Main
Log in

Sourcing & Staffing

Conclusion: Selecting the most suitable candidate is a critical responsibility. Take the time upfront to prepare for hiring the person required. Choosing the right person will reap rewards in many ways, such as improving the workplace, increasing revenue and a host of other goals.

Conversely, the pain and effort in employing the wrong person can have disastrous consequences in terms of loss of productivity and loss of reputation to the business, and it creates many issues for the team or individual who made that recruitment error.

Conclusion: This month, discussions regarding digital transformation efforts have been prominent. Plans to upgrade, improve and modernise internal ICT frameworks are critical for effective value creation and faster results delivery. Customers need to invest in technological change in order to establish a set of digital products which address stakeholder needs and integrate with business operations and functions. Customers often struggle with identifying and evaluating vendor risks and establishing appropriate audits and controls for service providers. Whilst customers are familiar with issues such as contract compliance and security, obtaining a managed service provider with a deeper understanding of business requirements can be difficult. However, this understanding is critical when developing digital transformation solutions, and vendors need to augment skills, develop more detailed strategies and address concerns specific to particular customers in order to deliver business value during digital transformation efforts.

Conclusion: This month has seen a focus on ICT 2018 forecasts and 2017 reviews. These types of analyses are important for vendors in order to strike a balance between providing new, high quality service offerings customers’ demand and traditional concerns, such as privacy and legislative compliance. It is critical that new offerings are carefully planned so they align market drivers such as cost savings, utilising new technologies and business improvements with basic needs that are common to all customers and integral to establishing, managing and completing outsourcing agreements.

Conclusion: CEOs need their CIOs to be out on the cutting edge to decide which technology to incorporate so that the organisation can adapt and transform in a rapidly changing landscape. As the digital leader, the CIO needs to emphasise the culture shift, be an influencer and guide the change across the IT team and broader enterprise. Organisations that elect CIOs as their digital champions experience higher performance compared with organisations where CIOs play a more passive role in digital transformation.

Conclusion: Growth in ICT remains strong in the foreseeable future in a very competitive market. Successful CIOs and ICT leaders responsible for staffing and sourcing need to adopt multiple strategies to successfully recruit, retain and plan for the resource challenges of tomorrow.

Conclusion: One of the least understood contributors in implementing IT projects successfully is the leadership provided by competent TTLs (Technical Team Leads). Their ability to steer projects in the right direction, maximise the contribution of team members and cement the relationship with sponsors, is pivotal.

IT professionals, with potential to act as TTLs, must manage their careers by seizing leadership training and mentoring opportunities so they have a head-start when assigned to a TTL role.

Conclusion: This month has seen an increase in activity for public sector outsourcing. While reports this year have flagged sector growth, with more diverse offerings and a greater uptake of smaller providers, difficulties with contract performance in this area are still clear. While the size and complexities associated with these projects can present serious problems, they are aggravated by issues that are especially prominent in the public sector. For instance, running critical functions such as financial management, customer service and human resources, on disparate, large or obsolete systems, can result in a wide range of vulnerabilities for government agencies. These can interfere with business continuity, pose security threats, hamper disaster recovery or prevent appropriate skills development. As vendors evolve to offer more specialised services that cater to customers’ requirements, it is important for the public sector to continue to review and analyse its outsourcing projects because of serious consequences associated with catastrophic failures, outages and exploitation of government systems.

Conclusion: Most change management processes focus on the traditional approach of identifying problems then analysing the causes of the problems, followed by the identification of possible solutions then arriving at the solution and implementing the same. APIQ focuses on what the organisation does well, then explores and identifies how those strengths and values can be further improved. The results can be dramatic in terms of improving quality of services and products produced, employee satisfaction/engagement and it is also sustainable.

Conclusion: Discussions regarding the increased presence of small-to-medium businesses (SMBs) and start-ups in the IT industry have been prominent this month. Initiatives aimed at generating growth in the sector, such as funding for smaller providers, information exchange and facilities which allow for access to government contracts, are showing clear results. Support for smaller providers that offer specialist services are in high demand, as well as resources and information regarding sustained growth, product development and consumption frameworks. Both vendors, and customers seeking tailored and competitive offerings in a market traditionally dominated by large vendors as well as smaller customers hoping to access quality services, have benefitted.

Conclusion: This month has seen an increased focus on security threats posed by managed service providers and associated vendors. ICT service providers are attractive targets because they can provide access to a wide variety of customer networks, or can be used as a starting point for other malicious attacks. Compromised commercial or government data, or products which facilitate vendor service provision, can result in serious breaches and unexpected losses. More in-depth reviews of vendor security protocols, products and response measures to threats are required for customers to obtain the best possible protection against attacks launched through their managed service providers.

In the News

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles