Sponsored By

What Keeps You Up at Night?What Keeps You Up at Night?

Continuous change, cultural upheaval, and security breaches are but three nightmarish issues for IT.

Dave Stein

December 3, 2018

5 Min Read
No Jitter logo in a gray background | No Jitter

With the end of the year rapidly approaching, it’s a good time to reflect on our industry from a macro viewpoint. What major challenges did IT face in 2018, and what will they come up against in the new year? Are there solutions? IT management certainly loses sleep on a whole host of these issues.

Continuous Change

Companies can no longer afford to wait to modernize. There is a bottom-line business imperative to moving at a fast pace. Failure to do so will likely result in significant advantage for competitors that are able to embrace this approach. Additionally, the IT upgrade cycle never ends. This modernization effort presents huge risks for CIOs and the entire IT organization as infrastructure and process must change dramatically (depending on the starting point).

When assessing an IT organization’s ability to support change, I often use a version of Maslow’s hierarchy of needs adapted to IT, as shown below:

Stein_MaslowHierarchy_1.jpg

I couldn’t find any research showing percentages of IT organizations performing at the top of the pyramid. But based on my consulting engagements and observations, as well as discussions with other consultants, most IT organizations seem to be in the middle of the stack.

Since this is a BCStrategies/No Jitter post, I’ve applied this model to communications technology. The IT organization must be able to adopt the appropriate infrastructure upgrades. Will it gain a competitive advantage? Will a new communications technology stack facilitate agility, enable collaboration, and support the organization’s growth? Will it allow the organization to communicate better with its customers?

I’ve read several vendor case studies that support the competitive advantage of implementing a new communications technology stack. A few examples include:

 CPaaS for custom applications, such as a Vonage customer’s “soggy french fry” example

Artificial intelligence for use in customer service/experience, augmenting human agents. LivePerson is working with IBM Watson to deploy a “bot assistant to the agent” model. It is utilizing specialized bots for handling the most routine and simple tasks.

Scale and agility using available public cloud tools, such as Amazon Connect . For this contact center service, in use at CapitalOne, Amazon Web Services uses a pay-as-you-go model that doesn’t bind customers by fixed licensing costs.

Culture

Readers who have heard me speak at Enterprise Connect or a BCStrategies conference know that I like to discuss the impact of an organization’s culture on its ability to affect change. Culture is one of the most significant barriers to digital transformation, as widely discussed. This includes culture within IT as well as the entire organization.

The question, ”how do we change the way we do business?” has kept CIOs and senior managers up many nights. A few years ago, I was the lead consultant on a network infrastructure replacement project for the largest university system in North America (approximately 300,000 hosts on 23 campuses). The technology choices and deployment decisions were relatively easy. The cultural issues were enormous, with IT encountering resistance at many levels due to changes such as:

  • Centralization of budgets and key decisions

  • Standardization of many processes for deployment, support, and management

  • Implementation of tools to facilitate collaboration for both synchronous (i.e., conferencing) and asynchronous (WIKIs) requirements

This project reinforced a number of points for me. Having change pushed from the top management down isn’t enough. Those empowered to make changes at every level have to address resistance on an everyday basis. In the university example above, the changes were mostly contained to the IT organizations.

Another recent consulting engagement involved constant re-negotiation between IT and user departments as to what features would be deployed and on what schedule. This necessitated IT to modify the original plan (previously agreed to by all) several times and led to budget and deployment challenges at this public sector organization.

Tying these two examples to the modified Maslow hierarchy above, the university IT organization had started in the middle of the stack and was able to move up the stack to provide an advantage to the entire system. In the case of the public sector client, the IT organization wasn’t able to provide effective leadership and continued at the lower levels of the stack, depriving the entire organization of potential process benefits.

Security

It seems that a week doesn’t go by without a major security incident being reported, with the Marriott breach of information on 500 million guests over the course of four years being the latest. Following on the incidents at companies like Target, Equifax, and Yahoo, this latest example supports the theory that you can’t keep the bad guys out. A recent Krebs on Security article suggests that IT management must adopt an approach that includes philosophy, people, process and technology, as shown below. One of the key suggestions is that the security function report directly to the board and CEO, bypassing IT management altogether.

Stein_security_0.jpg

 

Summary

The three topics I discussed above (continuous change, culture, and security) each possess the ability to be career-limiting for senior IT management if not handled properly. For example, shortly after the Target breach both the CIO and CEO resigned. There are other areas that worry IT managers as well, including:

  • Skills gap in IT

  • Budget control

  • Cloud migration

  • Internet of Things

  • Execution risk

The list could be longer. Clearly the number of issues that CIOs and CTOs must worry about is large and growing. No wonder they don’t get much sleep!

BCS_logo_100px_0.jpgBCStrategies is an industry resource for enterprises, vendors, system integrators, and anyone interested in the growing business communications arena. A supplier of objective information on business communications, BCStrategies is supported by an alliance of leading communication industry advisors, analysts, and consultants who have worked in the various segments of the dynamic business communications market.

About the Author

Dave Stein

Mr. Stein, a principal with Stein Consulting Group, has more than 30 years of consulting, information systems and telecommunications experience, with a primary emphasis on IP communications and technology infrastructure projects. He is nationally recognized for providing analysis and Independent consulting for essential IT infrastructure including voice, data, wireless, AV, security, data center, mobility and unified communications. Mr. Stein is a joint venture partner of Technology Plus and is a UC Strategies designated UC Expert.

His expertise includes the entire technology lifecycle including needs assessment, process evaluation, operations impact, systems design, procurement and implementation project management for IP Telephony/Unified Communications, wireless, data center, cabling, facilities, LAN, WAN, network management, data security systems, telecommunications, technology relocation and construction projects. He is an excellent communicator and is skilled in dealing with management, facilities and technical personnel within IT and user communities. Mr. Stein has provided consulting services for assessing the effectiveness of IT organizations and developing governance models.

Mr. Stein's expertise includes technology planning and business case development for many significant technology infrastructure projects for both public and private-sector clients. Previous engagements have included consulting for professional services firms (i.e. legal, financial), state and local governments, education (university and K-12), high tech, healthcare and entertainment. He is very effective in working with all levels of an organization.

Mr. Stein is a member of the Society of Communications Technology Consultants (SCTC). He holds a Bachelor of Science degree in Computer Science from Rensselaer Polytechnic Institute and has completed the 'Leadership and Management for Technology Professionals' program at University of California, Irvine. He speaks regularly at Enterprise Connect on a variety of topics and is a frequent contributor to No Jitter.

Mr. Stein can be reached at [email protected]. LinkedIn Profile