on strategic measures that cater to complex and unique environments. This type of information and awareness is invaluable to professionals, particularly when infrastructure complexities increase with the engagement of multiple providers.

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry


Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles