The Self-Fulfilling Prophecy Of Intelligent Automation

Today’s need for automation is real and is not going away. It is undeniable that the intelligent automation market is going through a rapid democratisation process and societies we live in are somehow more inclined to coexist with virtual cognitive workers. The end-goal of automation is no longer perceived as a Kafkaesque nightmare of unpredictable and uncompromising robots.

By Ralph Aboujaoude Diaz.

From automation that just “execute” (data centre automation to robotic process automation) to automation that “think” and “learn” (autonomics, cognitive computing and ultimately the holy grail of true artificial intelligence), the intelligent process automation market is growing at fast pace and in an orchestrated manner. This market is now projected to exceed $US40 billion by the year 2020. 

Three major indicators are, slowly but surely, reinforcing the belief that intelligent automation will be part of our future:

  • Near-confirmation of expectations due to increased knowledge and education of stakeholders (positively or negatively affecting the intention to use intelligent automation).
  • Substantial increase in adoption (driven by more industrialised, content-based and cost-effective deployment).
  • Perceived immediate and future usefulness (based on more compelling use cases, success stories and market trends).

The next-generation business ecosystem is naturally emerging due to a societal and technological shift towards more acceptance and usage of automation. The constant quest for more intelligent automation will be a promising and rewarding journey but without any doubt a tumultuous a complicated one…

Getting the right intelligent automation strategy supported by appropriate technologies will need proper thinking and planning. Will intelligent automation just serve specific purposes and contexts (running processes that require extensive “swivel-chair” access to multiple existing systems or increasing cognitive capabilities in targeted sub-processes) or will it be used to holistically and gradually transform the workforce environment across the organisation?

Building commitment from senior leadership towards large scale adoption of intelligent automation will be a long journey. Let’s be realistic here, there is still a long way before knowledge-based virtual workers can accurately start to gather unstructured data without pattern, process rules based on dynamic languages and ultimately make complex judgements. 

There is no doubt that in order to be successful and widely adopted, the intelligent automation journey should be considered as a strategic initiative. But how to convince and get the buy-in when benefit realisation plans are difficult to determine because too many variables are involved and unknown?

Overcoming cultural resistance to automation and managing the change will require planning, discipline, and effective communication. Don’t underestimate the business technophobia and operational fatigue that has been built up during the long and tedious IT and Business transformation years. Some form of IT literacy and skills will be required in order to assimilate and embed intelligent automation.

From an IT perspective, will IT functions feel that intelligent automation is another burdensome project that will stretch resources and create additional maintenance and support activities? 

In addition to key drivers such as end-to-end process optimisation, real-time data-driven insights or risk and compliance intelligence, cost reduction will remain the primary driver for investing in intelligent automation. It is evident for example that the targeted adoption of RPA will bring tangible cost reduction but how advanced intelligent automation as a whole will actually create business value and boost agility?

There will be non-negligible security concerns regarding the risk of the entire intelligent automation environment being vulnerable to internal or external data breaches and potential data manipulation. Now that intelligent automation is actually increasing the level of digitisation and networking, how to ensure that the intelligent automation environment is reliable, secured and cannot be tampered by intentional fraudulent cyber activities (accessing the robot controller to re-calibrate processing logic and sequences, altering master data or extracting data logs, etc.)

Significant co-investment between organisations and service providers for defining and aligning intelligent automation strategies will be the norm. Money will be spent on preparing business cases, running proof of concepts, determining how to scale up the pilot and defining target operating models. Offering large discounts, putting fees at risk and defining value-based revenue will be common practices. But one thing is sure is that intelligent automation tool providers will be the big winners!

There is no doubt that established service providers (the likes of IBM, Accenture, Cognizant, TCS, Wipro, etc.) have built extensive intelligent automation capabilities via accelerated development of proprietary technology (Watson, Holmes, Trizetto, ignio, etc.) or strategic alliances with mature off-the-shelf technology vendors (IPSoft, SyntBots, etc.). In addition to that, an HfS survey has revealed that almost half of organisations (buyers) want to roll out intelligent automation with their existing service providers. 

The unanswered question of resource reallocation mechanisms needs to be addressed in a holistic and procedural manner. Training future employees and re-training current ones will be a significant challenge. But how will the resource reallocation process will actually be executed and who will pay for it? Will it be easy to reallocate a resource to another existing function/ process by “augmenting” skills? Or convert an accounting data entry/ reconciliation person into a virtual agent calibrator or a data insight curator?

IDM:     Ralph Aboujaoude Diaz is Senior Manager, Risk Transformation Services, EY UK.

 

« How Easy Would It Be To Hack Your Business?
The Dilemma Of Predictive Policing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.