SlideShare a Scribd company logo
1 of 32
CIO360 Empowerment
Andrew Wasser
Executive Director of the CIO Institute
Dean of CMU’s School of Information
Systems & Management
Ranked by U.S. News & World Report, Carnegie Mellon is:
• 1st in Information and Technology Management
• 2nd in Management
Information Systems
and Quantitative
Analysis
• 3rd in Computer
Engineering
20 Nobel Laureates
IT Plus ‘ ’
• Healthcare
• Security
• Traffic
• Entertainment
• Crime
• Privacy
Topics for Today: Positioning your
CIO for Success
• Lead or follow?
• Why IT projects fail
• Iterative and incremental development
• Enterprise Architecture
• Shadow IT
• Principle-Agent theory
• Process or Innovate?
Public Vs. Private Sector CIO
Public sector IT lags three to five year behind
private sector technology initiatives
First Movers
• First Movers could be moving fast towards
a dead-end
• First Movers do not learn from other’s
mistakes
• First Movers are the province of the
private sector
Why do we take technology risks?
We listen to consultants and vendors in
expensive suits (with cocktails).
! Why do we respect the opinions of
outsiders more than we do our trusted
employees?
! Why do we let consultants and vendors
gain their experience at our expense?
You can still innovate
Innovate on Public Service, not Technology
• Open Data Websites:
• Weather patterns
• Census demographic data
• Transparency in government activities
• Speed and quality of service
• Building a smart city
Failed Government IT Projects
x FBI Case File System
x IRS Modernization
x Kinetic Energy Interceptor
x Denver Airport
x Federal Aviation Administration modernization
x DoD and VA’s joint health records
x Mississippi tax system automation
x Navy-Marine Corp Intranet
x HealthCare.Gov
x Pentagon’s DEAMS accounting system
x Security Border initiative
Why projects fail:
1. Too big, too ambitious
2. Too technologically advanced
3. Too many stakeholders with too many
competing interests
4. Poor leadership
5. The organization just isn’t ready or
properly incentivized
FedRAMP Collaboration
COMMON SECURITY RISK MODEL for CLOUD:
• Ensures government-wide cloud use has adequate
information security;
• Eliminates duplication of effort and reduce risk
management costs;
• Enables rapid and cost-effective procurement of
information systems/services for federal agencies.
• Private (IBM, Amazon, Microsoft) and Public (federal
agencies) covered
• Department of Defense, Homeland Security, and
GSA all on board
Give up on massive cross-departmental
IT projects
• One-off partnerships and incremental
agreements work better.
• The City of Chicago and Allstate Insurance
partnered to predict restaurants that carry
foodborne illnesses
• NIST and Census work together on a shared
cloud-based research platform
• Cause & Effect: The more stakeholders,
the higher the likelihood of a project failure
Small Wins towards Big gains
• Working in small (agile) chunks:
• Each mini project adds value in and of itself
• Each serves as a base for the next building
block
• People see progress and are motivated to
support you
• Allows you the flexibility to change
priorities and technologies
Little wins/Agile practices
• Requirements and solutions evolve
through collaboration between cross-
functional teams
• Fail quickly, learn, and move ahead
Agile Practices
Work on the most important things first
Not letting great stand in the way of
good enough (the law of diminishing
returns)
Decide as late as possible (just-in-time
feature-decisions)
(Not Agile) Fixed Price Contracts
Why do we like them:
1. The comfort of knowing how much you are
paying (low risk)
Why do we hate them:
1. We can’t change our minds
2. The incentive of the vendor is to do it in the
cheapest way possible
3. You may get what you asked for but not
what you want
Another major failure point
• Do you want to finish the last Director’s or
CIO’s strategic IT project?
• How much waste are you willing to live
with by abandoning projects?
Enterprise Architecture to the
rescue
• EA provides a strategic, integrated approach to
IT resource planning
EA sets Standards:
“We support Android
devices”
“We use Jive as our
collaboration tool”
EA as a Weapon for you and your
CIO
1. EA gives you a Plan
2. EA gives you Standards
3. EA drives your IT spend
EA as a Plan:
Which projects are
done 1st, 2nd, 3rd.
The End State with EA
• Stakeholders have better access to data
• IT Headcount reduced
• New systems delivered quicker
• Management / IT alignment
• Complexity & infrastructure costs
controlled
• Data integrity & security improved
Shadow IT
• Unauthorized applications and services used
without the permission of the CIO and the
tech team
• Driven by consumerized technology, mobility,
cloud, and frustration.
 GitHub
 Microsoft365
 DropBox
 SourceForge
 Yammer, Jive….
 A zillion apps
Shadow IT: Friend or Enemy?
Friend
• Fosters innovation
• Gets the job done
• Delivers agility & speed
• Escapes technical debt
Enemy
• Impedes cross-functional
collaboration
• Increases Security &
Compliance Risks
• Increases Privacy Risks
• Chaos will ensue
Shadow Innovation
• Allow and embrace small experiments
• Fast track new technologies
• Set boundaries and reinforce what will
not be tolerated
Last Major IT Failure Point
• Organizational Readiness
• Culture
• Unwillingness to change
• Competing interests
• Looking at it from a Principle-
Agent perspective
Principal Agent Theory (WIFM)
The problem of motivating a party to act on
behalf of another is known as ‘the principal-
agent problem’.
• Badly designed incentives or features
complicate the relationship between the
principle and agent
• Gaming the system using the rules and
procedures meant to protect a system to
manipulate the system for a desired outcome
Adopting a new system or practice
• Using ‘What’s in it for me’ (WIFM) to align
incentives
Incentives:
 Money
 Time-off
 Recognition
 Feedback
 Little Stuff
Is Process the enemy of Innovation?
• Process: You do things in an established
manner, never deviating from the Standard
Operating Procedure
• Service Level Agreements, Process Modeling
• Avoiding errors, minimal thinking
• Innovation: You take risks, you challenge
assumptions, you stay flexible, you
recover rapidly
The Rare Responsible Person
• Self motivating
• Self aware
• Self disciplined
• Self improving
• Acts like a leader
• Doesn’t wait to be told what to do
• Never feels “that’s not my job”
• Picks up the trash lying on the floor
• Behaves like an owner
“Good” vs. “Bad” Processes
• “Good” processes help talented people get more done
• Web site push every two weeks rather than random
• Spend within budget each quarter
• Regularly scheduled strategy meetings
• “Bad” processes try to prevent recoverable mistakes
• Get pre‐approvals for $5k spending
• 3 people to sign off on banner ad
• Permission needed to hang a poster on a wall
• Multilevel approval process for projects
• Get 10 people to interview each candidate
Two Types of Necessary Rules
1. Prevent irrevocable disaster
• Financials produced are wrong
• Hackers steal our customers’ credit card info
2. Moral, ethical, legal issues
• Dishonesty, harassment are intolerable
CIO Empowerment
• Have a clear enterprise architecture
• Do not place the consultants and vendors
over your internal staff
• Innovate on service, not on technology
• Small Wins, Small Wins, Small Wins
• Leverage but manage Shadow IT
• Use Principle-Agent Theory (WIFM) to
motivate behavior and change culture
Andrew Wasser
awasser@cmu.edu

More Related Content

What's hot

Brighttalk brining it all together - final
Brighttalk   brining it all together - finalBrighttalk   brining it all together - final
Brighttalk brining it all together - final
Andrew White
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
TheAnfieldGroup
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
TheAnfieldGroup
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William Tanenbaum
 

What's hot (20)

What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
Brighttalk brining it all together - final
Brighttalk   brining it all together - finalBrighttalk   brining it all together - final
Brighttalk brining it all together - final
 
Wake up, C-Suite -- #InfoChaos is Approaching
Wake up, C-Suite -- #InfoChaos is ApproachingWake up, C-Suite -- #InfoChaos is Approaching
Wake up, C-Suite -- #InfoChaos is Approaching
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
IT ASSET MANAGEMENT
IT ASSET MANAGEMENTIT ASSET MANAGEMENT
IT ASSET MANAGEMENT
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
 
Managing Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentManaging Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the Environment
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
 
Cloud Computing for CPAs: What Your Client Will Ask You
Cloud Computing for CPAs: What Your Client Will Ask YouCloud Computing for CPAs: What Your Client Will Ask You
Cloud Computing for CPAs: What Your Client Will Ask You
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile Computing
 
Simon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New RiskSimon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New Risk
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
 
The Joy Of Bits
The  Joy  Of  BitsThe  Joy  Of  Bits
The Joy Of Bits
 
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
 

Viewers also liked (10)

Agenda del CIO 2015
Agenda del CIO 2015 Agenda del CIO 2015
Agenda del CIO 2015
 
El nuevo CIO: Jefe de información, innovación e integración
El nuevo CIO: Jefe de información, innovación e integraciónEl nuevo CIO: Jefe de información, innovación e integración
El nuevo CIO: Jefe de información, innovación e integración
 
Nuevos retos CIO
Nuevos retos CIONuevos retos CIO
Nuevos retos CIO
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
Estrategia Viceministerio TI Colombia 2015
Estrategia Viceministerio TI Colombia 2015Estrategia Viceministerio TI Colombia 2015
Estrategia Viceministerio TI Colombia 2015
 
Estrategia de Gobierno en línea
Estrategia de Gobierno en líneaEstrategia de Gobierno en línea
Estrategia de Gobierno en línea
 
Ciber... nacion: afrontando los retos del siglo XXI
Ciber... nacion: afrontando los retos del siglo XXICiber... nacion: afrontando los retos del siglo XXI
Ciber... nacion: afrontando los retos del siglo XXI
 
Modelo de CIO del Reino Unido
Modelo de CIO del Reino UnidoModelo de CIO del Reino Unido
Modelo de CIO del Reino Unido
 
Marcos de gobierno de ti
Marcos de gobierno de tiMarcos de gobierno de ti
Marcos de gobierno de ti
 
Culture
CultureCulture
Culture
 

Similar to CIO 360 grados: empoderamiento total

Why Does IT Cost So Much CANHEIT v10
Why Does IT Cost So Much CANHEIT v10Why Does IT Cost So Much CANHEIT v10
Why Does IT Cost So Much CANHEIT v10
Mark Roman
 
Advanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project DeliveryAdvanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project Delivery
Mark Constable
 

Similar to CIO 360 grados: empoderamiento total (20)

Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Meeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand WorldMeeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand World
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science
 
GrowFL: Improve Employee and Customer Experience in a Hybrid Work Environment
GrowFL: Improve Employee and Customer Experience in a Hybrid Work EnvironmentGrowFL: Improve Employee and Customer Experience in a Hybrid Work Environment
GrowFL: Improve Employee and Customer Experience in a Hybrid Work Environment
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
 
Why Does IT Cost So Much CANHEIT v10
Why Does IT Cost So Much CANHEIT v10Why Does IT Cost So Much CANHEIT v10
Why Does IT Cost So Much CANHEIT v10
 
Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18
 
Digital Operations Service Design
Digital Operations Service DesignDigital Operations Service Design
Digital Operations Service Design
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Advanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project DeliveryAdvanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project Delivery
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
 
SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014
 
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
 
Mucon microservices and innovation
Mucon microservices and innovationMucon microservices and innovation
Mucon microservices and innovation
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
Summer School Lesson 3
Summer School Lesson 3Summer School Lesson 3
Summer School Lesson 3
 

More from Corporacion Colombia Digital

Economía digital e I+D+I
Economía digital e I+D+IEconomía digital e I+D+I
Economía digital e I+D+I
Corporacion Colombia Digital
 
Entidades eficientes: el poder de la Arquitectura TI Colombia
Entidades eficientes: el poder de la Arquitectura TI ColombiaEntidades eficientes: el poder de la Arquitectura TI Colombia
Entidades eficientes: el poder de la Arquitectura TI Colombia
Corporacion Colombia Digital
 
PetValet: el app para el cuidado de las mascotas
PetValet: el app para el cuidado de las mascotasPetValet: el app para el cuidado de las mascotas
PetValet: el app para el cuidado de las mascotas
Corporacion Colombia Digital
 
¿Cuándo comprar tiquetes aéreos al mejor precio?
¿Cuándo comprar tiquetes aéreos al mejor precio?¿Cuándo comprar tiquetes aéreos al mejor precio?
¿Cuándo comprar tiquetes aéreos al mejor precio?
Corporacion Colombia Digital
 
Encuentre las personas adecuadas para el trabajo indicado
Encuentre las personas adecuadas para el trabajo indicadoEncuentre las personas adecuadas para el trabajo indicado
Encuentre las personas adecuadas para el trabajo indicado
Corporacion Colombia Digital
 
Tecnología e innovación social: vías para el desarrollo
Tecnología e innovación social: vías para el desarrolloTecnología e innovación social: vías para el desarrollo
Tecnología e innovación social: vías para el desarrollo
Corporacion Colombia Digital
 
Reserve en línea una empresa para asear su casa u oficina sin preocupaciones
Reserve en línea una empresa para asear su casa u oficina sin preocupacionesReserve en línea una empresa para asear su casa u oficina sin preocupaciones
Reserve en línea una empresa para asear su casa u oficina sin preocupaciones
Corporacion Colombia Digital
 
Comunicación efectiva entre instituciones educativas, profesores, padres y al...
Comunicación efectiva entre instituciones educativas, profesores, padres y al...Comunicación efectiva entre instituciones educativas, profesores, padres y al...
Comunicación efectiva entre instituciones educativas, profesores, padres y al...
Corporacion Colombia Digital
 

More from Corporacion Colombia Digital (20)

Estudio: ¿cómo está Colombia en gobierno electrónico?
Estudio: ¿cómo está Colombia en gobierno electrónico?Estudio: ¿cómo está Colombia en gobierno electrónico?
Estudio: ¿cómo está Colombia en gobierno electrónico?
 
Economía digital e I+D+I
Economía digital e I+D+IEconomía digital e I+D+I
Economía digital e I+D+I
 
¿Cómo las entidades públicas pueden formular su Plan Estratégico de TI?
¿Cómo las entidades públicas pueden formular su Plan Estratégico de TI?¿Cómo las entidades públicas pueden formular su Plan Estratégico de TI?
¿Cómo las entidades públicas pueden formular su Plan Estratégico de TI?
 
Entidades eficientes: el poder de la Arquitectura TI Colombia
Entidades eficientes: el poder de la Arquitectura TI ColombiaEntidades eficientes: el poder de la Arquitectura TI Colombia
Entidades eficientes: el poder de la Arquitectura TI Colombia
 
5 habilidades y competencias de crecimiento profesional para 2017
5 habilidades y competencias de crecimiento profesional para 20175 habilidades y competencias de crecimiento profesional para 2017
5 habilidades y competencias de crecimiento profesional para 2017
 
PetValet: el app para el cuidado de las mascotas
PetValet: el app para el cuidado de las mascotasPetValet: el app para el cuidado de las mascotas
PetValet: el app para el cuidado de las mascotas
 
¿Cómo la tecnología aporta a la construcción de paz?
¿Cómo la tecnología aporta a la construcción de paz?¿Cómo la tecnología aporta a la construcción de paz?
¿Cómo la tecnología aporta a la construcción de paz?
 
¿Cuándo comprar tiquetes aéreos al mejor precio?
¿Cuándo comprar tiquetes aéreos al mejor precio?¿Cuándo comprar tiquetes aéreos al mejor precio?
¿Cuándo comprar tiquetes aéreos al mejor precio?
 
Encuentre las personas adecuadas para el trabajo indicado
Encuentre las personas adecuadas para el trabajo indicadoEncuentre las personas adecuadas para el trabajo indicado
Encuentre las personas adecuadas para el trabajo indicado
 
Tecnología e innovación social: vías para el desarrollo
Tecnología e innovación social: vías para el desarrolloTecnología e innovación social: vías para el desarrollo
Tecnología e innovación social: vías para el desarrollo
 
Consejos para proteger transacciones bancarias en línea
Consejos para proteger transacciones bancarias en líneaConsejos para proteger transacciones bancarias en línea
Consejos para proteger transacciones bancarias en línea
 
5 factores a considerar en el proceso de transformación digital
5 factores a considerar en el proceso de transformación digital5 factores a considerar en el proceso de transformación digital
5 factores a considerar en el proceso de transformación digital
 
4 pasos para crear juegos en dispositivos moviles
4 pasos para crear juegos en dispositivos moviles4 pasos para crear juegos en dispositivos moviles
4 pasos para crear juegos en dispositivos moviles
 
¿Cuáles son las estrategias de política pública que impulsan la economía digi...
¿Cuáles son las estrategias de política pública que impulsan la economía digi...¿Cuáles son las estrategias de política pública que impulsan la economía digi...
¿Cuáles son las estrategias de política pública que impulsan la economía digi...
 
Reserve en línea una empresa para asear su casa u oficina sin preocupaciones
Reserve en línea una empresa para asear su casa u oficina sin preocupacionesReserve en línea una empresa para asear su casa u oficina sin preocupaciones
Reserve en línea una empresa para asear su casa u oficina sin preocupaciones
 
Impactos del Internet de las Cosas en distintas áreas del negocio
Impactos del Internet de las Cosas en distintas áreas del negocioImpactos del Internet de las Cosas en distintas áreas del negocio
Impactos del Internet de las Cosas en distintas áreas del negocio
 
Comunicación efectiva entre instituciones educativas, profesores, padres y al...
Comunicación efectiva entre instituciones educativas, profesores, padres y al...Comunicación efectiva entre instituciones educativas, profesores, padres y al...
Comunicación efectiva entre instituciones educativas, profesores, padres y al...
 
¿Anuncios en Facebook? 5 claves para optimizar la publicidad
¿Anuncios en Facebook? 5 claves para optimizar la publicidad¿Anuncios en Facebook? 5 claves para optimizar la publicidad
¿Anuncios en Facebook? 5 claves para optimizar la publicidad
 
¿Cómo ser competitivo para el 2020?
¿Cómo ser competitivo para el 2020?¿Cómo ser competitivo para el 2020?
¿Cómo ser competitivo para el 2020?
 
Plataforma de tutorías educativas personalizadas: Up2u
Plataforma de tutorías educativas personalizadas: Up2uPlataforma de tutorías educativas personalizadas: Up2u
Plataforma de tutorías educativas personalizadas: Up2u
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

CIO 360 grados: empoderamiento total

  • 1. CIO360 Empowerment Andrew Wasser Executive Director of the CIO Institute Dean of CMU’s School of Information Systems & Management
  • 2. Ranked by U.S. News & World Report, Carnegie Mellon is: • 1st in Information and Technology Management • 2nd in Management Information Systems and Quantitative Analysis • 3rd in Computer Engineering 20 Nobel Laureates
  • 3. IT Plus ‘ ’ • Healthcare • Security • Traffic • Entertainment • Crime • Privacy
  • 4. Topics for Today: Positioning your CIO for Success • Lead or follow? • Why IT projects fail • Iterative and incremental development • Enterprise Architecture • Shadow IT • Principle-Agent theory • Process or Innovate?
  • 5. Public Vs. Private Sector CIO Public sector IT lags three to five year behind private sector technology initiatives
  • 6. First Movers • First Movers could be moving fast towards a dead-end • First Movers do not learn from other’s mistakes • First Movers are the province of the private sector
  • 7. Why do we take technology risks? We listen to consultants and vendors in expensive suits (with cocktails). ! Why do we respect the opinions of outsiders more than we do our trusted employees? ! Why do we let consultants and vendors gain their experience at our expense?
  • 8. You can still innovate Innovate on Public Service, not Technology • Open Data Websites: • Weather patterns • Census demographic data • Transparency in government activities • Speed and quality of service • Building a smart city
  • 9. Failed Government IT Projects x FBI Case File System x IRS Modernization x Kinetic Energy Interceptor x Denver Airport x Federal Aviation Administration modernization x DoD and VA’s joint health records x Mississippi tax system automation x Navy-Marine Corp Intranet x HealthCare.Gov x Pentagon’s DEAMS accounting system x Security Border initiative
  • 10. Why projects fail: 1. Too big, too ambitious 2. Too technologically advanced 3. Too many stakeholders with too many competing interests 4. Poor leadership 5. The organization just isn’t ready or properly incentivized
  • 11. FedRAMP Collaboration COMMON SECURITY RISK MODEL for CLOUD: • Ensures government-wide cloud use has adequate information security; • Eliminates duplication of effort and reduce risk management costs; • Enables rapid and cost-effective procurement of information systems/services for federal agencies. • Private (IBM, Amazon, Microsoft) and Public (federal agencies) covered • Department of Defense, Homeland Security, and GSA all on board
  • 12. Give up on massive cross-departmental IT projects • One-off partnerships and incremental agreements work better. • The City of Chicago and Allstate Insurance partnered to predict restaurants that carry foodborne illnesses • NIST and Census work together on a shared cloud-based research platform • Cause & Effect: The more stakeholders, the higher the likelihood of a project failure
  • 13. Small Wins towards Big gains • Working in small (agile) chunks: • Each mini project adds value in and of itself • Each serves as a base for the next building block • People see progress and are motivated to support you • Allows you the flexibility to change priorities and technologies
  • 14. Little wins/Agile practices • Requirements and solutions evolve through collaboration between cross- functional teams • Fail quickly, learn, and move ahead
  • 15. Agile Practices Work on the most important things first Not letting great stand in the way of good enough (the law of diminishing returns) Decide as late as possible (just-in-time feature-decisions)
  • 16. (Not Agile) Fixed Price Contracts Why do we like them: 1. The comfort of knowing how much you are paying (low risk) Why do we hate them: 1. We can’t change our minds 2. The incentive of the vendor is to do it in the cheapest way possible 3. You may get what you asked for but not what you want
  • 17. Another major failure point • Do you want to finish the last Director’s or CIO’s strategic IT project? • How much waste are you willing to live with by abandoning projects?
  • 18. Enterprise Architecture to the rescue • EA provides a strategic, integrated approach to IT resource planning
  • 19. EA sets Standards: “We support Android devices” “We use Jive as our collaboration tool” EA as a Weapon for you and your CIO 1. EA gives you a Plan 2. EA gives you Standards 3. EA drives your IT spend EA as a Plan: Which projects are done 1st, 2nd, 3rd.
  • 20. The End State with EA • Stakeholders have better access to data • IT Headcount reduced • New systems delivered quicker • Management / IT alignment • Complexity & infrastructure costs controlled • Data integrity & security improved
  • 21. Shadow IT • Unauthorized applications and services used without the permission of the CIO and the tech team • Driven by consumerized technology, mobility, cloud, and frustration.  GitHub  Microsoft365  DropBox  SourceForge  Yammer, Jive….  A zillion apps
  • 22. Shadow IT: Friend or Enemy? Friend • Fosters innovation • Gets the job done • Delivers agility & speed • Escapes technical debt Enemy • Impedes cross-functional collaboration • Increases Security & Compliance Risks • Increases Privacy Risks • Chaos will ensue
  • 23. Shadow Innovation • Allow and embrace small experiments • Fast track new technologies • Set boundaries and reinforce what will not be tolerated
  • 24. Last Major IT Failure Point • Organizational Readiness • Culture • Unwillingness to change • Competing interests • Looking at it from a Principle- Agent perspective
  • 25. Principal Agent Theory (WIFM) The problem of motivating a party to act on behalf of another is known as ‘the principal- agent problem’. • Badly designed incentives or features complicate the relationship between the principle and agent • Gaming the system using the rules and procedures meant to protect a system to manipulate the system for a desired outcome
  • 26. Adopting a new system or practice • Using ‘What’s in it for me’ (WIFM) to align incentives Incentives:  Money  Time-off  Recognition  Feedback  Little Stuff
  • 27. Is Process the enemy of Innovation? • Process: You do things in an established manner, never deviating from the Standard Operating Procedure • Service Level Agreements, Process Modeling • Avoiding errors, minimal thinking • Innovation: You take risks, you challenge assumptions, you stay flexible, you recover rapidly
  • 28. The Rare Responsible Person • Self motivating • Self aware • Self disciplined • Self improving • Acts like a leader • Doesn’t wait to be told what to do • Never feels “that’s not my job” • Picks up the trash lying on the floor • Behaves like an owner
  • 29. “Good” vs. “Bad” Processes • “Good” processes help talented people get more done • Web site push every two weeks rather than random • Spend within budget each quarter • Regularly scheduled strategy meetings • “Bad” processes try to prevent recoverable mistakes • Get pre‐approvals for $5k spending • 3 people to sign off on banner ad • Permission needed to hang a poster on a wall • Multilevel approval process for projects • Get 10 people to interview each candidate
  • 30. Two Types of Necessary Rules 1. Prevent irrevocable disaster • Financials produced are wrong • Hackers steal our customers’ credit card info 2. Moral, ethical, legal issues • Dishonesty, harassment are intolerable
  • 31. CIO Empowerment • Have a clear enterprise architecture • Do not place the consultants and vendors over your internal staff • Innovate on service, not on technology • Small Wins, Small Wins, Small Wins • Leverage but manage Shadow IT • Use Principle-Agent Theory (WIFM) to motivate behavior and change culture