Menu
Log in
Log in


Tech News Blog

Connect with TECH NEWS to discover emerging trends, the latest IT news and events, and enjoy concrete examples of why Technology First is the best connected IT community in the region.

Subscribe to our newsletter

  • 11/28/2023 11:13 AM | Marla Halley (Administrator)


    The Privacy and Security Risks of “Citizen Development 

    Marc Andreessen, founder of Netscape and a well-known technology investor, famously said “‘Software is Eating the World” way back in 2011 and it’s obvious now that he was right. We live in a Software Defined Everything (SDE) world where even your coffee maker is “smart”, and the trend of software in everything shows no signs of slowing down.In fact, it’s estimated there will be 76 billion Internet of Things (IoT) aka “smart devices”,each driven by software, online by 2025, and Microsoft has said there will be a whopping 500 million new apps built over the next five years. 

    All this software is driving the rapid digital transformation of our world and while the demand for software development has never been higher, it greatly outstrips the available supply. Gartner reported that demand for software development will grow five times faster than conventional IT departments and the average IT project backlog is between 3 and 12 months per Appian. 

    Compounding the issue is the growing shortage of software developers. Forrester has reported that there will a shortage of 500,000 developers in the United States by 2024 and IDC has reported the shortage of software developers may reach 4,000,000 worldwide by 2025.  

    To quench the demand for software development and to accelerate value delivery many organizations have embraced “Citizen Development”. Citizen Development democratizes software development by allowing “Citizen Developers”- individuals with little or no programming experience - to use low-code or no-code (LCNC) tools to quickly build and deploy software applications. LCNC tools are rapidly growing in popularity, Gartner predicts that by 2025, 70% of enterprises will use LCNC tools and LCNC platforms expected to reach $187 billion in sales by 2030 according to Research and Markets. 

    This is a fundamental shift in how organizations build and maintain software applications. Individuals without an extensive technical background can build business ready applications using visual interfaces and pre-built components with little or no coding required. Readily available LCNC tools such asMicrosoft Power Apps, Appian, Zoho, Quickbase, and Salesforce Lightning allow business professionals with domain knowledge to create applications tailored to their specific needs without waiting for or relying on traditional software developers in the IT department or at an external consulting company.  

    The reasons for the growing popularity of Citizen Development include: 

    • Speed: Citizen developers can build and deploy applications very quickly compared to traditional approaches. 
    • Agility: Non-technical people can meet business needs and address challenges themselves. Additionally, these solutions are typically easy to modify as business needs evolve. 
    • Empowerment:Virtually any knowledgeable and motivated employee can contribute directly to digital transformation efforts. 
    • Cost: Organizations can reduce their reliance on professional programmers, cutting costs and allowing better use of resources. 
    • Innovation: Domain experts can quickly build prototypes or fully working applications with little effort or risk. 

    As a result of the exploding popularity of LCNC tools and the benefits they deliver, organizations of all sizes may find themselves leveraging LCNC tools. And while the democratization of software development can significantly speed project delivery and reduce demand on traditional IT departments, like many “Shadow IT” solutions that originate outside the IT department, Citizen Development introduces privacy and security concerns for organizations that employ it. For example, non-technical users might not be aware of privacy concerns or security best practices, leaving their applications more susceptible to attacks or leaks.Increasingly frequent and increasingly devastating cyberattacks demand that organizations understand and address these concerns. Let’s examine each in more detail. 

    Citizen DevelopmentPrivacy Risks: 

    • Compliance Issues: Privacy regulations such as GDPR, HIPAA and CCPA require organizations to protect personal data. Lack of compliance creates the potential for large fines. 
    • Data Leakage/Theft: Citizen developers may inadvertently expose sensitive data through misconfigured access controls, misconfigured platforms or by sharing data with unauthorized users. This can result in data breaches, regulatory fines, and reputational damage. 
    • Lack of Encryption: Citizen developers may not understand and/or prioritize encryption when designing applications, leaving data vulnerable to interception or theft. 

    Citizen Development Security Risks: 

    • Authentication and Authorization Issues: Citizen developers may not be aware of best practices to secure user accessor may not understand the sensitivity of data leading to unauthorized access and/or data breach. 
    • Patch Management: Citizen developers may not keep tools updated with the latest security patches. This can leave applications exposed to known vulnerabilities. 
    • Software Vulnerabilities: Citizen-developed applications may be missing proper security measures, making them susceptible to all-too-common vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). 
    • Integration Risks: Integrating citizen-developed applications with existing systems can introduce security vulnerabilities that cascade across systems. 
    • Backup and Disaster Recovery: Citizen developers may not understand the terms of service of LCNC platform-as-a-service (PaaS) offerings or prioritize continuity of critical systems which could lead to gaps in data protection and downtime. 
    • Vulnerabilities in Third-Party Components: LCNC platforms often rely on third-party components and integrations whose lineage and security posture are unclear. Security vulnerabilities in third-party components can expose applications to attacks. This speaks strongly to the need for a Software Bill of Materials (SBOM) to understand dependencies and lineage. 
    • Limited Testing: Citizen developers may not have the expertise or resources to conduct thorough security testing. 

    Organizations should ensure they address the following to reduce the risks of Citizen Development: 

    • Training and Awareness: Require training programs to educate citizen developers about privacy and security best practices to ensure they take prudent steps to protect the privacy and security of LCNC applications. 
    • Secure By Design: Security should never be an afterthought or retrofitted to existing applications. Ensure that citizen developed applications are secure by design. Involve security professionals to provide guidance and to design security into applications.  
    • Access Controls and Permissions: Ensure that developers understand the sensitivity of the data they have access to and implement robust access controls and permissions commensurate with the data sensitivity. Regularly review and update permissions. 
    • Integration with Identity and Access Management (IAM): Integrate LCNC platforms with organizational IAM systems to ensure that user identities are managed securely and consistently. For example, Single Sign On (SSO) with Active Directory. 
    • Encryption: Encourage the use of encryption for sensitive dataat rest and in transit. 
    • Regular Auditing and Monitoring: Continuously monitor and audit citizen-developed applications for unusual activity or unauthorized access. Implement automated alerts for anomalous behavior. 
    • Centralized Governance: Establish a governance framework to centralize control over citizen-developed applications including approval processes, version control, maintenance, and compliance checks. 
    • Vendor Assessment: Assess vendor security and compliance measures to ensure they meet organizational standards and compliance requirements. For example, review their SLA/SLO’s, ask for an independent SOC 2 Type 2 audit, and request a Software Bill of Materials (SBOM). 
    • Data Lifecycle Management: Define clear data retention policies for citizen-developed applications. 
    • Penetration Testing: Conduct regular penetration testing to identify and correct vulnerabilities. 
    • Leverage existing resources: The Project Management Institute (PMI) has excellent vendor-agnostic educational resources and tools for Citizen Development. I recently completed the PMI Citizen DeveloperTMPractitioner course and recommend it for those looking to engage in Citizen Development. You can learn more here.  

    The advent of LCNC platforms has revolutionized the way software is developed and it offers immense potential for organizations seeking speed, agility and efficiency.  However, the convenience and accessibility of citizen development brings inherent privacy and security risks that must be addressed proactively, and organizations should strive to strike a balance between fosteringCitizen Development and safeguarding sensitive data. 

    A well-executed citizen development strategy can empower employees, drive innovation, and significantly contribute to the overall success of digital transformation initiatives.By investing in training, robust security, trustworthy platforms and a good governance framework, organizations can leverage the power of Citizen Development while minimizing the associated risks.

    Dave Hatter, Cybersecurity Consultant, Intrust IT – CISSP, CISA, CISM, CCSP, CSSLP, PMP, PMI-ACP, PMI-PBA, PSM 1, PSD1, ITIL 

  • 10/29/2023 4:34 PM | Marla Halley (Administrator)

    During the COVID pandemic, we experienced lockdowns, illness and death, loneliness, working from home, learning from home, disrupted supply chains, overtaxed health systems, non-stop media reports about COVID, and daily anxiety and stress.   Although U.S. and global health organizations declared the end of the COVID public health emergency, the effects linger, including many workplace disruptions.  Being a good leader of people in any industry means reflecting on social context and social disruptions and how our own leadership skills and style must adapt.  Because every organization’s competitive advantage relies increasingly on technology in this age, it is even more important for technology leaders to pivot to changing workplace conditions. How are you adjusting in response to these disruptions? 

    1. Hybrid and Remote Workplace 

    For many roles in the workplace, we are not going back to the old way of working - physically in the office building five days a week, 8 am-5 pm.  According to Forbes, of the jobs that can be done remotely, 7% of workers were fully remote before the pandemic, and in 2023, it is five times higher at 35%.   Workers are very clear about what they expect from their employer, according to Forbes’ remote work statistics,  “98% of workers want to work remotely at least some of the time and 65% of workers want to work remotely ALL of the time.  Fifty-seven percent of workers would look for a new job if their current company didn’t allow remote work.” 

    But there are also downsides to remote work. From the same Forbes report, “69% of remote workers report increased burnout from digital communication tools, 53% of remote workers say it’s harder to feel connected to coworkers, and 23% of remote workers struggle with loneliness.” 

    Many large corporations have recently begun return-to-office mandates:  Google, Meta, JP Morgan Chase, Amazon, Apple, Starbucks, Disney, Lyft, and Zoom. This has set up a conflict between what employees want and what employers want.   Currently, organizations that can give workers some flexibility will be better poised for recruiting and retaining talent.   If you do implement a mandate for in-person work, CNBC Leadership Insights recommends: 

    • Explain the specific “Whys”   
    • Look closely at individual and team performance data 
    • Leave room for exceptions 
    • Build flexibility in other ways 
    • Watch for proximity bias  
    • Be ready to lose employees 

    2. Stress, Trauma, Mental Health 

    There has been a measurable rise in negative emotions around the globe, including stress, sadness, anger, and worry, according to an annual measure by Gallup. The pandemic caused a spike in the world of unhappiness and we have not yet recovered.

        

    In the workplace, Gallup finds that employee engagement dropped in 2021 for the first time in a decade and dropped again in 2022. Our workforce is unhappy and disengaged at record levels. Why? 

    CAUSE #1 – POST-COVID STRESS DISORDER -“Illness, grief, job loss, social isolation, uncertainty, and other pandemic-driven stressors have contributed to an increase in psychological stress,” according to Yale School of Medicine. There is a new disorder identified as Post-COVID Stress Disorder, which presents similar to PTSD including increased reaction to stimuli, avoidance, focusing on the negative aspects of a situation, incessant contemplation of negative events, and anxious arousal associated with memories of the COVID-19 pandemic.   

    CAUSE #2 – SOCIAL MEDIA -  National Institutes of Health states that social media is strongly correlated with “anxiety, depression, insomnia, stress, decreased happiness, and a sense of mental deprivation.” This correlation is caused by the “negative impact on self-esteem through unhealthy comparisons, social media burnout, stress, lack of emotional regulation due to social media preoccupation, and development of social anxiety due to decreased real-life social interactions.” FOMO (Fear Of Missing Out) is a real thing, with real mental health consequences.  

    Because our workforce is seeing heightened stress and general unhappiness, leaders must be aware of, and manage, employee engagement and well-being. 

    3. Generational Disruption 

    In conjunction with disruptions related to the pandemic, Gen Z’s entry into the workforce is driving change, due to different norms and values regarding workplace atmosphere, culture, and support. By 2030, Generation Z will constitute about 30% of the workforce. While generational stereotypes are not 100% accurate for each individual, data from Johns Hopkins University indicates that, in general, “Baby Boomers sought job security, Generation X sought work-life balance and professional progress, Millennials and Generation Z are seeking greater Diversity, Equity, and Inclusion (DEI), greater flexibility, and a focus on ethics and social awareness of a company.” Gen Z is also seeing a lack of engagement at work leading to lower retention and higher levels of stress that impact work performance.   

    According to McKinsey, factors that motivate Gen Z to stay in a job aren’t the same as those for other generations. Gen Z, for example, considers compensation less important than flexibility, career development, meaningful work, and a safe, supportive work environment. 

    Have you heard of “Quiet Quitting,” “Bare Minimum Monday”, and “Time Blindness”?  These terms, and the values they represent, may at first seem incomprehensible to older generations, but leaders cannot easily dismiss this if they want to recruit and retain a thriving workforce.  Seek first to understand the different generations. 

    Artificial Intelligence (AI) 

    How will AI disrupt the workplace in the next ten years? Some industries and roles will be affected more than others, and leaders will need to be ready to reskill their workforce. McKinsey Global Institute reports that an increase in labor demand is predicted for health professionals, health technicians, and STEM Professionals (a 30% increase).  A 15-20% decrease in labor demand is predicted for office support, customer service, and sales.  In the fields of education and workforce training, business and legal professionals, creatives, and arts management, not a large change in demand is predicted, but a high change in work activities. “Workers in lower-wage jobs are up to 14 times more likely to need to change occupations than those in highest-wage positions, and most will need additional skills to do so successfully.”    

    These changes will not happen immediately, but leaders should begin preparing.  Remember this famous quote from Bill Gates in 1996: 

    We always overestimate the change that will occur in the next two years and underestimate the change that will occur in the next ten. Don’t let yourself be lulled into inaction.”   

    Reskilling your workforce is a strategic imperative and it is the responsibility of every leader and manager. Leaders will need to understand and embrace these shifts if they hope to adapt to the rapidly evolving new era of automation and AI. 

    In conclusion, technology leaders are surely already noticing these workplace disruptions. Great leaders will acknowledge these changes and will reflect on how their personal leadership style and skills must adapt. These are the leaders who will continue to deliver results and enable their organizations to be successful in this age of ever-increasing digitization.   
  • 10/29/2023 4:25 PM | Marla Halley (Administrator)

    In today's fast-paced technology landscape, the integration of Artificial Intelligence (AI) has become a game-changer for businesses seeking to enhance internal and external customer experiences. For professionals well-versed in various aspects of the technology industry, understanding the simplicity of AI and the crucial steps required for success can be a significant advantage. In this blog post, we'll delve into the core concepts of AI, outline the key steps for technology teams to excel, and offer valuable tips for getting data sources right.

    The Simplicity of AI
    Despite its reputation for complexity, AI can be simplified into its fundamental components. At its core, AI is about teaching machines to learn from data and make intelligent decisions. For our audience of technology professionals, this means understanding that AI isn't magic, but a tool driven by algorithms and data.

    Key Components of AI:

    1.    Data: Data is the lifeblood of AI. Accurate, relevant, and diverse data is essential for training AI models. Ensure that your data sources are comprehensive and up to date.
     
    2.    Algorithms: Algorithms are the brains behind AI. These mathematical instructions process data and make predictions or decisions. Familiarize your team with various AI algorithms and their applications.
     
    3.    Model Training: Training AI models involves exposing them to data to learn patterns and make predictions. It's an iterative process that requires constant refinement.  It is very important that the models being trained are consistent with your organization’s culture.
     
    4.    Evaluation and Testing: Rigorous testing is crucial to ensure AI models perform as expected. Monitor their performance and fine-tune them as needed.  Make sure that you include your customers in the evaluation and testing process.
    Steps for Technology Teams to Succeed with AI
    1.    Define Clear Objectives: Start by defining your AI project's objectives. What specific problem are you trying to solve, and how will AI help achieve this? Clear goals are essential.
     
    2.    Assemble the Right Team: Form a cross-functional team with data science, software engineering, and domain knowledge expertise. Collaboration is key.
     
    3.    Data Quality Matters: Garbage in, garbage out. Ensure your data is clean, relevant, and well-structured. Invest in data quality tools if necessary.
     
    4.    Choose the Right Tools: Select AI frameworks, libraries, and tools that align with your project's requirements. Consider open-source options and cloud platforms.
     
    5.    Iterate and Improve: AI is an ongoing journey. Continuously evaluate and refine your models to adapt to changing conditions and data.
    Tips for Getting Data Sources Right
    1.    Data Diversity: Gather data from diverse sources to minimize bias and enhance model performance.
     
    2.    Data Governance: Establish clear data governance policies to ensure data integrity, security, and compliance.
     
    3.    Data Preprocessing: Clean, preprocess, and normalize data before feeding it to AI models to improve accuracy.
     
    4.    Feature Engineering: Craft meaningful features from raw data to enable better model insights.
     
    5.    Data Validation: Implement rigorous data validation processes to detect and rectify errors early on.

    In conclusion, AI need not be shrouded in mystery for technology professionals. By understanding its core components, following the right steps, and paying attention to data quality, your technology team can harness the power of AI to deliver exceptional internal and external customer experiences. Stay informed, collaborate effectively, and embrace the AI revolution to stay ahead in the ever-evolving technology industry.

    Remember, AI is not just a buzzword—it's a transformative force, and you have the knowledge and tools to leverage it effectively.

    Bill Magnuson is the co-founder and CEO of BindMyIT, a leading technology solution consulting company. With over 26 years of experience in the tech industry, Bill is passionate about harnessing AI's potential to drive innovation and improve customer experiences.

  • 10/29/2023 4:16 PM | Marla Halley (Administrator)

    I am consulting with a client who outsourced software development for a new app. As her acting CTO, I have good insight into this relationship and the work they are doing. Let me start by saying, I am shocked by how poorly this vendor treats us. Our negative experience working with them has reminded me of the principle “treat others the way you want to be treated.”  

    The bad news is how difficult this experience has been. The good news is that it prompted me to write about how we should treat our clients, and frankly, how clients want to be treated in return. Whether you provide software services, cyber services, or plumbing services, I think you can relate to the following principles: 

    • Set clear expectations – If you are a software shop and you say that you do Agile development, then explain what your definition of Agile is. Clearly explain your process, especially where and how you will engage the client, so they know what to expect (and what you expect from them in return). If you say you’re an Agile shop, then it should be pretty close to the Agile Manifesto. It most certainly should involve the customer/product owner setting priorities, having short sprints/delivery cycles, and frequent feedback/retrospectives. The main objective is to get feedback from the client early and often and adjust frequently. EXPLAIN YOUR PROCESS. 
    • Communicate frequently, both good and bad – It’s always easy to communicate good news. “Hey, we’re ahead of schedule,” or “That went smoother than we thought it might.” But it’s crucial to deliver the not-so-great news. “It didn’t go as easily as we expected,” or “We just lost our senior developer.” When we have a problem, we all think that we can hide it and fix it without the client ever knowing. That might work some of the time, but your team knows what you did, and you just caused them to lie about what they got done during the sprint.  

    Meet with your client frequently. We recommend weekly. If you have two-week sprints, each week can alternate between a user story/requirements grooming session and a post-sprint retrospective. Use your grooming session to build rapport and understanding with your client and use the retrospective to share what you got done. Be open. Share what you planned to get done vs. what actually got done and have an open dialog about why.  

    Maybe you were too optimistic when you estimated the story points. Maybe you and your client didn’t do a great job grooming a particularly complex requirement. Maybe your testers uncovered a bunch of unexpected bugs. That’s a good thing. You’d rather find them now than later. Maybe two of your team members got sick. Who knows? But the point is to work together, develop lessons learned, learn the lessons, improve, and avoid repeating the same mistakes over and over. SHARE OPENLY. 

    • Set and meet intermediate milestones – If you are running an Agile shop, this is easy. Set a sprint schedule and hold to it. Most organizations we work with use two-week sprints, and a critical key to success is to hold these dates rock solid.  Don’t let the work cause you to slide the date! Another critical key to success is assuring you FULLY complete the work in the sprint. Not all the work you planned needs to be completed, but the work you say got done, must actually be done.
    To achieve this, we recommend you set an immutable, unbreakable definition for Done-Done – This definition cannot be gray because if it is, then … Every feature. In every sprint. Is going to be questioned. Forever. Make it easy and clear to your team, your client, and your stakeholders. For us, the ideal definition of “Done-Done” is that you completed both the development and testing for a feature. Ideally, all bugs are fixed, but at a minimum, all critical and majors are corrected, and any minors or trivials are documented in Jira. DO NOT EQUIVOCATE.
    • Ensure the customer always has full control of their assets – Go through the process in the beginning of having your customer setup and be the administrator of GitHub, servers, database, and all other tools. Even though they might not have this skillset, you want them to know that they always have full control of everything they envisioned and paid for. Empower them so they can go elsewhere if they want. If you are open and honest and constantly improving, they won’t want to.NEVER HOLD THE CODE AS RANSOM. 
    • Report progress against a plan – Customers rightfully want to know how long the project will take and how much it will cost. Build a plan and size the project up front. Show them your past productivity on similar projects so they can understand when you think it will be done. Ideally, share cost, schedule, and quality metrics vs. plan with your customer at each retrospective. Track and report your velocity every sprint so you can give them (and your team) confidence in hitting the deadlines. Are you delivering the expected story points/sprint? Are you finding more or less bugs each sprint? How much effort is going toward new features vs. bug fixes? Does the backlog estimate align with your velocity and meet your expected delivery date and budget? Do you have a management reserve built into your estimates? Collecting and communicating this information allows you to improve and provide your customers with ever-growing confidence in you. YOU CAN’T MANAGE WHAT YOU DON’T MEASURE.
    • Be honest and kind – If you mess up, own it, and fix it. Don’t try to hide things because it’s always a bad situation when the truth comes out. I think we all learned that lesson in kindergarten. And don’t charge the customer for your mistakes, training, or lack of experience. Be positive and kind in your communications even if you don’t agree with your customer. Explain why your opinion is different and have a dialog. Put yourself on the same side of the table as the customer and realize that you are both trying to successfully deliver this app. I know there are some less than reputable companies, but I think the vast majority of software shops want to deliver successful apps and want happy client references. TREAT YOUR CLIENT THE WAY YOU WANT TO BE TREATED. 

    I wrote this talking directly to software development companies, but it’s easy enough to flip the script and read these as the expectations you should have when buying software services. If you are in the market for a software development partner or have found yourself in a frustrating situation with one who isn’t performing where you want them to be, ask yourself how you want to be treated. Then, use your answers and the guide above to find a qualified partner who not only aligns with your needs as a company and client, but as a person.  

    We’d love to hear from you! Do these resonate with you? What have your experiences been? Please share your personal experiences so we can all learn and improve.  

    Jeff Van Fleet 

    President & CEO, Lighthouse Technologies, Inc. 

    After almost 20 years of developing and managing complex software/hardware systems for both commercial and Department of Defense (DoD) applications, Jeff founded Lighthouse Technologies in 2000 with the aim of delivering software systems on-time, on-budget, and on-quality while simultaneously building an intentional culture of caring, growing, and improving – A “Culture of We”. 

  • 09/29/2023 11:18 AM | Marla Halley (Administrator)


    The NIST Cybersecurity Framework

    NIST, the US National Institute of Standards and Technology, has released a new draft version of its Cybersecurity Framework (CSF).  This 2.0 version of the voluntary Framework is the first refresh to the current 1.1 version released in 2018. 

    NIST, the US National Institute of Standards and Technology, has released a new draft version of its Cybersecurity Framework (CSF).  This 2.0 version of the voluntary Framework is the first refresh to the current 1.1 version released in 2018. 

    At a high level, the CSF is a set of guidelines intended to help organizations improve their cybersecurity practices and effectively manage their cybersecurity risks.  By following the Framework, organizations can enhance their overall cybersecurity posture, minimize cybersecurity risks, and safeguard critical assets and data. 

    The Framework Core is a set of cybersecurity outcomes which are arranged by function, category, and subcategory.  It also includes examples of how those outcomes might be achieved by providing implementation examples and references to additional guidance.  It’s not a checklist to follow because the actions needed to achieve a cybersecurity outcome will differ by organization and use case.

    Changes to the Cybersecurity Framework

    Expanded Scope

    The scope of the Framework has been expanded.  The CSF was initially developed with the focus of protecting critical infrastructure such as banking and energy industries, but the Framework has been useful in other sectors from small businesses, education, to local governments. 

    Expanded Implementation Guidance

    The updated version provides improved and expanded guidance on the implementation of the CSF.  The use of Framework Profiles tailors the CSF for specific use case scenarios.  Examples of Profiles include a specific scenario such as “How to Use the Cybersecurity Framework Profile for Connected Vehicle Environments,” or a more general topic of “Ransomware Risk Management.”

    The Framework will also now include implementation examples for each of the function’s subcategories to help organizations use the framework more effectively.  These examples are not contained in the main framework document but will be maintained separately in an online format called the NIST Cybersecurity and Privacy Reference Tool (CPRT).  This will allow for more frequent updates to keep information current.  This tool is currently in Phase 1 of its development and will be expanded as it matures.

    New Pillar

    The CSF has added a new pillar to the previous five main functions of identify, protect, detect, respond, and recover.  The sixth pillar that was added is the Govern function.  The new pillar focuses on the establishment and monitoring of the organization’s cybersecurity risk management strategy, expectations, and policy. 

    The Govern function isn’t an entirely new topic in the CSF.  17 of the 31 subcategory items in the Govern function have been moved from one of the other five functions.  In addition to new subcategories being added an entirely new category was added related to Oversight. 

    One new focus is the emphasis on organizational leadership bearing responsibility and accountability for cybersecurity risk and an organizational culture that is risk-aware, ethical, and continually improving.  It shows cybersecurity isn’t just a function of IT but rather needs to be a part of the organization’s overall governance and strategic planning.

    Conclusion

    The changes to the new (draft) version of the NIST CSF bring an expanded scope to include more than just “critical infrastructure” sectors.  Framework Profiles / use cases help to tailor the Framework to organizational and sector goals.  Implementation guidance for each of the Function’s subcategories helps organizations to use the framework more effectively.  Finally, the addition of the sixth pillar of Govern shows the importance of the integration of cybersecurity into overall business strategy and oversight.

    Marcus Thompson is the Founder and CEO of Expedient Technology Solutions, LLC, located in Miamisburg, OH.  ETS is a cybersecurity-focused managed services provider bringing technology and cybersecurity solutions to area organizations.  Marcus holds many cybersecurity certifications including the Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM).

  • 09/04/2023 12:18 PM | Marla Halley (Administrator)

    As organizations rapidly deploy generative Artificial Intelligence (AI) tools, many companies expect significant effects on their industries and workforces.

    The latest annual McKinsey Global Survey on the current state of AI confirms the explosive growth of generative AI (gen AI) tools. Less than a year after many of these tools debuted, one-third of the McKinsey survey respondents say their organizations are using gen AI regularly in at least one business function. Amid recent advances, AI has risen from a topic relegated to tech employees to a focus of company leaders: nearly one-quarter of surveyed C-suite executives say they are personally using gen AI tools for work, and more than one-quarter of respondents from companies using AI say gen AI is already on their boards’ agendas.

    What’s more, 40% of respondents say their organizations will increase their investment in AI overall because of advances in gen AI. The findings show that these are still early days for managing gen AI–related risks, with less than half of respondents reporting that their organizations are mitigating even the risk they consider most relevant: inaccuracy.

    Darrell West, Senior Fellow, Governance Studies at the Brookings Institution, states that AI is likely to flatten many organizations due to its ability to automate work activities. Right now, most organizations have entry-level people who perform routine tasks, midlevel individuals who supervise them, and high-level employees who set the direction of the organization.  That organizational structure will no longer be necessary. AI can automate many of the tasks performed by entry-level workers. Accounting features, purchase orders, and job requisitions are already being automated. Workplaces no longer need people who manually compile or analyze information.

    As generative AI becomes more widely deployed, even more tasks will be automated. In addition, job supervision and assessment won’t need as much human oversight. Customers can rate employees on how well they perform basic tasks and allow people to get the services they want. Using data analytics and AI, companies can use the responses to weed out low-performing workers and reward their top individuals. The end result will be fewer layers of management and a smaller number of employees overall in the organization.


    Image Source: McKinsey Global Survey on the current state of AI

    Michael Chui, Partner, McKinsey Global Institute, states that there are some gen AI applications where the potential to have transformative impact really comes to the fore. For example, in research and development, some experiments using generative AI to support writing software code have shown very high levels of increasing productivity. But that doesn’t mean we’ll need a lot fewer software engineers, because the world needs more software. Generative AI also has the potential for improving the productivity of contact centers. Technologies that automate interactions with customers already exist. Generative AI has the potential for making these interactions feel much more natural.

    Alexandra Samuel, digital-workplace speaker and co-author of “Remote, Inc.” states that as AI takes over routine tasks, there will be a temptation to cut the whole tier of entry-level employees. Summarizing documents, answering routine emails, writing basic computer code, and solving simple logistical challenges are all tasks that AIs can do about as well as an inexperienced human, and at much lower cost. But employers still need an on ramp for new hires. If you stop hiring entry-level employees, you’ll have to do all your midlevel hiring from outside the organization. And if every organization pares back on entry-level hires; it will get harder and harder to find experienced mid career talent anywhere.

    That’s why it pays to cultivate your own long-term talent pool by hiring green employees, but rethinking how they are tasked and trained. Instead of piling your juniors with grunt work and trusting that they’ll learn through observation, assign them more challenging tasks, like drafting reports instead of just summarizing them. The explosion in AI research and writing tools means that kind of work is now well within the grasp of inexperienced hires. With more active coaching and mentoring, these green employees can grow into valuable colleagues, much more quickly.

    ###

    Trevor Cobain is the Senior Business Development Manager for Alta IT Services. He has over 20 years experience providing niche talent ​opportunities to his clients.

  • 08/21/2023 3:31 PM | Marla Halley (Administrator)

    For the first time in Technology First history, we are hosting a women’s conference. We are thrilled to bring this half day event to the Women 4 Technology community! The theme for this year’s conference is Own IT! As you can imagine, we’ve had several conversations over what Own IT means, and I was surprised by the variety of viewpoints.

    For me, Own IT means:

    Owning who I am, knowing my values, understanding my strengths, owning my personality type, and setting, and sticking to, my boundaries. It’s so important to be both confident in who we are and really owning who we are. I remember a time when I wished that I was five feet tall and weighed 100 pounds. It simply isn’t the way I’m built and today I’m okay with that.

    Over the years I’ve taken a plethora of values tests and they pretty much stay the same: collaboration, honesty, trust, contribution, and participation to name a few. Knowing my values helps me stay aligned with what really matters, how I decide to spend my time and with who. If you haven’t taken a values test here is a pdf to get you started.

    Several years ago, I read Strength Finders 2.0 by Tom Rath. It’s a quick read and then a quick online test. The feedback I received was invaluable! I learned my top strengths are achiever, learner, responsibility, deliberative and relator. Knowing this has helped me know where and how to best spend my time. I surround myself with people that have different strengths because together we make a great team!

    Knowing my personality type has also clarified how I communicate and how I process. If you are familiar with Myers-Briggs, or MBTI, I’m INTJ: introvert, intuitive, thinking, judging. I know, introvert, me?! This one really helped me understand the reason I’m exhausted after a day of meetings and networking.

    Boundaries! Man, these are tough! As I get older, I’m better at them but then there are times I think I can conquer everything, volunteer for everything, and do everything. Setting boundaries has become both necessary and a way to ensure I work on some sort of work/life harmony.

    Owning IT also means, to me, taking responsibility for my actions and my team. Ensuring that my expectations are clearly communicated, and that we are all on the same page. If something fails, it’s my fault and my job to find out what I need to do to fix it. What processes and/or procedures need to be reviewed, reevaluated, and/or created to ensure it doesn’t fail again? It’s when I mess up and take responsibility, owning my actions, or lack of action.

    So, I ask you, what does Own IT mean to you? Join us on Wednesday, September 27th and share your point of view!

    *********

    Melissa Cutcher is Executive Director of Technology First. 

  • 07/26/2023 3:23 PM | Marla Halley (Administrator)

    It is one thing to grow a business through organically increasing market share through advertising and selling.  It is another thing to grow by gobbling up (or being gobbled up by) your competition.  The level of unmitigated chaos created by welding two different companies, with separate cultures, practices, and methodologies cannot be underestimated. 

    Unfortunately, some of this pain and suffering is self-inflicted, especially within the Information Technology (IT) department.  Their job is to provide the electronic tools and talents necessary for modern businesses to do their business.  That is why IT takes up such a large chunk of the overall budget.  That is also why IT is a prime target for redundancy elimination when the two companies finally become one.

    Why is it, then, that IT Asset Management (ITAM) is rarely ever mentioned, if at all, as part of the merger and acquisition (M&A) process?  ITAM’s purpose is to achieve cost optimization of the hardware and software spend across the entirety of those assets’ useful life.  Maybe it is because ITAM works behind the scenes and their impact is overlooked.  Maybe your own ITAM program’s reporting accuracy has a poor reputation.  Maybe the organization hasn’t prioritized ITAM tooling and training to ensure they are ready for the extra workload an M&A will bring.

    Regardless of the reasons for past mistakes, let’s examine some ways you can avoid ITAM issues in future M&As:

    1.     Get Your ITAM Team Involved Right Away - The sooner your team knows about the company s plans and understands they will be front and center, the better. Don t wait for them to hear about it somewhere else. The last thing you want is for them to panic.  Give them time to find and review their own tooling and knowledge gaps. This increases their chance for a successful outcome.

    2.     Help IT Security, IT Service Management, and ITAM Work Together - Cybersecurity and Service Management are usually top of mind. They are your go-to teams for surveying the acquired company’s technology stack.  Adding ITAM provides a third, complimentary vision into the workings of the acquisitions IT operations. This can ensure all three teams have accurate and trustworthy reporting on any expensive services, vulnerabilities, or license audit risks.

    3.     Understand You ll Run Two ITAM Teams For A While - Each company s asset records and configuration items must be kept separate from each other until the combined group s service and license agreements are renegotiated.  That means two configuration management databases (CMDBs) or managed data repositories (MDRs).  Resist the urge to just smash the two systems together and hope for the best.  Allow ITAM the chance to dig through old records, determine their validity, and ingest only the valid ones.

    4.     Control How Much Software Publishers & Service Providers Know About The M&A - Software auditors examine trade publications and press releases every day and delight in scheduling license audits at the most inopportune times for you. You and your ITAM team need to be ready for an audit notification the second your M&A plans go public. Have your audit defense playbook ready!  And if you don’t have one?  Well…

    5.     Don t Hesitate To Bring In Outside Help - Software publishers routinely bring in third-party software auditors to help them conduct their investigations.  Third-party cybersecurity firms can provide experience and talent for the short-term needs the merging companies might lack.  And some managed service providers specialize in providing temporary contractors to cover spiking IT support demands.  I can assure you, there are specialized ITAM firms that can provide cost-effective and customized hardware and software licensing support until the merger completes.

    M&As (and Divestitures, for that matter) can be exciting events.  They don’t happen that often, like field trips and pizza parties when you were a kid.  And that means your IT department could lack the experience necessary to ensure the smooth creation of the new organization.  Just remember: your IT Asset Management team can help mitigate these issues, but only if they are brought in early enough to successfully apply their best business practices.

    **********

    Jeremy L. Boerger, the ITAM Coach, founded BOERGER CONSULTING with the idea of helping organizations cut their software budget without buying less software”.  He also speaks around the country to pass along his 20+ years experience to the next generation of ITAM and SAM professionals.  His book, Rethinking Information Technology Asset Management,” is available at Amazon, Barnes & Nobel, and most other bookstores.

  • 07/03/2023 10:02 AM | Marla Halley (Administrator)


    • Every business is unique, so the specific blueprint to successful digital transformation varies. You will achieve your desired results if you tailor your approach to your organization's needs, industry, and market conditions. Here are some factors to consider.

      Evaluate Current Strategy

      • Target your investments: Companies spend big on digital transformation. Spend wisely. Prioritize security and privacy throughout your digital transformation efforts. Implement robust cybersecurity measures to protect your data, systems, and customer information. Ensure compliance with relevant regulations and standards. Technology is a key component, but you must invest in your people, processes, and customers.
    • Prioritize the business: Invest in a modern and scalable technology infrastructure that supports your digital initiatives. This may involve adopting cloud computing and integrating various software applications and systems. Technology stacks are evolving at a rapid rate, which causes businesses to want to chase after the next best thing. Always have the business at the heart of the transformation. Ensure it makes sense as it will ultimately have a wide effect on the business and is worth pursuing.
      • Engage your workforce: Foster an agile and adaptive culture within your organization. Encourage innovation, experimentation, and a willingness to take calculated risks. Embrace new technologies, encourage collaboration, and empower employees to contribute ideas and drive change. Get input from your employees and seek out their perspective. They are performing current processes daily and can speak about them from firsthand experience.
    • Put People First

      • Focus on the customer: Ultimately, digital transformation is about exceptional user experiences. Prioritize your customers throughout the transformation process. Gain a deep understanding of their needs, preferences, and pain points. Use this knowledge to design digital solutions that enhance their experience and deliver value. Map out your entire customer journey. It will provide a clear roadmap to help you build engaging customer experiences for your target audience.
    • Make it a collective effort: Ensure you have the right talent and skills within your organization to drive digital transformation. Identify skill gaps and provide training and development opportunities for your employees. Transformation can’t succeed in a silo. Business and IT teams must get on the same page, communicate, and create a shared vision before moving digital transformation strategies forward.
    • Be mindful with leadership: Choose leaders and representatives wisely to gauge the organization as a whole and help build a culture of learning and sharing to support business transformation.
    • Set Clear Expectations

      • Start with the end in mind: Define a clear vision for your digital transformation and establish a strategy that aligns with your business goals. Determine what you want to achieve, whether it's improving operational efficiency, enhancing customer experience, or exploring new business models. Starting with a plan and building a roadmap will help you construct operational value streams and enablement runways. They will serve as the foundation for achieving true business and delivery agility.
    • Embrace disruption: Digital transformation requires strong leadership and effective change management. Engage key stakeholders, communicate the vision, and create a culture that embraces change. Leadership should inspire and drive the transformation, ensuring everyone understands the importance of digital initiatives. Whether environmental, geopolitical, technological or a public health crisis, the next disruption is coming. Create flexibility and resiliency within your company, so you do more than weather the storm. You grow, innovate, and thrive through it.
    • Define the business outcomes: Leverage data and analytics to make informed business decisions. Implement robust data collection, storage, and analysis processes. Extract insights from data to drive improvements, optimize processes, and identify new opportunities. Remember, no business initiative can thrive without being rooted in a quantifiable outcome that has an impact and meaning for the organization. It all starts with the unifying force of having tangible goals. Where do you want to go and how will you get there?

    Digital transformation is an ongoing process. Continuously monitor and evaluate the effectiveness of your initiatives. If you embrace a culture of continuous improvement, iterate on your digital solutions, and adapt to changing market conditions and customer needs, then your business’s digital transformation will be successful.

    TekSystems brings real-world expertise to solve your complex technology, business and talent challenges on a global scale.

    Read The Full Article Here 

  • 05/31/2023 8:39 AM | Marla Halley (Administrator)

    “Without data, you’re just another person with an opinion,” business management expert W. Edwards Deming once said.

    Well, how can you get “data” to go from an “opinion” to an insight and build a strong business entity that can sustain fierce competition and an unpredictable future? The answer is simple “IF” it is done right:

    Invest in Business Intelligence (BI) solutions that are scalable and have an enterprise mindset.  

    One of the most common approaches to selecting and implementing a BI solution is when a CIO or top-level IT leader sees a demo of (fill in the blank BI tool…). They love it so much, they think ‘we just need to get it done!’ But wait, what about the backend part of this tool? Did the demo show how the data is curated? Did they show how scalable the data models are? The answer is:

    ‘We just need to figure out how to make it work!’

    That is where BI engineers and consultants come in. Thinking only about the dashboard and not the backend at the beginning is an expensive approach and leads to frustrating implementation. Sometimes, you end up with both the new BI tool and the one you are trying to replace because the shiny new one is not working as well as hoped.

    Having a user-friendly BI dashboarding tool is an important part of data analytics. However, more important than the dashboard is the data model and how scalable it is, so an organization can build it once and EVERYONE can use it in any dashboard they build.

    A scalable enterprise semantic layer makes BI developers’ and analysts’ jobs a lot easier, and it is one of the factors of achieving BI implementation with “one source of the truth.” A smart business analyst that knows how to build a top-class dashboard does not necessarily know how create a data model, but having the enterprise semantic layer will eliminate that gap. Hence, data modelers are expensive for a reason, but that can be overcome with a build-it-once approach that does not require data analysts to also be data modeling experts.

    Here is a common example: There are two dashboards representing an amount figure, (ex. last quarter’s sales) but they show two different values. After a long investigation, you end up with a third different value so the insights become three different “opinions.” The hardest part of this example is trying to explain to the leaders why enterprise data models are important so the analysts do not make the wrong tables join and show incorrect data that might have a consequential outcome.

    In conclusion, most people can build a dashboard with little to no training if the data is coming from one table or an Excel file. However, to be an analytical savvy business, it is critical to invest in BI solutions that have built-in scalable enterprise semantic layers so there is “one source of the truth.”

    *****

    Salem Alsulaiman is a Business Intelligence Engineer and Technology First’s Data Analytics Peer Group Chair. He has more than 10 years’ experience in the Business Intelligence (BI) and data analytics space, implementing end-to-end BI solutions.


Meet Our Partners

Our Annual Partners share a common goal: to connect, strengthen, and champion the technology community in our region. A Technology First Partner is an elite member leading the support, development, and expansion of Technology First services. In return, Partners improve community visibility and increase their revenue. Make a difference in our region and your business. 

Become A Partner

Champion Partner


Cornerstone Partners



1435 Cincinnati St, Ste 300, Dayton Ohio 45417

Info@TechnologyFirst.org
937-229-0054

Cancellation Policy | Event Terms and Conditions | Privacy Statement