06Jun

What’s the difference between a CTO and a CIO?

“Good question,” admits ZDNet. Where once the Chief Information Officer was universally acknowledged as the most senior IT executive, now, says the tech site, it “depends very much on the type of business you’re talking about.”

Where a business has only a CIO or a Chief Technical Officer, it’s an easy call – that’s the top IT executive. The duties and responsibilities are clear. Where the situation gets murky is when an organization has both.

Explains ZDNet, “The traditional split is that the CTO is responsible for the operational concerns associated with technology implementation. CTOs drill down into the details of technology. They have a strong systems focus and they know how technology works, making it more of a chief architect role.

“CIOs, on the other hand, tend to focus more on engaging with the business. So while the CTO might go and speak with vendors to source technology, the CIO makes sure the internal business gets the secure and governable systems and services it wants.”

Everyone got that? No? How about this from InsiderPro:

“CTOs are similar to CIOs. But they are responsible for the overarching technology strategy and infrastructure to help meet the organization’s goals, while CIOs oversee the IT departments and staff to manage everyday operations and in many cases work with business leaders on aligning IT with business goals.”

Where both roles exist, InsiderPro says “the CTO usually reports directly to the CIO.”

But wait. Pointing out that “As the importance of technology within the business has risen, so has the demand for knowledgeable technologists,” ZDNet says, “Some businesses – including established enterprises – have opted to rely more on a CTO than a CIO.”

Dig a little further and you’ll find that the hierarchical distinction is becoming less important as the bigger businesses move ever further along the path to digital transformation. Bornfight, a project-focused development firm, has a different take on the relationship between chief technology and chief information officers. It defines the jobs this way:

  • “Chief Information Officers are members of the executive team who are responsible for ensuring that a company leverages technology in a way that helps it optimize, improve and streamline internal processes.”
  • “Chief Technology Officers are members of the executive team who are responsible for ensuring that a company’s product utilizes technology in a way that will meet the customers’ needs.”
  • The company included this handy chart comparing the roles.CTO vs. CIO - blog.jpg

Bornfight’s most significant contribution to the discussion may well be that in organizations large enough to need both, CIOs and CTOs are complementary to each other.

“From a business perspective, you need these two positions and you need them to fit well together and cooperate — this leads to progress. The right way to approach this is to look at these positions as two sides of the same technology coin, a sort of a buddy-buddy relationship.”   

Photo by ThisisEngineering RAEng on Unsplash

[bdp_post_carousel]

The Pandemic Is Altering Data Privacy Expectations

A recent EY Global Consumer Privacy Survey found that the data privacy expectations of consumers are shifting due to the pandemic and the correlating increased reliance on technology in the last year.

The survey was created to help organizations better understand how consumers’ data privacy needs are evolving by examining their attitudes towards sharing personal data and by analyzing the way their behavior is changing.

The survey and the results report addressed three critical questions and guidance for how businesses can navigate these changes:

Question 1: How do consumers expect organizations to handle their data?

The findings – deliver certainty the consumers crave. The survey found that more consumers are concerned about the security of the data they share with a company more than the actual data that is shared.

Yogen Appalraju, EY Canada Cybersecurity Leader summed the finding up saying, “Organizations that want to maximize the collection of personal data need to focus on establishing their data protection and privacy capabilities. Those that cannot provide assurance that data is collected and stored safely may start to see customers go elsewhere.”

Question 2: What do consumers want in exchange for their data?

The findings – tailor offerings to build trust. Consumers want to see a fair exchange of the value your product provides with the data they’ve shared. For example, the survey found that half of millennial consumers say they’re willing to share their browser search history with a large tech company in exchange for a more tailored and personalized online experience. However, older generations like baby boomers believe the lack of control over third-party access to data decreases the amount of trust they place in an organization.

Question 3: How is data privacy shifting for a post-pandemic world?

A unique shift in attitude towards data sharing comes as a direct result of the COVID-19 pandemic. As economies start to reopen, many businesses, schools, and organizations may require the collection of personal information to ensure health and safety. Half of the consumers polled in the survey believe the pandemic has made them more willing to give up personal data if they know it is contributing to research and/or overall community wellness.

Photo by Matthew Henry on Unsplash

‘Outlandish Job Requirements’ Are Causing an IT Shortage

Too many employers are asking for too much when seeking to fill entry-level cybersecurity positions, then lamenting that there’s a shortage of talent applying for the job.

“There’s a misunderstanding, I think, out the door of what the [requirements] really should be for junior, midlevel and senior roles, and what those expectations are,” said Neal Dennis, a threat intelligence specialist, in an interview with The Wall Street Journal.

Citing a report by the International Information System Security Certification Consortium (ISC2), the Journal said there is a need for 3.1 million cybersecurity professionals to meet security requirements. But companies leave positions unfilled insisting they can’t find people to fill them.

Researchers tell the Journal “outlandish job requirements are the problem,” not than a lack of workers.

“We’ve created this self-licking ice-cream cone of misery that continues to drive the narrative forward that we don’t have the ability to solve this problem, or we don’t have enough humans,” said Chase Cunningham, principal analyst at research firm Forrester Inc.

The Journal article notes that job postings for entry-level security roles frequently request two to four years’ experience and advanced knowledge, which can be evidenced by certifications such as the Certified Information Security Systems Professional.

But Clar Rosso, chief executive of ISC2, which issues the certification, points out in the article that it takes 5 years of experience before earning a CISSP. “Possibly the human resources recruiter doesn’t have experience in the area and they’re not able to say, wait, that doesn’t even make sense,” she told the Journal.

The solution, says the Journal, is for companies to rework their expectations and hire tech professionals with non-traditional backgrounds, then invest in training. “Apprenticeship schemes and firm career development paths for new cybersecurity workers would help,” says the Journal.

“Once that shift occurs,” Dennis said, referring to on-the-job training and certification prep programs, “I think that the skill shortage starts to answer itself. And then we’ll finally realize that there’s not really a people shortage, there’s just a knowledge shortage on the people who are available.”

Photo by Patrick Amoy on Unsplash

[bdp_post_carousel]