SlideShare a Scribd company logo
1 of 21
THE 5 CHALLENGES
IMPEDING THE FUTURE OF IT TODAY
Is there any way to successfully navigate and
leverage such a challenging industry?
Challenge #1: Failure to harness IT value

When moving into the
implementation and operation
phases of a project, there are many
questions to consider:
 Is a warranty in place?

 Is there a security strategy?

 Does the desired capacity exist?

 Is the support staff prepared?

 Are users prepared?

Source: Operational readiness, Basic Service Management, 2/01/11

                                                                   © Glenfis AG – 2012   2
Challenge #2: Difficulty meeting
regulatory compliance
                                                                                                                         Basel II/III


                                                                                                               Sarbanes Oxley SOX

   • Regulations vary by country
     and are long and complicated                                                                                         PCI-DSS


                                                                                                                          SAS 70
   • Recently changed or new
     IT regulations include:
                                                                                                                          MA-Risk


                                                                                                                         Solvency II

Sources: Cost cutting and pricing pressures fastest growing risks to global business in 2011, Ernst & Young, 12/17/10;
Regulatory compliance is top concern in 2011, ISACA, 4/19/11

                                                                           © Glenfis AG – 2012                                          3
Challenge #3: Security concerns
                                                                        120%                                              111%

• Over 50 million viruses                                               100%                                                     90%
  are now in existence
                                                                          80%

• There were almost                                                       60%                52%
  20 million new                                                          40%                                    34%
  viruses in 2010 alone
                                                                          20%

• In 2011, there were an                                                     0%
  estimated 2.5 million                                                                Data-stealing Web/HTTP Increase in Unwanted e-
                                                                                          attacks    attacks had malicious   mails had
  malware programs                                                                      conducted data-stealing websites     spam links
                                                                                          online        code    from 2009 to
                                                                                                                    2010
Sources: 50 million viruses and rising, AV-Test, 1/27/11; G data half-yearly report, January-June 2011;
Researchers predict advanced, blended threats focused business and infrastructure in 2011, Security Week News, 11/10/10

                                                                       © Glenfis AG – 2012                                                4
Challenge #4: Mastering complexity



• The inherent complexity of
  IT departments can veil
  how service is actually doing

• Gartner unearthed that
  40% of problems are
  found by end users

• This places the organization
  at a huge performance risk

Sources: How to make the CFO a buyer for sustainability solutions, Forrester, 4/26/11; More software project failure / challenge information from
CAI, Galorath, 3/31/10, 33% of money spent on IT development is wasted, IAG, 9/25/09

                                                                         © Glenfis AG – 2012                                                        5
Challenge #5: Adapting to changing
expectations




                                                  The biggest
                                                                                                               From the
                                               challenge faced                                               attitudes and
      According to                                                                            …Is changing
                                              when implementing                                              behaviors of
         Bain &                                   something                                    corporate
                                                                                                              entry-level
       Company…                               new, such as cloud                                 culture     employees to
                                                 computing…
                                                                                                             management




Source: The new CIO agenda: Intel cloud computing insights 2011, Intel/Bain & Company, 2011

                                                                       © Glenfis AG – 2012                                   6
Strategy #1: Become service minded


• It is paramount for IT
  departments to build up a
  service management system

• This delivers value by
  facilitating outcomes

         – Costs and risk are kept
           under better
           control, according to an
           IBM study
Sources: Boosting European prosperity through the widespread use of ICT, The Information Technology & Innovation Foundation, 10/31/07; Value of
smart information technology still unrealized, Information Management, 10/12/11; The new CIO: Change partner and business leader, IBM, May 2007

                                                                      © Glenfis AG – 2012                                                         7
Strategy #2: Engage with all departments


                                                                     • This is crucial for understanding
                                                                       the voice of the customer in
                                                                       order to provide valuable service


                                                                     • Between 70-80% of IT projects
                                                                       fail due to a combination of
                                                                       poor communication and
                                                                       integration across
                                                                       departments, from operations to
                                                                       HR, to the CFO

Source: Poor communication to blame for business intelligence failure, Gartner, 1/10/11

                                                                        © Glenfis AG – 2012                8
Strategy #3: Shift from reactive to
proactive

• The technology curve is
  getting steeper, especially
  when it comes to security


• Proactive leaders are able to
  anticipate, understand, coor
  dinate, and influence
  security issues, regulatory
  compliance and
  customer demand

Source: Prepare for mobile security threats, PCWorld, 5/31/07

                                                                © Glenfis AG – 2012   9
Be proactive in working with business

• This includes that full
  integration with other areas
  of the company


• All data, processes, and
  services are then better
  aligned with the business


• This, in turn, contributes
  more meaningfully to the
  organization’s goals

                           © Glenfis AG – 2012   10
Strategy #4: Expand in-house expertise

• Companies can better deal with
  today’s issues by developing
  in-house capabilities such as:

   – Enterprise architecture

   – Service and process
     management

   – Building governance

   – Operational excellence

   – Lean IT

                           © Glenfis AG – 2012   11
Use globally recognized certifications


                                                       These
                                                   frameworks
                                                   are the most
                                                    effective in
                                                   training and
                                                    operations


               ITIL                             COBIT           ISO 20000   ISO 27000


Source: itSMF 2010 Global Survey, itSMF, 2010

                                                    © Glenfis AG – 2012                 12
Strategy #5: Adapt to flexible learning
platforms

 E-learning is so productive
 because it is:

           • Cost-effective

           • Time-sensitive

           • Customizable

           • Easy to update to the
             latest information

Source: Why E-learning is so effective, Rapid E-Learning, 2/2/2010

                                                                     © Glenfis AG – 2012   13
Learning by experience via simulations

• Goes beyond classical training
  and simply obtaining a certificate


• Provides true
  understanding, application in
  daily work, and a real benefit for
  the business including service
  management


• Focuses on the soft skills
  required to create buy-in, deal
  with resistance, and
  foster teamwork


                                 © Glenfis AG – 2012   14
Learning by experience via simulations

•   Gaming is becoming an important
    learning instrument in both IT and
    business contexts

•   It includes social media and apps as
    instruments in learning new skills
    and applying them in the workplace

•   It can be used for knowledge
    transfer, team building, developing
    new skills, and cultivating
    culture change

•   Gaming is not playing against
    others, but with others



                                     © Glenfis AG – 2012   15
Strategy #6: Find the right partner



• The right partner should have
  the longevity that proves their
  skill and experience


• They should lead by example
  and “walk the talk” – using the
  same techniques they teach



Sources: Coaching in corporations yields high return on investment, The European Financial Review, 8/4/10; Return on investment for customized training, American Society
for Training and Development, 2011; Executive coaching as a transfer of training tool, Gerald Olivero & K. Denise Bane et al, 1997, cited by ECI, September 2004
                                                                        © Glenfis AG – 2012                                                                                 16
What else to look for…


• They have obtained
  official certifications


• High quality and innovative
  teaching materials and
  methods are used


• Training actively
  involves participants

Source: Why E-learning is so effective, Rapid E-Learning, 2/2/2010

                                                                     © Glenfis AG – 2012   17
Let us help you



           Glenfis AG
          ++41 44 202 81 10
            www.glenfis.ch



                  © Glenfis AG – 2012   18
What do we do and why?


• For more than 12 years,
  we have been providing
  pragmatic, results-driven
  IT service management
  and governance


• We use the exact same
  approaches which we teach
  our clients around the world –
  to ensure their own success


                           © Glenfis AG – 2012   19
What do we do and why?
• How we walk the talk…

   – Our management system is ISO/IEC
     20000-1:2011 certified

   – All our training and e-learning is
     officially accredited by APMG, ISACA
     and Tüv Süd

   – Our training organization is
     EDUQUA certified, which includes
     value performance

   – Glenfis is an officially licensed
     Software Assessor, LSA

   – We train what we are doing –
     and we do what we are training

                                   © Glenfis AG – 2012   20
How do we do it?

                          • We form a relevant,
                            service-oriented strategy


                          • It supports smooth IT
                            operations as well as
                            the organization’s goals


                          • This strategy is
                            strengthened by using
                            the most effective
                            frameworks in their entirety

                   © Glenfis AG – 2012                     21

More Related Content

What's hot

VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Making it happy_with_mobile_content_management
Making it happy_with_mobile_content_managementMaking it happy_with_mobile_content_management
Making it happy_with_mobile_content_managementQuestexConf
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyInnoTech
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsFindWhitePapers
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security complianceFindWhitePapers
 
SMBs: The Threat Ahead
SMBs: The Threat AheadSMBs: The Threat Ahead
SMBs: The Threat Aheadmartin_lee1969
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
The Future of Security
The Future of SecurityThe Future of Security
The Future of SecurityInnoTech
 
PwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintPwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintKim Jensen
 
IDC Report : Web Security
IDC Report : Web SecurityIDC Report : Web Security
IDC Report : Web SecurityKim Jensen
 
The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyInnoTech
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 EnvironmentVinoth Sivasubramanan
 
EACS Newsletter 2013
EACS Newsletter 2013EACS Newsletter 2013
EACS Newsletter 2013iantaylor2100
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersFindWhitePapers
 
Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11Joseph Schorr
 
The Challenges of BYOD in Your Corporation
The Challenges of BYOD in Your CorporationThe Challenges of BYOD in Your Corporation
The Challenges of BYOD in Your Corporationmyorbitx
 

What's hot (19)

VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Making it happy_with_mobile_content_management
Making it happy_with_mobile_content_managementMaking it happy_with_mobile_content_management
Making it happy_with_mobile_content_management
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive Technology
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
 
SMBs: The Threat Ahead
SMBs: The Threat AheadSMBs: The Threat Ahead
SMBs: The Threat Ahead
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
The Future of Security
The Future of SecurityThe Future of Security
The Future of Security
 
PwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintPwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO Reprint
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
IDC Report : Web Security
IDC Report : Web SecurityIDC Report : Web Security
IDC Report : Web Security
 
The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive Technology
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
EACS Newsletter 2013
EACS Newsletter 2013EACS Newsletter 2013
EACS Newsletter 2013
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11
 
The Challenges of BYOD in Your Corporation
The Challenges of BYOD in Your CorporationThe Challenges of BYOD in Your Corporation
The Challenges of BYOD in Your Corporation
 

Viewers also liked

Маркетинг план компании Somnium Network
Маркетинг план компании Somnium NetworkМаркетинг план компании Somnium Network
Маркетинг план компании Somnium NetworkSomnium Network
 
nervous system
nervous systemnervous system
nervous systemDECRAM
 
Go4 it! powerpoint without video for winter 2013 factc meeting
Go4 it! powerpoint without video for winter 2013 factc meetingGo4 it! powerpoint without video for winter 2013 factc meeting
Go4 it! powerpoint without video for winter 2013 factc meetingPhil Venditti
 
PRoot improved kernel compatibility
PRoot improved kernel compatibilityPRoot improved kernel compatibility
PRoot improved kernel compatibilitycvinc02
 
Characterisation.doc3456.doc properrr
Characterisation.doc3456.doc properrrCharacterisation.doc3456.doc properrr
Characterisation.doc3456.doc properrriramkhizar
 
01 sql-overview
01 sql-overview01 sql-overview
01 sql-overviewWarawut
 
List of places who will be an Assistance for Paying Bills, Rent, and Other Ex...
List of places who will be an Assistance for Paying Bills, Rent, and Other Ex...List of places who will be an Assistance for Paying Bills, Rent, and Other Ex...
List of places who will be an Assistance for Paying Bills, Rent, and Other Ex...Mandy Vrieze
 
給所有未婚,將要結婚,和已婚的好朋友
給所有未婚,將要結婚,和已婚的好朋友給所有未婚,將要結婚,和已婚的好朋友
給所有未婚,將要結婚,和已婚的好朋友Amy Yeh
 
For bird lovers
For bird loversFor bird lovers
For bird loversRenny
 
Apocalypse In Death Valley Interlude
Apocalypse In Death Valley   InterludeApocalypse In Death Valley   Interlude
Apocalypse In Death Valley InterludeDellyo_82
 
Show nerves
Show nervesShow nerves
Show nervesIHKids
 
Kraftforsyningen i møre og romsdal, ved svein rødal kds møre og romsdal
Kraftforsyningen i møre og romsdal, ved svein rødal kds møre og romsdalKraftforsyningen i møre og romsdal, ved svein rødal kds møre og romsdal
Kraftforsyningen i møre og romsdal, ved svein rødal kds møre og romsdalEnergiNorge
 
Metabolic basis of Muscular Fatigue
Metabolic basis of Muscular FatigueMetabolic basis of Muscular Fatigue
Metabolic basis of Muscular FatigueVisualBee.com
 

Viewers also liked (20)

Маркетинг план компании Somnium Network
Маркетинг план компании Somnium NetworkМаркетинг план компании Somnium Network
Маркетинг план компании Somnium Network
 
204215 Unit7.1
204215 Unit7.1204215 Unit7.1
204215 Unit7.1
 
Diagnostico y tratamiento de tuberculosis
Diagnostico y tratamiento de tuberculosisDiagnostico y tratamiento de tuberculosis
Diagnostico y tratamiento de tuberculosis
 
SOY MAESTRA DE INFANTIL
SOY MAESTRA DE INFANTILSOY MAESTRA DE INFANTIL
SOY MAESTRA DE INFANTIL
 
nervous system
nervous systemnervous system
nervous system
 
Go4 it! powerpoint without video for winter 2013 factc meeting
Go4 it! powerpoint without video for winter 2013 factc meetingGo4 it! powerpoint without video for winter 2013 factc meeting
Go4 it! powerpoint without video for winter 2013 factc meeting
 
PRoot improved kernel compatibility
PRoot improved kernel compatibilityPRoot improved kernel compatibility
PRoot improved kernel compatibility
 
User behavior: Dating
User behavior: DatingUser behavior: Dating
User behavior: Dating
 
The Purpose of E.T.I. Regarding Africa
The Purpose of E.T.I. Regarding AfricaThe Purpose of E.T.I. Regarding Africa
The Purpose of E.T.I. Regarding Africa
 
Characterisation.doc3456.doc properrr
Characterisation.doc3456.doc properrrCharacterisation.doc3456.doc properrr
Characterisation.doc3456.doc properrr
 
01 sql-overview
01 sql-overview01 sql-overview
01 sql-overview
 
List of places who will be an Assistance for Paying Bills, Rent, and Other Ex...
List of places who will be an Assistance for Paying Bills, Rent, and Other Ex...List of places who will be an Assistance for Paying Bills, Rent, and Other Ex...
List of places who will be an Assistance for Paying Bills, Rent, and Other Ex...
 
給所有未婚,將要結婚,和已婚的好朋友
給所有未婚,將要結婚,和已婚的好朋友給所有未婚,將要結婚,和已婚的好朋友
給所有未婚,將要結婚,和已婚的好朋友
 
For bird lovers
For bird loversFor bird lovers
For bird lovers
 
Apocalypse In Death Valley Interlude
Apocalypse In Death Valley   InterludeApocalypse In Death Valley   Interlude
Apocalypse In Death Valley Interlude
 
Wilhelmina Jenkins
Wilhelmina JenkinsWilhelmina Jenkins
Wilhelmina Jenkins
 
Show nerves
Show nervesShow nerves
Show nerves
 
Music in worship
Music in worshipMusic in worship
Music in worship
 
Kraftforsyningen i møre og romsdal, ved svein rødal kds møre og romsdal
Kraftforsyningen i møre og romsdal, ved svein rødal kds møre og romsdalKraftforsyningen i møre og romsdal, ved svein rødal kds møre og romsdal
Kraftforsyningen i møre og romsdal, ved svein rødal kds møre og romsdal
 
Metabolic basis of Muscular Fatigue
Metabolic basis of Muscular FatigueMetabolic basis of Muscular Fatigue
Metabolic basis of Muscular Fatigue
 

Similar to THE 5 CHALLENGES

Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Finding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO StudyFinding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO StudyIBMGovernmentCA
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]kgbacdd
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategycVidya Networks
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
 
Latest news phoenix
Latest news phoenixLatest news phoenix
Latest news phoenixJeff Pearce
 
The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)CA Technologies
 
Cloud Connectivity and Amazon Direct Connect
Cloud Connectivity and Amazon Direct ConnectCloud Connectivity and Amazon Direct Connect
Cloud Connectivity and Amazon Direct ConnectExponential_e
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationLeigh Williamson
 
The 2012 ibm tech trends report
The 2012 ibm tech trends reportThe 2012 ibm tech trends report
The 2012 ibm tech trends reportCasey Lucas
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3princescorpio
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Scenari evolutivi nello snellimento dei sistemi informativi
Scenari evolutivi nello snellimento dei sistemi informativiScenari evolutivi nello snellimento dei sistemi informativi
Scenari evolutivi nello snellimento dei sistemi informativiFondazione CUOA
 
Mergers & Acquisitions
Mergers & AcquisitionsMergers & Acquisitions
Mergers & Acquisitionsdmurph4
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 

Similar to THE 5 CHALLENGES (20)

Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
CBS March 11
CBS March 11CBS March 11
CBS March 11
 
Finding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO StudyFinding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO Study
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
 
SIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
SIIA & INPUT Webinar: Federal Cloud Computing Initiative UpdateSIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
SIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Top5 it-predictions-v2
Top5 it-predictions-v2Top5 it-predictions-v2
Top5 it-predictions-v2
 
Latest news phoenix
Latest news phoenixLatest news phoenix
Latest news phoenix
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)
 
Cloud Connectivity and Amazon Direct Connect
Cloud Connectivity and Amazon Direct ConnectCloud Connectivity and Amazon Direct Connect
Cloud Connectivity and Amazon Direct Connect
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
The 2012 ibm tech trends report
The 2012 ibm tech trends reportThe 2012 ibm tech trends report
The 2012 ibm tech trends report
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Scenari evolutivi nello snellimento dei sistemi informativi
Scenari evolutivi nello snellimento dei sistemi informativiScenari evolutivi nello snellimento dei sistemi informativi
Scenari evolutivi nello snellimento dei sistemi informativi
 
Mergers & Acquisitions
Mergers & AcquisitionsMergers & Acquisitions
Mergers & Acquisitions
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

THE 5 CHALLENGES

  • 1. THE 5 CHALLENGES IMPEDING THE FUTURE OF IT TODAY Is there any way to successfully navigate and leverage such a challenging industry?
  • 2. Challenge #1: Failure to harness IT value When moving into the implementation and operation phases of a project, there are many questions to consider:  Is a warranty in place?  Is there a security strategy?  Does the desired capacity exist?  Is the support staff prepared?  Are users prepared? Source: Operational readiness, Basic Service Management, 2/01/11 © Glenfis AG – 2012 2
  • 3. Challenge #2: Difficulty meeting regulatory compliance Basel II/III Sarbanes Oxley SOX • Regulations vary by country and are long and complicated PCI-DSS SAS 70 • Recently changed or new IT regulations include: MA-Risk Solvency II Sources: Cost cutting and pricing pressures fastest growing risks to global business in 2011, Ernst & Young, 12/17/10; Regulatory compliance is top concern in 2011, ISACA, 4/19/11 © Glenfis AG – 2012 3
  • 4. Challenge #3: Security concerns 120% 111% • Over 50 million viruses 100% 90% are now in existence 80% • There were almost 60% 52% 20 million new 40% 34% viruses in 2010 alone 20% • In 2011, there were an 0% estimated 2.5 million Data-stealing Web/HTTP Increase in Unwanted e- attacks attacks had malicious mails had malware programs conducted data-stealing websites spam links online code from 2009 to 2010 Sources: 50 million viruses and rising, AV-Test, 1/27/11; G data half-yearly report, January-June 2011; Researchers predict advanced, blended threats focused business and infrastructure in 2011, Security Week News, 11/10/10 © Glenfis AG – 2012 4
  • 5. Challenge #4: Mastering complexity • The inherent complexity of IT departments can veil how service is actually doing • Gartner unearthed that 40% of problems are found by end users • This places the organization at a huge performance risk Sources: How to make the CFO a buyer for sustainability solutions, Forrester, 4/26/11; More software project failure / challenge information from CAI, Galorath, 3/31/10, 33% of money spent on IT development is wasted, IAG, 9/25/09 © Glenfis AG – 2012 5
  • 6. Challenge #5: Adapting to changing expectations The biggest From the challenge faced attitudes and According to …Is changing when implementing behaviors of Bain & something corporate entry-level Company… new, such as cloud culture employees to computing… management Source: The new CIO agenda: Intel cloud computing insights 2011, Intel/Bain & Company, 2011 © Glenfis AG – 2012 6
  • 7. Strategy #1: Become service minded • It is paramount for IT departments to build up a service management system • This delivers value by facilitating outcomes – Costs and risk are kept under better control, according to an IBM study Sources: Boosting European prosperity through the widespread use of ICT, The Information Technology & Innovation Foundation, 10/31/07; Value of smart information technology still unrealized, Information Management, 10/12/11; The new CIO: Change partner and business leader, IBM, May 2007 © Glenfis AG – 2012 7
  • 8. Strategy #2: Engage with all departments • This is crucial for understanding the voice of the customer in order to provide valuable service • Between 70-80% of IT projects fail due to a combination of poor communication and integration across departments, from operations to HR, to the CFO Source: Poor communication to blame for business intelligence failure, Gartner, 1/10/11 © Glenfis AG – 2012 8
  • 9. Strategy #3: Shift from reactive to proactive • The technology curve is getting steeper, especially when it comes to security • Proactive leaders are able to anticipate, understand, coor dinate, and influence security issues, regulatory compliance and customer demand Source: Prepare for mobile security threats, PCWorld, 5/31/07 © Glenfis AG – 2012 9
  • 10. Be proactive in working with business • This includes that full integration with other areas of the company • All data, processes, and services are then better aligned with the business • This, in turn, contributes more meaningfully to the organization’s goals © Glenfis AG – 2012 10
  • 11. Strategy #4: Expand in-house expertise • Companies can better deal with today’s issues by developing in-house capabilities such as: – Enterprise architecture – Service and process management – Building governance – Operational excellence – Lean IT © Glenfis AG – 2012 11
  • 12. Use globally recognized certifications These frameworks are the most effective in training and operations ITIL COBIT ISO 20000 ISO 27000 Source: itSMF 2010 Global Survey, itSMF, 2010 © Glenfis AG – 2012 12
  • 13. Strategy #5: Adapt to flexible learning platforms E-learning is so productive because it is: • Cost-effective • Time-sensitive • Customizable • Easy to update to the latest information Source: Why E-learning is so effective, Rapid E-Learning, 2/2/2010 © Glenfis AG – 2012 13
  • 14. Learning by experience via simulations • Goes beyond classical training and simply obtaining a certificate • Provides true understanding, application in daily work, and a real benefit for the business including service management • Focuses on the soft skills required to create buy-in, deal with resistance, and foster teamwork © Glenfis AG – 2012 14
  • 15. Learning by experience via simulations • Gaming is becoming an important learning instrument in both IT and business contexts • It includes social media and apps as instruments in learning new skills and applying them in the workplace • It can be used for knowledge transfer, team building, developing new skills, and cultivating culture change • Gaming is not playing against others, but with others © Glenfis AG – 2012 15
  • 16. Strategy #6: Find the right partner • The right partner should have the longevity that proves their skill and experience • They should lead by example and “walk the talk” – using the same techniques they teach Sources: Coaching in corporations yields high return on investment, The European Financial Review, 8/4/10; Return on investment for customized training, American Society for Training and Development, 2011; Executive coaching as a transfer of training tool, Gerald Olivero & K. Denise Bane et al, 1997, cited by ECI, September 2004 © Glenfis AG – 2012 16
  • 17. What else to look for… • They have obtained official certifications • High quality and innovative teaching materials and methods are used • Training actively involves participants Source: Why E-learning is so effective, Rapid E-Learning, 2/2/2010 © Glenfis AG – 2012 17
  • 18. Let us help you Glenfis AG ++41 44 202 81 10 www.glenfis.ch © Glenfis AG – 2012 18
  • 19. What do we do and why? • For more than 12 years, we have been providing pragmatic, results-driven IT service management and governance • We use the exact same approaches which we teach our clients around the world – to ensure their own success © Glenfis AG – 2012 19
  • 20. What do we do and why? • How we walk the talk… – Our management system is ISO/IEC 20000-1:2011 certified – All our training and e-learning is officially accredited by APMG, ISACA and Tüv Süd – Our training organization is EDUQUA certified, which includes value performance – Glenfis is an officially licensed Software Assessor, LSA – We train what we are doing – and we do what we are training © Glenfis AG – 2012 20
  • 21. How do we do it? • We form a relevant, service-oriented strategy • It supports smooth IT operations as well as the organization’s goals • This strategy is strengthened by using the most effective frameworks in their entirety © Glenfis AG – 2012 21

Editor's Notes

  1. Malware – Trojan horses, spyware, etc.