You May Not Need A CDO — But Wouldn’t You Want To Improve Your Odds Of Success?

Gene Leganza

Jennifer Belissent and I just published a report on the role of the Chief Data Officer that we’re hearing so much about these days – Top Performers Appoint Chief Data Officers. To introduce the report, we sat down with our press team at Forrester to talk about the findings and about the implications for our clients.

Read more

You May Not Need A CDO - But Wouldn’t You Want To Improve Your Odds Of Success

Jennifer Belissent, Ph.D.

Gene Leganza and I just published a report on the role of the Chief Data Officer that we’re hearing so much about these days – Top Performers Appoint Chief Data Officers.  To introduce the report, we sat down with our press team at Forrester to talk about the findings, and the implications for our clients.

Forrester PR: There's a ton of fantastic data in the report around the CDO. If you had to call out the most surprising finding, what would top your list?

Gene:  No question it's the high correlation between high-performing companies and those with CDOs. Jennifer and I both feel that strong data capabilities are critical for organizations today and that the data agenda is quite complex and in need of strong leadership. That all means that it's quite logical to expect a correlation between strong data leadership and company performance - but given the relative newness of the CDO role it was surprising to see firm performance so closely linked to the role.

Of course, you can't infer cause and effect from correlation – the data could mean that execs in high-performing companies think having a CDO role is a good idea as much as it could mean CDOs are materially contributing to high performance. Either way that single statistic should make one take a serious look at the role in organizations without clear data leadership. 

Read more

Turn CMO-CIO Collaboration into Digital Action at Forrester’s Asia Pacific Summits

Dane Anderson

September winds bring the spring to Sydney, the official end of the monsoon to Mumbai, more of the same to equator-bound Singapore and Forrester’s CMO-CIO Summits to all three! We are looking forward to bringing together the region’s digital business leaders in Singapore on September 2, Sydney on September 16 and Mumbai on September 22. Themed “Build Your Customer-Obsessed Enterprise”, Forrester’s 2015 Summits will focus on how to strengthen the vitally important CMO-CIO partnership to build a customer-obsessed digital business. 

Our agenda will focus on the specific roles and responsibilities of CMOs and CIOs on the digital journey and the collaboration points between them. We will explore how CMOs can drive digital customer experience (DCX) and how CIOs can support their progress by driving digital operational excellence (DOX). Instead of frothy appeals that explain the importance of the CMO-CIO partnership, we will provide specific steps that will enable a roadmap to better teamwork.

Read more

Security In The IoT Age: Makers Vs. Operators

Tyler Shields

Check out my latest research on IoT security: An S&R Pros Guide To IoT Security

Internet of Things (IoT) security is a hot topic among security and risk professionals. It seems as if every "thing" on the market is becoming smarter and more interactive. As the level of IoT device maturity increases so does the level of risk of data and device compromise. The scary thing is that we really have no idea what IoT devices are in our environment let alone the correct way to secure them. 

Both IoT product makers and IoT product operators need to understand the security implications of IoT devices. Security in IoT involves product makers rethinking how they create technologies, secure code and hardware, develop new offerings, and ensure the privacy of the data they collect. These areas of security are not typically areas that automobile, manufacturing, and retail technology makers have had to consider in the past.  The scale of IoT devices in each vertical is enough to employ a small army of developers who are yet not up to speed on the latest secure code and hardware concepts.

On the other side of the coin, enterprises have the unenviable position of implementing these poorly coded and built technologies. Overwhelming pressure will come from competing enterprises causing an increase in IoT adoption to improve business efficiencies. IoT will become pervasive, and mandatory, throughout every vertical from gas and electric to automotive. The threat landscape in these areas will be immense.

Read more

The Future Of Telcos Remains Precarious

Dan Bieler

The old telco business model is breaking up. Telcos are at a crossroads, with one path leading to becoming pure utilities, another to transforming into important members of digital ecosystems, and a third to their complete demise.

Telcos have had years to prepare for this situation, but few have used their time effectively. At this stage, I see few reasons to be optimistic about the prospects for most telcos to recover the ground they’ve lost to other players in the emerging digital ecosystems because:

  • Consumers care more about apps and devices than connectivity than ever.One main impact of the onslaught on telcos by over-the-top providers like Facebook and handset manufacturers like Apple has been to push telco brands to the back of the consumer’s mind. Consumers care more about which handset and apps they use than which connectivity provider they have. Telco brands just don’t rock as they used to years ago.
  • Business leaders do not see telcos as the first choice to provide ICT services.Data from Forrester’s Global Business Technographics® Networks And Telecommunications Survey 2015 shows that business and IT users trust systems integrators and independent solution specialists more than telcos with a wide spectrum of voice, data, and managed services. One of the reasons is that business and IT users feel that telcos don’t understand their specific business requirements sufficiently.
Read more

The Fragmenting SFA Ecosystem

Kate Leggett

Sales organizations, for the last couple of decades, have used sales automation (SFA) to manage account and contact data, sales pipelines, territories and more – all inside-out capabilities that help optimize their productivity, The problem is that today, customers control the conversation that they have with companies. Customers increasingly demand effortless sales interactions that increasingly trend toward self-service. They demand interactions tailored to their particular industry, pain point, and profile. They want streamlined interactions that value their time, such as a simple, efficient quote-to-order process or a contract renewal process.

Today sales organizations struggle to provide sales experiences in-line with customer expectations. They cant:

  • Support buyers on their terms. Buyers increasingly leverage mobile touchpoints, self-service, and digital channels to interact with companies which sales organizations cannot support.
  • Get sales representatives to follow consistent processes. Sales managers have sales reps of different calibers, and they must up-level a team’s performance. Also, without a consistent sales process that clearly articulates conditions for the different stages, managers can’t accurately qualify their pipeline. This affects forecasts, valuation, and profitability.
  • Personalize conversations with stakeholders. Sales reps don’t have near real-time information about their prospect’s company or industry or about a particular stakeholder to make conversations more relevant. They may not understand relationships between stakeholders that are involved in a purchase. They often lack insight about the effectiveness of sales collateral for different stages of the sales journey.
Read more

Automated Malware Analysis Wave - Kicking Off Soon

Rick Holland

In September, Kelley Mak and I are going to be kicking off our Automated Malware Analysis Wave. During a 3 - 4 month process, we will be evaluating the network based sandboxes of 10-15 vendors. If you would like the opportunity to participate, please contact Kelley Mak (kmak at forrester dot com) and Josh Blackborow (jblackborow at forrester dot com). They can send you the inclusion criteria. Since nearly every security vendor in the market has an AMA solution, not all vendors will be invited to particpate in the Wave. Our inclusion criteria are designed to ensure we evauate the vendors most capable of addressing Forrester's security and risk client base. 

For vendors interested in learning more about Forrester's perspective on automated malware analysis, please check out Pillar No. 1: Malware Analysis from Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities.

Forrester’s Security & Risk Research Spotlight: Make Customers The Focus Of Your Security Efforts

Stephanie Balaouras

Since I first became the research director of the Security & Risk team more than five years ago, security leaders have lamented the difficulty of aligning with the business and demonstrating real business value. Over the years, we’ve written an enormous amount of research about formal processes for aligning with business goals, provided key metrics to present to the board, and developed sophisticated models for estimating security ROI. Yet for many, demonstrating real business value continues to be a significant challenge. If it wasn’t for the 24 hour news cycle and a parade of high profile security breaches, chances are good, that security budgets would have been stagnant the last few years.

Read more

The New Customer Service Mandate - It’s No Longer Socially Acceptable To Not Be Social

Ian Jacobs

This a guest post by Danielle Geoffroy, a Research Associate on the Application Development & Delivery (AD&D) team.

Customer service teams are facing a dilemma that may bring back high school nostalgia – if you want to be one of the cool kids, you need to be social. But simply being present in the social scene doesn’t automatically make you hip to the digital customer. You need to talk the talk and have the latest gadgets.

In our recent report, we discuss the new reality of social customer service, and outline tools you should adopt for social workforce optimization.  Companies have all felt social flip the table – it affects their core business model because newly empowered customers have a giant bullhorn to make their feelings known. As a result, companies must incorporate social into all realms of their business, especially customer service teams.

Customers turning to social channels for service support have high expectations (I know I do). Those expectations mean you’ll need to:

Read more

Make Your BI Environment More Agile With BI on Hadoop

Boris Evelson
In the past three decades, management information systems, data integration, data warehouses (DWs), BI, and other relevant technologies and processes only scratched the surface of turning data into useful information and actionable insights:
  • Organizations leverage less than half of their structured data for insights. The latest Forrester data and analytics survey finds that organizations use on average only 40% of their structured data for strategic decision-making. 
  • Unstructured data remains largely untapped. Organizations are even less mature in their use of unstructured data. They tap only about a third of their unstructured data sources (28% of semistructured and 31% of unstructured) for strategic decision-making. And these percentages don’t include more recent components of a 360-degree view of the customer, such as voice of the customer (VoC), social media, and the Internet of Things. 
  • BI architectures continue to become more complex. The intricacies of earlier-generation and many current business intelligence (BI) architectural stacks, which usually require the integration of dozens of components from different vendors, are just one reason it takes so long and costs so much to deliver a single version of the truth with a seamlessly integrated, centralized enterprise BI environment.
  • Existing BI architectures are not flexible enough. Most organizations take too long to get to the ultimate goal of a centralized BI environment, and by the time they think they are done, there are new data sources, new regulations, and new customer needs, which all require more changes to the BI environment.
Read more