Deloitte discusses Tech Trends 2012. Are you making best use of disruptive technology?
Deloitte has done a good job summarizing some of the fast-moving developments and applications of the latest business technology in their Tech Trends 2012: Elevate IT for digital business. The summary page includes a short video discussion that is worth reviewing before reading the report.
The publication lists and discusses 5 “disruptors” and 5 “enablers”, each of which are interesting topics.
The disruptive technologies are:
- Social Business
- Enterprise Mobility Unleashed
- User Empowerment
- Hyper-hybrid Cloud
The enabling technologies are:
- Big Data
- Geospatial Visualization
- Digital Identities
- Measured Innovation
- Outside-in Architecture
Here are some of the points that caught my eye:
- It’s an uncommon, and perhaps even unique, time to have so many emerging forces – all rapidly evolving, technology-centric and each already impacting business so strongly. Whether or not you have previously thought of your business as inherently digital, the convergence of these forces offers a new set of tools, opening the door to a new set of rules for operations, performance and competition. This is an opportunity for IT to truly help elevate business performance.
- Each of these 2012 trends is relevant today. Each has significant momentum and potential to make an impact. Each warrants timely consideration. Forward-thinking organizations should consider developing an explicit strategy in each area – even if that strategy is to wait and see. But whatever you do, step up. Use the digital forces to your advantage. Don’t get caught unaware or unprepared.
- Leading enterprises today are applying social technologies like collaboration, communication and content management to social networks – the connected web of people and assets that impact on a given business goal or outcome – amplified by social media from blogs to social networking sites to content communities. Yet it’s more than tools and technology. Businesses are being fundamentally changed as leaders rethink their core processes and capabilities with a social mindset to find new ways to create more value, faster.
- Millennials joining the workforce are wired to use social and mobile channels to bond, socialize and solve problems. Organizations that lack internal, governed social media and computing channels may find their younger employees using public tools as a well-intentioned, but risky, alternative.
- Mobility has evolved from an issue within a few niche industries and functions (think oil & gas and logistics services) to a potential source of innovation across wide-ranging vertical industries, processes and business models. And while many of the underlying components have been evolving for decades, the break-out potential is only now being realized.
- Early experiments in business-to-consumer and early business-to-business scenarios are leading to more compelling, complex applications across the enterprise value chain, making integration, security and manageability more critical.
- Organizations need policies and tools to authenticate users; control devices, applications and data; provide end-to-end encryption while at rest, in flight and in use; run content filtering and malware protection; and allow security event monitoring, logging and response. Security policies and profiles should be tied to specific users and scenarios, focusing remedies on likely incidents, not the infinite range of risk possibilities.
- Developing, deploying and supporting mobile solutions is quite a bit different than traditional IT. Doing it well requires a special blend of business insight, deep technical chops and strong design. Companies that recognize this required mix of business, art and science can set themselves apart from their competition and help to reshape entire industries.
- End users have plenty of opportunities to bypass IT and procure off-the-shelf or low/no-code solutions that are just good enough to meet their needs. Through mobile and desktop application (app) stores, cloud-based marketplaces and rapid development and deployment platforms, business stakeholders are one swipe of the corporate credit card away from procuring rogue “almost-enterprise” applications to fulfill their unmet needs. As a result, CIOs should consider adopting a design-led, user-centric approach to new application development, while also accepting the inevitability of business users directly sourcing apps. BYOA (bring your own application) will likely become part of many organizations’ solution footprints.
- Whether your organization will shift to cloud services is unlikely to remain an open question. The question now becomes how that shift is likely to happen. Will your approach add complexity to your technology environment – or will it bring elegance and simplicity? The choice is yours.
- The potential of big data is immense. Remove constraints on the size, type, source and complexity of useful data, and businesses can ask bolder questions. Technology limitations that once required sampling or relied on assumptions to simplify high-density data sets have fallen to the march of technology. Long processing times and dependencies on batch feeds are being replaced by on-demand results and near real-time visibility.
- Organizations that put big data to work may pursue a huge competitive edge in 2012 – and beyond.
- These emerging technologies are driving business transformation and bold new applications – sources of both sustaining and disruptive innovations. Social business and enterprise mobility are changing the way business is conducted and, increasingly, allowing new operating and business models to emerge. IT organizations should be educating their business counterparts on the potential of these new technologies – and preparing for the groundswell of demand once the implications are understood.
- Creating a vision for driving innovation is the often-forgotten third role of CIOs. Beyond running the business of IT and delivering IT to support the needs of the business, CIOs should be leading the charge toward innovation through emerging solutions and technologies.
What does this mean for boards, executives, and risk and assurance professionals? My view:
- Does your organization have an organized strategy and plan for adopting and optimizing the use of technology? This applies both to the technology that is selected and the technology that is not selected
- Are the CIO and his team working cooperatively with the business? Are priorities shared? Is the business doing its own thing? Is IT a visionary leader, or a reluctant irrelevance?
- Are the risk, compliance, control, and information security functions involved early and throughout the strategy-setting and deployment phases? Are risks and controls thought of before or not until after there is a problem?
- Are you sure you will not be left behind by a competitor who leverages the new technology better than you?
I welcome your comments and perspectives.
Recent Posts on this Blog
- The risk of material errors in the quarterly financial statements March 10, 2017
- Is your compliance program strong enough? March 4, 2017
- Embedding risk into strategic planning and more February 25, 2017
- Cyber and reputation risk are dominoes February 18, 2017
- The current state of risk management February 11, 2017
- When an acceptable level of risk is not acceptable February 4, 2017
- How to mess up your risk management program January 28, 2017
- The value of a risk register January 21, 2017
- Risk in the Fourth Dimension January 15, 2017
- How much cyber risk should an organization take? January 7, 2017
- The real risks: the ones not in the typical list of top risks December 31, 2016
- An expert shares his views on the future of risk management December 18, 2016
- Selecting software to help manage user access risk December 17, 2016
- User access risk and SOX compliance December 12, 2016
- Risk and Culture December 9, 2016
- The Idea of a Unified Risk Oversight Council March 10, 2017
- The Integration of Governance, Risk, Compliance, and Related Activities March 6, 2017
- Cybersecurity Effectiveness February 27, 2017
- Cyber Root Cause Alarm Bells Are Ringing February 20, 2017
- Reports That Provide Actionable Information February 14, 2017
- What Is Holding the Company Back? February 6, 2017
- Do Internal Audit Reports Matter? February 1, 2017
- Monitoring Laws and Regulations and Their Effect on Your Organization January 24, 2017
- An Important Cyberrisk Framework January 16, 2017
- Deloitte Shares a List of "Risk" Trends to Watch in 2017 and Beyond January 9, 2017