Main
Log in

Sourcing & Staffing

Discussions regarding unknowns that arise from multi-layered, hybrid and increasingly complex ICT environments have been prevalent this month. There is a recognition that, because of these variables, traditional tools and delivery models are often insufficient to ensure ICT environments function efficiently. Reviews indicate that difficulties can arise because of failures in the implementation of management and operational protocols as well as the critical tools needed to bind the many facets of an ICT environment together, to ensure operational effectiveness which all users can access and understand. For instance, user authentication systems that now require careful consideration and planning are often not feasible as they can require very specific expertise for just one small aspect of a large environment. IBRS Analyst James Turner will be discussing this particular issue in relation to authentication solutions, as well as potential response measures in a webinar to be held on July 31st.

This month’s outsourcing deals were especially interesting, showing that the range of services available to outsource and the ways customers are using them has broadened and borders for providers are being eliminated. Vendors are becoming more specialised, as the trend to target outsourced services at particular business functions or objectives, to satisfy customer needs, has emerged. This has resulted in vendors adopting more flexible products, services and delivery models to accommodate a wider range of customers and their varied requirements. This is becoming clearer with potential customers, such as the Department of Health specifically stating it wishes to explore different service models, technologies, IT practices and market capabilities when searching for a new service provider.

Particularly prominent this month was the high level of new senior appointments and employee rationalisation in the IT industry. This highlights the critical nature of taking into account practical, business issues as well as technological developments to maintain efficiency, competitiveness and targeted service provision for a company’s internal ICT customers, as well as for service providers catering to external clients.

April has been an incredibly strong month for outsourcing engagements. Most interesting is the variety of deals in size and nature as well as the vendor and customer size. It is clear that the momentum in outsourcing is steady accelerating as new technologies are accepted and the skills required to support them evolve and become more readily available. A proliferation of smaller and specialist service providers, new service models, efficiencies and affordable technologies have also resulted in increasing the availability of outsourcing to small-to-medium enterprises wishing to take advantage of new developments.

Security continued to be a major concern during March, with particular focus on new privacy regulations (Privacy Amendment Act) that came into effect on March 12th. A lot of interest was generated because of the extensive measures and associated fines for breaching the new Australian Privacy Principles (APPs). The APPs focuses on protection of sensitive information and integrates information security policies which are already in place. Of most interest were the significant changes, the fact that many companies were not sufficiently prepared and the high fines for breaching the APPs. It displays an increased concern and focus on establishing security solutions and a requirement to engage external providers to assist with response measures as well as illustrating the need for strong government regulations to prevent misuse, loss or inappropriate access to sensitive data, facilitate breach detection and to establish responses for security breaches.

February saw a continued emphasis on security threats and response measures, as well as practical issues that may impact on IT investment. Particularly interesting was a write-down of Tower’s new core IT systems after the sale of some of its business units. This highlights the need for careful planning and extensive consideration of real world issues in an environment where fluid and complex IT and business structures exist. The desire to exploit the benefits of new technologies requires changes to both IT and business foundations which can pose challenges when technologies and business processes need to be integrated. A combination of evolving solutions and limited support can be problematic when business-oriented decisions are made which could have flow-on or unpredictable effects on IT infrastructure and strategies.

This month has seen a lot of discussion regarding security failures, sparking debate in relation to the adequacy of the solutions and response capabilities for such incidents. Concerns raised because of these failures, emerging technologies and uncertainties regarding security arrangements have forced both vendors and specialist security providers to investigate ways of alleviating customer concerns through integrating solutions and assurances when establishing outsourcing arrangements. While security has always been an issue for customers recent failures are driving more collaborative, open and prospectively sturdier security arrangements for the future.

Conclusion: CIOs must create a flexible workplace combined with astute people management practices to achieve service related productivity improvements and reduce IT costs. Creating the workplace and expecting that the benefits will accrue without astute team management is naïve. It is analogous to giving a new programmer complex specifications and, without supervision, expecting, error free code when first tested.

Especially noticeable in December was the large number of purchases and collaborative agreements in the IT service provider sector. Vendors aiming to expand their customer base and service offerings, reach and scale as well as exploiting new technologies they have no access to are adopting alternative approaches to business growth and sustainability. This underscores the need for the industry to remain flexible and be aware of industry changes, demands and evolving areas that can benefit their customers

There has been much discussion this month with regard to IT in the Banking and Financial Services sector. Projects and plans to expand internal IT structures have largely been in response to increased and changing customer needs and demands. The high level of activity and discussion regarding IT in this sector illustrates how evolving technologies and customer awareness and desire to access these new technologies can transform internal infrastructures and how IT service providers must respond positively to these demands. IT service providers catering to these new needs need to address issues such as internal support systems, protocols and IT decision-making and make significant increases in IT investment. This is particularly evident as service providers restructure, extend capacities and begin to offer new services in respect of cloud and security.

In the News

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Intel chip meltdown flaw shows new vulnerability - AFR - Jan 5th 2018

Cyber security experts have warned the long-term implications of chip vulnerabilities nicknamed Spectre and Meltdown discovered by researchers this week are still unknown, despite it appearing that...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

       
Recently Viewed Articles