CIO Summit 2012: How to attract and retain staff
- 20 July, 2012 12:17
Finding candidates with the right personality for your team or organisation and retaining them is not always an easy task, but a panel at the CIO Summit 2012 offered some guidance to IT managers on how best to go about it.
Get to know interviewees personally
CIO of Calibre Global, Jason Cowie, said that when his team conducted interviews candidates would be asked questions about themselves — "their personality, their likes and dislikes".
“My interview with them is more around, ‘What do you like? What excites you? What makes you passionate?’” Cowie said.
By getting to know an interviewee personally, it will help determine if a person’s personality is the right fit for the organisation or team.
Use profile tools
Director of information technology at Deloitte, Raymond Danton, said he uses a profile tool to help understand and effectively communicate with team members.
“Once someone comes on board we use a profile tool just to understand that person’s strengths and vulnerabilities and how they will fit in with the rest of the team. That helps us communicate better with that person and helps them communicate with the rest of the team” he said.
Focus on team building
“We focus on team building, around the specific themes and individual weaknesses. We do real-life scenarios in those sessions,” Danton said.
“We also help the team understand the importance of process, methodologies, communication and general willingness to help solve customer issues and problems in a proactive manner.”
Back your staff
“You’ve got to back your people,” said Syed Ahmed, head of business technology at Servcorp. He said it is important to offer a safe environment for staff members to learn and still drive their own input.
He gave an example of a team member who independently built an application that temporarily brought a production system down. Ahmed said that he continued to support the team member's learning experience and enthusiasm to try something new instead of just condemning them.
Put staff career goals over money
Cowie said solely using monetary incentives would not help retain team members over the long term.
“I think money is a short-term thing,” he said. “You have got to do things differently. Money is not a driver... If you just focus on that, you’ll lose staff faster than you imagine.”
Instead, CIOs and IT leaders should allow team members to discuss their career goals and offer them direction and support in building their experience.
Follow Rebecca Merrett on Twitter: @Rebecca_Merrett
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Maximising productivity without sacrificing security
Advances in mobility and client computing technology combined with the ubiquity of the Internet and social media are creating a culture and desire for constant connectivity and anywhere access to information. As these trends extend from the home into the work place, IT managers should consider seriously the opportunities for increased productivity and communication with customers and constituents, as well as understand the increased security risks posed by online, anytime access to private networks and data. Read more.
Bring Your Own Device FAQs
This report covers the frequently asked questions associated with the implications of BYOD devices in the workplace. Any solution in this space needs to be built on simplicity, scalability and security. Click to find out how to address the IT security challenges.