CIOs Share Secrets of Getting IT Some Respect
- 10 May, 2007 10:52
One of John Furlong's pet peeves is IT employees who don't dress like their clients.
"Look at the way your clients are dressed. Make sure your IT organization matches them," says Furlong, managing director and CTO for US-based UBS Global Asset Management. "That means in my organization in the investment room, guys tend to be in khakis or jeans or T-shirts, and that's great. But if you're in the sales organization, that's not the way to go. You want to be their peer."
The theme of getting more respect for IT was pervasive at this week's CIO Forum, a gathering of 300-plus CIOs and other high-level IT executives that takes place at sea aboard the Norwegian Dawn cruise ship sailing out of New York City.
Furlong says a key to making sure IT and business groups understand each other is rotating IT people in and out of the business groups. He cites his own experience of working in jobs on both sides of the fence during his 25 years in the financial-services industry (for example, he worked for IBM for 12 years and also headed technology development at Paine Webber).
"Cross-function job rotations are critical," Furlong says. "Make sure that your [high-potential] people are developing a sense of different parts of the business... You wind up having a whole cadre of middle-level executives who know the IT organization and are able to discern strategy."
IT groups that don't brainstorm and work closely with the business side run the risk of simply becoming order takers, Furlong says.
Cathy Ellwood, who runs a job-rotation program at US-based Nationwide Financial Services, says putting such a system in place isn't for "the faint of heart". It can take years to get such a program really up and running, she says, as you need to do everything from defining what you want employees to get experience in, to putting an infrastructure in place to make sure your day-to-day IT operations don't collapse when good employees rotate out. She cites an example of taking one of the insurance company's CFO potentials and putting him over the IT procurement area, which includes handling vendor contracts and driving costs out of IT infrastructure.
"It wasn't necessarily something that he aspired to do," she says. "On the other hand, he's going to bring a lot of discipline and training to that organization."
One dicey issue with job rotations is salary. Moving from IT to another group might ordinarily mean an increase or cut in pay to align with others in the group. That can be an issue with both the employee and the department, which might not want to pay the salary and benefits, says Ellwood, who reports to the CFO. "We made a decision that each business area or IT organization where people go will cover the expense," she says. "It's an investment in our future."
Putting on your marketing hat
Fred Danback, CIO for US-based Integro Insurance Brokers, gave a presentation at the event advising his peers on how to market their services.
For one thing, IT organizations should make sure to have their facts straight, Danback says. That is, you need to know how much it costs to provide assorted services, such as e-mail, so that if an internal client wants to know what they're actually getting for their money, you can tell them, he says.
"Chargebacks are definitely a catalyst for that," Danback says.
It's also important to quantify how much it costs to provide services so that your organization can charge different levels of users different amounts. Further, it can aid your IT organization in determining whether certain jobs should be outsourced, Danback says.
But marketing your IT group "is not having a communications manager telling the whole company that these are the things we're working on".
Danback says it has more to do with concentrating on the four Ps of business-class fame, which he listed as product, price, placement (just because you have offices all over the world doesn't mean you need to roll out the same services everywhere) and promotion:
To market your product, you need to understand what sort of company yours really is. Danback asks: Is your company most focused on customer intimacy, operational excellence or product leadership? If your organization, like Integro, is focused most on customer intimacy, your IT emphasis will be on systems, such as CRM, he says. But other organizations, such as a financial-services company Danback used to work for, have lines of business that might fall into each of these categories.
At that company Danback says he brought in a consulting company to give his team rolling out an identity-management system a crash course on how to market it. The IT team needed to cater to the different business segments in how it marketed its offering (auditors wanted better accountability, the insurance business wanted authentication for the extranet and reinsurance group needed to exploit the network directory for single sign-on).
Expanding the CIO's role
One sure way to raise IT's profile is by getting the CIO a seat at the table more frequently with other C-level executives, but doing so is easier said than done. Recent research shows that most CIOs haven't been in their jobs for more than three years and that, more often than not, CEOs aren't too satisfied with them, says Jim Court, CIO for US-based First American Property & Casualty.
"This is not conducive to partnering with the business side or expanding the role of the CIO," says Court, who documented during a presentation an eight-year effort on his part to take IT from being a necessary evil to being a critical part of the organization. The fact that he recently was asked to put together the company's three-year strategic plan is a sign that the effort is paying dividends, he says.
Making headway involves first understanding the environment you're in, he says. CIOs increasingly are reporting to COOs and CEOs rather than CFOs, which Court says is a good thing, though the real issue is whether the person you report to values technology. You need to ask questions about your organization - such as whether risk is rewarded - and determine whether you can really influence product development and other business decisions.
Court says that when he started at his company, all the homeowners insurance it sold was customized by state. Coming from the manufacturing industry, where product standardization is important, Court wondered why standardization couldn't be applied more to homeowners insurance. He met with the company's marketing people and worked to standardize the product, a change that would enable the company to roll out new offerings in closer to 30 days rather than 90, as had been the case.
"The business side immediately signed up for that... that's what they understand," Court says. "They don't understand that we're using Linux with Java, all the technology stuff, they don't care. They want business value."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- OAIC releases privacy impact assessment guide for consultation
- Some Australian businesses 'unlikely' to be ready for Privacy Act changes: survey
- BYOA 'shadow IT' grows in the enterprise: Telsyte
- Cost of a Privacy Act breach could extend to ongoing audits: legal expert
- How Hunter Water is saving $50k a year in software licences
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
451 Group Research Report MDM Trends
As the BYOD model continues to grow at twice the rate of corporate-owned devices, enterprises are facing an increasingly diversified mobility landscape. And though BYOD brings many benefits, complex management and security challenges are also ushered in. Read this report to understand what MDM can and cannot do for you and which solutions are being chosen today - and tomorrow.
Implementing an Effective Vulnerability Management Program
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.
Best Practices in Data Protection Monitoring
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.