How IT Leaders Can Keep a Seat at the Table

In this era of digital disruption, business leaders are turning to technology to keep up.  But, will they continue to turn to traditional IT leaders to map out the future?  This is the question addressed by Mark Schwartz’s new book A Seat at the Table. Mr. Schwartz engagingly analyzes the present and provides guidance for IT leaders to get and keep a “seat at the table”.

In the beginning, we had Waterfall systems development.  CIOs could take orders from business leaders, translate the orders into technology roadmaps, develop milestones and implement systems.  Then the business discovered SaaS and the “Shadow IT” department was born.  The most recent trend is Agile/DevOps, in which business collaborates directly with development and DevOps engineers are tasked with implementing code.  What is the role of IT leadership when business leaders are directing systems development?

Gartner has defined Mode 1 and Mode 2 activities for IT.  Mode 1 is “keeping the lights on” and Mode 2 is managing digital disruption, as I see it.  Mode 1 isn’t just maintaining a static playbook; it requires development and active management.  Mr. Schwartz recounts a project he ran, as CIO, to improve the throughput of an existing application.  He had $20m to do this job, but the exact improvement goals were not defined.  This is a perfect example of Agile/DevOps applied to a technical problem.  The improvements achieved were more than sufficient for the mission.

What about the Mode 2, business disruption type projects?  Mr. Schwartz suggests that the role of IT leadership migrates to influencing rather than controlling.  If Agile/DevOps iterative, collaborative work replaces Waterfall, then the role of “IT managers” is to let the team run with the problem, instead of holding everyone to predetermined milestones.  I agree with this conclusion for many projects.  Others, such as meeting an SEC compliance requirement by a specific day, might still be better implemented using waterfall methods.

Chapter 13 outlines the specific things CIO’s and other IT leaders can do to exercise leadership in the new IT world.  Here are some of his suggestions:

  • Be a driver of business outcomes, not just technology outcomes. This reminds me of CIO Rik Reitmaier’s presentation on how he collaboratively developed a mobile application for taking poolside drink orders at Gaylord.
  • Steward of Assets.  This is the manager of Mode 1 initiatives.  No small challenge, given the years’ of IT investment that falls into this bucket.
  • Contributor. The IT leader of the future has to be more technical to help provide a technology map to business leaders. This is interesting, because 5-10 years ago, many thought that the CIO had to be an MBA and not a hardcore technologist.
  • Influencer and Salesperson. The new CIO will have to influence the approaches used to develop transformative systems. He/she may also need to sell the organization’s technology to outside investors and customers.
  • Enabler.  Where will the platforms and systems to rapidly develop next generation capabilities come from? This will be the role of the CIO.

If you are in technology this book provides guidance on where your role may be going. It is well written and insightful.  My own conclusion is that IT leaders will need to become like the Roman god Janus. One face looking at the past and how to improve it, and one face looking out far into the future…arriving faster than we can appreciate. Looking at the present alone doesn’t work anymore.

Contact us today to learn how we can assist you in any aspect of your IT security program.

Frederick Scholl

Frederick Scholl is an accomplished Global Senior Information Security Risk Manager. Dr. Scholl earned a BS and Ph.D. in Electrical Engineering from Cornell University. In 1991, Fred founded Monarch Information Networks, LLC to enable forward-thinking organizations to protect their information. Previously, he co-founded Codenoll Technology Corporation (NASDAQ: CODN). He chaired the IEEE committee that wrote the first standard for Ethernet communication over fiber optic links, now used world-wide.

Book an Appointment for Cybersecurity Issues

Request an appointment with Dr. Fred Scholl. We will discuss any cybersecurity issues you have.

More Good Reading

Cybersecurity Thrives in An Organizational Context

The First National Cybersecurity Summit

New Privacy Laws Require Security Professionals Up Their Game

Cybersecurity Workforce Development: Real or Imagined Problem?

Antidote for Fake Everything

Information Security Risks, Gray Rhinos and Black Swans

Managing Information Security On a Limited Budget

Building a Security Start-Up

Cybersecurity Risk Management for Directors

My Reading List for Security Start-Ups

Should Your CIO Learn to Code?

How IT Leaders Can Keep a Seat at the Table

Equifax points out—again—the need for speed in security management

Anatomy of a Security Breach

The Smartest Information Security Companies

Book Review: Play Bigger

Long Term Beneficiaries of WannaCry

RISK: A NEW MOVIE ABOUT JULIAN ASSANGE

TRADE SECRET THEFT CONTINUES UNABATED

TENNESSEE LEGISLATORS MUDDY WATERS AROUND PRIVACY BREACH NOTIFICATION REQUIREMENTS

LEADERSHIP CHECKLIST FOR SECURITY PROFESSIONALS

SIEM VENDORS HAVE IT ALL BACKWARDS

THE SECRET TO GROWING YOUR SECURITY STARTUP

CLOUD JOBS PEAKING?

The Spy Who Couldn’t Spell

IS THERE A CYBERSECURITY PROFESSIONALS SHORTAGE?

No Blue Pill for Cybersecurity Failures

Presidential Cybersecurity Commission Makes Some Good Suggestions

Understanding Intelligence

Align Your Security Program With the Business

Don’t fall victim to BEC

Enterprise Risk Management and Information Security

Evidence Based Risk Assessment: Lessons Learned from the Y-12 Breach

First Conviction for Illegally Distributing Android Apps

Locking Up the Ivory Tower

Cloud Vulnerabilities

More Security Lessons Learned from the Y-12 Breach

Security or Compliance?

Home Disaster Recovery Planning

Cloud Computing: Trust but Verify

Background Checks May Not Be Enough

PERFECT SECURITY STORM FOR LAW FIRMS?

How Not To Be a Cyber Janitor

SECURITY MEMO: IT CAN’T HAPPEN HERE, CAN IT?

Don’t Forget Cloud Availability

Compliance v. Security

GAO Report on Information Security in Federal Government

Lean Security

Mitigate Your Social Engineering Vulnerabilities

HIPAA Security. Are We Making Progress?

Brand Your Security Program

PDCA is Dead

LEARNING FROM PAST MISTAKES

How Better Security Can Create Shared Value

C’est La Vie, You Never Can Tell: Lessons Learned from the HBGary Hack

DDOS Tutorial

The future of information technology

Data Governance Anyone?

Learning from the oil spill disaster

Down the Rabbit-Hole…Again?

Ideas on Risk Management