The Self-Fulfilling Prophecy Of Intelligent Automation

Today’s need for automation is real and is not going away. It is undeniable that the intelligent automation market is going through a rapid democratisation process and societies we live in are somehow more inclined to coexist with virtual cognitive workers. The end-goal of automation is no longer perceived as a Kafkaesque nightmare of unpredictable and uncompromising robots.

By Ralph Aboujaoude Diaz.

From automation that just “execute” (data centre automation to robotic process automation) to automation that “think” and “learn” (autonomics, cognitive computing and ultimately the holy grail of true artificial intelligence), the intelligent process automation market is growing at fast pace and in an orchestrated manner. This market is now projected to exceed $US40 billion by the year 2020. 

Three major indicators are, slowly but surely, reinforcing the belief that intelligent automation will be part of our future:

  • Near-confirmation of expectations due to increased knowledge and education of stakeholders (positively or negatively affecting the intention to use intelligent automation).
  • Substantial increase in adoption (driven by more industrialised, content-based and cost-effective deployment).
  • Perceived immediate and future usefulness (based on more compelling use cases, success stories and market trends).

The next-generation business ecosystem is naturally emerging due to a societal and technological shift towards more acceptance and usage of automation. The constant quest for more intelligent automation will be a promising and rewarding journey but without any doubt a tumultuous a complicated one…

Getting the right intelligent automation strategy supported by appropriate technologies will need proper thinking and planning. Will intelligent automation just serve specific purposes and contexts (running processes that require extensive “swivel-chair” access to multiple existing systems or increasing cognitive capabilities in targeted sub-processes) or will it be used to holistically and gradually transform the workforce environment across the organisation?

Building commitment from senior leadership towards large scale adoption of intelligent automation will be a long journey. Let’s be realistic here, there is still a long way before knowledge-based virtual workers can accurately start to gather unstructured data without pattern, process rules based on dynamic languages and ultimately make complex judgements. 

There is no doubt that in order to be successful and widely adopted, the intelligent automation journey should be considered as a strategic initiative. But how to convince and get the buy-in when benefit realisation plans are difficult to determine because too many variables are involved and unknown?

Overcoming cultural resistance to automation and managing the change will require planning, discipline, and effective communication. Don’t underestimate the business technophobia and operational fatigue that has been built up during the long and tedious IT and Business transformation years. Some form of IT literacy and skills will be required in order to assimilate and embed intelligent automation.

From an IT perspective, will IT functions feel that intelligent automation is another burdensome project that will stretch resources and create additional maintenance and support activities? 

In addition to key drivers such as end-to-end process optimisation, real-time data-driven insights or risk and compliance intelligence, cost reduction will remain the primary driver for investing in intelligent automation. It is evident for example that the targeted adoption of RPA will bring tangible cost reduction but how advanced intelligent automation as a whole will actually create business value and boost agility?

There will be non-negligible security concerns regarding the risk of the entire intelligent automation environment being vulnerable to internal or external data breaches and potential data manipulation. Now that intelligent automation is actually increasing the level of digitisation and networking, how to ensure that the intelligent automation environment is reliable, secured and cannot be tampered by intentional fraudulent cyber activities (accessing the robot controller to re-calibrate processing logic and sequences, altering master data or extracting data logs, etc.)

Significant co-investment between organisations and service providers for defining and aligning intelligent automation strategies will be the norm. Money will be spent on preparing business cases, running proof of concepts, determining how to scale up the pilot and defining target operating models. Offering large discounts, putting fees at risk and defining value-based revenue will be common practices. But one thing is sure is that intelligent automation tool providers will be the big winners!

There is no doubt that established service providers (the likes of IBM, Accenture, Cognizant, TCS, Wipro, etc.) have built extensive intelligent automation capabilities via accelerated development of proprietary technology (Watson, Holmes, Trizetto, ignio, etc.) or strategic alliances with mature off-the-shelf technology vendors (IPSoft, SyntBots, etc.). In addition to that, an HfS survey has revealed that almost half of organisations (buyers) want to roll out intelligent automation with their existing service providers. 

The unanswered question of resource reallocation mechanisms needs to be addressed in a holistic and procedural manner. Training future employees and re-training current ones will be a significant challenge. But how will the resource reallocation process will actually be executed and who will pay for it? Will it be easy to reallocate a resource to another existing function/ process by “augmenting” skills? Or convert an accounting data entry/ reconciliation person into a virtual agent calibrator or a data insight curator?

IDM:     Ralph Aboujaoude Diaz is Senior Manager, Risk Transformation Services, EY UK.

 

« How Easy Would It Be To Hack Your Business?
The Dilemma Of Predictive Policing »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

Adsigo

Adsigo

Adsigo AG is your reliable and professional partner for all topics concerning PCI certification, compliance and information security.