Fast Growing Companies Use CIOs Technology Strategy

ss_1.jpg

Organizations that conduct long-range planning of five to 15 years are more likely to outperform organizations that don’t plan ahead, according to Gartner Inc.'s 2015 survey of CEOs and senior business executives. Moreover, over performing companies tend to lean more heavily on CIOs technology understanding during the long-term planning process.
“Long-term strategic planning can lead to benefits,” Steve Prentice, vice president and Gartner Fellow, said in a statement. "More than 50% of organizations that underperformed did not engage in very long-term planning, and those that did looked out on average 16 years. In the case of the outperforming companies, over 80% carried out planning that was very long term, and they looked even further ahead, a mean of 22 years.”
Strategic planning is a collaborative exercise for organizations’ senior management and directors, and a Gartner survey of 400 senior business leaders worldwide, conducted in the fourth quarter of 2014, showed that the CFO is the primary choice of partner by far for the CEO. Overall, almost 40% of respondents named the CFO as either the first, second or third choice of partner for the CEO.
The next most popular choices were the chief strategy officer (27%) and the board of directors (26%). The CIO was named as first, second or third choice by only 17% of respondents, behind chief marketing officer (18%), chief operating officer (20%), chairman (20%) and president/owner (23%).
The CFO is the primary choice for both underperforming and outperforming organizations, Gartner says.
So where Are The Tech Leaders in this Strategic Process?
Over performing organizations tend to increase the contribution of more technical roles, such as CIO, CTO, chief innovation officer, chief risk officer and chief digital officer.
"For CIOs to be seen as key contributors and advisors regarding the changes and disruptions that technology brings, they must seriously assess their position internally," Prentice said. "They should position themselves as informed and objective innovators who understand the disruptive role technology will play in business over the next 10 to 20 years, and who can make an essential contribution to long-term and very long-term planning activities within their organization.”
Info-Management: http://bit.ly/1IIIpol

« Russian Cyber Attack Threat to Global Banking System
Want to be a Hacker? GCHQ wants you! »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

Cybeats Technologies

Cybeats Technologies

Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

BlackScore

BlackScore

BlackScore is a technology company seeking to disrupt risk assessment using AI-driven technology.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

CITRA - Information Security and Emergency Response

CITRA - Information Security and Emergency Response

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Binalyze

Binalyze

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software helps you to collaborate and complete incident response investigations quickly.

AFRY

AFRY

AFRY is a world leading engineering company, trusted as a supplier of services and solutions within the industry, energy, and infrastructure sectors as well as for authorities.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.