Today’s Enterprise - Cyberthreats Lurk Amid Major Transformation Assessing the Results of Protiviti’s 2015 IT Priorities Survey INTRODUCTION “T he very technologies that empower us to do great good can also be used to undermine us and inflict great harm . national security . … [ the ] ... cyber threats are a challenge to our problem of how we secure this digital world is only going to increase .” U.S. President Barack Obama1 Amid major technology transformation and change, danger seemingly lurks everywhere for today’s enterprises. Crafty, cunning and dangerous cyber predators worldwide are threatening to blow the lid off organizational cybersecurity defenses. Defending against these predators is consuming large amounts of IT hours and resources at a time when a majority of organizations are undergoing a major IT transformation (see page 5). Outwitting the wolves at your organization’s “cyber door” and managing changes in the enterprise with confidence requires IT departments to deploy an impressive and innovative array of information security approaches, processes, tools, skills/personnel, and collaborations – all of which we find at the top of IT’s packed priority list, according to the results of Protiviti’s 2015 IT Priorities Survey. Not surprisingly, the priority placed on security and privacy capabilities has intensified in our survey this year – often dramatically. To illustrate, in last year’s study the highest-ranked area in this category (“Developing and maintaining security and privacy standards”) had a priority index of 6.4 (on a 10-point scale). This year, a full dozen of the security and privacy capabilities we assessed are ranked 6.7 or higher. As we detail in our report, the results for CIOs and IT executives are even more pronounced. These trends are, in fact, evident throughout this year’s results, which show that IT leaders and professionals are contending with a vast number of increasing and competing priorities, including but not limited to cybersecurity. This also mirrors key findings from our recent Executive Perspectives on Top Risks for 2015 study, in which board members and C-suite executives identified cybersecurity as one of the top risks their organizations must address in 2015.2 Our key findings in this year’s IT Priorities Survey include: 1. Security concerns are paramount – No surprise here: Addressing and strengthening cybersecurity represents a critical priority among all respondents, CIOs and companies of all sizes. 2. Major IT changes and upgrades continue – Well over half of all organizations are undergoing a major IT transformation that will last a year or longer, intensifying demands on IT departments to manage these changes successfully while addressing other critical business needs (e.g., cybersecurity). 3. The search for balance is underway – As important as cybersecurity and privacy issues have become, they represent just one of many rising priorities, such as virtualization and enterprise 1 2 Comments made at the White House Summit on Cybersecurity and Consumer Protection, February 13, 2015. Executive Perspectives on Top Risks for 2015: Key Issues Being Discussed in the Boardroom and C-Suite, North Carolina State University’s ERM Initiative and Protiviti, www.protiviti.com/toprisks. 2015 IT Priorities Survey • protiviti.com/ITpriorities 1 architecture, on the IT department’s bursting agenda. IT executives and professionals have a vast number of pressing duties on their plates this year, with priorities increasing across the board in volume and significance. To address and manage these challenges successfully, they must develop and strengthen the expertise and business savvy necessary to strike the right balance between activities that enhance business value and those that protect organizational value. 4. IT seeks to manage all assets better: data, hardware, software and more – IT departments are adapting and improving how they manage a broader and more diverse collection of companyowned and third-party assets (including data) as their companies seek to harness more and more business value from them. 5. Collaboration is key – Organizations undergoing and managing major changes are focused on leveraging technology to enable greater collaboration across the enterprise. This not only facilitates more opportunities for real-time partnering, but also reduces time-to-value significantly. Top 10 IT Priorities for 2015 (including ties)* Rank IT Area 2015 Priority 2014 Priority Index Index “Significant Priority” Percentage (6-10) 1 Virtualization 7.3 6.5 2 Virus/malware advanced threat detection/eradication 7.1 NA Data breach and privacy laws (various U.S. states) 7.0 6.2 Enterprise architecture 7.0 NA Incident response success (containment, recovery) 7.0 6.3 83% Monitoring security events 7.0 6.4 84% Data architecture 6.9 6.4 81% Data governance 6.9 6.3 81% Incident response policy and preparedness 6.9 6.3 82% Incident response reaction time 6.9 6.3 83% IT project management 6.9 6.5 82% Patch management 6.9 NA NA 83% Vulnerability scanning 6.9 NA NA 82% 3 (tie) 7 (tie) * Based on a 10-point scale. See Methodology section for details. 2 YOY Trend 2015 IT Priorities Survey • protiviti.com/ITpriorities 86% NA 83% 83% NA 81% METHODOLOGY More than 1,000 respondents (n = 1,073), including CIOs, IT vice presidents and IT directors, participated in our study, which was conducted within the prior 90 days. We are grateful for the time invested in our study by these individuals. Participants answered more than 100 questions in 10 categories: • Managing Security and Privacy • Technical Knowledge • Defining IT Governance and Strategy • Managing IT Assets • Management and Use of Data Assets • Ensuring Continuity • Managing Application Development • Deploying and Maintaining Solutions • Managing IT Infrastructure • Organizational Capabilities For each of these categories, respondents were asked to rate, on a scale of 1 to 10, the level of priority for them and their organizations to improve in different issues and capabilities. A “10” rating indicates the issue is a high priority while a “1” indicates the issue is a low priority. We have classified each issue and capability with an index of 6.0 or higher as a “Significant Priority” for IT functions. Those with an index of 4.5 through 5.9 are classified as a “Moderate Priority,” and those with an index of 4.4 or lower are classified as a “Low Priority.” (Of note, none of the more than 100 IT issues and capabilities addressed in our 2015 survey is rated to be “Low Priority.”) Our survey also includes a special section, “IT Transformation,” in which we assess how IT organizations are managing changes and addressing budget and resource challenges. 2015 IT Priorities Survey • protiviti.com/ITpriorities 3 IT TRANSFORMATION Key Findings • For the second consecutive year, a majority of organizations report they are undergoing a “major IT transformation,” though there was a slight year-over-year decrease in the results. • Most organizations expect the IT transformation to last a year or longer, and the magnitude of disruption caused by these changes is viewed to be very significant (of note, multiple studies continue to show that many IT projects experience costly delays, exceed established budgets and/or fail to fulfill the original business requirements). • IT transformations are intended to achieve multiple objectives, the most common of which are cost/simplification, new functionality, service assurance and regulatory/compliance. Key Facts Percentage of organizations undergoing a major IT transformation Level of disruption (scale of 1 to 10) organizations are experiencing as a result of a major IT transformation 60 6.4 54 Percentage of organizations in which the duration of the IT transformation is expected to be a year or longer What are the objectives of your organization’s IT transformation?* Cost/simplification 64% New functionality (mobile, new products, etc.) 55% Service assurance 47% Regulatory/compliance 46% Adoption of emerging technology 43% Time to market/agility 34% * Multiple responses permitted 2015 IT Priorities Survey • protiviti.com/ITpriorities 5 MANAGING SECURITY AND PRIVACY Key Findings • The top security and privacy priorities – including virus/malware advanced threat detection/eradication, monitoring security events, and incident response success (containment, recovery) – rank among the highest priorities in the entire survey. • IT functions plan to invest significant time, staff, technology and budget on numerous specific security and privacy priorities in 2015. Overall Results, Managing Security and Privacy Managing Security and Privacy 6 2015 Priority 2014 Priority Index Index Virus/malware advanced threat detection/eradication 7.1 NA Incident response success (containment, recovery) 7.0 6.3 Monitoring security events 7.0 6.4 Incident response policy and preparedness 6.9 6.3 Incident response reaction time 6.9 6.3 YOY Trend NA Patch management 6.9 NA NA Vulnerability scanning 6.9 NA NA Developing and maintaining security and privacy standards 6.8 6.4 Managing user identities and access 6.8 6.3 End-user security awareness and training 6.7 NA Implementing security/privacy solutions and strategies 6.7 6.3 Managing technical infrastructure configuration 6.7 6.2 Penetration testing (internal/external) 6.7 NA Managing application users 6.5 6.2 Managing IT users 6.5 6.2 Managing third-party vendors 6.5 6.0 U.S. Health Insurance Portability and Accountability Act (HIPAA) 6.5 5.8 Managing and classifying enterprise data 6.4 6.2 Managing contractors 6.4 6.0 Clarity about third-party compliance readiness (partners, vendors) 6.3 6.0 U.S. Gramm-Leach Bliley Act (GLBA) 6.2 5.8 California Security Breach Information Act (CS SB 1386) 6.0 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities NA NA Commentary Documented occurrences of corporate and governmental data breaches grow larger, more prevalent, more damaging and more complex in nature. Boards and C-suite executives are more focused than ever on security issues.3 And enterprises are adopting a more comprehensive view of their information security. Thus, IT is doubling down on its efforts to strengthen information security and privacy. Note that each of the 22 areas included in this section of the survey are ranked at the “Significant Priority” level. Virus/malware advanced threat detection/eradication, which we added to the survey this year, received the second-highest index ranking among all of the 100-plus priorities evaluated in this year’s study, and monitoring security events and incident response success (containment, recovery) are among the top six priorities in our survey. We view the responses as indicative of organizations focusing on leveraging technology and automation to improve their ability to identify risks in real-time – and to respond accordingly. Additionally, of those areas included in last year’s survey, every one of them ranks higher this year compared to last year’s results. In other words, information security and privacy, a longstanding IT priority, is becoming even more important. That said, this challenge is no longer viewed strictly as an “IT issue” at leading companies, but rather as a critical business issue. Executive management teams and boards of directors are working closely with IT executives to more effectively manage and monitor what qualifies as a strategic risk.4 Key Questions to Consider • Has an information security model – such as the NIST Cybersecurity Framework, ISO 27001/27002 or Critical Security Controls for Effective Cyber Defense – been adopted? Has the organization done a gap assessment against one of these models? • Has the company performed an information security risk assessment to understand its technical exposures? • Does the organization have the tools and processes to effectively prevent, detect and contain targeted malware after a user clicks on a link in a phishing email? • Does the organization have the right tools and staffing levels to address the security needs of the organization effectively? • Does the organization’s IT strategy include an incident response plan that is evaluated regularly to ensure it addresses new and emerging types of security and privacy risks and breaches? • Is an effective incident response team in place and equipped to reduce the occurrence, proliferation and impact of security breaches? • Who in the IT organization is responsible for keeping executive management and the board updated regarding the company’s information security and privacy risks? • Do key stakeholders (IT, C-suite executives, board members) support the development of an information security strategy appropriate to the organization’s scale, culture, regulatory obligations and business objectives? Ibid. Protiviti’s Board Perspectives: Risk Oversight, Issue 44, “Managing Cybersecurity Risk,” www.protiviti.com/en-US/ Pages/Board-Perspectives-Risk-Oversight-Issue-44.aspx. 3 4 2015 IT Priorities Survey • protiviti.com/ITpriorities 7 • Does the current incident response plan include procedures that identify specific actions to be taken in response to specific types of security incidents? How often are these procedures exercised (think “fire drill”), and who is responsible for doing so (and taking corrective actions, if necessary)? • What steps are in place to test and improve incident response speed as well as the quality of the overall incident response capability? • Have thresholds been identified that indicate when and how executive management and, in some cases, the board, should participate in incident response efforts when appropriate? • Is there agreement on what metrics are communicated to the board and executive management to keep them sufficiently aware of the organization’s information security status? • Is the organization clear on the value/importance of its information assets – especially those that could be considered its “crown jewels”? Does the company have a formal data classification program to help manage both the effectiveness and efficiency of the overall data security and privacy capability? How is this program communicated and taught throughout the entire organization? • Is security-event monitoring support being performed in-house, through a managed security services provider (MSSP) or both? How is the effectiveness of this monitoring evaluated? • Are third-party vendors and trading partners addressed in the organization’s security/privacy strategy? • How is vendor compliance with security and privacy policies and standards monitored (including incident response preparedness)? • How are internal (“insider”) security threats monitored, managed and communicated? • What additional technologies are planned for managing security risk? Key Facts To whom or where does the CIO and IT organization report?* CEO CFO Board of Directors * Percentages shown 8 2015 IT Priorities Survey • protiviti.com/ITpriorities 21 42 8 22 7 COO Other Focus on CIOs/IT Executives and Large Companies Managing Security and Privacy – Results for CIOs/IT Executives and Large Company Respondents Managing Security and Privacy Virus/malware advanced threat detection/eradication CIOs/IT Executives YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) NA NA Patch management NA NA Vulnerability scanning NA NA NA NA NA NA Incident response success (containment, recovery) Monitoring security events Incident response policy and preparedness Incident response reaction time Developing and maintaining security and privacy standards Managing user identities and access End-user security awareness and training Implementing security/privacy solutions and strategies Managing technical infrastructure configuration Penetration testing (internal/external) Managing application users Managing IT users Managing third-party vendors U.S. Health Insurance Portability and Accountability Act (HIPAA) Managing and classifying enterprise data Managing contractors Clarity about third-party compliance readiness (partners, vendors) U.S. Gramm-Leach Bliley Act (GLBA) California Security Breach Information Act (CS SB 1386) Significant Priority Index of 6.0 or higher Moderate Priority Index of 4.5 to 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities 9 TECHNICAL KNOWLEDGE Key Findings • Virtualization, data breach and privacy laws, and enterprise architecture (a new addition to this year’s study) not only are the top priorities in this category, but also represent three of the highest-ranked priorities in the entire survey. • Cybersecurity guidance, including NIST, is prevalent in the Technical Knowledge priority list. • Data governance and data architecture (another new area in the survey) also rank as significant priorities. • As is the case throughout this year’s survey, many technical capabilities rank higher as priorities this year compared to last year’s results. Overall Results, Technical Knowledge Technical Knowledge 10 2015 Priority 2014 Priority Index Index Virtualization 7.3 6.5 Data breach and privacy laws (various U.S. states) 7.0 6.2 Enterprise architecture 7.0 NA Data architecture 6.9 6.4 Data governance 6.9 6.3 IT project management 6.9 6.5 Cloud computing 6.7 6.3 Cloud storage of data 6.7 6.1 IT program management 6.7 6.3 NIST (cybersecurity) 6.7 6.1 Big data 6.5 6.0 Business process automation 6.5 NA ERP systems 6.5 6.2 YOY Trend NA NA ITIL 6.4 NA NA Agile methodologies 6.3 NA NA Data discovery/e-discovery 6.3 NA NA Mobile development 6.3 NA NA PCI DSS 6.3 5.8 Smart device integration 6.3 6.1 Mobile commerce security 6.2 6.1 Open Web Application Security Project (OWASP) 6.2 NA 2015 IT Priorities Survey • protiviti.com/ITpriorities NA Technical Knowledge 2015 Priority 2014 Priority Index Index PMP 6.2 6.1 BYOD policies/programs 6.1 6.1 CISSP/CISM 6.1 5.9 ISO/IEC 27001 and 27002 6.1 6.2 Mobile commerce integration 6.1 6.0 Mobile commerce policy 6.0 5.9 Social media policy 6.0 5.8 Social media security 5.9 6.0 COBIT 5.8 5.9 Social media integration 5.8 5.9 ISO 31000 5.7 6.0 CISA 5.6 5.8 European Union Data Directive 5.6 5.9 HITRUST CSF 5.6 5.6 CGEIT 5.5 5.7 YOY Trend Commentary Given the prevalence of IT transformation and the resulting challenges for organizations, it is not surprising to find numerous multidimensional knowledge areas ranking as key priorities in this category, as IT functions strive to both enhance and protect business value. These twin objectives are evident at the top of the Technical Knowledge priority rankings, where equal weight is given to addressing data breach and privacy laws (protecting value) and improving enterprise architecture (enhancing value). Interestingly, the highest-ranked priority in the entire survey, virtualization (7.3), is not tied directly to security. Rather, virtualization serves the dual purpose of enhancing and protecting value by helping IT functions boost efficiency and productivity, reduce power usage and operating costs, and strengthen security and disaster recovery capabilities. While virtualization ranks highly as a priority this year, it certainly is not the only priority in this category. In fact, compared to our 2014 results, there are higher priority index scores throughout the category. Last year, two areas (virtualization and IT project management) each had a priority index of 6.5, while other Technical Knowledge areas scored 6.3 or lower. This year, 10 areas scored 6.7 or higher, with three scoring 7.0 or higher. Relating back to the earlier discussion regarding security and privacy challenges, cybersecurity issues, including data breach and privacy laws (various U.S. states) and the NIST Cybersecurity Framework, also rank among the most important of all issues that IT functions are confronting in this category. 2015 IT Priorities Survey • protiviti.com/ITpriorities 11 Key Questions to Consider • How can the IT department strengthen its current approach to virtualization (server, network, desktop) through new collaborations, investments and skills? • Is the IT department’s knowledge and expertise concerning virtualization, enterprise architecture and cloud computing sufficient? If not, how can this knowledge be enhanced or supplemented? • Is the IT department maintaining current knowledge of changing data breach, information security and information privacy laws, rules, directives, standards and guidance? • Has IT evaluated the organization’s cybersecurity program against the NIST Cybersecurity Framework? • Is data security sufficiently addressed in current data governance, data architecture, IT project management and IT program management activities? • Does IT maintain formal mobile commerce and social media policies that lay out the security requirements for those who engage in mobile commerce and/or social media activities? • Does IT maintain a “bring your own device” (BYOD) policy that serves as the foundation for a current, secure and business-value-enabling BYOD program? • What applications are running in a cloud environment? What data is processed there and how is it protected and monitored? • Are staff members strengthening their knowledge and expertise through formal training (e.g., professional certifications) and informal approaches (e.g., stretch assignments, rotational work, etc.)? Focus on CIOs/IT Executives and Large Companies Technical Knowledge – Results for CIOs/IT Executives and Large Company Respondents Technical Knowledge CIOs/IT Executives YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) Virtualization Data breach and privacy laws (various U.S. states) Enterprise architecture NA NA NA NA NA NA Data architecture Data governance IT project management Cloud computing Cloud storage of data IT program management NIST (cybersecurity) Big data Business process automation ERP systems ITIL 12 2015 IT Priorities Survey • protiviti.com/ITpriorities Technical Knowledge CIOs/IT Executives YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) Agile methodologies NA NA Data discovery/e-discovery NA NA Mobile development NA NA NA NA PCI DSS Smart device integration Mobile commerce security Open Web Application Security Project (OWASP) PMP BYOD policies/programs CISSP/CISM ISO/IEC 27001 and 27002 Mobile commerce integration Mobile commerce policy Social media policy Social media security COBIT Social media integration ISO 31000 CISA European Union Data Directive HITRUST CSF CGEIT Significant Priority Index of 6.0 or higher Moderate Priority Index of 4.5 to 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities 13 DEFINING IT GOVERNANCE AND STRATEGY Key Findings • Top priorities include monitoring IT costs and benefits, monitoring and achieving legal/ regulatory compliance, and integration/alignment of IT planning and business strategy. • IT functions are focused on achieving highly effective IT governance and strategy, which is designed to manage and run the IT function in a way that enhances and protects organizational value. • While all of the areas again have “Significant Priority” rankings (similar to the 2014 results), the priority index numbers for 13 of the 16 areas measured last year increased on a year-over-year basis. Overall Results, Defining IT Governance and Strategy Defining IT Governance and Strategy 2015 Priority 2014 Priority Index Index Monitoring IT costs and benefits 6.8 6.5 Integration/alignment of IT planning and business strategy 6.7 6.5 Monitoring and achieving legal/regulatory compliance 6.7 6.4 IT risk analysis and reporting 6.6 6.4 Managing project quality 6.6 6.4 Developing and maintaining operations management policies and standards 6.5 6.3 Key performance indicators (KPIs) 6.5 6.5 Developing and maintaining end-user support policies and standards 6.4 6.3 Maintaining IT controls design and operating effectiveness 6.4 6.3 Reporting IT activities and performance 6.4 6.3 Defining IT roles and responsibilities 6.3 6.2 Defining metrics and measurements for monitoring IT performance 6.3 6.3 Managing and monitoring policy exceptions 6.3 6.3 Negotiating, managing and monitoring customer service-level agreements 6.3 6.2 Negotiating, managing and monitoring information quality 6.3 6.2 Portfolio management – Long-term and short-term planning 6.3 6.4 Defining organizational placement of the IT function 6.1 6.2 YOY Trend Commentary Why is strong IT governance and strategy so critical? Consider that almost all companies today – regardless of industry, location or size – are technology organizations. They cannot function without technology, and the innovative use of technology almost always represents a critical differentiator and success factor for the company. 14 2015 IT Priorities Survey • protiviti.com/ITpriorities More broadly, technology is transforming most industries and driving a wave of innovation and creativity. The pace of change is increasing, and technology is breaking down barriers between industries and transforming business models. In addition, “shadow IT” and the need to harness it while fostering innovation and creativity represents another critical consideration. As many organizations are learning, there is both risk and reward in this space. These are among the many reasons underscoring the critical importance of IT governance and strategy. From monitoring IT costs and benefits to aligning IT planning and business strategy, we see that numerous IT governance areas rank among the many demanding priorities CIOs and IT professionals are addressing today. As further context, note that last year the highest index ranking in this category was 6.5 (integration/alignment of IT planning and business strategy, key performance indicators (KPIs), and monitoring IT costs and benefits). This year, there are five items with ratings of 6.6 or higher. What other factors are driving changes in the enterprise and the increasing need for strong IT governance processes? • Cloud/XaaS is presenting new opportunities and operating models that businesses are exploring – at the same time, they must manage key changes and risks that these operating models are introducing. • Cybersecurity (as we noted earlier in our report) represents a major area of focus in terms of IT governance and strategy. • Despite the increasing need for strong IT governance to help manage the changing enterprise and address increasing risks, IT budgets remain under pressure, requiring the IT organization to do more with the same level of resources. Ultimately, CIOs and IT leaders recognize that failure to define and execute on IT strategy to support the organization’s objectives will, for many, lead to failure of the business strategy. Key Questions to Consider • Do we have the right leadership and skills to engage effectively with other leaders in the business so that we can help manage changes underway throughout the enterprise? • How is IT leadership communicating the importance of IT’s mission to enhance and protect value throughout the department’s ranks and, more importantly, across the enterprise? What types of collaboration between IT executives and other business leaders can help IT more effectively execute its enhance-and-protect mission? • Is the technology organization able to influence business strategy? And is technology and its use a key driver when defining business strategy? • Are we able to articulate business risk issues in the context of technology? • Do we have a clear view of the cyber risks that we face? And when it comes to cybersecurity, do we know what our risk appetite is? • What processes ensure that IT risk analysis and reporting insights and outputs are fed into strategic planning (within the IT department and at an overall business level)? How can IT risks be most effectively represented in an enterprise’s operational risks? • What is our exposure to third-party risk? Which third parties present the highest risk to the enterprise? • Are we spending enough on technology innovation as opposed to security, operations, etc.? • What disruptive technologies/innovations exist (e.g., “shadow IT”) that could destabilize our business strategy? What opportunities are presented by these disruptive technologies? 2015 IT Priorities Survey • protiviti.com/ITpriorities 15 • Is the drive to measure, manage and monitor IT costs and benefits – and IT performance – consistent throughout every level of the IT department? How can this objective be executed more consistently? How can this be used to change behaviors? • Are there ways that IT and finance can partner to strengthen IT’s focus on monitoring costs and benefits? How do we communicate cost/value to the business? And how can IT costs be represented in a manner that is meaningful and actionable for business partners? Focus on CIOs/IT Executives and Large Companies Defining IT Governance and Strategy – Results for CIOs/IT Executives and Large Company Respondents Defining IT Governance and Strategy CIOs/IT Executives Monitoring IT costs and benefits Integration/alignment of IT planning and business strategy Monitoring and achieving legal/ regulatory compliance IT risk analysis and reporting Managing project quality Developing and maintaining operations management policies and standards Key performance indicators (KPIs) Developing and maintaining end-user support policies and standards Maintaining IT controls design and operating effectiveness Reporting IT activities and performance Defining IT roles and responsibilities Defining metrics and measurements for monitoring IT performance Managing and monitoring policy exceptions Negotiating, managing and monitoring customer servicelevel agreements Negotiating, managing and monitoring information quality Portfolio management – Longterm and short-term planning Defining organizational placement of the IT function Significant Priority Index of 6.0 or higher 16 Moderate Priority Index of 4.5 to 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) MANAGING IT ASSETS Key Findings • Managing software licensing and compliance, deploying software, and managing hardware maintenance agreements represent the top priorities. • The findings in this category reflect a desire to manage IT asset risks while optimizing the value of current assets. • Several priorities point to a need to improve vendor risk management. Overall Results, Managing IT Assets Managing IT Assets 2015 Priority 2014 Priority Index Index Managing software licensing and compliance 6.4 6.1 Software deployment 6.3 6.2 Managing hardware maintenance agreements 6.2 5.9 Hardware deployment 6.1 6.1 Managing audit process (SAS 70, SSAE 16, others) 6.1 5.9 Monitoring and reviewing contracts/billings 6.1 5.9 Monitoring IT assets 6.1 5.9 Negotiating and establishing agreements 6.1 5.9 Accounting for IT asset management 6.0 5.9 Managing contract analysis and renewal 6.0 5.9 Managing IT asset retirement – employee/contractor termination 6.0 5.8 Monitoring external service-level agreements 6.0 5.9 Determining outsourcing strategy and approach 5.9 5.9 Managing IT asset retirement – IT asset refresh 5.9 5.9 YOY Trend 2015 IT Priorities Survey • protiviti.com/ITpriorities 17 Commentary Based on this year’s findings, IT professionals have a clear plan for improving their function’s IT asset management capability: 1. Manage risks 2. Maximize value 3. Adapt Both maximizing value and adapting are necessary thanks to the ongoing adoption of new devices (e.g., smartphones and tablets). Additionally, a coming wave of “Internet of Things” technology and connectivity promises to create even more (and, in many cases, highly unique) IT assets for organizations, along with new questions about how they use data and whether this violates their ethical standards or harms their reputation. These changes already are introducing new devices (and even more data) and are requiring modifications to current IT asset management approaches and processes. It also is clear that like other IT areas and capabilities addressed in our study, IT asset management is growing in importance and priority. Whereas three areas in this category had “Significant Priority” rankings in our 2014 survey, 12 are ranked 6.0 or higher in this year’s findings. Key Questions to Consider • Are current asset management policies, processes, technologies and structures (skills, roles, etc.) keeping pace with the organization’s changing portfolio of IT assets? • Is the IT function monitoring organizational interest in new and emerging IT assets to ensure they can be managed effectively under current policies? • Does the current policy governing IT asset retirement following the termination of an employee or contractor sufficiently mitigate information security and privacy risks? • How are software licensing agreements monitored, and are current change-management mechanisms regarding these licenses working effectively and efficiently? • Are all third-party agreements governed and managed in accordance with applicable auditing standards, such as SSAE 16? • Who is responsible for network planning and engineering, as well as ensuring any network build-out is rightsized? • Who is responsible for creating, maintaining and monitoring controls and other risk management considerations related to the deployment, maintenance and retirement of software and hardware assets? 18 2015 IT Priorities Survey • protiviti.com/ITpriorities Focus on CIOs/IT Executives and Large Companies Managing IT Assets – Results for CIOs/IT Executives and Large Company Respondents CIOs/IT Executives Managing IT Assets YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) Managing software licensing and compliance Software deployment Managing hardware maintenance agreements Hardware deployment Managing audit process (SAS 70, SSAE 16, others) Monitoring and reviewing contracts/billings Monitoring IT assets Negotiating and establishing agreements Accounting for IT asset management Managing contract analysis and renewal Managing IT asset retirement – employee/contractor termination Monitoring external service-level agreements Determining outsourcing strategy and approach Managing IT asset retirement – IT asset refresh Significant Priority Index of 6.0 or higher Moderate Priority Index of 4.5 to 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities 19 MANAGEMENT AND USE OF DATA ASSETS Key Findings • Business intelligence and reporting tools, data analytics platforms and support, shortand long-term enterprise information management strategy, and data and information governance programs represent the top priorities. Overall Results, Management and Use of Data Assets Management and Use of Data Assets 2015 Priority 2014 Priority Index Index Business intelligence and reporting tools 6.5 6.1 Data analytics platforms and support 6.4 6.1 Data and information governance program 6.3 6.1 Short- and long-term enterprise information management strategy 6.3 6.1 Data lifecycle management 6.2 6.1 Master data management 6.2 6.1 Big data initiatives 6.1 5.9 End-user adoption of data tools 6.1 5.9 YOY Trend Commentary As more companies implement cloud computing technology, the protection and use of data – and organizational data assets, in particular – become more important and valuable to businesses. The priorities identified herein point to a heightened need for IT functions to protect and optimize data assets. Two priorities identified in this year’s survey – short- and long-term enterprise information management strategies, and data and information governance programs – suggest that IT organizations are intent on integrating the management and use of data assets into their strategies and oversight capabilities. The emphasis on master data management and data lifecycle management shows that IT organizations also are keen to protect the rapidly increasing value of organizational data. Not surprisingly, business intelligence and reporting tools as well as data analytics platforms and support are at the very top of the IT function’s data asset management priority list. These activities, the reach of which now extends to every function in the enterprise, are intended to derive value from the organization’s data assets. 20 2015 IT Priorities Survey • protiviti.com/ITpriorities Key Questions to Consider • Is a formal data and information governance program in place? If so, who is responsible for overseeing the program as data analytics tools are leveraged increasingly throughout the company? • Beyond IT, what other functional leaders should be involved in shaping and monitoring data and information governance? • How can IT and internal audit collaborate more effectively to ensure the data and information governance program is an effective risk management mechanism? • How is the data and information governance program marketed to internal stakeholders? How is it applied with regard to vendors, including offshore resources? • What are the most important data risks related to third-party relationships, and how are these risks managed? • What current mechanisms ensure the data and information governance program remains relevant and sufficient in light of the organization’s rapidly changing use of data and data analysis tools? What additional mechanisms should be considered? • How is the IT function’s short- and long-term enterprise information planning integrated into IT planning and the overall business strategy? • How can data assets be managed in a more secure manner as well as in a way that generates more business value? • How is master data management quality/security governed and monitored? Focus on CIOs/IT Executives and Large Companies Management and Use of Data Assets – Results for CIOs/IT Executives and Large Company Respondents Management and Use of Data Assets CIOs/IT Executives YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) Business intelligence and reporting tools Data analytics platforms and support Data and information governance program Short- and long-term enterprise information management strategy Data lifecycle management Master data management Big data initiatives End-user adoption of data tools Significant Priority Index of 6.0 or higher Moderate Priority Index of 4.5 to 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities 21 ENSURING CONTINUITY Key Findings • Top priorities include business continuity management and disaster recovery program testing, and ensuring business alignment. • Every BCM area has increased year-over-year in priority at a time when concerns related to cybersecurity and cyberattacks continue to rise. Overall Results, Ensuring Continuity Ensuring Continuity 2015 Priority 2014 Priority Index Index Business continuity management and disaster recovery program testing 6.5 6.2 Ensuring business alignment 6.5 6.2 Designing and maintaining business continuity strategies 6.4 6.1 Developing and maintaining IT disaster recovery plans 6.4 6.2 Developing and maintaining risk assessment/business impact analysis 6.4 6.0 Ensuring executive management support and sponsorship 6.4 6.1 Developing and maintaining business resumption plans 6.2 6.0 Developing and maintaining crisis management plans 6.2 6.0 YOY Trend Commentary In recent years, IT functions that focused on strengthening their companies’ business continuity management (BCM) and disaster recovery (DR) capabilities typically worked to adapt their programs to address more integrated global supply chains, more frequent weather-related disasters, and an increasingly mobile and remote workforce. More recently, IT functions have witnessed firsthand the speed, scale and impact of an equally challenging business continuity threat: cyberattacks. Well-known cybersecurity intrusions over the past year have resulted in the loss of intellectual property and business intelligence. These events provide painful reminders of the risks companies confront as they become more and more data-driven.5 Given the central enabling role that technology systems, applications and data provide for most companies, IT functions must ensure that a BCM/DR capability remains robust and ready at both a strategic and tactical level. Testing also has become more complicated as organizations deal with an increasing number of third-party vendors. Considering the priorities indicated in our findings (e.g., ensuring business alignment), they seem well-aware of these needs and their importance. Although the business realm’s growing reliance on data and information systems exposes companies to new challenges, technology breakthroughs and developments (e.g., cloud computing) also provide valuable new BCM defenses and capabilities. 5 22 Executive Perspectives on Top Risks for 2015: Key Issues Being Discussed in the Boardroom and C-Suite, North Carolina State University’s ERM Initiative and Protiviti, www.protiviti.com/toprisks. 2015 IT Priorities Survey • protiviti.com/ITpriorities Key Questions to Consider • Which IT leaders are responsible for 1) developing and maintaining IT disaster recovery plans, and 2) playing a key role in the company’s overall BCM/DR program? • Are business interruptions and crises that would stem from potential data breaches reflected in the current BCM program? Do current BCM/DR plans contain specific incident response approaches and escalation protocols? • From an IT perspective, are current levels of BCM rigor, funding and attention sufficient? • What, if any, new investments in technology, process improvement or skills would benefit your organization’s BCM efforts? • What monitoring mechanisms are in place to ensure the BCM program keeps pace with changes to IT infrastructure, applications, external relationships and data? • How are IT-related BCM and disaster recovery capabilities, activities and updates shared with executive management and the board of directors, and how is their feedback incorporated into the BCM planning process? • How frequently are BCM plans tested? Are concrete improvement plans enacted in response to the learnings from these exercises? Focus on CIOs/IT Executives and Large Companies Ensuring Continuity – Results for CIOs/IT Executives and Large Company Respondents CIOs/IT Executives Ensuring Continuity YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) Business continuity management and disaster recovery program testing Ensuring business alignment Designing and maintaining business continuity strategies Developing and maintaining IT disaster recovery plans Developing and maintaining risk assessment/business impact analysis Ensuring executive management support and sponsorship Developing and maintaining business resumption plans Developing and maintaining crisis management plans Significant Priority Index of 6.0 or higher Moderate Priority Index of 4.5 to 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities 23 MANAGING APPLICATION DEVELOPMENT Key Findings • Similar to prior years’ results, risk management represents the top application development priority. • Other key areas of focus include project monitoring and control, collaboration platforms (such as SharePoint) and ERP application security. Overall Results, Managing Application Development Managing Application Development 24 2015 Priority 2014 Priority Index Index Risk management 6.4 6.1 Project monitoring and control 6.3 6.0 Collaboration platforms (for example, SharePoint) 6.2 6.0 ERP application security 6.2 6.0 Configuration management 6.1 5.9 ERP system “bolt-on” applications (BI, CRM, etc.) 6.1 5.9 Mobile application development 6.1 6.0 Requirements management 6.1 6.0 ERP system implementation 6.0 5.9 Organizational performance management 6.0 5.9 Organizational process performance 6.0 5.8 Organizational training 6.0 5.8 Secure development/code review 6.0 NA Software selection 6.0 5.9 Decision analysis and resolution 5.9 5.9 Rapid application development framework 5.9 5.7 Scrum development methodology 5.9 5.7 Service-oriented architecture (SOA) 5.9 NA ERP system selection 5.8 5.8 Object-oriented programming 5.8 5.8 Open application programming interface (API) 5.8 NA Causal analysis and resolution 5.7 5.6 Spreadsheet risk 5.6 5.7 Spiral iterative framework 5.5 5.7 2015 IT Priorities Survey • protiviti.com/ITpriorities YOY Trend NA NA NA Commentary Managing application development requires large amounts of work as well as numerous and complex considerations. There are risks to be managed, project management expertise to be applied, controls to enact, intense collaborations to be conducted, methodologies to be mastered, requirements and configurations to be managed, and much more. In many ways, application development is both an essential and representative IT activity – the findings in this category signify trends evident throughout our report, from managing risk to effective project management and collaboration. The results also show that, similar to most other categories, there are a greater number of application development priorities this year compared to 2014. Last year’s respondents scored six areas to be of “Significant Priority” (those with a priority index score of 6.0 or higher); this year’s respondents ranked more than twice that number as “Significant Priority” areas. Key Questions to Consider • Does the IT function possess the resources necessary to manage application development in a secure manner? • What are the top current application development risks, and how are these risks addressed? • What are notable emerging application development risks, and to what extent do (or would) current risk management practices address these emerging issues? • To what extent are vendor-related application development risks monitored and managed? • Is the current level of ERP security sufficient? • Are current and planned ERP system changes – most notably, the integration of bolt-on applications (BI, HRIS, CRM, marketing automation, etc.) – performed in a way that mitigates ERP security risks? • Are collaboration platforms being utilized sufficiently to strengthen applications development? • Does the IT function possess the resources and expertise necessary to apply the right level of project monitoring and control to application development activities? 2015 IT Priorities Survey • protiviti.com/ITpriorities 25 Focus on CIOs/IT Executives and Large Companies Managing Application Development – Results for CIOs/IT Executives and Large Company Respondents Managing Application Development CIOs/IT Executives YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) Risk management Project monitoring and control Collaboration platforms (for example, SharePoint) ERP application security Configuration management ERP system “bolt-on” applications (BI, CRM, etc.) Mobile application development Requirements management ERP system implementation Organizational performance management Organizational process performance Organizational training Secure development/code review NA NA NA NA NA NA Software selection Decision analysis and resolution Rapid application development framework Scrum development methodology Service-oriented architecture (SOA) ERP system selection Object-oriented programming Open application programming interface (API) Causal analysis and resolution Spreadsheet risk Spiral iterative framework Significant Priority Index of 6.0 or higher 26 Moderate Priority Index of 4.5 to 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities DEPLOYING AND MAINTAINING SOLUTIONS Key Findings • Managing changes in applications developed in-house represents a top priority, along with integrating applications. • Other priorities include developing applications and managing changes in thirdparty applications. Overall Results, Deploying and Maintaining Solutions Deploying and Maintaining Solutions 2015 Priority 2014 Priority Index Index Managing changes – applications developed in-house 6.4 6.1 Integrating applications 6.3 6.1 Developing applications 6.2 6.0 Managing changes – third-party applications 6.2 6.1 Managing and testing security in SDLC 6.1 NA Acquiring applications 5.9 5.9 YOY Trend NA Commentary IT organizations continue to wrestle with coordination across the business as they deploy solutions and updates. This is particularly the case for homegrown applications. Key Questions to Consider • Who is responsible for overseeing and managing changes to in-house applications? And who is responsible for overseeing and managing changes to third-party applications? • How is the change process monitored and audited, and how can this process be improved? • How can security be managed and tested more effectively throughout the system development lifecycle? 2015 IT Priorities Survey • protiviti.com/ITpriorities 27 Focus on CIOs/IT Executives and Large Companies Deploying and Maintaining Solutions – Results for CIOs/IT Executives and Large Company Respondents Deploying and Maintaining Solutions CIOs/IT Executives YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) Managing changes – applications developed in-house Integrating applications Developing applications Managing changes – third-party applications Managing and testing security in SDLC NA NA Acquiring applications Significant Priority Index of 6.0 or higher Moderate Priority Index of 4.5 to 5.9 Key Facts Percentage of organizations that utilize offshore resources to support/augment the IT function 54 64 28 2015 IT Priorities Survey • protiviti.com/ITpriorities Percentage of organizations that have a chief information security officer (or equivalent position) MANAGING IT INFRASTRUCTURE Key Findings • There are notable year-over-year increases in priority index scores for IT infrastructure, with IT infrastructure change management leading the way. • IT organizations also are focusing on the management and administration of backup and recovery systems, network performance planning, and change management in operating systems and databases. Overall Results, Managing IT Infrastructure Managing IT Infrastructure 2015 Priority 2014 Priority Index Index IT infrastructure change management 6.6 6.1 Managing and administering backup and recovery 6.6 6.3 Network performance planning 6.5 6.1 Operating system change management 6.5 6.1 Database change management 6.4 6.1 YOY Trend Managing and maintaining real-time operations 6.4 NA NA Managing capacity 6.4 NA NA Storage management and planning 6.4 6.2 Platform performance planning 6.3 6.0 Managing and maintaining hybrid operations (on-site, ASP, cloud, etc.) 6.2 NA NA Managing application service providers 6.2 NA NA Managing data center environmental controls 6.2 6.0 Managing and maintaining batch processing 6.1 6.1 Commentary The emphasis that IT functions place on most elements of managing IT infrastructure is clearly increasing. The highest priority index ranking that survey respondents identified in this area last year was 6.3; this year, respondents ranked eight different areas of managing IT infrastructure at 6.4 or higher. Quite simply, as is the case throughout this year’s survey findings, respondents have longer to-do lists packed with more pressing priorities. The overarching digital transformation has upped the need for IT functions to store, manage and protect their data-driven company’s lifeblood. As newer and better data management and data protection tools and approaches emerge, IT functions must conduct a much greater amount of change management work – to IT infrastructure, operating systems, databases (all top priorities) and more. Planning, protecting and managing change represent core activities IT functions are employing to improve their management of IT infrastructure. These activities also extend to vendors, such as application service providers. The IT function’s data, particularly in the cloud, becomes more 2015 IT Priorities Survey • protiviti.com/ITpriorities 29 complicated. Increasingly, the mandate for these infrastructure improvements originates with executive management and the board of directors, who recognize that one of their organization’s top sources of business value must be managed carefully. Key Questions to Consider • How are senior executives and the board of directors kept abreast of changing IT infrastructure risks and needs? • How can current change management strategies and processes related to infrastructure, operating systems and databases be improved? • To what extent do current storage management capabilities support and align with the ways in which the organization classifies, manages and protects data? • How do daily storage management processes, decisions and investments align with business continuity management plans? • How does the IT function plan to meet changing – and growing – business demands as those demands affect network performance? Focus on CIOs/IT Executives and Large Companies Managing IT Infrastructure – Results for CIOs/IT Executives and Large Company Respondents Managing IT Infrastructure CIOs/IT Executives YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) IT infrastructure change management Managing and administering backup and recovery Network performance planning Operating system change management Database change management Managing and maintaining realtime operations NA NA Managing capacity NA NA Managing and maintaining hybrid operations (on-site, ASP, cloud, etc.) NA NA Managing application service providers NA NA Storage management and planning Platform performance planning Managing data center environmental controls Managing and maintaining batch processing Significant Priority Index of 6.0 or higher 30 Moderate Priority Index of 4.5 to 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities ORGANIZATIONAL CAPABILITIES Key Findings • Working effectively with C-level/senior executives, leadership (within your organization), working effectively with business-unit executives, and recruiting IT talent are the top priorities. • Strategic collaborations – both inside and outside the organization – are a key area of focus for IT professionals. Overall Results, Organizational Capabilities Organizational Capabilities 2015 Priority 2014 Priority Index Index Working effectively with C-level/senior executives 6.3 6.0 Leadership (within your organization) 6.2 6.0 Recruiting IT talent 6.2 6.0 Working effectively with business-unit executives 6.2 6.0 Leadership (in outside organizations, groups, etc.) 6.0 5.8 Working effectively with regulators 6.0 5.9 Coaching/mentoring 5.9 5.9 Leveraging outside expertise 5.9 5.8 Working effectively with outside parties 5.9 5.9 Business process disciplines (Lean, Six Sigma, etc.) 5.7 5.8 Negotiation 5.7 5.8 Developing outside contacts/networking 5.6 5.8 Dealing with confrontation 5.5 5.8 YOY Trend Commentary As detailed in prior sections of our report, the number and importance of competing priorities simmering throughout the IT organization are reaching a fever pitch. It is positive to see that in this environment, IT professionals are looking to sharpen their personal skills to help them expand their expertise, deepen their relationships throughout the business, and recruit more help that offers a more diverse set of capabilities. Not surprisingly, the top priorities identified by respondents in this category have a decidedly strategic bent: working effectively with C-level/senior executives, leadership (within your organization), working effectively with business-unit executives, and recruiting IT talent. As the data within IT systems becomes more pivotal to strategic planning and execution, IT professionals are seeking to solidify relationships with senior executives and business-unit executives to help shape and safeguard these plans. 2015 IT Priorities Survey • protiviti.com/ITpriorities 31 The next tier of top priorities, which includes working effectively with regulators and leadership (in outside organizations, groups, etc.), also demonstrates the IT function’s strategic intentions. Together, these priorities reflect how IT functions, and IT professionals themselves, are transforming – quickly and intensely – to highly collaborative enhancers and protectors of business value. Key Questions to Consider • What opportunities exist for future IT leaders to collaborate with the senior executive team as well as business-unit and other functional leaders throughout the organization? • What leadership development does the IT function offer to rising executives? • What types of training and assignments can help IT professionals become more effective collaborators and business partners? • How is IT leadership working with human resources executives to ensure that current and future IT talent needs are addressed? • Are there opportunities for IT leaders to learn from other functional heads (e.g., legal, compliance, finance) and board members about working effectively with regulators? • Are outside leadership activities encouraged and/or rewarded? Focus on CIOs/IT Executives and Large Companies Organizational Capabilities – Results for CIOs/IT Executives and Large Company Respondents Organizational Capabilities CIOs/IT Executives Working effectively with C-level/ senior executives Leadership (within your organization) Recruiting IT talent Working effectively with business-unit executives Leadership (in outside organizations, groups, etc.) Working effectively with regulators Coaching/mentoring Leveraging outside expertise Working effectively with outside parties Business process disciplines (Lean, Six Sigma, etc.) Negotiation Developing outside contacts/ networking Dealing with confrontation Significant Priority Index of 6.0 or higher 32 Moderate Priority Index of 4.5 to 5.9 2015 IT Priorities Survey • protiviti.com/ITpriorities YOY Trend (Priority Level) Large Company Respondents YOY Trend (Priority Level) SURVEY DEMOGRAPHICS All demographic information was provided voluntarily and not all participants provided data for every demographic question. Position Chief Information Officer 7% Chief Information Security Officer 3% Chief Technology Officer 3% Chief Security Officer 2% Chief Financial Officer 2% IT VP/Director 27% IT Manager 48% Other 8% Industry Financial Services 14% Manufacturing 13% Government/Education/Not-for-profit 10% Technology 10% Professional Services 7% Healthcare Provider 6% Insurance 6% Retail 4% Services 3% Telecommunications 3% Consumer Products 2% Energy 2% Healthcare Payer 2% Hospitality 2% Life Sciences/Biotechnology 2% Media 2% Real Estate 2% Communications 1% Distribution 1% Utilities 1% Other 7% 2015 IT Priorities Survey • protiviti.com/ITpriorities 33 Size of Organization (by Gross Annual Revenue) $20 billion+ 10% $10 billion - $19.99 billion 9% $5 billion - $9.99 billion 10% $1 billion - $4.99 billion 23% $500 million - $999.99 million 18% $100 million - $499.99 million 15% Less than $100 million 15% Type of Organization Public 36% Private 49% Government 5% Not-for-profit 8% Other 2% Organization Headquarters 34 North America 97% Asia-Pacific 1% Europe 1% South America 1% 2015 IT Priorities Survey • protiviti.com/ITpriorities ABOUT PROTIVITI Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit, and has served more than 40 percent of FORTUNE 1000® and FORTUNE Global 500® companies. Protiviti and its independently owned Member Firms serve clients through a network of more than 70 locations in over 20 countries. The firm also works with smaller, growing companies, including those looking to go public, as well as with government agencies. Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half is a member of the S&P 500 index. About Our IT Consulting Services In today’s rapidly evolving technological environment, a trusted adviser – one who not only provides relevant insights, but delivers a combination of strategic vision, proven expertise and practical experience – can enhance the value of your business with technology. Our global IT Consulting practice has helped CIOs and IT leaders at more than 1,200 companies worldwide design and implement advanced solutions in IT governance, security, data management, applications and compliance. By partnering with us, you ensure that your IT organization performs with the same focus and excellence with which you manage day-to-day business operations. We will work with you to address IT security and privacy issues and deploy advanced and customized application and data management structures that not only solve problems, but add value to your business. 2015 IT Priorities Survey • protiviti.com/ITpriorities 35 PROTIVITI GLOBAL IT CONSULTING PRACTICE Tom Andreesen thomas.andreesen@protiviti.com Sidney Lim sidney.lim@protiviti.com Grant Barker grant.barker@protiviti.com.au Mark Lippman mark.lippman@protiviti.com Steve Cabello – Leader, Portfolio & Program Management steve.cabello@protiviti.com Chris Louden chris.louden@protiviti.com Samir Datt samir.datt@protiviti.com David Dawson david.dawson@protiviti.com Nikhil Donde nikhil.donde@protivitiglobal.in Hernan Gabrieli hernan.gabrieli@protiviti.it Scott Gracyalny – Leader, Custom-developed Software scott.gracyalny@protiviti.com Chris Grant chris.grant@protiviti.com.au Trey MacDonald trey.macdonald@protiviti.com Masato Maki masato.maki@protiviti.jp Ronan O’Shea ronan.oshea@protiviti.com Ed Page ed.page@protiviti.com Michael Pang michael.pang@protiviti.com Michael Porier michael.porier@protiviti.com Rocco Grillo – Leader, Incident Response & Forensics rocco.grillo@protiviti.com Aric Quinones aric.quinones@protiviti.com John Harrison john.harrison@protiviti.com Carol Raimo – Leader, ERP Solutions carol.raimo@protiviti.com Greg Hedges gregory.hedges@protiviti.com Kalyan Raman kalyan.raman@protivitiglobal.me Rob Hustick rob.hustick@protiviti.com Siamak Razmazma siamak.razmazma@protiviti.com Sudarsan Jayaraman sudarsan.jayaraman@protivitiglobal.me Andrew Retrum andrew.retrum@protiviti.com Senthil Kumar senthil.kumar@protivitiglobal.me Ryan Rubin – Leader, Identity & Access Management ryan.rubin@protiviti.co.uk Scott Laliberte – Leader, Vulnerability & Penetration Testing scott.laliberte@protiviti.com 36 Tom Luick tom.luick@protiviti.com Jeff Sanchez – Leader, Data Security & Privacy jeffrey.sanchez@protiviti.com 2015 IT Priorities Survey • protiviti.com/ITpriorities Michael Schultz – Leader, Strategy & Architecture michael.schultz@protiviti.com Cal Slemp – Leader, Security Program, Strategy & Policy cal.slemp@protiviti.com Mike Steadman mike.steadman@protiviti.com Andrew Struthers-Kennedy andrew.struthers-kennedy@protiviti.com David Taylor david.taylor@protiviti.com Tomomichi Tomiie tomomichi.tomiie@protiviti.jp Kurt Underwood – Global Leader, IT Consulting kurt.underwood@protiviti.com Michael Walter – Leader, Security Operations Centers michael.walter@protiviti.com Jeff Weber – Leader, IT Operations Improvement jeffrey.weber@protiviti.com Scott Williams scott.williams@protiviti.com Scott Wisniewski – Leader, Risk Technologies scott.wisniewski@protiviti.com Jonathan Wyatt – Leader, Technology Strategy and Operations jonathan.wyatt@protiviti.co.uk EUROPE/MIDDLE EAST/AFRICA THE AMERICAS UNITED STATES Alexandria Atlanta Baltimore Boston Charlotte Chicago Cincinnati Cleveland Dallas Denver Fort Lauderdale Houston Kansas City Los Angeles Milwaukee Minneapolis New York Orlando Philadelphia Phoenix Pittsburgh Portland Richmond Sacramento Salt Lake City San Francisco San Jose Seattle Stamford St. Louis Tampa Washington, D.C. Winchester Woodbridge ARGENTINA* Buenos Aires CHILE* Santiago PERU* Lima BRAZIL* Rio de Janeiro São Paulo MEXICO* Mexico City VENEZUELA* Caracas FRANCE Paris GERMANY Frankfurt Munich ITALY Milan Rome Turin THE NETHERLANDS Amsterdam UNITED KINGDOM London BAHRAIN* Manama QATAR* Doha KUWAIT* Kuwait City UNITED ARAB EMIRATES* Abu Dhabi Dubai OMAN* Muscat SOUTH AFRICA* Johannesburg CANADA Kitchener-Waterloo Toronto ASIA-PACIFIC AUSTRALIA Brisbane Canberra Melbourne Perth Sydney CHINA Beijing Hong Kong Shanghai Shenzhen INDIA* Bangalore Mumbai New Delhi JAPAN Osaka Tokyo SINGAPORE Singapore * Protiviti Member Firm © 2015 Protiviti Inc. An Equal Opportunity Employer M/F/Disability/Vet. PRO-0315-101075 Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on financial statements or offer attestation services.