Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

Why accountability is key to making the most of technology

Image Description

The onset of a new wave of innovation and technology can induce a mix of reactions amongst C-level decision-makers in any business. For every CEO, CIO, or CFO who chases the latest technological ‘shiny thing’ and plans to implement meaningful change within their organization, there are countless others who would prefer to take little or no action regarding new technological advances.

About the author

Don Schuerman is CTO and Vice President of Product Marketing at Pegasystems.

Here’s the thing – as much as some senior leaders might prefer to stick their heads in the sand, new technology trends are like seasons of the year; they are inevitable. In fact, the biggest risk far too many organizations run is that by either implementing innovations half-heartedly or ignoring them completely, they can lose ground to more progressive competitors who are harnessing new technologies to differentiate themselves and gain a competitive advantage.

The key to avoiding this is to emphasize accountability. This is more than a ‘buck stops here’, one-size-fits-all approach. Accountability can come in many forms – through integration, innovation adoption, or even governance.

AI governance

The emergence of artificial intelligence (AI) in modern organizations is a great example of where effective governance is needed. While it’s now more widely accepted as an emerging technology that can help to drive meaningful change and add value to consumers, AI regulation is still something of a grey area. In a recent global study amongst C-level executives, three quarters (65%) felt that the current level of external AI governance isn’t sufficient to manage the growth of the technology.

To that end, 78% advocated for an equal share of responsibility for regulation between government and the private sector as their ideal scenario. However, when asked what they felt the balance would actually look like in five years’ time, 75% expected the government to be largely or fully responsible for AI governance. Why? Because only 27% said they currently have no designated AI governance leader within their organization and only 25% are managing a formal policy at the C-suite level. All of this suggests a failure at C-level within organizations to step up and take accountability for AI governance themselves. For companies to become leaders in AI governance, business leaders must make sure that they are kept in the loop of any internal processes that are made more autonomous through the use of AI. If not, these findings suggest that the private sector will lose control of regulating the technology entirely. If business leaders implement a strategy that is based on technical expertise and outcomes, it can help keep their governance responsive to new challenges.

Hyperautomation

Another way in which accountability can be important is in ensuring that businesses are able to successfully integrate new technologies, such as hyperautomation, which helps reduce costs and increase efficiencies in areas like case management. However, many see hyperautomation having a longer-term impact as well. Our study found that 32% are using it to help their business improve workflow and case management today, and this number almost doubles to 61% when respondents were asked to look five years ahead.

However, for hyperautomation to have the impact many hope and expect it to, it is important that businesses have accountability for successfully integrating it. At present, significant concerns exist around the ability to do so at present, with 58% of respondents citing integration with existing legacy systems as their biggest automation challenge, while 40% point to compatibility with third party technologies as their biggest concern. The success of hyperautomation deployments also depends on keeping operations and processes consistent, even when situations such as the coronavirus pandemic arise, and organizations are required to develop new automated solutions quickly.

Emerging technologies

It’s just as important to ensure that business leaders take accountability for recognizing technologies that are still at the early stages of emerging on their radar. After all, innovation is only innovative as long as it’s new. Once a technology has become mainstream, businesses can quickly find themselves playing catchup in terms of fully understanding how it can be used effectively within their organizations.

Take extended reality (XR). Virtual Reality headsets and augmented reality have long been emerging technologies for consumers, but when asked how business leaders were using it to interact with customers, just 35% said it was changing the customer experience. This might be expected for such relatively new technology, but when asked about the outlook five years from now, a different picture emerges – almost a third (30%) of C-suite respondents say XR will become essential to customer engagement. In fact, more than half (52%) believe XR will become a competitive differentiator. The takeaway is that even though a technology may not be in the here and now in terms of widespread adoption, there’s no excuse not to be prepared. It’s never too early to hold oneself accountable for innovation. As XR begins to take shape, business leaders can also score early wins through a market-focused strategy that does not wait for such technology to mature before identifying early, valuable opportunities.

The same can be said when it comes to investing in IT infrastructure that can support emerging technologies. For example, it’s no surprise that 73% of survey respondents said that current remote and mobile work trends have made cloud deployments a priority, nor that over half (51%) said mobile and remote functionality will continue to be one of the drivers of extended edge technology. However, if these technologies are to be effective, organizations need to adopt and help complementary technologies along the way. 41% of C-level respondents said the maturation of AI, automation, and machine learning are necessary for the cloud and extended edge to achieve deeper success. Today, only 22% rated their distributed cloud technology as ‘intelligent’ or ‘mature’ while 18% said the same of extended edge technology, demonstrating the extent of the challenge ahead.

The bottom line

The bottom line is that technology accountability requires more than just standing up and taking ownership. It’s a process of proactive investigation, preparation, and study into what’s best for an organization. One thing’s for sure - technology will continue to evolve and new trends will continue to emerge. If businesses aren’t ready to maximize its value by embracing accountability, they could be left behind.

Date

05 May 2021

Sources


Share


Other Blog

  • Cybercriminals have found a cunning new way to evade security protections

    As email gateways become better at spotting malicious messages, operators of the sinister BazarBackdoor malware are resorting to changing up their tactics.

    According to reports from BleepingComputer, the TrickBot group, which created the malware, no longer tries to infect new endpoints directly via email, but rather through website contact forms.

    Citing a report from cybersecurity experts Abnormal Security, the publication says the new campaign probably kicked off in December 2021, targeting corporate endpoints with Cobalt Strike or ransomware.

    TechRadar needs you!

    We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time, and entrants from the UK and US will have the chance to enter a draw for a £100 Amazon gift card (or equivalent in USD). Thank you for taking part.

    >> Click here to start the survey in a new window

    Deploying the BazarBackdoor DLL

    The method is simple: instead of directly sending an email, the threat actor will use corporate contact forms to kick off communication, most often posing as a business requesting a product supply quote.

    Once the target responds to the message, the attacker will send a malicious ISO file, claiming it’s relevant to the communication. The ISO file won’t be attached directly, though, but instead will first be uploaded to third-party file-sharing services, such as TransferNow or WeTransfer. 

    The ISO archive carries two files, the researchers suggest: one .lnk file and one .log file. By grouping these files together, and having the victim extract them manually after download, the threat actors hope to evade any email protection services that the target might have set up.

    Once the target runs the .lnk file, it will open a terminal window and load the .log file - the BazarBackdoor DLL.

    BazarBackdoor is built to provide its operators with remote access to an internal device, and as such, is usually used as a stepping stone towards the deployment of more destructive malware or ransomware. 

    Given that BazarBackdoor is the first stage in a multi-stage attack, the researchers expect the malware to deploy the stage-two payload. However, many of the C2 IPs are offline, preventing researchers from discovering the campaign’s endgame.

    Via BleepingComputer

    Read More
  • Massive GPU stock: buy the RTX 3070 Ti today from Best Buy, EVGA for MSRP

    The RTX 3080 Ti is going to be available to buy today. Here's when and where it'll be in stock, according to our reporting.

    Read More
  • Here's the cheapest 4K projector on the market right now

    You won’t find a cheaper ultra short throw 4K projector around today.

    Read More
  • Intel’s Core i9-9900K and i7-9700K Coffee Lake CPUs have never been cheaper

    These high-end 9th-gen chips were discounted in August, but have seen their prices slashed even further now.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us