Fast Growing Companies Use CIOs Technology Strategy

ss_1.jpg

Organizations that conduct long-range planning of five to 15 years are more likely to outperform organizations that don’t plan ahead, according to Gartner Inc.'s 2015 survey of CEOs and senior business executives. Moreover, over performing companies tend to lean more heavily on CIOs technology understanding during the long-term planning process.
“Long-term strategic planning can lead to benefits,” Steve Prentice, vice president and Gartner Fellow, said in a statement. "More than 50% of organizations that underperformed did not engage in very long-term planning, and those that did looked out on average 16 years. In the case of the outperforming companies, over 80% carried out planning that was very long term, and they looked even further ahead, a mean of 22 years.”
Strategic planning is a collaborative exercise for organizations’ senior management and directors, and a Gartner survey of 400 senior business leaders worldwide, conducted in the fourth quarter of 2014, showed that the CFO is the primary choice of partner by far for the CEO. Overall, almost 40% of respondents named the CFO as either the first, second or third choice of partner for the CEO.
The next most popular choices were the chief strategy officer (27%) and the board of directors (26%). The CIO was named as first, second or third choice by only 17% of respondents, behind chief marketing officer (18%), chief operating officer (20%), chairman (20%) and president/owner (23%).
The CFO is the primary choice for both underperforming and outperforming organizations, Gartner says.
So where Are The Tech Leaders in this Strategic Process?
Over performing organizations tend to increase the contribution of more technical roles, such as CIO, CTO, chief innovation officer, chief risk officer and chief digital officer.
"For CIOs to be seen as key contributors and advisors regarding the changes and disruptions that technology brings, they must seriously assess their position internally," Prentice said. "They should position themselves as informed and objective innovators who understand the disruptive role technology will play in business over the next 10 to 20 years, and who can make an essential contribution to long-term and very long-term planning activities within their organization.”
Info-Management: http://bit.ly/1IIIpol

« Russian Cyber Attack Threat to Global Banking System
Want to be a Hacker? GCHQ wants you! »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Monegasque Digital Security Agency (AMSN) - Monaco

Monegasque Digital Security Agency (AMSN) - Monaco

AMSN is the national authority in charge of the security of information systems in Monaco.

Department of Justice & Equality - Cybercrime Division - Ireland

Department of Justice & Equality - Cybercrime Division - Ireland

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

Fortreum

Fortreum

Fortreum aim to simplify cybersecurity in the marketplace to accelerate your business outcomes.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.

Secure Domains

Secure Domains

Secure Domains is the first company in the GCC to offer cloud-based DNS firewall services and security through its flagship SaaS product, DNS Armor.

Invary

Invary

Invary's expert Runtime Integrity solution, powered by NSA-licensed technology, verifies the security and confidentiality of your system.