Home > Categories > Identity and Access Management > Small Enterprise SituAction: A CIO Assesses the Structure of the IT Team

Home > Categories > Identity and Access Management > Research > Small Enterprise SituAction: A CIO Assesses the Structure of the IT Team

Small Enterprise SituAction: A CIO Assesses the Structure of the IT Team

Good IT leaders are supported by great IT teams. Take the opportunity to reassess the makeup and capabilities of the team.

Situation: An Info-Tech member recently joined a new organization. He is excited about the opportunity because his previous employer had a very operational view of IT. Finally, he has a role as a CIO with a seat at the executive table. One of his first goals is to assess the capabilities and makeup of his new IT team.

Complication: His new C-level colleagues are very excited about the potential strategic value of IT and are keen to work with the new CIO. Unfortunately, the IT department isn’t in great shape due to a curious mixture of underinvestment and strategically important things and a pattern of chronic overspend on core infrastructure. The new CIO has to assess his new department.

One of his first goals is to get a handle on the capabilities of his new team.

Recommendations

Bottom Line

Info-Tech’s blueprints and tools are valuable starting points for getting IT leaders up to speed quickly with their strategic-staffing responsibilities.


Want to Know More?

Other Recent Research in Identity and Access Management

Identity and Access Management

IBM Raises Price on Software Support; Shoves Customers Toward the Cloud

IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.

Identity and Access Management

Bomgar & BMC Team Up to Speed Trouble-Ticket Resolution

For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.

Identity and Access Management

Okta Partners With VMware Carbon Black, CrowdStrike, and Tanium

Okta announces its new partnerships with endpoint security vendors VMware Carbon Black, CrowdStrike, and Tanium. Integrating endpoint protection management analysis with Okta Verify’s user identity risk indicators, Okta Identity Cloud consolidates the information and creates a risk profile of the individual login attempt.

Identity and Access Management

Avatier Releases AI Chatbot to Automate Common IAM Helpdesk Requests

Avatier, an IAM vendor, has developed an innovative solution for automating mundane IAM tasks: a chatbot called Apollo. Apollo is a great example of how ANI can enable simple task automation that ultimately frees up IT staff to tackle more pressing issues.