The Self-Fulfilling Prophecy Of Intelligent Automation

Today’s need for automation is real and is not going away. It is undeniable that the intelligent automation market is going through a rapid democratisation process and societies we live in are somehow more inclined to coexist with virtual cognitive workers. The end-goal of automation is no longer perceived as a Kafkaesque nightmare of unpredictable and uncompromising robots.

By Ralph Aboujaoude Diaz.

From automation that just “execute” (data centre automation to robotic process automation) to automation that “think” and “learn” (autonomics, cognitive computing and ultimately the holy grail of true artificial intelligence), the intelligent process automation market is growing at fast pace and in an orchestrated manner. This market is now projected to exceed $US40 billion by the year 2020. 

Three major indicators are, slowly but surely, reinforcing the belief that intelligent automation will be part of our future:

  • Near-confirmation of expectations due to increased knowledge and education of stakeholders (positively or negatively affecting the intention to use intelligent automation).
  • Substantial increase in adoption (driven by more industrialised, content-based and cost-effective deployment).
  • Perceived immediate and future usefulness (based on more compelling use cases, success stories and market trends).

The next-generation business ecosystem is naturally emerging due to a societal and technological shift towards more acceptance and usage of automation. The constant quest for more intelligent automation will be a promising and rewarding journey but without any doubt a tumultuous a complicated one…

Getting the right intelligent automation strategy supported by appropriate technologies will need proper thinking and planning. Will intelligent automation just serve specific purposes and contexts (running processes that require extensive “swivel-chair” access to multiple existing systems or increasing cognitive capabilities in targeted sub-processes) or will it be used to holistically and gradually transform the workforce environment across the organisation?

Building commitment from senior leadership towards large scale adoption of intelligent automation will be a long journey. Let’s be realistic here, there is still a long way before knowledge-based virtual workers can accurately start to gather unstructured data without pattern, process rules based on dynamic languages and ultimately make complex judgements. 

There is no doubt that in order to be successful and widely adopted, the intelligent automation journey should be considered as a strategic initiative. But how to convince and get the buy-in when benefit realisation plans are difficult to determine because too many variables are involved and unknown?

Overcoming cultural resistance to automation and managing the change will require planning, discipline, and effective communication. Don’t underestimate the business technophobia and operational fatigue that has been built up during the long and tedious IT and Business transformation years. Some form of IT literacy and skills will be required in order to assimilate and embed intelligent automation.

From an IT perspective, will IT functions feel that intelligent automation is another burdensome project that will stretch resources and create additional maintenance and support activities? 

In addition to key drivers such as end-to-end process optimisation, real-time data-driven insights or risk and compliance intelligence, cost reduction will remain the primary driver for investing in intelligent automation. It is evident for example that the targeted adoption of RPA will bring tangible cost reduction but how advanced intelligent automation as a whole will actually create business value and boost agility?

There will be non-negligible security concerns regarding the risk of the entire intelligent automation environment being vulnerable to internal or external data breaches and potential data manipulation. Now that intelligent automation is actually increasing the level of digitisation and networking, how to ensure that the intelligent automation environment is reliable, secured and cannot be tampered by intentional fraudulent cyber activities (accessing the robot controller to re-calibrate processing logic and sequences, altering master data or extracting data logs, etc.)

Significant co-investment between organisations and service providers for defining and aligning intelligent automation strategies will be the norm. Money will be spent on preparing business cases, running proof of concepts, determining how to scale up the pilot and defining target operating models. Offering large discounts, putting fees at risk and defining value-based revenue will be common practices. But one thing is sure is that intelligent automation tool providers will be the big winners!

There is no doubt that established service providers (the likes of IBM, Accenture, Cognizant, TCS, Wipro, etc.) have built extensive intelligent automation capabilities via accelerated development of proprietary technology (Watson, Holmes, Trizetto, ignio, etc.) or strategic alliances with mature off-the-shelf technology vendors (IPSoft, SyntBots, etc.). In addition to that, an HfS survey has revealed that almost half of organisations (buyers) want to roll out intelligent automation with their existing service providers. 

The unanswered question of resource reallocation mechanisms needs to be addressed in a holistic and procedural manner. Training future employees and re-training current ones will be a significant challenge. But how will the resource reallocation process will actually be executed and who will pay for it? Will it be easy to reallocate a resource to another existing function/ process by “augmenting” skills? Or convert an accounting data entry/ reconciliation person into a virtual agent calibrator or a data insight curator?

IDM:     Ralph Aboujaoude Diaz is Senior Manager, Risk Transformation Services, EY UK.

 

« How Easy Would It Be To Hack Your Business?
The Dilemma Of Predictive Policing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

National Crime Agency (NCA) - United Kingdom

National Crime Agency (NCA) - United Kingdom

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

Dazz

Dazz

Dazz is the cloud security remediation platform for smart security and development teams.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.

Quantum Ventura

Quantum Ventura

Quantum Ventura is a technology innovation company with a single mission of delivering customer-centric advanced solutions to US Federal & State Governments and Private Sector customers.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.