CEOs Seek Out CIOs With A 'Bias For Action'

CIOs bracing for the harsh winds of change inherent in business transformations are asking what CEOs want from today's IT leaders.  A strong cultural fit for CIO’s is very important.

They need the ability to communicate with senior management, and the Board.

CEOs are also looking for CIOs who can anticipate and hedge against emerging cybersecurity and competitive threats, according to executive recruiters from Korn/Ferry International.

"The ability to look around the corner... that part of the job has become more important than ever," said Korn/Ferry Senior Client Partner Bob Concannon, during an open discussion at the Forbes CIO Summit in Half Moon Bay, California recently.

Concannon called this capability "bias for action," the critical knack for knowing when to seize on new ideas and execute on them rapidly. But he acknowledged that this requires CIOs to be constantly on their toes because the evolution of technology is such that there is "no end point."

Social, mobile, analytics and cloud (SMAC) technologies are underpinning today’s transformations. Cloud software is freeing up IT staffs from the chores of managing IT infrastructure to identify and manage cloud services, and then manage the vast quantities of data generated by SMAC tools. CIOs have evolved from data center and back-office custodians to change management agents and cloud brokers. Future technologies could include augmented and virtual reality, blockchain, and other emerging tools, according to Deloitte research.

Such constant change requires CIOs to think more like CEOs, something many CIOs may struggle to do because they rely on data before making critical decisions, said Mark Polanksy, Korn/Ferry senior client partner, during the discussion. "A CEO will make decision faster because they have the experience to trust gut," Polanksy says. "It’s hard [for the CIO] because you have to go against the grain a little bit and that takes courage -- the ability to get outside your comfort zone and do things a little bit differently than you did them yesterday. And slowly but surely you make that transition."

CIOs who can channel their inner CEO by reassessing their business, adjusting their strategy and executing earns the coveted "transformational CIO" moniker, and typically earn 25 percent to 35 percent more money than more purely tech-focused CIOs.

Even so, Polanksy acknowledged that every CIO can't or doesn't want to be viewed as transformational. The CIO role is split into two camps: those that are business savvy and those that are not, or those that are part of the business and those that are not.

Forbes Insight research released at the event bears this point out. Forty-four percent of 305 IT and business executives surveyed are “servicers" providing digital capabilities requested from other business units or “plumbers” running the traditional tasks of IT. Only 13 percent of said that their CIOs are "transformers" serving as full partners to the business in digital transformations. Another 44 percent are "advocates," piloting or exploring digital projects.

It was clear at the Forbes event that most of the 100 CIOs in attendance viewed themselves in the transformational camp. Federal Communications Commission CIO David Bray, who has introduced more than 200 cloud and other IT systems at the agency since 2013, said that he had to balance upgrading antiquated IT systems that consume more than 85 percent of his budget, with an aging workforce that he's had to train up to support the new tools. He also endowed certain employees with the ability to drive change, providing goals and boundaries.

"The CIO role is changing in that we are seen as needing to be creative problem-solvers for whether it’s a business or a nonprofit organization, of which technology is a tool," Bray says. "It's about how you have that conversation with your leadership about the problems that they want to solve and how you will help get to that answer.”

What does the future hold for the CIO?

With technology accelerating and transforming businesses at an unprecedented rate, what CEOs want from their CIO in the future will become an open-ended question. What’s next for CIOs who successfully transforms their business? Each year, dozens of CIOs who complete their work at one company move on to higher-profile CIO roles with larger budgets and greater responsibilities. Others, such as former ADP CIO Mike Capone and, most recently, Crocs CIO Stephen Katsirubas, are becoming COOs.

If Salesforce.com Marc Benioff is right, many CIOs who lead transformations will eventually land CEO roles because they have been exposed to every facet of their business, and the board trusts them. Some CIOs may warm to that idea, while other, more traditional technologists will shudder at the notion of tackling more responsibility.

Target CIO Mike McNamara said that the CIO role may well collapse back into the CTO role from whence it evolved decades ago. CIOs have spent the last several years weaving IT throughout digital products and business processes, and educating senior managers on the role technology plays in the business. But as the digital transformations become complete, it begs the question: What becomes of the CIO?

“I think [the CIO role] transforms back into a CTO-type role,” said McNamara, who spoke to CIO.com at the Forbes event. “You’re focused on architecture, you’re focused on engineering capability and it’s less about being the translator because the native language is in the business.”

CIO: http://bit.ly/1qjrWAL

« Thought Experiment: Predicting Cyber War
Russian Cyber War Training Can Be A Killer »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

eCosCentric

eCosCentric

eCosCentric provides software development solutions for the IoT, M2M & embedded systems market.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Cybalt

Cybalt

Cybalt is a security services company that provides end-to-end security solutions to help clients achieve their business goals.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.