3 min read

What tops the list of concerns for CIO’s in 2015

Securitysecurity
Analytics, cyber security and more BYOD headaches will be top concerns of chief information officers in various organizations for 2015 and beyond according to experts.

“By 2017, 80 per cent of the CIO’s time will be focused on analytics, cyber security and creating new revenue streams through digital services,” according to a report from IDC. The analyst firm recently laid out if outlook for in its  IDC FutureScape: Worldwide CIO Agenda 2015 Predictions Web Conference.

Meanwhile Citrix Canada predicted that the bring-your-own-device trend will continue to change the way people work and that the number of employee-owned devices being brought into the corporate network will increase further in 2015 and beyond.

“Companies will be expected to start addressing a wider range of needs for more smart phones and tablets,” a report from Citirx Canada said. “Global mobile devices and connections are expected to reach 10.2 billion by 2018, so emphasis will shift towards serving mobile users in diverse environments.”

As remote clouds increase, the use of hybrid cloud computing will becomes necessary to deal with offsite connections. Multiple mobile devices will be expected to access a company’s cloud from anywhere, any time.

“2015, will be the year companies will “begin accepting that they cannot 100 per cent block all security attacks,” the company said. According to Citirx, the emphasis will begin to shift towards risk assessment rather than the “outdated perception” of creating an impenetrable wall around the corporate network.

Industry clouds will disrupt legacy risk operations and contribute to a 10 per cent reduction in Know Your Customer (KYC) and other compliance costs by 2016, according to IDC.

Risk data aggregation, analytics and reporting will consume 75 per cent of the chief risk officer’s agenda in 2015, according to IDC’s Financial Insights Risk FutureScape. Led in part by big data solutions, fraud and financial crimes analytics will set global financial institutions back US$2.8 billion for software and services by 2016.

Other CIO predictions include:

  • By 2016, 65 per cent  of global competitive strategies will require real-time 3rd Platform IT-as-a–Service (ITaaS).
  • By 2016, security will be a top 3 business priority for 70 per cent  of CEOs of global enterprises.
  • By 2015, 60 per cent  of CIOs will use DevOps as their primary tool to address the speed and sprawl of mobile, cloud, and open source applications.
  • By 2016, 80%per cent of CIOs will deliver a new architectural framework that enables innovation and improved business decision making.
  • By 2020, 60 per cent  of CIOs in global organizations will be supplanted by the Chief Digital Officer (CDO) for the delivery of IT-enabled products and digital services.
  • By 2016, 80 per cent  of CIOs will accelerate 3rd Platform migration to counter premature obsolescence of current IT assets.
  • By 2018, 30per cent of CIOs of global organizations will have rolled out a pan-enterprise data and analytics strategy.
  • By 2017, 35 per cent of vendor sourcing relationships around 3rd Platform technologies will fail, causing CIOs to roll out new sourcing processes.
  • By 2018, 50 per cent  of CIOs will relinquish IT’s traditional mode of technology control in favor of an open standards-based framework.

“The transformations brought about by the 3rd platform are having significant effects on how the business uses IT, how IT is delivered, and how the IT organization is structured,” said Mike Rosen, adjunct research advisor with IDC’s research network. “Insightful CIOs will seize the opportunity to be key players in this transformation and elevate their role in the enterprise.”

1 Comment

  1. Cybersecurity attacks have been evolving lately at a rapid rate. It’s time that CIO’s start working on ensuring safety of systems which are prone to attacks and conducts
    regular security maintenance. I work with mcgladrey and this piece about board’s role may interest readers of this post. bit.ly/mcgldryinfosec2

Leave a Reply

Your email address will not be published. Required fields are marked *

Post comment