Fast Growing Companies Use CIOs Technology Strategy

ss_1.jpg

Organizations that conduct long-range planning of five to 15 years are more likely to outperform organizations that don’t plan ahead, according to Gartner Inc.'s 2015 survey of CEOs and senior business executives. Moreover, over performing companies tend to lean more heavily on CIOs technology understanding during the long-term planning process.
“Long-term strategic planning can lead to benefits,” Steve Prentice, vice president and Gartner Fellow, said in a statement. "More than 50% of organizations that underperformed did not engage in very long-term planning, and those that did looked out on average 16 years. In the case of the outperforming companies, over 80% carried out planning that was very long term, and they looked even further ahead, a mean of 22 years.”
Strategic planning is a collaborative exercise for organizations’ senior management and directors, and a Gartner survey of 400 senior business leaders worldwide, conducted in the fourth quarter of 2014, showed that the CFO is the primary choice of partner by far for the CEO. Overall, almost 40% of respondents named the CFO as either the first, second or third choice of partner for the CEO.
The next most popular choices were the chief strategy officer (27%) and the board of directors (26%). The CIO was named as first, second or third choice by only 17% of respondents, behind chief marketing officer (18%), chief operating officer (20%), chairman (20%) and president/owner (23%).
The CFO is the primary choice for both underperforming and outperforming organizations, Gartner says.
So where Are The Tech Leaders in this Strategic Process?
Over performing organizations tend to increase the contribution of more technical roles, such as CIO, CTO, chief innovation officer, chief risk officer and chief digital officer.
"For CIOs to be seen as key contributors and advisors regarding the changes and disruptions that technology brings, they must seriously assess their position internally," Prentice said. "They should position themselves as informed and objective innovators who understand the disruptive role technology will play in business over the next 10 to 20 years, and who can make an essential contribution to long-term and very long-term planning activities within their organization.”
Info-Management: http://bit.ly/1IIIpol

« Russian Cyber Attack Threat to Global Banking System
Want to be a Hacker? GCHQ wants you! »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

TrustGrid

TrustGrid

Trustgrid is a pioneer and leader in secure, cloud-native software-defined connectivity.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Titan Labs

Titan Labs

Titan Labs is a Cyber Security Consultancy that provides advice and technical expertise to government, international finance and telecommunications providers.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Cybalt

Cybalt

Cybalt is a security services company that provides end-to-end security solutions to help clients achieve their business goals.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.