Sei sulla pagina 1di 8

LIVING IN THE IT ERA

THE 11 BIGGEST ISSUES IT FACES TODAY 2. Data protection


Each year we talk with tech leaders about the
Forward-thinking organizations are now
biggest problems they’ll face in the near future, and
implementing privacy by design in their products but
we’re starting to see some subtle and not-so-subtle shifts
making sure those efforts meet GDPR standards is
from the worries of 2018.
an ongoing concern. Google, for example, just saw a
Data overload, a major concern 12 months ago, record fine by French regulators over how the
has evolved as new data-hungry tools and AI help make company collects data.
sense of data and drive business decisions. This year
CIOs say they’re more concerned with how to protect “U.S. businesses will need to consider a GDPR-type
that data, as organizations grapple with new privacy policy to protect citizens even before any regulations
regulations. are enacted,” Samuel says. “Ultimately, there must
be international guidelines to ensure customer
As the economy continues to improve, CIOs are less
privacy and protection on a global scale to allow for
hampered in 2019 by tightening budgets. And worries
easier compliance.”
about moving to the cloud are less of an issue, since
many companies have already made the jump.
Jacob Ansari, senior manager of Schellman and Co.,
Executives put more emphasis now on securing their
says IoT security got a lot of attention last year, but it
cloud-based assets across multiple cloud environments.
led to little practical change in the industry.

“The makers of IoT devices still use vulnerable


1. New security threats
software components, poor network and
communication security, and are unable to supply
Headline-grabbing recent events may spark
software updates in the field,” says Ansari. “They’re
surprising new security threats, says Rick Grinnell,
still making essentially all of the mistakes everyone
founder and managing partner of Glasswing
else made in the late 1990s and early 2000s. Oh,
Ventures.
and your voice-activated home device is spying on
you and the company that makes it will give your
“The government shutdown helped contribute to a
data to the wrong person by accident with little
great cyber threat to the U.S. government, critical
oversight or accountability. This also suggests that
infrastructure and other public and private
better data privacy legislation — at least in the U.S.
organizations,” Grinnell says. “With the shutdown,
— is a potentially hot topic for 2019, particularly in
many of the security professionals watching for
light of the events of recent elections. Nobody loved
threats at a national level were not on duty, creating
implementing GDPR in Europe, but its protections
a bigger hole for attackers. Time will tell if a month of
for ordinary people are decent."
lowered defenses will have deeper repercussions in
2019 and beyond.”
3. Skills gap
Tech leaders are also gearing-up for next-
generation, AI-driven cyber attacks.
More than one of our sources mentioned the much-
discussed skills gap in IT, but with a twist — some
“Security professionals must be extra vigilant with
tech leaders now see the problem more self-inflicted
detection and training against these threats,” says
than intractable.
John Samuel, CIO at CGS. “This year, companies
will need to introduce AI-based protection systems to
“If you're only looking at college graduates with
be able to contain any such attacks introduced by
computer science or electrical engineering degrees
this next-gen tech.”
from the top ten universities in the U.S. then yes,
there are hardly any candidates, and most of them
Grinnell says AI wasn’t a factor in the most notable
are going off to the five largest employers,” says Tod
attacks of the last year, but he expects that to
Beardsley, director of research at Rapid7. “But the
change.
potential talent pool is so, so much larger than this,
and companies would do well to explore this space a
“I believe 2019 will bring the first of many AI-driven
little more liberally.”
attacks on U.S. companies, critical infrastructure and
government agencies,” he says. “Let’s hope I’m
Sandra Toms, vice president and curator of the RSA
wrong.”
Conference, says IT departments would help
themselves by “plugging their skills gap with more “The process to finding and exploiting revenue
diverse employees, and not just in terms of race and opportunities hasn’t fundamentally changed — find a
gender. Most IT hiring groups fail to look at diversity problem that we can solve that is common, prevalent
in life experiences, religion, backgrounds, sexual and that people will pay to solve,” Murray says.
orientation, and education. Viewing diversity in a
more holistic manner should open up a broader field What has changed is the emphasis on direct
of candidates and lead to higher levels of revenue generation landing in the CIO’s lap, says
productivity." Mike Fuhrman, chief product officer of hybrid IT
infrastructure provider Peak 10 + ViaWest.

4. Multi-cloud security “Maybe I’m old school, but I don’t think the CIO
should be worried about directly generating
When exploring new cloud-based services, CIOs revenue,” Fuhrman says. “I’m starting to see this pop
now need to ask about security across multiple up more and more among my peers. To stay
platforms, says Laurent Gil, security product strategy relevant as a CIO, many are working to try and
architect at Oracle Cloud Infrastructure. productize themselves. While there are benefits to
thinking that way, I think it can also be a recipe for
“Traditionally, multi-cloud leads the enterprise to defocusing the team and the boardroom. When it
manage many different, often incompatible and comes to revenue-generating opportunities, the
inconsistent security systems,” Gil says. “We think place the CIO belongs is focusing on those projects
that selecting cross-cloud, cloud-agnostic security and digitizing the business into an automated
platforms is now fundamental in ensuring platform at scale. We need to stay focused on
consistency, and most importantly completeness of driving costs out of the business and scaling from a
securing enterprise-wide assets regardless of where go-to-market perspective. That’s how a CIO should
these assets are living.” focus on revenue.”

5. Innovation and digital transformation 7. Lack of agility

According to Gartner data, about two-thirds of Organizations that aim to incorporate agile methods
business leaders think their companies need to sometimes end up limping along in a sort of hybrid
speed up their digital transformation or face losing model that incorporates agile practices but also
ground to competitors. more linear “waterfall” methods. In short, the worst of
both worlds.
Most companies will continue on the same path until
they’re forced to do otherwise, says Merrick Olives, Tangoe’s Murray lays it out: “Developers are coding
managing partner at cloud consulting firm Candid to specific spec sheets with little conceptual
Partners. understanding of how this button or feature fits within
the overall user experience. A disciplined approach
“Tying IT spend to strategic business capabilities is needed to pull this off, where the solution to
and answering the question ‘How will this make us specific problems are addressed within a certain
more competitive?’ is essential,” Olives says. “Value release. Each release is then coordinated for a set of
stream-based funding models as opposed to project- sprints so that a comprehensive solution that adds to
based funding are becoming more and more the UX is achieved with every release and not just a
effective at tying board-level objectives to budgetary collection of requested features that may or may not
influences. The cost structures and process support one another.”
efficiencies of legacy vs. a nimble digital capability
are much different — nimble is less expensive and
much more efficient.” 8. Outsourcing risks

The skills gap will lead many organizations to seek


6. Finding new revenue streams outside help. But these sometimes-necessary
solutions can lead to concerns with reliability and
Ian Murray, vice president of telecom expense security.
management software firm Tangoe, says that while
the business landscape is ever evolving, the basic “Our main focus is to deliver on the promises we
premise of making a profit is the same. make to each customer,” says Sanchez. “You build
your reputation and business on this one critical
thing. In outsourcing your work, the quality of the 11. Rebuilding trust
deliverable is sometimes at the mercy of the firm you
outsourced to. Given the sensitive nature of the Isaac Wong, software engineering manager at
projects we manage, we utilize strict third-party Retriever Communications, calls 2018 a “bad year
vendor assessments to evaluate partners in the for IT publicity,” based on a number of well
event a project requires us to consider outsourcing publicized hacks of large companies and
some or all of the required tasks.” questionable sharing of customers’ online habits.

In addition to quality concerns, outsourcing opens up “Issues such as privacy, security and device
security threats that are well known. “The specific addiction must be addressed immediately by big and
threats for CIOs that should be top of mind are the small players in the industry,” Wong says. “As a
insider and the contractor,” says French Caldwell, sector we have to be responsible corporate citizens.
chief evangelist with MetricStream and a former We need to show that we care about the people we
White House cybersecurity advisor. “Until we move claim to be serving and act in their best interest.
away from passwords for credentials, humans will People trusted us and we should be very respectful
continue to be the biggest threat.” in honoring that.”

9. Business results

Matt Wilson, chief information security advisor at MANAGING PRIVACY IN THE DIGITAL ERA
BTB Security, says there’s a disconnect between Sharing has become second nature.
what’s set aside for the IT budget and measurable
- The more our lives become digital, the more our
results for the business.
personal data travels. We share everything,
through browsing, purchases, social activities
“Most organizations haven't taken a hard, brutally
and all the services we subscribe to.
honest, look at their current spend,” Wilson says.
“There's often too much momentum behind the way We learnt the hard way we are exposed!
things are currently done, the solutions already
- At a time when privacy is increasingly fleeting,
acquired, and the processes built over a decade to
we want to regain control and we are demanding
allow for any meaningful change. Instead,
new rights to protect ourselves.
organizations may cobble together partial solutions
-
that can't ever fully address the root of the IT
challenge — for example, Equifax not patching a 3 REASONS TO BELIEVE IT
known vulnerability. We live with IT pain. We waste
1. Constant Tracking
dollars. We frustrate our talented resources with
- Technologies, always more evolved and
solvable problems that are rendered completely
invisible, follow us everywhere. Beyond our
impossible in our companies by momentum. For
digital activities, we track everything including
2019, we should refuse to be captive to history.”
our bodies’ functions, we know, EVERYTHING
about ourselves and others.
10. Tools for a digital native workforce
Illustrations:
Between 2000 and 2010, computers’ ability to
Christian Teismann, SVP of global enterprise
recognize people in photos improved by 3 orders
business at Lenovo, argues that a new workforce of
of magnitude.
employees who grew up with digital technology
demands new ways of working that will boost the
44% of people are less inclined to shop in a
bottom line.
place they know they are tracked.
“Gen Z, for instance, expects control over the types
With the rise of sensors, biometrics, drones &
of technology available to them,” Teismann says.
more, it’s getting almost impossible to remain off
“They favor the technology they grew up with and
the grid. Anonymity is becoming elusive. […] As
use in other spheres of their lives in the workplace
we move further into the digital age, we’re
— as well as a recognition of personal and cultural
starting to both fear and resent technology.
elements. Tech-enriched, assistive spaces that are
configurable and flexible will continue to trend.”
2. The Fear of BIG BROTHER
- Edward Snowden’s revelations about PRISM - If we remain eager to share everything, we seek
raised the fears of state surveillance. A question to better control the data we let slip into the
is now on or minds: if tech giants collaborate digital world. We use simple strategies and new
with governments, what else are they doing with sharing tools to compose our private and public
our data? With the proliferation of hacking information.
scandals, fears are getting stronger and  Sharing more to hide more
generate tensions around the notion of privacy. - Danah Boyd, American researcher on
social networks, explains that teenagers
Illustrations: protect their privacy by sharing just a
In the few months following the PRISM scandal, tiny bit of information about themselves.
American cloud companies suffered a los The attention is focused on the few
estimated around 35 billions of dollars on their things they share and the rest if left
sales. alone. Their private life remains private
this way.
41% of French people declare that on social  Junk Email Address
networks, nothing can be re-establish their trust - Many email services are only
(not privacy policies, nor technical guarantees, accessible online in exchange for
nor reputation, …) personal data: we sometimes give them
false information to avoid being tracked.
Today, on our market, it’s an asset not to be At a time we have more and more email
America! Clients are mostly interested by the addresses per person (75% of French
products, but professionals are more sensitive to people have several), we often use one
who owns the data, and where. for junk emails and sometimes using
one of the many disposable email
3. Growing Demands services available online.
- Right to transparency, right to oblivion, right to  Privacy Policies
know and understand privacy policies: we are - Instead of giving up social networks, we
getting organized, in order not to lose control just use them is more clever ways.
over our private lives. We demand more power, Friends’ lists, privacy settings
against governments and tech giants, who are restrictions: in 2013, 77% of people
using us as products, selling our data. changed their privacy settings on
Facebook.
Illustrations:  New Types of Network
75% of people think it’s useful to know what - When massive social platforms seem
brands make their data. more and more suspicious, we prefer
using new social networks, which seem
Smartphone users are ready to pay 5$ on to better protect our privacy.
average for an app that would guarantee their
privacy. Alternative Tools
- We are conscious the exploitation of our
While we’ve concentrated on the growth in size personal data is becoming abusing and we want
of our networks, even if it means leaking large to act. New solutions and alternatives exist to
quantities of data, we now favor their quality and avoid tools like Google, to better protect
their security. ourselves.
 Knowing to control better
MANIFESTATIONS ON THE CONSUMER SIDE - Tools that are able to gather information
on the traces we leave behind are
Popular Movements multiplying, allowing us more power on
- Because we don’t really know what states and managing our connections.
companies make of our personal data, a  Advertising Blocks
movement of discontent is growing. We are - Targeted advertising get criticized often
getting organized and we are claiming our right about the (lack of) respect of personal
to anonymity and privacy. data. A lot of applications, like AdBlock
- E.g., Right to Oblivion in Europe, The “Stop are now available and widely used
Watching Us” Petition (more than 250M downloads and more
than 20M daily users in April 2014 for
Thoughtful Sharing
AdBlock Plus), in order to avoid the
diffusion of pop-up windows, banners consumers. From the first contact, it is crucial to
and other invading advertising formats. explain and justify each question, each request of
 Alternative Browsing information.
- To avoid using Google, we can turn to  GOOGLE
new solutions, DuckDuckGo, IxQuick, - Google produced a video to clearly
or Qwant are new web browsers which explain the processes that would permit
keep our searches really private. them to share personal information with
governments. The brand attempts to re-
Digital Invisibility Cloak
establish trust with its users, giving
- If you are suspicious about technology, you details about the process and the
might just as well seek to disappear entirely. We different barriers they try to put to avoid
can choose extreme but efficient solutions, revealing information. An interesting
which are used more and more, to guarantee first initiative from the tech giant.
our complete anonymity. This way, we’ll be able  APPLE
to discuss, exchange and surf the web in a pitch- - The brand published its first «
black environment. Transparency Report » in November
 All Encrpyted 2013. Like Google, they detail and
- Military-graded encryption is becoming explain how they came to share data
the new norm. thanks to innovative with governments. They also try to
products and services, we protect our reassure consumers, telling their model
communication from outsiders’ is not based on the collection of data
intrusions more efficiently. and it will never be.
- The Blackphone, Encrypted emails,
Wickr.
 Anonymity’s Glory #2 INSISTING ON SECURITY
- Anonymity, on networks and on various
- At a time when most brands are developing
web platforms we use, is not always
connected objects, thinking about the internet
guaranteed. New solutions allow us to
security is more than crucial: 84% of French people
turn this around for good.
see them as a progress and 60% want to use them
- Safer connections, obscure
for their personal security*. Thus, reassuring people
transactions.
about privacy and security will be the key to
nurturing a new relationship with the ever more
connected consumers.
IF THERE IS A GROWING AWARENESS, THERE’S
 ENCRYPTION RACE AT YAHOO
ALSO A TRUE PARADOX:
- After PRISM, Yahoo decided to encrypt
39% of people found it was useful to share personal everything. After making all connections
information with a brand. HTTPS, the company has encrypted
the totality of email accounts data since
61% of internet users would trade privacy for truly
January 2014 and the data from its data
personalized offers.
centers since March 2014. At the
beginning of April, the Chief of Security
also announced the intention to encrypt
IMPACT ON RELATIONSHIPS WITH CONSUMERS
the whole Yahoo platform. They are
IN THE AGE OF «BIG DATA», RELEVANCE AND pushing security in their development,
MODERATION ARE THE KEYS TO SUCCESS. to re-establish trust from users.
Today, if companies focus only on volume and
the accumulation of data, it is necessary that they
#3 GIVE UP CONTROL
change their approach. To (re)establish a lasting
relationship of trust with consumers, brands need to - To reassure consumers, brands have to transfer the
become clever with their personal data collection. control of the relationship from their hands to the
consumers’. Allowing them to know what data they
own, who uses it and what they do with it, will be an
#1 PROMOTING TRANSPARENCY efficient means to avoid a doubt crisis towards
- Brands need to be clear and explain what they make brands.
of personal data – this can be a way to allow them to  «MYDATA» PROJECT
rebuild a relationship of mutual trust with their
- From CRM, are we going towards Technology is an ever-changing playing field
VRM ? The consumer will soon be able and those wanting to remain at the helm of innovation
to manage his relationships toward have to adapt. The consumer journey is charting a new
brands, rather than the contrary. In the course and customers and companies alike are
UK, the « MYDATA » project is going in embracing emerging technologies. As the IT industry
this direction. With the support of the trends such as cloud computing and SaaS become more
government and many brands (HSBC, pervasive, the world will look to brands who can deliver
MasterCard, Google, T-Mobile,…), the with accuracy and real-time efficiency.
program would allow consumers to
keep a perfect track of what data is
known by which brand. They could then To help meet the demands of a technology-
control and keep a trace of what brands enabled consumer base, businesses and solution
know about them. providers must also turn toward the latest trends and
 FACEBOOK REINVENTS ITS possibilities provided by emerging innovations to realize
CONNECTIONS their full potential. But, where to begin? These are the
- During the F8 conference, Facebook emerging trends businesses need to keep their eyes on
announced two major changes to come in 2020.
regarding the management of personal
data. Users will be able to precisely
select which data they are willing to AI
share and an anonymous FB login will Artificial intelligence holds significant potential
be created to register on apps. The for businesses. While we have yet to achieve the full
company is now clearly aware of the spectrum of capabilities frequently at the center of
real need of reassuring the public and is futuristic cinema, AI is poised as a tool of choice for
looking for efficient answers, to businesses and solution providers. As is often seen with
preserve its hegemonic position on the social media, AI, combined with machine learning, can
web. be a powerful combination. Businesses can use AI to
achieve cost-saving benefits, streamline workflows,
enable more efficient communications, improve
#4 BRING ADDED VALUE customer satisfaction, and provide insight into
- When brands ask for personal data, consumers purchasing behavior.
expect them to use it in the most clever way
possible, to receive relevant offers, with a real
added-value. Brands have the capacity to be of a Additionally, machine learning can analyze large
better service to their consumers and to respond to datasets and provide scaled insight. We are currently
their needs, in a more than ever personalized way. just scratching the surface of how machine learning and
 BURBERRY « CUSTOMER 360 » artificial intelligence can work together to enable
- Pioneer of the luxury digital store, businesses. (Think of IT-industry giants such as Google
Burberry also developed an interesting and Amazon.) Current applications provide huge growth
customer experience. They offer their potential for solution providers who can fully understand
consumers the possibility to create a the capabilities of AI and tailor solutions to meet
profile where they can define their business demands. Businesses can also employ AI to
preferences and their fashion phobias, identify new product and service opportunities.
as well as tracking their trials and
purchases. Consulting their profiles,
sales persons can advise them. A Blockchain
personal shopper who knows you better Past discussions of blockchain are often hinged
than anyone, at the moment you enter on cryptocurrency, but the real power lies in the
the door: this is a real extraordinary immutability and transparency of a blockchain. Due to
shopping experience. the fixed and highly visible nature of blockchains, this
trend has been widely accepted to have financial
applications, and often informs discussions of bitcoin.
However, the business benefits are much more far
10 EMERGING TRENDS IN INFORMATION reaching.
TECHNOLOGY FOR 2020
The blockchain is an information system that
holds promise for supply chain management, enabling
Edge Computing
transparency into the origin and journey of materials
from origin to product. Blockchain technology will also Edge computing is a decentralized model which
allow for better record management, providing a places computing nodes closer to the source of
snapshot of any record from its origination. This could be interaction. Gartner defines edge computing as a model
used to verify orders, purchases, returns, receipt of where “information processing and content collection
product, you name it. and delivery are placed closer to the sources,
repositories and consumers of this information.” This
model optimizes technological interactions and reduces
Another cryptocurrency utilizing blockchain latency at the point of origin to enable more effective and
technology is Ethereum. This cryptocurrency uses smart real-time data consumption. Edge computing is quickly
contracts to ensure delivery of conditions. Smart becoming the most efficient path for localized
contracts release data when both participants have met interactions.
the criteria of an agreement. Smart contracts offer
endless capabilities for ensuring agreements are carried
out and therefor can help position you as a trusted IoT
brand.
As the world becomes more and more digitized,
informed business is the key to success and internet of
things provides greater clarity into consumer behavior.
Cybersecurity as Critical Business Function
The Internet of Things is increasingly offering business
Cybersecurity will no longer operate as an opportunities in the form of data collection and analysis.
addendum in the world of information technology. As In fact, IoT is the most widely adopted technology in
companies leverage emerging trends and move more CompTIA’s emerging tech track.
toward cloud computing, cybersecurity will become a
critical business functionality and will be an integral
business process. Unlike traditional data collection methods of the
past, the Internet of Things is a conglomeration of
devices that interact, providing substantially greater
Data protections and PII are real-world concerns insight into how products and services are being applied
that are steadily creeping to the forefront as media for everyday tasks. As more devices become IoT
coverage of data breaches affect our trust in brands. enabled, businesses will be able to design products with
Making information security an operational necessity will a greater understanding of pain points.
position a business as a trusted entity and ensure
smooth delivery of products and services.
Quantum Computing
Quantum computing offers unique opportunities
Drones
for predictive analysis that extend beyond the capacity of
Drones are helping to transform certain verticals, conventional computing. Quantum computers leverage
giving an edge over competitors and offering a the principles of superposition and entanglement to
technologically powered physical connection between process information on an exponential scale. While
businesses and end users. The remote capabilities of Google came on the scene in 2017 with a promise of the
drones coupled with AI applications are transforming largest quantum computer, IBM has actually made it
business in the industrial, public safety, construction, and possible for businesses to leverage this technology.
insurance sectors, just to name a few.

Quantum computing offers businesses a


As the drone industry continues to mature, more powerful tool for predictive analytics and big data
and more applications are coming to light and analysis. As we encounter new problems, quantum
businesses are embracing the possibilities. Gartner computing will help predict viable solutions, though it
predicts that drone shipments will increase 50 percent in may not be on the radar for many solution providers or
2020. Drones offer a unique opportunity to identify channel partners just yet.
actionable tasks with much less leg work. Businesses
and solution providers can offer enhanced support and
real-time services. As best practices are developed and Virtual Reality/Augmented Reality
proper protocols put in place, drones offer real-potential
for businesses.
When we think of virtual reality and augmented
reality technologies (now referred to as XR), we often
drift to possibilities in gaming. While those should not be
overlooked, there is real potential for businesses and
solution providers as well.

XR helps provide context to possibility.


Consumers and businesses may know that they need a
solution but have difficulty visualizing how a product or
service will enable a particular outcome. Businesses can
use XR to enhance their offerings and inform effective
decision making.

3D Printing
The business applications for 3D printing are
endless. The ability to customize a product according to
personalized specifications will allow businesses to
provide nearly limitless possibilities. In recent years,
providing this kind of customization required either
significant reprogramming or manual intervention. With
3D printing, personalization is now one more task that
can be automated. 3D printing also enables the use of
various materials that offer cost-saving and
environmentally sustainable benefits.

5G
The speeds accomplished with 5G greatly
outpace those seen with previous networks. 5G offers
the supporting foundation that businesses can leverage
to embrace emerging technologies. When
unencumbered by latency issues, businesses can
provide greater capabilities and service. Reaching
consumer bases via mobile devices and smartphones
will soar to new heights as the IT infrastructure for 5G
expands and becomes more pervasive.

Potrebbero piacerti anche