We all know that securing your perimeter and your internal assets only gets you so far today. The crux of the issue is that your brand, and potential threats to it, are now often external and out of your direct area of control. The number of places and channels online where your brand appears and where malicious actors discuss how to take down your organization is expanding rapidly today.
Do you start your days looking at a calendar full of meetings and feel overcome with joy? Me neither - especially when I have a lot of work to get done that I know is more important. And when you’re in those meetings, are you fully engaged or are you trying to clean out your email queue and put the finishing touches on your slides for your next meeting? That’s what I thought. After all of your meetings, are you in any mood to plan your next day, week or month? Nope, me neither. Do you tell yourself that you’re going to get up early on a Saturday so you can get things done that require a lot of focus, and then don’t do it? Yeah, me too.
And so it continues. A crisis of attention wears us out and re-tunes our brains to feast on the false sense of accomplishment that goes with getting a lot of really small, transactional things done. And our mobile devices make matters worse. Without realizing it, we drain our limited cognitive fuel, leaving nothing left at the end of the day to do serious thinking, creative work or longer-term planning. Mismanaging our technology and ourselves, and burning out, is but one element in a mosaic of things that scientists who participated in our research like Teresa Amabile at the Harvard Business School and author of “The Progress Principle", and David Rock, neuroscientist and author of “Your Brain at Work" now know about how we work best as knowledge workers. It’s also something that we as individuals can, and must control if we want to be effective in our jobs as knowledge workers.
When employees don’t have the resources to meet the demands of their jobs, they burn out
The sharing of threat intelligence is a hot topic these days. When I do conference speeches, I typically ask how many organizations see value in sharing, and most in the room will raise their hand. Next, I ask how many organizations are actually sharing threat intelligence, and roughly 25% to 30% in the room raises their hand. When our 2014 Security Survey data comes in, I will have some empirical data to quote, but anecdotally, there seems to be more interest than action when it comes to sharing. I wrote about some of the challenges around sharing in “Four Best Practices To Maximize The Value Of Using And Sharing Threat Intelligence.” Trust is at the epicenter of sharing and just like in "Meet the Parents," you have to be in the circle of trust. You can enable sharing, but automating trust does take time.
A common inquiry I get from clients has some of the following flavors:
“We’ve chosen a new ITSM tool and need help moving to it. Who can help us?”
“We want to choose a new ITSM product and an implementation provider at the same time. How do I know which implementation providers work with a particular ITSM product?”
“We don’t have the resources to automate our processes. Who can help us with that by applying best practices?”
“We want to work with someone who has developed industry specific best practices. Who really delivers that?”
“We need to revolutionize the way we are delivering services so we can focus on what really matters to the company. Is there an implementation service provider who can help get us there from where we are today?”
Vendors across the board are building tools to add context-driven personalization features to mobile apps. Specifically, we see new offerings from vendors in personalization, mobile analytics, API management, predictive analytics, artificial intelligence, and the digital agencies for product and content recommendations, in-app messages, and voice-driven digital assistance.
Marketers and developers are jumping at these solutions because creating more personalized digital experiences will be critical to remaining competitive. And as CIOs rationalize a larger software platform strategy, these solutions will plug specific mobile engagement gaps along the way.
Want to hear more? In our new brief, Vendors Scramble To Enable Contextual Mobile Moments,we examine how different groups of vendors extend their capabilities to compete in the arms race to deliver contextual mobile apps and provide guidance for CIOs on managing the myriad solutions entering their organization.
Critical infrastructure is frequently on my mind, especially the ICS/SCADA within the energy sector. I live in Texas; oil and natural gas are big here ya'll. I'm just a short distance away from multiple natural gas drilling sites. I cannot help but think about the risks during the extraction and transport of this natural gas. North Texas has seen an attempt to bomb the natural gas infrastructure. In 2012, Anson Chi attempted to destroy an Atmos Energy pipeline in Plano, Texas. As a security and risk professional, I wonder about the potential cyber impacts an adversary with Chi's motivations could have.
The other day, I met with the strategy director of a European telco. Let’s call him Art. We shared an informal discussion about the future of telcos. Personally, I am fairly skeptical about the prospects of telcos to recover ground – in particular in Europe.
Consumers are more concerned about the apps they use and the devices that they have than what connectivity they use, as I outline in the report The Future Of Over-The-Top Services. Forrester’s Customer Experience Index, which measures consumer perceptions of telco services, shows telcos near the bottom of all sector readings.
On the business side, data from Forrester’s Business Technographics® Global Networks And Telecommunications Survey, 2014 shows that business users trust systems integrators and independent solution specialists more than telcos with almost all voice and data service, because they feel that telcos don’t understand their specific business requirements as well.
Add an unfavorable regulatory environment — which, under the umbrella of the net neutrality debate, is about to close the door on commercial relationships regarding quality connectivity between content and network providers — and it becomes difficult to be wildly optimistic about the future of telcos. Yet, this is not where our discussion ended. Art pointed to three major issues where telcos will need shock therapy:
Forrester has just published its annual European Tech Market Outlook (see "At Last, A Tech Market Recovery In Europe"), and we are projecting modest growth of 2.3% in euros in 2014 for European business and government purchases of technology goods and services, with an acceleration to 4.9% in 2015. There are some bright spots in the European tech market:
Spending on technology that supports customer facing processes (e.g,, customer relationship management, marketing automation, mobile applications, eCommerce solutions, Web content management, etc.) will rise by over 10% as firms put priorities on technologies that help them directly win, serve, and retain more empowered customers;