Main
Log in

Sourcing & Staffing

Conclusion: This month, IT vendor acquisitions and partnerships have been prominent. The incentive for companies with disparate products and services to consolidate has increased, resulting in strategic arrangements aimed at expanding offerings and future company developments. However, this kind of consolidation can result in difficulties when separate entities make efforts to integrate. This type of integration requires an orderly transition and establishing a solid foundation for ongoing operations to maximise benefits associated with new resources. Detailed planning and execution is necessary to establish direct relationships and better understand the resources available, customer base and externals from both companies and allow for a more consistent fit between internal departments as well as a framework for practical and flexible implementation of plans.

Conclusion: This month, discussions regarding enterprise agreements combining products and services to provide highly tailored solutions have been prominent. In particular, market transformation with smaller vendors offering new products, different enterprise consumption models, collaboration and new capabilities have driven growth in this area. A greater demand for flexible customisation and configuration of offerings has also driven growth, as well as vendors offering incentives to utilise products and services, or establishing partnerships in order to support organisations when developing solutions.

Conclusion: Whilst many organisations in Australia cite the lack of available IT skills to be a threat to their future growth or ability to complete digital transformation initiatives, Australia has a large often untapped pool of potential employees in candidates on the autism spectrum.

It is estimated that around 60 to 80 per cent of employable adults with autism spectrum disorder (ASD) struggle to find full time or steady employment, and those that do find employment are often underemployed, that is, employed in roles below their educational or professional level1. Recently tech companies have recognised this opportunity, and programs underway in Australia are successfully identifying, recruiting and supporting individuals on the autism spectrum with the potential to excel particularly in testing, data science and cyber security roles. All are high growth areas for employment.

Related Articles:

"Future-proofing your ICT team: Predictions and mitigation" IBRS, 2018-02-01 10:12:40

"Get serious and make IT staff upskilling a reality" IBRS, 2018-07-05 03:08:00

"Key skills to develop" IBRS, 2018-05-04 18:53:57

Conclusion: Since CRM modernisation will impact many major functional areas of the organisation, developing a communication plan to ensure the strategy is developed and executed in a consistent and well-supported manner will involve many different roles and responsibilities. Gone are the days when the CRM was primarily the domain of sales and the IT departments.

Related Articles:

"CRM modernisation Part 1: Strategy, planning & selection" IBRS, 2018-09-04 05:20:15

"CRM modernisation Part 2A: Creating a public sector stakeholder experience strategy" IBRS, 2018-09-04 06:46:34

"CRM modernisation Part 2B: Creating a customer experience strategy" IBRS, 2018-09-04 06:47:58

Conclusion: The role of being a supportive follower is overlooked as compared against the literature of being a leader. Everyone is a follower, yet by a factor of over 1,000 to 11, information is overwhelmingly written about how to be a better leader rather than about being a follower. As a leader, there are many benefits in identifying traits of what is required in a follower. There is also a strong overlap in the behaviours of being an effective leader as there is in being an effective follower. Both roles are just as important as each other and yield significant benefits to the organisation and individuals when realised.

Related Articles:

"How to select the best candidate using behavioural interview questions and techniques" IBRS, 2018-03-31 06:59:01

"Inspirational leadership core qualities and behaviours" IBRS, 2017-11-02 04:18:41

"Traits of a successful Chief Technology Officer (CTO)" IBRS, 2017-07-03 23:28:58

Conclusion: This month, discussions regarding data-driven products and associated services have been prominent. There has been an increased interest in offerings that facilitate the collection, measurement and quantification of useful data, then translation to optimise business operations or internal processes. These types of offerings are particularly useful when automating functions, identifying and tending to inefficiencies and resolving intractable problems. New regulatory standards, increased competitive pressures, growth opportunities in evolving markets and responding to customer behaviours and preferences are critical issues for clients. Managed service providers need to be sufficiently flexible when providing offerings that incorporate data-driven services that can support changes in a company’s organisational culture, business processes and internal management frameworks.

Conclusion: Being able to deal with workplace conflict quickly and effectively reaps many rewards. There are different strategies that can be used to deal with the differing types of conflict in the workplace. Being mindful that personality classifications are fluid states of being, i. e. there is no such thing as a pure introvert or extrovert1, in a recent survey2, slightly over 50 % of IT professionals classified themselves as introverts, another 20 % as extroverts and a quarter as “ambiverts” (neither one nor the other). So there is also a requirement to be mindful of what strategies work well (or not) with the differing personality traits of all involved at the time.

Related Articles:

"Benefits of a great working relationship with the CIO" IBRS, 2018-06-01 04:12:19

"Future-proofing your ICT team: Predictions and mitigation" IBRS, 2018-02-01 10:12:40

"Virtual Teams need new skills and behaviours" IBRS, 2017-03-04 16:53:02

Conclusion: This month has seen a high number of security incidents globally. The high demand for security services requires vendors to provide transparency with service offerings, implementation and management. While security provider offerings must cater to a changing environment and support the protection of critical information and business functions, it is also necessary for vendors to foster trust with customers and within individual markets. Difficulties experienced by security service provider Kaspersky Lab in the United States have resulted in a range of issues, particularly when establishing trust in global markets. This month, Kaspersky Lab has been in discussions with the Australian Government to avert these types of difficulties, and foster trust in both public and private sector customers, which is especially critical for security service providers.

Conclusion: Interest in eforms solutions is being driven by two drivers:

  • First, the promise of enabling “citizen developers” within the organisation to take ownership of the creation of forms and automate simple processes.
  • Second, the promise of greater workforce efficiency by digitising manual activities.

These two drivers sit at opposite ends of a spectrum of eforms capabilities. The following framework provides a starting point for organisations to capture and refine their eforms requirements and structure information gathering prior to going to market for a solution.

Related Articles:

"How to succeed with eforms Part 1: Understand the need" IBRS, 2018-01-03 05:42:10

"How to succeed with eforms Part 2: The five most common eforms challenges" IBRS, 2018-02-01 10:06:14

"SNAPSHOT: eForms & workflow products" IBRS, 2018-07-05 02:45:24

"Selecting Mobile Application development tooling" IBRS, 2015-09-02 01:43:47

Conclusion: This month, discussions regarding critical security issues have continued to be prominent. In particular, an increase in the ineffective management of security threats and incidents was flagged. A high proportion of companies have cited a preference for paying off ransomware demands due to a perception it is a cheaper and less complex resolution to security incidents. These types of short-term solutions often produce other risks and create larger, associated problems in the future. A growing trend to under-report security incidents and a lack of cyber threat intelligence has left many companies exposed. Customers often deprive themselves of opportunities to improve cyber security controls and processes when they do not adopt long-term mitigation strategies to reduce risks and enhance response measures.
Such long-term and consolidated efforts allow customers to take advantage of all resources available to the company, founded in threat intelligence. Accessing a wide range of cyber threat intelligence and establishing ways to obtain this information is particularly critical. Plans must include ways to identify and assess security incidents, how staff communicate and share information regarding incidents, as well as harnessing data from external sources such as service providers and other tailored data specialists. Whilst complex, establishing sturdy threat identification, protection, response and recovery frameworks will improve a company’s capacity to manage security risks, utilising all resources and information available.

In the News

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles