Fast Growing Companies Use CIOs Technology Strategy

ss_1.jpg

Organizations that conduct long-range planning of five to 15 years are more likely to outperform organizations that don’t plan ahead, according to Gartner Inc.'s 2015 survey of CEOs and senior business executives. Moreover, over performing companies tend to lean more heavily on CIOs technology understanding during the long-term planning process.
“Long-term strategic planning can lead to benefits,” Steve Prentice, vice president and Gartner Fellow, said in a statement. "More than 50% of organizations that underperformed did not engage in very long-term planning, and those that did looked out on average 16 years. In the case of the outperforming companies, over 80% carried out planning that was very long term, and they looked even further ahead, a mean of 22 years.”
Strategic planning is a collaborative exercise for organizations’ senior management and directors, and a Gartner survey of 400 senior business leaders worldwide, conducted in the fourth quarter of 2014, showed that the CFO is the primary choice of partner by far for the CEO. Overall, almost 40% of respondents named the CFO as either the first, second or third choice of partner for the CEO.
The next most popular choices were the chief strategy officer (27%) and the board of directors (26%). The CIO was named as first, second or third choice by only 17% of respondents, behind chief marketing officer (18%), chief operating officer (20%), chairman (20%) and president/owner (23%).
The CFO is the primary choice for both underperforming and outperforming organizations, Gartner says.
So where Are The Tech Leaders in this Strategic Process?
Over performing organizations tend to increase the contribution of more technical roles, such as CIO, CTO, chief innovation officer, chief risk officer and chief digital officer.
"For CIOs to be seen as key contributors and advisors regarding the changes and disruptions that technology brings, they must seriously assess their position internally," Prentice said. "They should position themselves as informed and objective innovators who understand the disruptive role technology will play in business over the next 10 to 20 years, and who can make an essential contribution to long-term and very long-term planning activities within their organization.”
Info-Management: http://bit.ly/1IIIpol

« Russian Cyber Attack Threat to Global Banking System
Want to be a Hacker? GCHQ wants you! »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

FraudHunt

FraudHunt

FraudHunt protects your website from account fraud, ad fraud, fraud clicks, and malicious bots.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.