|By PR Newswire||
|February 21, 2013 09:02 AM EST||
MENLO PARK, Calif., Feb. 21, 2013 /PRNewswire/ -- IT professionals will be expected to handle a growing list of functions with only average competency levels, according to a new survey about IT risk factors for 2013 published by global consulting firm Protiviti (www.protiviti.com). The 2013 IT Priorities Survey (www.protiviti.com/ITsurvey), designed to help IT departments classify areas in need of attention in order to better execute the function's strategic mandate, found that IT executives are struggling to manage the wide variety of technology risk, regulatory compliance and performance challenges that now face them.
When asked to assess their competency in key areas of IT technical knowledge on a scale of one to five, with one being the lowest and five being the highest, nearly 200 CIOs, chief technology officers, chief security officers, and IT vice presidents/directors reported a 2.8 average rank for social media security, social media integration, mobile commerce security, mobile commerce integration, and mobile commerce policy.
"The continued rapid global expansion of the smart phone and mobile applications marketplace reflects the strong demand from business leaders and consumers for access to information anytime and anywhere, which presents exciting opportunities for delivering value. However, it also creates greater technology risk potential," said Kurt Underwood, a managing director with Protiviti and leader of the firm's global IT consulting unit. "The result is significant pressure on IT departments and business leaders as they are asked to deliver more mobile technology-enabled services. This pressure forces them to take on considerably more risk than they're prepared for – especially in terms of policy, integration, data management, security and data privacy related to mobile commerce and social media proliferation and innovation."
Among 21 areas of technical knowledge, survey respondents identified social media security and mobile commerce security as the areas needing most improvement. CIOs and their staffs indicated that they intended to strengthen their cyber security capabilities in order to tackle the growing threat of breaches ‑ and potential incident response procedures ‑ as well as ensuring their compliance with the increasing number of state and federal information security requirements.
Executive-level respondents also rated mobile commerce security, policy and integration among their top five priorities in the new survey's technical knowledge section, which contrasts strongly with the 2011 survey in which none of these areas made the top of the list. Interestingly, challenges related to virtualization and cloud computing receded in the rankings compared to 2011, suggesting IT departments have a higher level of confidence in managing these areas.
Additional Survey Highlights
Survey results also highlighted the following findings related to IT processes and capabilities:
- Managing and classifying enterprise data is the number one security and privacy area in need of improvement, and remains a major challenge for IT departments.
- The IT function's top priorities are related to strategy and organization, reflecting a need to enhance the clarity and precision with which IT performance is measured, monitored and reported internally and externally, as needed to customers.
- In terms of IT infrastructure, platform performance planning and storage management and planning are listed as top concerns, with respondents ranking their competency level in these categories at 2.8 on a scale of one to five.
- Three primary priorities in the "ensuring continuity" category are developing and maintaining business resumption plans; developing and maintaining IT disaster and recovery plans; and developing and maintaining crisis management plans.
In the survey's "managing IT assets" category, monitoring and accounting for IT assets are listed as the top two areas that require improvement. According to Tom Andreesen, a managing director in Protiviti's enterprise application practice, "This concern about IT assets is driven by an increasing volume of small computing devices coupled with their mobility ‑ factors that make verification of location, condition and value difficult, especially if they are off-air or dark assets."
About the Survey
Protiviti's 2013 IT Priorities Survey was fielded during the third and fourth quarters of 2012, and respondents answered more than 100 questions in three categories: Technical Knowledge, Process Capabilities and Organizational Capabilities. More than half of the participants work in publicly traded companies and represent virtually all industry sectors, with others working across a variety of private, government and not-for-profit organizations. This edition of Protiviti's 2013 IT Priorities Survey is available for complimentary download at www.protiviti.com/ITsurvey.
Webinar Today and Podcast
Protiviti is conducting a complimentary webinar today at 11:00 a.m. PST. Andreesen and Cal Slemp, a Protiviti managing director and leader of the firm's data security and privacy practice, along with Michael Leidinger, VP infrastructure, operations, and security, from Hilton Worldwide, will explore the survey's findings and implications. Please register for the webinar at www.protiviti.com/webinars.
Additionally, Andreesen discusses highlights from the survey in a podcast, available on the Protiviti website at www.protiviti.com/podcasts.
Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit. Through its network of more than 70 offices in over 20 countries, Protiviti has served more than 35 percent of FORTUNE® 1000 and Global 500 companies. The firm also works with smaller, growing companies, including those looking to go public, as well as with government agencies.
Protiviti is a wholly owned subsidiary of Robert Half International (NYSE: RHI). Founded in 1948, Robert Half International is a member of the S&P 500 index.
Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on financial statements or offer attestation services.
Editor's note: Photos and infographic available upon request. A video featuring Protiviti IT subject-matter experts discussing IT priorities is available at: http://www.youtube.com/watch?v=6CH4DMi9Zds&feature=player_detailpage
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists will address the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affec...
May. 23, 2015 11:45 AM EDT Reads: 1,042
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
May. 23, 2015 11:30 AM EDT Reads: 2,281
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enter...
May. 23, 2015 11:15 AM EDT Reads: 1,549
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session a...
May. 23, 2015 11:00 AM EDT Reads: 3,703
SYS-CON Events announced today that EnterpriseDB (EDB), the leading worldwide provider of enterprise-class Postgres products and database compatibility solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. EDB is the largest provider of Postgres software and services that provides enterprise-class performance and scalability and the open source freedom to divert budget from more costly traditiona...
May. 23, 2015 11:00 AM EDT Reads: 1,349
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
May. 23, 2015 11:00 AM EDT Reads: 640
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
May. 23, 2015 11:00 AM EDT Reads: 5,366
Organizations today are confounded by an avalanche of data that needs to be processed and managed on a daily basis. Through relevant use cases and a thought-provoking dialogue on an organization’s ‘Data to Decisions’ journey, Andrew Clyne, Chief Data Officer at CenturyLink Cognilytics, will reveal in his session at Big Data Expo how your organization can monetize data as a strategic asset. State-of-the-art Big Data and Advanced Analytics capabilities provided as a managed service can enable da...
May. 23, 2015 10:45 AM EDT Reads: 1,495
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
May. 23, 2015 10:30 AM EDT Reads: 2,610
We are all here because we are sold on the transformative promise of The Cloud. But what good is all of this ephemeral, on-demand infrastructure if your usage doesn't actually improve the agility and speed of your business? How must Operations adapt in order to avoid stifling your Cloud initiative? In his session at DevOps Summit, Damon Edwards, co-founder and managing partner of the DTO Solutions, will highlight the successful organizational, process, and tooling patterns of high-performing c...
May. 23, 2015 10:00 AM EDT Reads: 5,234
SYS-CON Events announced today that the "First Containers & Microservices Conference" will take place June 9-11, 2015, at the Javits Center in New York City. The “Second Containers & Microservices Conference” will take place November 3-5, 2015, at Santa Clara Convention Center, Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
May. 23, 2015 10:00 AM EDT Reads: 1,747
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
May. 23, 2015 10:00 AM EDT Reads: 902
With worldwide spending on cloud services and infrastructure growing by 23% in 2015 to $118B, it is clear that cloud services are here to stay. Yet, the rate of cloud adoption varies by companies and markets around the world. With thousands of outages and hijacks across the Internet every day, one reason for hesitation is the faith in quality Internet performance. In his session at 16th Cloud Expo, Michael Kane, Senior Manager at Dyn, will explore how Internet performance affects your end-user...
May. 23, 2015 10:00 AM EDT Reads: 1,269
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud en...
May. 23, 2015 10:00 AM EDT Reads: 1,640
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between confe...
May. 23, 2015 10:00 AM EDT Reads: 2,853