Are you using the technologies of 2010 to run the business of 2013 and beyond?
Are you still using the same personal mobile phone and tablet in your personal life as you did just 3 years ago? Most are quick to adopt new technology and all its capabilities, such as the iPhone 4 or 5, iPad with Retina Display or the Samsung Galaxy.
But I am going to guess that most of you are using the same technology as you used in 2010 (if not much older) in your work life – whether a board member, executive, risk, or assurance professional.
Why is that?
Are you aware of how much technology has advanced in the last few years – when there have been as much innovation and progress as in the prior decade?
Or are you so satisfied with your current systems and tools that you see no need for change?
Are you so invested, so deeply tied to legacy applications that are held together and are connected by a combination of string and duct tape that you can’t move?
Is your organization sufficiently agile to take advantage of new opportunities? If you are in the process now of evaluating and implementing the technology of last year, how quickly will you be able to leverage new technology that appears this or next year?
This may be worth a few moments of introspection and discussion within your organization and/or team. For example, many are saying (Gartner, McKinsey, IDC, etc.) that so-called “big data” represents great opportunities, especially when combined with new analytics and in-memory technologies. Yet, only 54% of organizations have a strategy for big data. Few risk and audit professionals are using the latest in analytics, including mobile BI and predictive analytics) to detect potential risks, even fraud.
If you are not taking full advantage of technology advances, you are probably not optimizing the business now and putting its future at risk.
So many questions. Do you have answers to share?
Recent Posts on this Blog
- Risk in the Fourth Dimension January 15, 2017
- How much cyber risk should an organization take? January 7, 2017
- The real risks: the ones not in the typical list of top risks December 31, 2016
- An expert shares his views on the future of risk management December 18, 2016
- Selecting software to help manage user access risk December 17, 2016
- User access risk and SOX compliance December 12, 2016
- Risk and Culture December 9, 2016
- New guidance on operational risk December 3, 2016
- Why do so many practitioners misunderstand risk? November 26, 2016
- A new front opens in the SOX battle November 20, 2016
- Internal audit reports do the function a great disservice November 12, 2016
- My new book on Auditing that Matters is available November 9, 2016
- Time for a leap change in risk management guidance November 5, 2016
- Cyber security and the board October 29, 2016
- The biggest obstacle to effective risk management October 28, 2016
- An Important Cyberrisk Framework January 16, 2017
- Deloitte Shares a List of "Risk" Trends to Watch in 2017 and Beyond January 9, 2017
- What Does the New Year Hold for Internal Audit? January 5, 2017
- The Decision-maker's View of Risk December 19, 2016
- How Much Cyberrisk Should We Take? January 4, 2017
- Do We Know How to Audit Technology-related Risks? December 5, 2016
- The State of Information or Cybersecurity November 28, 2016
- Back to the Future for Internal Audit November 21, 2016
- How Do You Change the Culture of the Organization? November 15, 2016
- Why Does ERM Fail So Often? November 7, 2016