25.01.2018 Views

CIO & LEADER-Issue-10-January 2018 (1)

The cover story on CIO&Leader's January issue is a dive into the skills that CIOs are going to develop and hire in 2018

The cover story on CIO&Leader's January issue is a dive into the skills that CIOs are going to develop and hire in 2018

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Face Off<br />

Is <strong>CIO</strong>'s vertical specialization<br />

important? Pg 24<br />

Banking<br />

Why tech is the ultimate<br />

cash cow for farmers? Pg 38<br />

Volume 06<br />

<strong>Issue</strong> <strong>10</strong><br />

<strong>January</strong> <strong>2018</strong><br />

150<br />

TRACK TECHNOLOGY BUILD BUSINESS SHAPE SELF<br />

Skills<br />

<strong>CIO</strong>s will<br />

Develop<br />

& Hire to<br />

Conquer<br />

<strong>2018</strong> page.<br />

16<br />

A 9.9 Media Publication


EDITORIAL<br />

Shyamanuja Das<br />

shyamanuja.das@9dot9.in<br />

Beyond the<br />

Hyperboles<br />

A<br />

For ensuring that<br />

the organization<br />

remains both<br />

competitive and<br />

responsible, one<br />

of the immediate<br />

priorities is<br />

drawing of an<br />

action plan<br />

for systematic<br />

reskilling<br />

At the time of writing this, the annual meeting<br />

of the World Economic Forum is on at Davos.<br />

India, of course, is getting a lot of mindshare,<br />

not just because of the plenary speech of prime<br />

minister Narendra Modi in which he reiterated<br />

India’s commitment to globalization but also<br />

because India’s role in global economy is now<br />

unquestionable!<br />

Technology has become one of the recurring<br />

themes in all global agenda setting. In a multidisciplinary,<br />

cross-cultural platform like WEF<br />

it is even more prominent—as technology now<br />

touches and impacts all aspects of life.<br />

What is somewhat new this year, however, all<br />

that tech talk is not one-sided optimism. Global<br />

leaders—including tech leaders—have started<br />

discussing the adverse impact of technological<br />

progress, incidentally one of the global risks<br />

that WEF has been trying to measure in its<br />

annual Global Risk Report (GRR).<br />

Talking of GRR, this year, two of<br />

the cyber risks—cyber-attacks and<br />

data theft/fraud—have been identified<br />

by thought leaders as two of the<br />

five most likely risks for the world<br />

in <strong>2018</strong>.<br />

But the WEF discussion goes<br />

much beyond the immediate risks.<br />

Apart from cyber security, other<br />

impact of technology that has been<br />

discussed is the impact that technology<br />

has on children, on jobs, and on<br />

society in general. Who could have<br />

imagined a decade back that Cisco<br />

CEO would stand on one of the most important global<br />

platforms and urge the parents to control device<br />

use among children?<br />

This is but one ex<strong>amp</strong>le of the fact that the global<br />

tech community is becoming far more responsible.<br />

As an important constituent of that community, the<br />

<strong>CIO</strong>s should keep this aspect in mind.<br />

One of the more actionable items on that responsibility<br />

agenda is doing something about new automation<br />

making certain current functions redundant/<br />

less important. For ensuring that the organization<br />

remains both competitive and responsible, one of the<br />

immediate priorities is drawing of an action plan for<br />

systematic reskilling.<br />

The recently released WEF report, Towards a<br />

Reskilling Revolution: A Future of Jobs for All introduces<br />

a new data-driven approach to identifying reskilling<br />

and job transition opportunities.<br />

But as a recent survey by us finds out—and our<br />

cover story is based on that—our <strong>CIO</strong>s are more<br />

than sensitized to the need of reskilling. The <strong>2018</strong><br />

agenda is primarily to act. We present ten top <strong>CIO</strong>s’<br />

take on what skills they are looking at hiring and<br />

what skills that they are looking to acquire for themselves.<br />

And they explain why.<br />

Tell us about yours<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

1


A 9.9 Media Publication<br />

Face Off<br />

Is <strong>CIO</strong>'s vertical specialization<br />

important? Pg 24<br />

TRACK TECHNOLOGY BUILD BUSINESS SHAPE SELF<br />

Banking Volume 06<br />

Why tech is the ultimate <strong>Issue</strong> <strong>10</strong><br />

<strong>January</strong> <strong>2018</strong><br />

cash cow for farmers? Pg 38<br />

150<br />

16<br />

CONTENT<br />

JANUARY <strong>2018</strong><br />

COVER STORY<br />

16-23|<br />

Skills <strong>CIO</strong>s Will<br />

Develop & Hire To<br />

Conquer <strong>2018</strong><br />

advertisers ’ index<br />

Godrej<br />

Vodafone<br />

Skills<br />

<strong>CIO</strong>s will<br />

Develop<br />

Conquer<br />

<strong>2018</strong> page.<br />

& Hire to<br />

Cover Design by:<br />

Shokeen Saifi<br />

FC<br />

BC<br />

Please Recycle<br />

This Magazine<br />

And Remove<br />

Inserts Before<br />

Recycling<br />

COPYRIGHT, All rights reserved: Reproduction in whole or in part without written permission from<br />

Nine Dot Nine Interactive Pvt Ltd. is prohibited. Printed and published by Vikas Gupta for Nine Dot Nine<br />

Mediaworx Pvt Ltd, 121, Patparganj, Mayur Vihar, Phase - I, Near Mandir Masjid, Delhi-1<strong>10</strong>091. Printed at<br />

Tara Art Printers Pvt ltd. A-46-47, Sector-5, NOIDA (U.P.) 2013011<br />

This index is provided as an<br />

additional service.The publisher<br />

does not assume any liabilities<br />

for errors or omissions.<br />

2 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


AROUND THE TECH<br />

04-07<br />

Colonels, Commanders &<br />

Cybersecurity<br />

www.cioandleader.com<br />

COLUMN<br />

08-09<br />

Essential Traits Of A<br />

New Leader<br />

By Priya Dar<br />

<strong>10</strong>-11<br />

How Enterprises Are<br />

Redefining Businesses<br />

With Big Data Powered<br />

By AI<br />

By Aashish Kalra<br />

INSIGHT<br />

26-27<br />

Artificial Intelligence<br />

Is Creating Happy<br />

Workplaces<br />

28-29<br />

Tech Job Trends In<br />

<strong>2018</strong> And Beyond<br />

32-33<br />

When Cloud Gives You<br />

Wings<br />

SECURITY<br />

34-36<br />

Web Application<br />

Security In A Digitally<br />

Connected World<br />

MANAGEMENT<br />

Managing Director: Dr Pramath Raj Sinha<br />

Printer & Publisher: Vikas Gupta<br />

EDITORIAL<br />

Managing Editor: Shyamanuja Das<br />

Associate Editor: Shubhra Rishi<br />

Content Executive-Enterprise Technology:<br />

Dipanjan Mitra<br />

DESIGN<br />

Sr Art Director: Anil VK<br />

Art Director: Shokeen Saifi<br />

Visualisers: NV Baiju & Manoj Kumar VP<br />

Lead UI/UX Designer: Shri Hari Tiwari<br />

Sr Designers: Charu Dwivedi, Haridas Balan & Peterson PJ<br />

SALES & MARKETING<br />

Director-Community Engagement<br />

for Enterprise Technology Business:<br />

Sachin Mhashilkar (+91 99203 48755)<br />

Brand Head: Vandana Chauhan (+91 99589 84581)<br />

Assistant Product Manager-Digital: Manan Mushtaq<br />

Community Manager-B2B Tech: Megha Bhardwaj<br />

Community Manager-B2B Tech: Renuka Deopa<br />

Associate-Enterprise Technology: Abhishek Jain<br />

Assistant Brand Manager-B2B Tech: Mallika Khosla<br />

Regional Sales Managers<br />

South: Ashish Kumar (+91 97407 61921)<br />

North: Deepak Sharma (+91 98117 911<strong>10</strong>)<br />

West: Prashant Amin (+91 98205 75282)<br />

Ad Co-ordination/Scheduling: Kishan Singh<br />

PRODUCTION & LOGISTICS<br />

Manager Operations: Rakesh Upadhyay<br />

Asst. Manager - Logistics: Vijay Menon<br />

Executive Logistics: Nilesh Shiravadekar<br />

Logistics: MP Singh & Mohd. Ansari<br />

OFFICE ADDRESS<br />

Nine Dot Nine Mediaworx Pvt Ltd<br />

121, Patparganj, Mayur Vihar, Phase - I<br />

Near Mandir Masjid, Delhi-1<strong>10</strong>091<br />

Published, Printed and Owned by Nine Dot Nine Mediaworx<br />

Private Ltd. Published and printed on their behalf by<br />

Vikas Gupta. Published at 121, Patparganj,<br />

Mayur Vihar, Phase - I, Near Mandir Masjid, Delhi-1<strong>10</strong>091,<br />

India. Printed at Tara Art Printers Pvt Ltd., A-46-47, Sector-5,<br />

NOIDA (U.P.) 201301.<br />

Editor: Vikas Gupta<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

3


WHAT<br />

<strong>CIO</strong>s ARE<br />

TIRED OF<br />

HEARING...<br />

around<br />

thetech<br />

SECURITY<br />

Colonels,<br />

Commanders &<br />

Cybersecurity<br />

In 1978, Transformational Leadership<br />

was introduced by expert, James Mc-Gregor Burns,<br />

in his book “Leadership”. There are close to a dozen<br />

CISOs in Indian industry—who have served in Indian<br />

the defense forces—namely the Indian Army and Indian<br />

Navy. Somehow, we do not see many ex-Airmen in the<br />

list. But what exactly is prompting India, Inc. to go for<br />

these defense personnel as CISOs? On the face of it,<br />

many say current cyber threats require a real combat<br />

mindset that comes naturally to the defense personnel.<br />

Whatever it is, at present fauji CISOs seem to be ruling<br />

the CISO-dom. Here is a list of a handful of CISOs.<br />

“The Chief<br />

Information Officer<br />

role is nearing<br />

extinction and may<br />

cease to exist a few<br />

years from now.”<br />

AK Anand<br />

Senior Vice President, Global<br />

Practice Head & CISO<br />

NIIT Technologies<br />

Colonel in Indian Army<br />

AJ Vijaykumar<br />

CISO<br />

Tata Communications<br />

Lt Colonel in Indian Army<br />

Brijesh Datta<br />

SVP & CISO<br />

Reliance JioInfocom<br />

Colonel in Indian Army<br />

Kaushal K Chaudhary<br />

Executive Director – Group Head<br />

IT & IS<br />

Lanco Infratech<br />

Jt Director Systems<br />

(Commander of Indian Navy)<br />

Manish Tiwari<br />

CISO<br />

Bharti Airtel<br />

Director – CERT, Indian Navy<br />

Murli Menon<br />

CISO<br />

Atos India<br />

Commander at Indian Navy<br />

Mukesh Saini<br />

Head, IT Security<br />

Essel Group<br />

Commander at Indian Navy<br />

Prashant Veer Singh<br />

SVP, CISO and <strong>CIO</strong><br />

Bharti Infratel<br />

Officer Commanding<br />

Communications (Major) at<br />

Indian Army<br />

4 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Around The Tech<br />

BY THE BOOK<br />

We recommend you to read Pedro<br />

Domingos’ The Master Algorithm,<br />

which gives us a peek inside the learning<br />

machines that power Google, Amazon,<br />

and your smartphone. The author<br />

paints a picture through machine<br />

learning's five major schools of thought,<br />

showing how they turn ideas from neuroscience,<br />

evolution, psychology, physics,<br />

and statistics into algorithms ready<br />

to serve you. Domingos, a Professor<br />

at University of Washington, is also a<br />

researcher in machine learning, creates<br />

a blueprint of The Master Algorithm,<br />

and discusses what it means for the<br />

future of business, science, and society.<br />

The quest for universal learning is one<br />

of the most significant, fascinating, and<br />

revolutionary intellectual developments<br />

of all time. A ground-breaking<br />

book, The Master Algorithm is the<br />

essential guide for anyone wanting to<br />

understand not just how the data revolution<br />

will happen, but how to be at its<br />

forefront.<br />

makingheadlines<br />

When people arrived in Las Vegas to attend CES in <strong>January</strong> this year, one of the<br />

first things they noticed was Google’s massive promotional c<strong>amp</strong>aign for its<br />

Google Assistant service. There were ads splattered on the sides of buildings,<br />

painted on trains, and displayed on the screens of hotel room TVs. The effort<br />

wasn't to make artificial intelligence a huge theme at this year’s show–mainly in<br />

the form of digital assistants. Google, on the other hand, is also using its network<br />

of Android devices and integrate its digital assistant service into millions of cars<br />

from companies such as Ford, GM, Volkswagen and Volvo. Likewise, Amazon<br />

left no stone unturned to showcase Alexa as the new wave in digital assistants.<br />

Alexa's history preceded itself since it was the star of last year's CES. At CES<br />

<strong>2018</strong>, Amazon's Alexa service has diversified into cookers from Whirlpool and<br />

GE as well as Bluetooth-enabled portable devices such as smartwatches, headphones<br />

and smartglasses.<br />

Only 17% of senior roles are held by women in India.<br />

The global survey by Grant Thornton – Women in business:<br />

New perspectives on risk and reward, of 5,500<br />

businesses in 36 economies further adds that 41%<br />

of the Indian businesses surveyed have no women in<br />

leadership roles, 7 points higher than the last year.<br />

India continues to rank third lowest in the proportion<br />

of business leadership roles held by women for the<br />

third year consecutively.<br />

At the global stage, Grant Thornton’s data shows<br />

developing regions continue to lead the charge on<br />

diversity with developed economies lagging behind.<br />

Eastern Europe performs best, with 38% of senior roles<br />

held by women in 2017 and just 9% of businesses<br />

with no women in senior management. Meanwhile the<br />

MINT economies (Mexico, Indonesia, Nigeria and Turkey)<br />

saw the most improvement, with the proportion of<br />

senior roles held by women rising from 24% in 2016 to<br />

28% in 2017.<br />

gender<br />

bender<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

5


Around The Tech<br />

CES <strong>2018</strong><br />

SPECIAL<br />

matter of<br />

twitter<br />

Toyota president Akio Toyoda has announced e-Palette, the auto<br />

company's on-demand autonomous vehicle solution for business<br />

applications, which it said will essentially form on-demand cities.<br />

E-Palette is one ex<strong>amp</strong>le of Toyota's vision for autonomous business<br />

applications," Toyoda said at CES <strong>2018</strong>.<br />

E-Palette will be fully electric, and will be powered by Toyota's<br />

autonomous technology. Or, if they prefer, partner companies can use<br />

their own automotive driving system instead. In either case, e-Palette<br />

will include Toyota's Guardian technologies, which will act as a<br />

safety net. It's an open, flexible platform that can be easily adapted to<br />

support a range of uses, including ride sharing, delivering, and retail.<br />

Announced at CES <strong>2018</strong>, the e-Palette could enable on-demand<br />

use cases for retail experiences, personal shops, markets, showrooms,<br />

and office sharing while transiting to and from the workplace.<br />

Ride sharing transport could also share the space with on-demand<br />

meal deliveries.<br />

VITAL<br />

STATISTICS<br />

Digital business<br />

maturity has a<br />

direct impact on<br />

<strong>CIO</strong> position<br />

Percentage of <strong>CIO</strong>s reporting to the<br />

CEO by digital maturity<br />

70%<br />

0%<br />

31%<br />

No Digital<br />

Initiative<br />

(n=260)<br />

36%<br />

Desire/<br />

Ambition<br />

(n=604)<br />

41%<br />

Designing<br />

(n=851)<br />

43%<br />

Delivering<br />

(n=799)<br />

48%<br />

Scaling<br />

(n=417)<br />

59%<br />

Harvesting/<br />

Refining<br />

(n=94)<br />

Source: Gartner's <strong>CIO</strong> Agenda <strong>2018</strong> Survey<br />

6 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Around The Tech<br />

<strong>CIO</strong> Movements<br />

Niranjan<br />

Bhalivade<br />

IS NOW<br />

CEO - Information<br />

Technology,<br />

Trident Group<br />

WAS<br />

<strong>CIO</strong>, CEAT<br />

Niranjan Bhalivade has<br />

joined as the CEO -<br />

Information Technology<br />

at Trident Group, a<br />

leading manufacturer<br />

of textiles and based<br />

in Ludhiana. Bhalivade,<br />

who has served as a<br />

jury member for annual<br />

NEXT<strong>10</strong>0 awards by<br />

9.9 Media's IT NEXT<br />

for multiple years, was<br />

serving as the <strong>CIO</strong> of<br />

CEAT for last eight years.<br />

He will be leading the<br />

digitalization program at<br />

the group.<br />

Manish<br />

Tiwari<br />

IS NOW<br />

Senior VP and<br />

Global CISO, Bharti<br />

Airtel<br />

WAS<br />

CISO, Microsoft<br />

India<br />

Manish Tiwari has<br />

joined as Senior VP and<br />

Global Chief Information<br />

Security Officer (CISO)<br />

for Bharti Airtel, India's<br />

largest telecom service<br />

provider. Tiwari, an<br />

ex-defence personnel,<br />

who served as the<br />

director for Indian Navy's<br />

Computer Emergenecy<br />

Response Team (CERT),<br />

was most recently<br />

serving as the CISO for<br />

Microsoft India.<br />

Anand<br />

Thakur<br />

IS NOW<br />

Chief Digital Officer,<br />

Jubilant Foodworks<br />

Ltd<br />

WAS<br />

CTO, Koovs<br />

Anand Thakur has<br />

joined as the Chief<br />

Digital Officer of Jubilant<br />

Foodworks Ltd. This is a<br />

newly created position at<br />

the company. A techie,<br />

Thakur served in various<br />

IT companies including<br />

Infosys, Perot Systems,<br />

Adobe before having<br />

a stint in online retail<br />

companies including<br />

Lenskart and Koovs.<br />

His immediate last<br />

assignment was as the<br />

CTO of Koovs.<br />

Major Vikas<br />

Singh Yadav<br />

IS NOW<br />

CISO, Max Life<br />

Insurance Company<br />

WAS<br />

CISO, Government<br />

of India<br />

Major Vikas Singh<br />

Yadav, an experienced<br />

information security<br />

professional, who was<br />

with the Indian Army<br />

and was working most<br />

recently in a government<br />

assignment, has joined<br />

as the Chief Information<br />

Security Officer (CISO) at<br />

Life Insurance company,<br />

Max Life.<br />

Vikas is a dynamic<br />

professional with<br />

excellent academic<br />

record and cross domain<br />

experience.<br />

Arindam<br />

Singha Roy<br />

IS NOW<br />

<strong>CIO</strong>, East India<br />

Udyog<br />

WAS<br />

Head of IT,<br />

SPML Infra<br />

Arindam Singha Roy has<br />

joined as the <strong>CIO</strong> of East<br />

India Udyog, a major<br />

transformer, conductor<br />

and EPC company.<br />

Before this, he was the<br />

Head of IT at SPML<br />

Infra where he was<br />

responsible for setting<br />

up IT infrastructure,<br />

security and applications<br />

and was in-charge of the<br />

entire IT set-up. Arindam<br />

had spent more than 12<br />

years at SPML Infra.<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

7


COLUMN<br />

By Priya Dar<br />

Essential<br />

Traits Of A<br />

New Leader<br />

Priya Dar, Chief Information Officer,<br />

Godfrey Phillips, writes about leadership<br />

in the digital age<br />

W<br />

“Who is a leader?” - My 13-year old son asked me one day. This<br />

got me thinking. Having spent some time in the leadership spectrum,<br />

this is a hard truth to live by. You have to constantly ask yourself:<br />

Are you a leader? A good leader? A conscientious leader? A<br />

just leader?<br />

Is he/she the one who stands front and center or is he/she the<br />

one who stands in the back ensuring everything goes well? After<br />

taking a scholastic approach, I think I have learnt a few things<br />

about leadership.<br />

In my opinion, anyone can become a leader. Are you a team<br />

player?; Are you decisive enough without letting your ego get in<br />

the way?; Do you communicate?; Are you approachable?; Do your<br />

people know you have their back?<br />

Know When To Change<br />

Sometimes you will need to lead the troops, and at other times you<br />

will have to nudge your people to take the plunge. Access the situation<br />

and decide.<br />

Be Decisive<br />

Not with an iron fist though. Any attempt to rule with an iron fist<br />

will go down like a lead balloon.<br />

The author is Chief Information Officer<br />

at Godfrey Phillips<br />

Keep Learning<br />

However, high on the career graph, you should be open to learning<br />

from anyone around you – irrespective of rank.<br />

8 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Column<br />

1<br />

Promoting the<br />

company's vision<br />

2<br />

Operationalizing<br />

CSR<br />

3<br />

Obtaining top<br />

management<br />

support<br />

4<br />

Engaging diverse<br />

stakeholders<br />

5<br />

Empowering<br />

and developing<br />

stakeholders<br />

Sometimes you will need to lead the troops<br />

and at other times, you will have to nudge<br />

people to take the plunge<br />

6<br />

Communicating<br />

with stakeholders<br />

7<br />

Measuring<br />

performance<br />

8<br />

Setting ethical<br />

standards<br />

Source: Report by Russel Reynolds on Sustainable<br />

Leadership: Talent requirements for sustainable enterprises<br />

Be Appreciative<br />

Just because it is a job, does not mean,<br />

you cannot appreciate small things.<br />

I have learnt from experience that<br />

appreciation begets loyalty, which is at<br />

the core of a successful leader.<br />

Pace Yourself<br />

Just because there is a book called<br />

“First <strong>10</strong>0 days of a CXO” does not<br />

mean you have to complete everything<br />

within <strong>10</strong>0 days. Every organization is<br />

different and so the list of accomplishments<br />

will be different.<br />

Build Relationships/<br />

Network<br />

Build your network - internally and<br />

externally. One of my mentors used<br />

to say this – a lot can be accomplished<br />

over a cup of tea.<br />

Delegate<br />

As you go higher up the corporate<br />

ladder, there are things you will<br />

have to delegate. Create the bandwidth<br />

for yourself by delegation and<br />

then let the delegate handle the day to<br />

day stuff.<br />

Lead by Ex<strong>amp</strong>le<br />

If you want people to respect policy<br />

– start following it yourself. I have<br />

seen people preach about the benefits<br />

of strong passwords while their own<br />

passwords are “abc123.”<br />

Don’t Forget to Enjoy<br />

You have earned it. Ultimately my<br />

answer to my son was on similar lines<br />

– a leader is not just someone who<br />

leads but someone who inspires others<br />

to follow<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

9


COLUMN<br />

By Aashish Kalra<br />

How<br />

Enterprises<br />

Are Redefining<br />

Businesses<br />

With Big Data<br />

Powered By AI<br />

How these technologies is giving<br />

businesses a new lease of life<br />

T<br />

The author is Chairman, Cambridge<br />

Technology Enterprises Limited<br />

The world is transforming and<br />

economies like India and China that<br />

remained undiscovered in early 90s,<br />

hold the potential to be discovered as<br />

growth stories and creators of asset<br />

class because of their ability to create<br />

unstructured data sets. Data is the<br />

next natural resource, like air,<br />

oil, water, and the convergence of<br />

Big Data and Cloud powered by AI<br />

and ML is a potential multi-trillion<br />

dollar opportunity.<br />

Artificial Intelligence is no longer<br />

a theory, it is for real because of the<br />

availability of unstructured data,<br />

high bandwidth and affordable computing<br />

resources.<br />

Discovering AI is the<br />

new normal<br />

As the world transforms, businesses<br />

are going to need a lot of elements to<br />

implement AI. They need an element<br />

of Big Data and Cloud, then they need<br />

to manage data, followed by an ability<br />

to see panoramic view of data to<br />

innovate and help businesses leapfrog<br />

and most importantly, draw<br />

insights to take the decisions. Majority<br />

of the companies will not be able<br />

to articulate the problem or hire the<br />

people to execute.<br />

There will be businesses with the<br />

resources and capital to get to decisions<br />

while some may still be finding<br />

the way to cross the bridge. Discovering<br />

the power of AI for your business<br />

will be the new impact. Gartner<br />

recently estimated that the term “AI”<br />

ranked seventh in the most searched<br />

terms. This is significant jump compared<br />

to <strong>January</strong> 2016 when “AI”<br />

was not even in the top <strong>10</strong>0 for the<br />

same category.<br />

Artificial Intelligence is transforming<br />

the way businesses are defined,<br />

designed and delivered and enterprise<br />

value is captured. Asian economies<br />

like India and China are poised to<br />

leapfrog the world in Artificial Intel-<br />

<strong>10</strong> <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Column<br />

ligence as the demography is not constrained<br />

by legacy usage of computers<br />

or tablets so they can move directly to<br />

the phone. Also, India and China are<br />

creating unstructured data at a very<br />

rapid pace and has datasets in volume<br />

that very few countries possess.<br />

In the Asian context, India is a<br />

country with inefficiencies and lack<br />

of infrastructure in financial services,<br />

retail, education, health services,<br />

insurance and manufacturing. Most of<br />

these sectors have limited innovation<br />

in technology due to the majority of<br />

transactions being done in cash. Now,<br />

with the increasing adoption of digital<br />

currency, it will create a treasure<br />

trove of data in every industry. With<br />

incredible advances in Artificial Intelligence,<br />

India Inc. will have the ability<br />

to upend, disrupt and create industryshaping<br />

companies from scratch.<br />

Mobility in India will drive digital<br />

adoption. As the next 700 million<br />

Indians get online – they will create<br />

data on how they live, move, transact<br />

and interact. This will in turn create<br />

opportunities in healthcare services,<br />

transportation, building better cities,<br />

retail, e-commerce and media.<br />

As we approach this future, we will<br />

see startups and big companies alike<br />

take advantage of Artificial Intelligence<br />

to re-invent and innovate. The<br />

vision of Digital India requires considerable<br />

investment and a sustained<br />

push to create better infrastructure<br />

and development of talent to support<br />

this transformation. If we can combine<br />

the efforts in government policy and<br />

innovation that young Indians are<br />

creating today, India will leapfrog the<br />

technologies of yesterday and emerge<br />

as the engine of global growth.<br />

On a larger context, application<br />

of Artificial Intelligence to crossfunctional<br />

departments can generate<br />

insights adding immense value to ingrained<br />

business processes in terms<br />

of improving performance on a proactive<br />

basis. For implementing Artificial<br />

Intelligence at an enterprise level,<br />

both AI and businesses have to ‘Think<br />

Gartner recently estimated that the<br />

term “AI” ranked seventh in the most<br />

searched terms<br />

Big, Start Small and Act Fast’.<br />

So, that’s the global context of what<br />

businesses should be trying to solve.<br />

The first thing is to capture the data<br />

and place it in databases that can<br />

handle that volume of data. This is not<br />

your traditional databases. The second<br />

part is how you analyse it. Today, the<br />

world analyzes it by brute force but<br />

tomorrow, we are convinced that the<br />

world will analyze large parts of data<br />

with Artificial Intelligence. Once you<br />

get to that point, the way we deal with<br />

information, the way the world works<br />

transforms itself. It is no longer transactional,<br />

it is relationship.<br />

Identifying hidden correlations is<br />

the aim of applying AI to business<br />

processes. Data-rich and digitally<br />

transformed organizations are going<br />

to have an advantage here compared to<br />

ones that are not capturing their data.<br />

Former organizations should start<br />

understanding the power of AI and<br />

start identifying different processes in<br />

business units where they can maximize<br />

results with the usage of AI.<br />

In the years to come, enterprises<br />

will scale new heights by exploring<br />

this untapped data and extract incremental<br />

value. AI powered by Big<br />

Data will affect almost all facets of our<br />

existence ultimately influencing the<br />

way enterprises chase growth, to<br />

positive effect.<br />

Whether businesses are ready<br />

or not, AI is going to take us overwith<br />

its disruption and it is going to<br />

work in the favor of those who are better<br />

prepared<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

11


COLUMN<br />

By Rahul Kumar<br />

Cloud<br />

Security:<br />

A Case For<br />

Effective<br />

Encryption<br />

Having an effective encryption and key<br />

management solution is vital to the<br />

success of any security strategy<br />

I<br />

It has not yet reached epic proportions, but the number of organizations<br />

adopting cloud-based technologies is growing dramatically.<br />

Organizations of all sizes across industries are turning towards<br />

cloud-based infrastructure and cloud computing for better scalability,<br />

accessibility and a collaborative work environment. However,<br />

after moving to the cloud, many organizations mistakenly assume<br />

that it is the role of the cloud service provider (CSP) to secure data<br />

and ensure compliance.<br />

Even though the CSP may provide services for protecting data,<br />

organizations must understand the fact that virtual environments<br />

are not always fully secure and that they—organizations—too have a<br />

role in protecting the security and privacy of their data. Remember,<br />

the liability to notify those affected and remediate damages is on you<br />

should your company suffer a data breach!<br />

The author is Country Manager for<br />

India at WinMagic<br />

Knowing the levels of responsibility<br />

does matter<br />

When it comes to choosing between cloud infrastructure and cloud<br />

computing, companies must make the decision backed by a plan to<br />

implement the right security solution. The solution should effectively<br />

address issues such as securing data, managing risk related<br />

to unauthorized access, and meeting compliance and regulatory<br />

requirements. Remember, the cloud is subject to the same threats<br />

12 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Column<br />

With increased sophistication of threats, cloud security is<br />

becoming even more dynamic as it evolves<br />

as a data center. Whether cloud or onpremise,<br />

organizations have to deal<br />

with human error, malicious breaches<br />

from internal and external sources, as<br />

well as system glitches. The massive<br />

amounts of data located on shared<br />

cloud servers always entice criminals.<br />

Things get a lot more complicated<br />

when a multitude of mobile devices<br />

are used in organizations.<br />

With increased sophistication of<br />

threats, cloud security is becoming<br />

even more dynamic as it evolves.<br />

Organizations continue to be responsible<br />

for security, privacy and compliance<br />

even when under different cloud<br />

service models. The need for consistent<br />

policies, password rules and<br />

specialized data encryption methods<br />

has never been greater. Both the organization<br />

and the CSP have roles that<br />

vary in scope, but then both also have<br />

different levels of responsibility that<br />

encompass the entire gamut of operations—from<br />

data classification,<br />

endpoint protection, identity and<br />

access management, application and<br />

network level controls, to host and<br />

physical security.<br />

There are clear boundaries defined<br />

and responsibilities identified for<br />

organizations and CSPs. For instance,<br />

in both on-premise and cloud models,<br />

the organization is responsible for<br />

ensuring that the data is classified<br />

and encrypted in compliance with the<br />

regulatory obligations. In the case of<br />

endpoint devices, CSPs may facilitate<br />

the management of these devices by<br />

providing secure device management,<br />

mobile application management, and<br />

PC management capabilities; however,<br />

the responsibility of implementing the<br />

security solution again lies with the<br />

customer organization.<br />

Who is responsible for<br />

a breach?<br />

There is no question about who is<br />

responsible when a breach occurs. For<br />

businesses, the vital consideration in<br />

securing the infrastructure and data<br />

relates to where the CSP’s responsibility<br />

ends and the organization’s begins<br />

so that a breach does not occur in the<br />

first place. This means that while the<br />

provider is responsible for protecting<br />

the hardware, software, physical facilities<br />

and other aspects involved with<br />

running the cloud services provided,<br />

businesses maintain control over a<br />

number of key security measures.<br />

Some key security measures for<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

13


Column<br />

businesses include:<br />

Network configuration and security<br />

(such as firewalls)<br />

Data Security (including encryption)<br />

The use of third-party security tools<br />

such as encryption key management<br />

software<br />

Determining the type of content and<br />

data to store in the cloud<br />

Access control and management<br />

Making life simple with encryption<br />

There is abundant evidence to show<br />

the difference that encryption makes<br />

in containing the volume of loss and<br />

associated costs when a breach occurs.<br />

In fact, according to a study, extensive<br />

use of encryption is the second most<br />

impactful factor that can limit the costs<br />

of a data breach. Despite all pointers<br />

that emphasize its advantages, usage<br />

of encryption is limited in many businesses<br />

across industries. Although the<br />

adoption of encryption has increased<br />

over the last decade, only a mere 37 percent<br />

of businesses employ it as a cloud<br />

security strategy.<br />

Remember, encryption is the important<br />

first step for businesses that wish<br />

to take control of the ownership of<br />

data; better encryption key management<br />

follows next.<br />

While encryption renders data<br />

into a format that can only be read by<br />

authorized users, it does not make a<br />

powerful strategic tool if not combined<br />

with effective key management. Far<br />

too often, companies follow a laissezfaire<br />

approach to key management,<br />

which makes its utilization needlessly<br />

complex and cumbersome. Problems<br />

do get out of hand when there is no<br />

clear ownership of keys within the<br />

organization, when no skilled personnel<br />

is in charge of the keys, or when<br />

a siloed approach is followed for key<br />

management.<br />

Having an effective encryption and<br />

key management solution is vital to<br />

the success of any security strategy.<br />

Data encryption, when executed<br />

properly, ensures the protection of<br />

sensitive information. Although there<br />

are many myths surrounding data<br />

Encryption is the important first step for businesses<br />

that wish to take control of the ownership of data;<br />

better encryption key management follows next<br />

encryption (too expensive, too difficult<br />

to manage, etc), the surprising truth is<br />

that it is indispensable. In fact, encryption<br />

provides the foundational framework<br />

to any data security protection<br />

strategy.<br />

There are security options out there<br />

to help organizations in:<br />

Encrypting and managing data<br />

stored on virtual machines and<br />

Infrastructure-as-a-Service (IaaS)<br />

platforms.<br />

Encrypting files at the endpoint<br />

before they are synchronized to<br />

enterprise file sync and share (EFSS)<br />

services across a range of enterprise<br />

platforms.<br />

Managing encryption keys across<br />

the enterprise<br />

Whether data is stored in public,<br />

private, or hybrid cloud environments,<br />

organizations need a robust<br />

solution to ensure full control of<br />

encryption and its keys. Much of the<br />

encryption related problems can be<br />

alleviated with the adoption of file<br />

encryption software, and ideally with<br />

an intelligent key management system<br />

that encrypts virtual machines and<br />

removes encryption keys at the conclusion<br />

of each virtual instance.<br />

Using a single platform often is<br />

more effective as an organization can<br />

ensure the implementation of a unified<br />

encryption strategy across any<br />

endpoint, provide a virtualized or<br />

cloud environment with increased<br />

enterprise security, ensure encryption<br />

compliance, and reduce complexities<br />

of risk management and audits<br />

14 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Skills<br />

<strong>CIO</strong>s will<br />

Develop<br />

& Hire to<br />

Conquer<br />

<strong>2018</strong> By<br />

Shubhra Rishi


Cover Story<br />

L<br />

et's address the elephant<br />

in the room: The world is<br />

staring at a talent crisis.<br />

The Fourth Industrial<br />

Revolution is disturbing<br />

the demand supply equilibrium<br />

- creating a shortfall<br />

of new skills. This is a classic Catch-<br />

22 situation where, on the one hand,<br />

<strong>CIO</strong>s are shifting their investments<br />

in favour of digital transformation.<br />

On the other hand, skilled IT workers<br />

are hard to come by. In a recent Skill<br />

Survey conducted by <strong>CIO</strong>&Leader, we<br />

found that 45% of Indian <strong>CIO</strong>s find it<br />

"hard" to hire the right skills for their<br />

department while 14% agree that it is<br />

rather "very hard" to fill in these highskilled<br />

positions.<br />

This is hardly a surprise because<br />

<strong>CIO</strong>s across the board identify the IT<br />

skills gap as a serious impediment to<br />

their growing digital ambition and<br />

they are under enormous pressure<br />

to help their organizations become<br />

agile and stay relevant in the current<br />

digital age.<br />

Every <strong>CIO</strong> is probably in a classic<br />

fear-of-missing-out moment with<br />

technology. One in every third <strong>CIO</strong> is<br />

either implementing an AI-powered<br />

digital initiative or leading the digital<br />

transformation initiative in the organization.<br />

According to recent Skill<br />

Survey, <strong>CIO</strong>s will hire skills in BI &<br />

Analytics, security, cloud, infrastructure,<br />

networking, vertical-specific<br />

skills, enterprise architecture, business<br />

consulting, among others.<br />

Today's business expect <strong>CIO</strong>s and<br />

their IT organizations to develop digital technology and<br />

business skills such as design thinking, data sciences, usercentric<br />

design and exposure to new technologies, such as<br />

IoT, Machine Learning, Big Data, and Blockchain, to drive<br />

transformation and sustain long-term benefits.<br />

Traditionally, <strong>CIO</strong>s have hired IT consultants, contrac-<br />

Vertical-specific<br />

skills<br />

<strong>10</strong>%<br />

Which specific skills will <strong>CIO</strong>s hire in <strong>2018</strong>?<br />

Cloud/Infrastructure/<br />

Networking<br />

17%<br />

Enterprise<br />

Architecture<br />

17%<br />

Business<br />

Analyst<br />

17%<br />

BI & Analytics<br />

17%<br />

Security<br />

48%<br />

Which leadership/business skills are <strong>CIO</strong>s planning<br />

to hone in <strong>2018</strong>?<br />

3% 3%<br />

Marketing<br />

Vendor<br />

Mgmt<br />

14%<br />

Financial<br />

Mgmt<br />

21%<br />

Team<br />

Mgmt<br />

59%<br />

Business<br />

Transformation<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

17


Cover Story<br />

Which tech skills are you planning to develop in <strong>2018</strong>?<br />

<strong>10</strong>%<br />

IT<br />

Security<br />

26%<br />

Cloud<br />

Services<br />

33%<br />

Big<br />

Data<br />

64%<br />

Digital<br />

Technologies<br />

Which skill is more important to develop in <strong>2018</strong>?<br />

“Every <strong>CIO</strong> is<br />

probably in the<br />

middle of a classic<br />

fear-of-missingout<br />

moment with<br />

technology”<br />

7%<br />

Leadership<br />

27%<br />

Technology<br />

66%<br />

All of the<br />

above<br />

What is the level of difficulty you face/have faced in<br />

hiring skills for IT?<br />

7%<br />

Easy<br />

27%<br />

Medium<br />

45%<br />

Hard<br />

14%<br />

Very Hard<br />

7%<br />

None of<br />

the above<br />

Source: Skills survey <strong>2018</strong><br />

tors and outsourcing services to meet this challenge. But we<br />

all know the reality of the modern world that this solution<br />

is far from sustainable, and is definitely expensive (even if<br />

companies can afford to spend on it) in the long run. Developing<br />

and retaining IT talent is a critical issue that organizations<br />

are already facing or likely to face in the future. <strong>CIO</strong>s<br />

find themselves tacking this problem head first. The other<br />

not-so-immediate solution is for <strong>CIO</strong>s to focus on reskilling<br />

and upskilling their workforce. This is definitely not an<br />

option, but is a necessity of modern times.<br />

Some of the leading <strong>CIO</strong>s in the industry are already<br />

advocating a radical new approach. They are identifying<br />

and incubating small technology start-ups within their own<br />

organizations. This way they are able to add new skills,<br />

capabilities and competencies to their teams and stay not<br />

only relevant to their organizations, and win from within.<br />

As they cultivate new skills, <strong>CIO</strong>s are not leaving any<br />

stone unturned to develop their own leadership and technology<br />

skills. <strong>CIO</strong>s today want to be in the know and get<br />

their hands dirty as new technologies get deployed within<br />

their organizations. In the survey, 65% of <strong>CIO</strong>s said that<br />

they want to develop skills in digital technologies namely<br />

IoT, artificial intelligence, and robotics, closely followed by<br />

big data (35%), cloud services (36%) and IT security (<strong>10</strong>%).<br />

Similarly, business transformation continues to be a top priority<br />

for <strong>CIO</strong>s.<br />

In order to dig deeper, we probed <strong>10</strong> leading Indian <strong>CIO</strong>s<br />

to tell us how they are finding top talent– and how they are<br />

planning to hone their leadership and technology skills and<br />

develop new competencies in <strong>2018</strong>. Here's what they said:<br />

18 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Cover Story<br />

Alok Khanna<br />

Executive Director –<br />

Information Systems<br />

Indian Oil Corporation<br />

Limited<br />

Skill I Plan To Hire in <strong>2018</strong><br />

At Indian Oil, a number of digital transformation projects are already<br />

under way. We are taking another step towards procuring a dealer<br />

management plus CRM system. There are primarily four areas where<br />

we plan to hire digital skills, namely big data and analytics, machine<br />

learning, IoT and chatbots. Artificial intelligence is an important area of<br />

investment for us. Last year, we deployed a chatbot as a downloadable<br />

application to serve as a digital assistant to all our delegates at a global<br />

conference. This year, we will also be focused on hiring predictive analytics<br />

and big data skills to drive positive business outcomes through<br />

actionable insights. Cyber security is an area where skills are hard to come by, and<br />

therefore our focus will be to deploy a service model supported on cloud or an onpremises<br />

model managed by experts.<br />

Alok wants<br />

to focus on<br />

developing big<br />

data analytics<br />

and cybersecurity<br />

skills in <strong>2018</strong><br />

Skill I Plan To Hone in <strong>2018</strong><br />

Considering there are a number of digital initiatives underway at IOCL, my main<br />

focus is to deliver them in a timely manner. Nevertheless, I am planning to hone<br />

my skills in mainly two areas namely big data & analytics and cyber security; the<br />

latter, I believe will come handy in probing complex and ever-evolving ransomware<br />

and IoT-related threats -- and thus, help me in identifying future threats and finding<br />

staff that can mitigate those risks.<br />

Ashok wants to<br />

focus on adopting<br />

and promting<br />

a culture of<br />

collective<br />

leadership in<br />

<strong>2018</strong><br />

Skill I Plan To Hire in <strong>2018</strong><br />

No business has been left untouched by the impact of technology.<br />

The Paints industry is undergoing a transformation. Therefore,<br />

in <strong>2018</strong>, we will be hiring innovative skill set in artificial intelligence<br />

and social media for better reach to our consumers and<br />

mobility for helping us bring together all functions and complex<br />

processes.<br />

Skill I Plan To Develop in <strong>2018</strong><br />

In <strong>2018</strong>, I will focus on adopting and promoting the culture of<br />

collective leadership. What it means is accepting the fact that no<br />

one is the master of everything, and we need to create more and<br />

more leaders in various IT sub-domains. <strong>CIO</strong>s need to break classical<br />

reporting structures, form a pool of expertise using multiple<br />

sources for innovation and distribute leadership role across business<br />

and technology. I will pay more attention to how business<br />

functions impact business performance and how technology can<br />

help. I will personally focus on learning more about blockchain<br />

and how it can be used in our business and industry. There will be<br />

an additional focus on understanding more about AI and Machine<br />

Learning which is the future.<br />

Ashok Jade<br />

<strong>CIO</strong><br />

Shalimar Paints<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

19


Cover Story<br />

Skill I Plan To Hire in <strong>2018</strong><br />

<strong>2018</strong> is the year of mobility and analytics. IoT will also be a<br />

prime area of focus. Therefore, we will focused on hiring talent<br />

in these digital technologies. Cloud computing is set to continue<br />

on its high-velocity path as business shifts from legacy to<br />

cloud-based systems. We are also in the process of adopting<br />

digital business strategies. Additionally, I believe that the selection<br />

of the right partner is extremely important if you choose an<br />

outsourced model. It is because you're outsourcing your business,<br />

and therefore, it is a critical part of the <strong>CIO</strong>'s job today.<br />

Farhan Khan<br />

Head-IT<br />

Radico Khaitan<br />

Farhan's focus<br />

will be on<br />

hiring mobility,<br />

analytics and<br />

IoT talent<br />

Skills I Plan To Develop in <strong>2018</strong><br />

The changing technology dynamics warrant a new set of skills<br />

for a <strong>CIO</strong>. I believe that I wish to continue to develop my understanding<br />

of IT infrastructure and enterprise architecture. The<br />

<strong>CIO</strong> will have to showcase an intuitive understanding of finance,<br />

marketing, operations, HR as well as other functions. Additionally,<br />

I will also be looking at developing skills in business process<br />

reengineering, project management, and strategic planning.<br />

I believe that leading through that change is probably the<br />

most critical skill a <strong>CIO</strong> can possess.<br />

Glory Nelson<br />

Senior Vice President-IT<br />

Spice Jet<br />

Skill I Plan To Hire in <strong>2018</strong><br />

In <strong>2018</strong>, we will be focused on delivering an outstanding customer experience.<br />

However, getting UX skills is extremely hard. In order to do that,<br />

I will be hiring UX architects who play a critical role in understanding<br />

what the user expects from a product. A good UX specialist has a strong<br />

knowledge code, and should be well-versed in creating strategic plans<br />

that will help us improve overall customer experience.<br />

I will also be investing in hiring business consultants who are well-versed<br />

in business and technology. The other key area of skills investment will<br />

be broadly in Robotics Process Automation (RPA). As individual technology<br />

skills are very hard to find, we leverage partners who can provide advanced<br />

analytical and business intelligence skills in the RPA domain to eliminate a number<br />

of mundane and repetitive tasks.<br />

Skill I Plan To Develop in <strong>2018</strong><br />

Data science is a field that has constantly piqued my interest. Mining large<br />

amounts of structured and unstructured data to identify patterns can help an<br />

organization rein in costs, increase efficiencies, recognize new market opportunities<br />

and increase an organization's competitive advantage. I will also be seeking<br />

certifications in developing UX skills and RPA. The idea is to gain knowledge<br />

as we advance our deployments in these technologies.<br />

Developing<br />

know-how in<br />

robotics, data<br />

science and UX<br />

will be Glory's<br />

main focus in<br />

<strong>2018</strong><br />

20 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Cover Story<br />

Jaspreet Bindra<br />

Senior Vice President –<br />

Digital Transformation,<br />

Mahindra Group<br />

Skills I Plan To Hire in <strong>2018</strong><br />

In <strong>2018</strong>, my main focus will be to develop hard skills in digital<br />

technologies and not just legacy tech. I will work with my<br />

team to develop use cases that will help them implement<br />

digital initiatives with ease. I will also look for people with<br />

entrepreneurial experience and those who have exposure to<br />

new technologies such as Internet of Things (IoT), Machine<br />

Learning, Big Data, and Blockchain. Not only that, I will also<br />

look for people with soft skills such as design thinking, agile<br />

way of working, tolerance for failure, risk taking, storytelling<br />

and change management.<br />

Skills I Plan To Develop in <strong>2018</strong><br />

The current times call for leaders to constantly learn something<br />

new. Whether it is for creating new business models or<br />

great customer experiences, leaders today must know how to<br />

make effective use of digital technologies available to them<br />

and foster innovation. We have used blockchain— one of the<br />

newest technologies—in our financial services sector. In <strong>2018</strong>,<br />

my focus will be to develop design thinking capabilities, hone<br />

coaching, and coding skills.<br />

Jaspreet's<br />

main focus will<br />

be to develop<br />

design thinking<br />

capabilities in<br />

<strong>2018</strong><br />

Kamal's focus will<br />

be on completing<br />

his research on<br />

Flexibility in IT<br />

systems from IIT,<br />

Delhi<br />

Skill I Plan To Hire in <strong>2018</strong><br />

When it comes to hiring in <strong>2018</strong>, our focus at RJ Corp will be to hire people<br />

who have worked in AI, machine learning and IoT skills. Our aim is to hire<br />

emerging talent for a number of ongoing digital projects in the organization.<br />

However, skill gap being one of the biggest obstacles of digital India,<br />

good skills are difficult to find. To tackle this issue, we are incubating startups<br />

or working with them to recruit fresh talent for our various digital projects.<br />

We are also hiring entry level professional from top engineering and<br />

management schools.<br />

Skill I Plan To Develop in <strong>2018</strong><br />

<strong>CIO</strong>s must upgrade their skills every year. They must keep an eye on the<br />

latest digital technologies in the market. <strong>CIO</strong>s must focus on personal skill<br />

development. They must also know how to enable strategic innovation and<br />

disruption in their organization. For instance, I'm pursuing my research in<br />

Flexibility in Information Technology from Indian Institute of Delhi where I<br />

focus on how flexible Information technology systems can become such<br />

that the business can use it to drive flexibility strategically. In retail, flexibility<br />

of IT systems can increase the value of your overall business. As part of<br />

my research, I collected a lot of data and spoke to a lot of organizations. In<br />

a few months, I will be submitting my thesis.<br />

Kamal Karnatak<br />

Group <strong>CIO</strong><br />

RJ Corporation<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

21


Cover Story<br />

In <strong>2018</strong>, Priya's<br />

main focus will<br />

be on developing<br />

greater business<br />

understanding<br />

Skills I Plan To Hire in <strong>2018</strong><br />

We are experimenting with a lot of initiatives involving automation,<br />

bots, data, and dashboards. With such a barrage of digital projects<br />

commencing in <strong>2018</strong>, there is a huge need to set aside a project governance<br />

plan in place In <strong>2018</strong>, I hope to hire a digitally enabled project<br />

manager who understands enterprise IT, understands the new digital<br />

changes, and works with the team to ensure some of the initiatives<br />

are taken to implementation and acceptance by business. Data understanding<br />

will be a big part of all the job profiles that go out this year.<br />

Skills I Plan To Develop in <strong>2018</strong><br />

As I grow to a more strategic role, technology understanding without<br />

business knowledge won’t be of any use or outcome. We need to<br />

concentrate more on business understanding, how technology can<br />

be used in a cost effective way to reduce some pain points of business<br />

starting from reducing cycle times, removing resources from<br />

mundane jobs to data-based decision making to increase profits. In<br />

an ever-changing technology world, everyone has to have basic understanding<br />

of data and some level of analytics. I plan on taking some<br />

courses, reading on this aspect of data, and encourage my managers<br />

to do the same.<br />

Priya Dar<br />

<strong>CIO</strong><br />

Godfrey Phillips India<br />

Suresh Kumar<br />

<strong>CIO</strong><br />

Grant Thornton<br />

Skills I Plan To Hire in <strong>2018</strong><br />

As we embark on our Digital transformation journey, I will need to<br />

hire resources skilled in digital technologies. We plan to build our<br />

Digital data lake to be more agile and derive real-time business<br />

insights; mine value from unknown and large amount of data;<br />

enable data driven mindset across the organization and harness<br />

the power of big data in a cost effective manner. I will need to hire<br />

skilled resources for Hadoop, Yarn, Tableau and Power BI.<br />

Skill I Plan To Develop in <strong>2018</strong><br />

I would like to hone my leadership skills further. With many millennials<br />

joining the team, it is imperative to change your leadership<br />

style. Instead of ‘managing’ people, one needs to empower people<br />

and lead from the front. I plan to spend time learning about each<br />

of the businesses of the organization in greater detail and ‘partner’<br />

with them to not only provide solutions to meet their requirements<br />

but also help in developing new innovative services. My<br />

focus this year will be to learn digital technologies including Big<br />

Data, AI, Analytics and Robotics and use all possible avenues to<br />

acquire these skills.<br />

In <strong>2018</strong>, Suresh<br />

plans to develop<br />

his leadership<br />

style , empower<br />

people, and lead<br />

from the front<br />

22 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Cover Story<br />

Sunil Mehta<br />

Senior Vice-President<br />

& Area Systems<br />

Director – Central<br />

Asia<br />

JWT<br />

Skill I Plan To Hire in <strong>2018</strong><br />

The shift to a digital economy is creating a talent crisis that is putting<br />

companies’ survival—and <strong>CIO</strong>s’ own careers—on the line. Today the nature<br />

of the skills that organizations need in IT is changing. Digital business is<br />

being built cloud-first and mobile-first, and is heavily dependent on analytics,<br />

automation and new security models. My main area of focus will be<br />

to create a culture of growth, empowerment, and transparency; and above<br />

all, making sure work is meaningful, challenging, and fun. Additionally, I will<br />

also be focused on sourcing good artificial intelligence skills available in<br />

the market.<br />

Skill I Plan To Develop in <strong>2018</strong><br />

The IT skills gap is an ongoing concern for <strong>CIO</strong>s, particularly in the search<br />

for cyber security talent. Complex and ever-evolving threats, from the rise<br />

in ransomware to the emergence of billions of BYOD and IoT devices,<br />

mean the risks and staffing needs are always growing and changing Even<br />

though organizations are progressively looking for a modern business<br />

environment, <strong>CIO</strong>s today are concerned about having a proper security<br />

environment in place owing to the open nature of the Internet and increasing<br />

cyber threats. In <strong>2018</strong>, I will focus on developing and honing security<br />

skills to prepare for modern security warfare.<br />

In <strong>2018</strong>, Sunil's<br />

focus will be<br />

on developing<br />

cybersecurity<br />

skills<br />

Yateen has<br />

authored a book<br />

titled ' Life of<br />

CXO' - a skill<br />

development<br />

guide for the<br />

future<br />

Skill I Plan To Hire in <strong>2018</strong><br />

Hiring has undergone a transformation in the last three years. In my book, Life of CXO, I<br />

have explained how the skills required for future have replaced the skills of the past. Given<br />

the enormous operational and strategic importance of IT today, <strong>CIO</strong>s should act as CEO's<br />

IT advisor who understands the business as well as the technology. <strong>CIO</strong> is no longer<br />

focused on just technical matters: they are integral to company strategy, security<br />

and risk management, and how companies and customers interact. In <strong>2018</strong>, I will<br />

look for managerial level skills in core areas such as Strategic mindset, Risk management,<br />

Emotional Intelligence, Vendor management, Smart sourcing and negotiation<br />

skills. I will also look for technical expertise in areas such as Project and<br />

Operations management, Mobile, Web, Omni Channel application development,<br />

Data mining, Data Warehouse and Big data management, Next Gen Data centre<br />

technologies: Converged Infrastructure Rack management, and Cloud.<br />

Yateen Chodnekar<br />

Group <strong>CIO</strong><br />

Writer Corporation<br />

Skill I Plan To Develop in <strong>2018</strong><br />

The success or failure of a company is often linked to its highest level executives. Being<br />

the <strong>CIO</strong> I am at the driver’s seat as a custodian of data and technology decision maker.<br />

Therefore, I am rightly positioned to shape success of a business with use of latest technologies<br />

which can cross physical boundaries and achieve exponential business volumes.<br />

As part of my learning agenda in <strong>2018</strong>, I wish to focus on developing strategic, financial<br />

and business orientation, BI and analytics, Blockchain, and Enterprise Architecture.<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

23


FACE OFF<br />

//HOW IMPORTANT IS A <strong>CIO</strong>'S VERTICAL SPECIALIZATION?<br />

I have worked in the healthcare sector<br />

for only a decade as compared to my<br />

overall experience of over 20 years or<br />

so, and yet, I have been labelled as a<br />

healthcare <strong>CIO</strong> despite the fact that I<br />

come from a varied experience in organizations<br />

such as Microsoft (MS) and<br />

manufacturing in GE and Xerox.<br />

However, the market reality is that<br />

<strong>CIO</strong>s in specific industries such as<br />

Telecom, Healthcare and Banking are<br />

preferred due to their vertical specialization.<br />

It is slowly becoming a norm<br />

in order to reduce the learning and<br />

assimilation cycles. Today, the return<br />

of investment on most IT and digital<br />

projects is less than a year, thus making<br />

it necessary to hire people with<br />

relevant experience.<br />

However, in the organizations that I<br />

have worked in, I have hired IT Infra<br />

folks from retail space to allow cross<br />

pollination of people, ideas and innovation<br />

to flow. However, people in the<br />

core application had to be hired from<br />

the healthcare vertical.<br />

However, it is also true that due to a<br />

tight market situation, it doesn’t allow<br />

people to experiment and hire people<br />

from across industries, which is an<br />

unfortunate market reality.<br />

Quick View<br />

Rajesh Batra, VP-IT,<br />

Kokilaben Dhirubhai Ambani<br />

Hospital, says that <strong>CIO</strong>'s<br />

vertical specialization is<br />

a necessary evil in the<br />

competitive age<br />

RAJESH<br />

BATRA<br />

VP-IT, Kokilaben<br />

Dhirubhai Ambani<br />

Hospital<br />

In my own view, I do NOT agree with<br />

silo mindset of the market. It would<br />

NOT have allowed me to experience<br />

various industries from manufacturing<br />

to cards (my days at American<br />

Express) to software company like<br />

MS and then Healthcare. It not only<br />

gave me a perspective of the industry<br />

but allowed ideas and practises to<br />

flow from one industry to another. For<br />

ex<strong>amp</strong>le, when I joined my previous<br />

organization, healthcare was ripe for<br />

workflow adoption but nobody had<br />

implemented. Despite not possessing<br />

a healthcare background, it took<br />

conviction and courage to implement<br />

the workflow system. My team and I<br />

succeeded in implementing it without<br />

prior experience, and today workflow<br />

management systems are a norm.<br />

However, keeping in mind current<br />

industry norms, I believe that<br />

<strong>CIO</strong>'s vertical specialization is a necessary<br />

evil.<br />

“In certain sectors,<br />

<strong>CIO</strong>s with vertical<br />

specialization are<br />

preferred. It is<br />

slowly becoming<br />

a norm in order to<br />

reduce the learning<br />

and assimilation<br />

cycles”<br />

24 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Face Off<br />

SUNIL MEHTA<br />

Senior VP &<br />

Area Systems<br />

Director – Central<br />

Asia – JWT<br />

related implementation is taking place.<br />

Let me give you another ex<strong>amp</strong>le.<br />

Until a few years ago, <strong>CIO</strong>s were in<br />

charge of enterprise IT, infrastructure<br />

and security. Today because of digital,<br />

if <strong>CIO</strong>s have not kept themselves relevant,<br />

they will lose their jobs and companies<br />

will hire people who are young<br />

with relevant skills. However, just hiring<br />

a digital expert doesn’t ensure that<br />

he will also be able to perform a <strong>CIO</strong>'s<br />

responsibilities.<br />

“The truth is that<br />

a <strong>CIO</strong>'s overall<br />

experience, and<br />

more specifically<br />

IT experience,<br />

matters more<br />

than his vertical<br />

specialization”<br />

At a <strong>CIO</strong> level, I do not believe that vertical<br />

specialization is important. Most<br />

<strong>CIO</strong>s I know in the industry today<br />

have worked across sectors – gaining a<br />

wide-range of domain expertise.<br />

In the past when <strong>CIO</strong>s were EDP<br />

managers, they were responsible for<br />

driving change with the help of technology.<br />

Today technology has enabled<br />

organizations to drive that change.<br />

At JWT, the IT department has put<br />

the mandate on the finance department<br />

to choose their finance solution.<br />

While the IT department deploys it,<br />

the finance department is empowered<br />

to select the right solution as per<br />

their needs.<br />

Times have changed. Today if a <strong>CIO</strong><br />

is in charge of IT transformation globally,<br />

he can lead the transformation in<br />

any industry. The truth is that a <strong>CIO</strong>'s<br />

overall experience matters more than<br />

his/her vertical specialization— which<br />

comes handy only when a domain<br />

Quick View<br />

Sunil Mehta, Senior Vice-<br />

President & Area Systems<br />

Director – Central Asia<br />

– JWT, says that <strong>CIO</strong>s<br />

primarily should know how<br />

to run IT<br />

The <strong>CIO</strong> role is transforming into a<br />

digital specialist and he/she doesn't<br />

have to be an expert overnight. However,<br />

he or she should be able to use<br />

the expertise in one area or vertical to<br />

make a difference in the other.<br />

If a CEO can be hired without any<br />

vertical specialization, so can a <strong>CIO</strong>. So<br />

if a CEO knows how to run the organization,<br />

<strong>CIO</strong>s know how to run IT,<br />

irrespective of which sector they work<br />

or have worked in.<br />

But at the same time, there are several<br />

<strong>CIO</strong>s who have evolved, but there<br />

are also those who won't transform,<br />

and will not even want to step out of<br />

their comfort zones.<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

25


INSIGHT<br />

Artificial<br />

Intelligence Is<br />

Creating Happy<br />

Workplaces<br />

As per Gartner, by 2022, personal devices will know more<br />

about an individual's emotional state than his own family<br />

due to the impact of AI<br />

By <strong>CIO</strong>&Leader<br />

26 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Insight<br />

EEmotion artificial intelligence (AI)<br />

systems are becoming so sophisticated<br />

that Gartner predicts that by 2022,<br />

personal devices will know more about<br />

an individual's emotional state than<br />

his/her own family. AI is generating<br />

multiple disruptive forces that are<br />

reshaping the way we interact with<br />

personal technologies.<br />

"Emotion AI systems and affective<br />

computing are allowing everyday<br />

objects to detect, analyze, process and<br />

respond to people's emotional states<br />

and moods to provide better context<br />

and a more personalized experience,"<br />

said Roberta Cozza, research director<br />

at Gartner. "To remain relevant, technology<br />

vendors must integrate AI into<br />

every aspect of their devices, or face<br />

marginalization."<br />

The current wave of emotion AI<br />

systems is being driven by the proliferation<br />

of virtual personal assistants<br />

(VPAs) and other AI-based technology<br />

for conversational systems. As a second<br />

wave emerges, AI technology will<br />

add value to more and more customer<br />

experience scenarios, including educational<br />

software, video games, diagnostic<br />

software, athletic and health performance,<br />

and the autonomous car.<br />

"Prototypes and commercial products<br />

already exist and adding emotional<br />

context by analyzing data points<br />

from facial expressions, voice intonation<br />

and behavioral patterns will<br />

significantly enhance the user experience,"<br />

said Cozza. "Beyond smartphones<br />

and connected home devices,<br />

wearables and connected vehicles will<br />

collect, analyze and process users'<br />

emotional data via computer vision,<br />

audio or sensors capturing behavioral<br />

data to adapt or respond to a user's<br />

wants and needs."<br />

Other personal device predictions<br />

from Gartner include:<br />

By 2021, <strong>10</strong>% of wearable<br />

users will have changed<br />

lifestyles, and thereby<br />

extend their life spans by<br />

an average of six months.<br />

As AI emotion systems evolve there is<br />

huge potential for specialized devices,<br />

such as medical wristbands, which can<br />

anticipate life-threatening conditions<br />

and facilitate an early response system.<br />

At the same time special apps are also<br />

being developed for diagnostic and<br />

therapy services that will help to recognize<br />

conditions such as depression<br />

or help children with autism.<br />

"Even a basic wearable device could<br />

have a positive impact on the wearer's<br />

health," said Annette Zimmermann,<br />

research vice president at Gartner. "We<br />

are seeing growing numbers of users<br />

actively changing their behavior for<br />

the better with the adoption of a wearable<br />

device. Not only can this have beneficial<br />

influence on the amount of exercise<br />

they do but there is evidence that<br />

one or two out of <strong>10</strong> smart watch and<br />

fitness band users discover a condition<br />

such as sleep apnea or cardiac arrhythmia<br />

through wearing the device."<br />

By 2020, 60% of personal<br />

technology device vendors<br />

will use third-party AI<br />

cloud services to enhance<br />

functionality and services.<br />

Cloud-based AI technologies are driving<br />

compelling user experiences on<br />

a variety of connected devices. Cloud<br />

offerings from the big tech players,<br />

such as Google, Microsoft, Amazon,<br />

Tencent, Baidu and IBM, are starting<br />

to proliferate due to their attractive<br />

cost model, easy-to-use integration and<br />

potential to create complex services.<br />

A major catalyst for device vendors to<br />

use cloud AI services is the increased<br />

usage of VPAs and natural-language<br />

technologies, while the adoption of<br />

VPA-based, screenless devices such as<br />

Amazon Echo and Google Home is also<br />

on the rise, further increasing usage of<br />

cloud AI services.<br />

"We are starting to see adoption of<br />

these services from high-profile vendors<br />

that are using them to widen their<br />

reach," said Anthony Mullen, research<br />

director at Gartner. "Fitbit uses Alexa<br />

Skills to make user stats and functionality<br />

available through VPA speakers<br />

just as Netflix uses Actions for Google<br />

Assistant to voice control its service.<br />

Ultimately, vendors will compete on<br />

the best user experience and the smartness<br />

of their products, not the technology<br />

behind it."<br />

Through 2022, security<br />

technology combining<br />

machine learning,<br />

biometrics and user<br />

behavior will reduce<br />

passwords to account for<br />

less than <strong>10</strong>% of all digital<br />

authentications.<br />

Password-based simple authentication<br />

is becoming less and less effective for<br />

personal devices. Even today's popular<br />

biometric technology — fingerprint<br />

authentication — is only around 75%<br />

successful due to contaminants such as<br />

dirt and sweat.<br />

"Users need more convenient and<br />

accurate options for unlocking their<br />

devices," said CK Lu, research director<br />

at Gartner. "Security technologies that<br />

combine machine learning, biometrics<br />

and user behavior will become necessary<br />

to improve ease of use, self-service<br />

and frictionless authentications.<br />

Within the next five years new security<br />

technology will recognize the user,<br />

prevent fraud and detect automation<br />

threats such as malware, remote access<br />

trojans and malicious bots."<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

27


Insight<br />

Tech Job Trends In<br />

<strong>2018</strong> And Beyond<br />

In-demand IT roles have started to shift towards including<br />

positions focused on advanced technologies, such as AI,<br />

IoT, AR and VR<br />

By Pradipto Chakrabarty<br />

28 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Insight<br />

The transformation in the world<br />

is happening at a pace which we<br />

have not experienced in the past.<br />

Implementation of new cuttingedge<br />

technology is moving out from<br />

a drawing board stage to being<br />

practised by organizations<br />

TThe transformation in the world of<br />

technology is happening at a pace<br />

which we have not experienced in the<br />

past. Implementation of new cuttingedge<br />

technology is moving out from a<br />

drawing board stage to being practiced<br />

by organizations across the world. As<br />

more and more organizations undertake<br />

the process of digital transformation<br />

to offer tech-enabled products or<br />

services, IT roles and skills is undergoing<br />

radical shifts, something which we<br />

are already observing. This will affect<br />

the tech job scenario as we move into<br />

<strong>2018</strong> and beyond.<br />

In-demand IT roles have started<br />

to shift towards including positions<br />

focused on advanced technologies,<br />

such as artificial intelligence (AI), augmented<br />

and virtual reality (AR and<br />

VR), and the Internet of Things (IoT)<br />

along with exciting positions within<br />

cybersecurity, cloud computing, and<br />

network technology.<br />

Through these observations we have<br />

identified the following as some of the<br />

key job roles companies require as<br />

they transform their businesses and<br />

processes for the future:<br />

Cybersecurity Analyst: This individual<br />

will manage risk for organizations<br />

through the use of relevant tools<br />

and techniques to gather vital endpoint<br />

and network host data with the<br />

goal of identifying vulnerabilities.<br />

Network Engineer: This role will<br />

encompass coordinating between<br />

cloud and traditional networking<br />

resources to make a business communicate<br />

efficiently. They will need<br />

to know how to map technical network<br />

elements (e.g., a router, an edge<br />

device, a micro datacenter) to a company’s<br />

business needs.<br />

Vulnerability Assessment Manager:<br />

The role of a penetration tester<br />

has matured. Today’s pen tester does<br />

more than hacking a server or using<br />

fancy security tools. Today’s pen tester<br />

takes a responsible approach and<br />

conducts strong, comprehensive tests<br />

to identify – and correct – unacceptable<br />

risks.<br />

Technical Support Specialist: Gone<br />

are the days when the help desk<br />

professional fixed PCs. The world<br />

needs more tech support specialists<br />

than ever before: today’s tech support<br />

engineer helps manage increasingly<br />

complex issues involving data<br />

management, authentication, and<br />

network troubleshooting.<br />

Machine Learning Engineer:<br />

Machine learning uses sophisticated<br />

programming, such as R and Python<br />

to develop AI machines and systems<br />

that can learn and apply knowledge<br />

to perform tasks. These professionals<br />

will also work with complex datasets<br />

and algorithms to convert machines<br />

to intelligent machines.<br />

Network Analysts: Businesses are<br />

investing more heavily in their networks<br />

as IoT is fast becoming critical<br />

to manufacturing tech-enabled products.<br />

A growing number of “things”<br />

need to be connected in an efficient<br />

way, and that's going to be a major<br />

driver of demand there. Network<br />

analysts in the coming years will<br />

combine their technical skill set with<br />

an understanding of how to apply it<br />

to provide real-time trending information<br />

on network traffic, and what<br />

those insights mean for the business.<br />

Cloud Engineer: Almost all businesses<br />

are mobbing their on-prem<br />

systems to cloud and are choosing<br />

a hybrid approach, with multiple<br />

vendors. In the coming years, cloud<br />

engineers will need to create solutions<br />

which are a mix of multiple<br />

technologies. Gone are the days when<br />

an Amazon engineer only worked<br />

on AWS or Microsoft engineers only<br />

knowing Azure<br />

–The author is Regional Director,<br />

CompTIA India<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

29


Insight<br />

Consumers Are Ready<br />

To Say Goodbye To<br />

Passwords<br />

Indian consumers overwhelmingly favor use of<br />

biometrics as a faster, easier, and more secure alternative<br />

to passwords<br />

By <strong>CIO</strong>&Leader<br />

30 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Insight<br />

VVisa have announced a survey, conducted on Indians<br />

exploring awareness and perceptions of biometric authentication<br />

confirms that consumers continue to have a strong<br />

interest in new biometric technologies that make their lives<br />

easier. New forms of authentication, such as fingerprint,<br />

facial, and voice recognition, can make unlocking accounts<br />

and payments much easier and more convenient than traditional<br />

passwords or PINs - which are difficult to type onto<br />

tiny keyboards, easy to forget, and can be stolen.<br />

“The payments ecosystem is witnessing a rapid change<br />

in adoption of new form factors of payments and modes of<br />

authentication. For financial institutions, the time has never<br />

been better to integrate biometric technology into banking<br />

apps and payments experiences for customers,” said TR<br />

Ramachandran, Group Country Manager, Visa, India &<br />

81% of consumers<br />

sweepingly perceive that<br />

biometrics are faster<br />

than passwords<br />

South Asia. “We are excited with the increased popularity<br />

of biometrics across Indian consumers. Today smartphones<br />

have advanced features increasing the accuracy and speed of<br />

biometrics, such that they can be used for financial transactions.<br />

Indian consumers too have discovered the ease of biometric<br />

authentication and are open to using this technology<br />

for transactions going forward, which augurs well for the<br />

Indian payments industry.”<br />

Authentication Survey Findings<br />

According to the Visa study conducted of 500 Indians by<br />

AYTM Market Research, 99% are personally interested in<br />

using at least one biometric method to verify their identity,<br />

and 99% are interested in using at least one biometric<br />

method to make payments. Higher income consumers are<br />

more interested than lower income consumers in facial<br />

recognition. Younger consumers (36 and under) are more<br />

interested than older consumers in vein pattern recognition.<br />

Findings from the survey illustrate consumers’ desire to see<br />

the implementation of biometric tools in payment authentication<br />

processes.<br />

Highlights from the survey include:<br />

Consumers were most familiar with fingerprint recognition,<br />

with 32% having used it once or twice and another<br />

63% using it regularly. By comparison, about 48% have<br />

used voice recognition in the past and 26% use it regularly.<br />

The top benefits associated with using biometric authentication<br />

for payments are the perception that it is more secure<br />

than passwords/PINs (48%) and that it gives consumers<br />

peace of mind that their payment is protected (46%).<br />

Indian consumers overwhelmingly perceive that biometrics<br />

are faster (81%) and easier (84%) than passwords.<br />

51% are concerned both about the risk of a security breach<br />

of sensitive biometric information.<br />

To help financial institutions and merchants more quickly<br />

adopt emerging biometric authentication solutions, the<br />

Visa ID Intelligence platform provides a curated selection of<br />

leading third-party authentication technologies. Visa clients<br />

can create, test and adopt new authentication solutions with<br />

simple integrations using Visa APIs and SDKs<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

31


Insight<br />

When Cloud Gives<br />

You Wings<br />

As per Synergy Research Group, cloud services and infra<br />

market revenues reached USD 180 billion, a growth of<br />

24% annually<br />

By <strong>CIO</strong>&Leader<br />

32 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Insight<br />

In 2016, cloud started<br />

dominating many IT<br />

market segments; In 2017,<br />

cloud was the new normal<br />

technologies, such as<br />

artificial intelligence (AI),<br />

augmented and virtual<br />

reality (AR and VR)<br />

NNew data from Synergy Research<br />

Group shows that across six key cloud<br />

services and infrastructure market segments,<br />

operator and vendor revenues<br />

for the four quarters ending September<br />

2017 reached USD 180 billion, having<br />

grown by 24% on an annualized basis.<br />

IaaS & PaaS services had the highest<br />

growth rate at 47%, followed by enterprise<br />

SaaS at 31% and hosted private<br />

cloud infrastructure services at 30%.<br />

2016 was notable as the year in which<br />

spend on cloud services overtook<br />

spend on hardware and software used<br />

to build public and private clouds, and<br />

in 2017 the gap widened. In aggregate<br />

cloud service markets are now growing<br />

over three times more quickly than<br />

cloud infrastructure hardware and<br />

software. Companies that featured<br />

the most prominently among the 2017<br />

market segment leaders were Amazon/<br />

AWS, Microsoft, IBM, Salesforce, Dell<br />

EMC, HPE and Cisco.<br />

Over the period Q4 2016 to Q3 2017,<br />

total spend on hardware and software<br />

to build cloud infrastructure<br />

approached USD 80 billion, split evenly<br />

between public and private clouds,<br />

though spend on public cloud is<br />

growing more rapidly. Infrastructure<br />

investments by cloud service providers<br />

helped them to generate over USD <strong>10</strong>0<br />

billion in revenues from cloud infra-<br />

Cloud<br />

Infrastructure<br />

Services<br />

Other<br />

Cloud<br />

Services<br />

Infrastructure<br />

Hardware &<br />

Software<br />

Cloud Market Growth & Segment Leaders - 2017<br />

Iaas &<br />

Paas<br />

Hosted<br />

Private<br />

Cloud<br />

Enterprise<br />

Saas<br />

UCaas<br />

Public<br />

Cloud<br />

Private<br />

Cloud<br />

Dell EMC<br />

HPE<br />

Cisco<br />

Dell EMC<br />

RingCentral<br />

Mitel<br />

IBM<br />

Rackspace<br />

Microsoft<br />

Saleforce<br />

Amazon<br />

Microsoft<br />

0% <strong>10</strong>% 20% 30% 40% 50%<br />

Annualized Revenue Growth - Q3 2017<br />

Source: Synergy Research Group<br />

structure services (IaaS, PaaS, hosted<br />

private cloud services) and enterprise<br />

SaaS – in addition to which that cloud<br />

provider infrastructure supports<br />

internet services, such as search, social<br />

networking, email, e-commerce and<br />

gaming. Meanwhile, UCaaS, while in<br />

many ways a different type of market,<br />

is also growing strongly and is driving<br />

some radical changes in business communications.<br />

“We tagged 2015 as the year when<br />

cloud became mainstream and 2016 as<br />

the year when cloud started to dominate<br />

many IT market segments. In<br />

2017, cloud was the new normal,” said<br />

John Dinsdale, a Chief Analyst and<br />

Research Director at Synergy Research<br />

Group. “Major barriers to cloud adoption<br />

are now almost a thing of the past,<br />

with previously perceived weaknesses<br />

such as security now often seen as<br />

strengths. Cloud technologies are now<br />

generating massive revenues for cloud<br />

service providers and technology<br />

vendors and we forecast that current<br />

market growth rates will decline only<br />

slowly over the next five years.”<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

33


SECURITY<br />

Web Application<br />

Security In<br />

A Digitally<br />

Connected World<br />

According to a survey, 68% of organizations admit low<br />

confidence in information security posture<br />

By Nikhil Taneja<br />

34 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Security<br />

GGlobal organizations stand on a cybersecurity<br />

precipice. Emerging technologies,<br />

such as Blockchain, Artificial<br />

Intelligence (AI) and Internet of Things<br />

(IoT), along with the explosive volume<br />

of mobile, Web and cloud apps creates<br />

uncharted, highly lucrative pathways<br />

to revenue generation, optimized productivity<br />

and enhanced brand value.<br />

At the same time, the speed and sophistication<br />

inherent in these technological<br />

advances exposes application vulnerabilities,<br />

security risks and skills deficiencies.<br />

These compromise sensitive<br />

company and customer data, devalue<br />

the brand, and severely impact financial<br />

performance.<br />

The conundrum for any organization<br />

is how to take the leap towards<br />

these new technologies that help<br />

breakdown barriers to consumer<br />

engagement and deliver substantial<br />

economic reward while successfully<br />

protecting corporate assets, Intellectual<br />

Property (IP), and personal customer<br />

information.<br />

It is important to uncover other<br />

aspects such as the challenges these<br />

new technologies and rapid-fire application<br />

deployments present, ascertain<br />

how organizations in different<br />

industries identified application-layer<br />

and API vulnerabilities, measure the<br />

impact that bots have on organizations,<br />

how companies combat applicationlayer<br />

attacks (like those listed in the<br />

OWASP Top <strong>10</strong>) and construct a security<br />

roadmap for today and tomorrow.<br />

Also, vital to understand how the<br />

exponential number of security breaches<br />

against the application layer (such as<br />

the recent Equifax attack) would alter<br />

the financial and operational actions<br />

these companies would take.<br />

Based on a survey conducted with<br />

over 600 Chief Information Security<br />

Officers (CISOs) and other security<br />

leaders across six continents, the following<br />

key findings came forth:<br />

68% of organizations admit low<br />

confidence in information security<br />

posture<br />

Organizations often leave sensitive<br />

data under-protected. 45% report<br />

they suffered a data breach while<br />

52% do not inspect traffic being<br />

transferred to and from APIs. 56%<br />

do not have the ability to track data<br />

once it leaves the company.<br />

Bot traffic represents more than half<br />

(52%) the amount of Internet traffic,<br />

exceeding 75% of the total traffic<br />

among some organizations. 49% of<br />

all bot traffic is bad bots, yet 33% of<br />

organizations cannot distinguish<br />

between good and bad bots.<br />

API security is often overlooked.<br />

While 60% both share and consume<br />

data via APIs, including personally<br />

identifiable information, usernames/<br />

passwords, payment details, medical<br />

records, ., 52% don’t inspect the data<br />

that is being transferred via APIs<br />

and 51% don’t perform any security<br />

audits or analyze API vulnerabilities<br />

prior to integration.<br />

Application-layer DDoS is a greater<br />

fear than network-level DDoS<br />

assaults. Only 33% feel confident<br />

they can mitigate application-layer<br />

attacks compared to 50% that feel<br />

confident they can protect agains<br />

tnetwork-layer DDoS attacks.<br />

Seven out of ten businesses (72%)<br />

are not fully aware of the frequent<br />

change made to in-house applications<br />

and APIs within their organizations’<br />

software development environment<br />

40% of respondents claim their<br />

organization updates applications at<br />

least once per week, posing a great<br />

challenge for organizations<br />

Everyone wants the speed and agility<br />

that continuous delivery provides<br />

but few feel they can achieve<br />

it securely. Half (49%) currently use<br />

the continuous delivery of application<br />

services and another 21% plan<br />

to adopt it within the next 12-24<br />

months. However, 62% reckon it<br />

increases the attack surface and<br />

approximately half say that they<br />

don’t integrate security into their<br />

continuous delivery process.<br />

Less than a year prior to the due date<br />

(May <strong>2018</strong>) for General Data Protection<br />

Regulations (GDPR) compliance,<br />

68% of organizations are not<br />

confident they will be ready to meet<br />

these requirements in time<br />

#1 Conundrum: The<br />

Confidence Crisis:<br />

Protecting Applications<br />

Against Data Theft and<br />

Bot Attacks<br />

As the rate and number of new technologies<br />

materialize at an accelerated<br />

pace, many security professionals<br />

face the unprecedented challenge of<br />

mitigating a wide swath of threats and<br />

attacks that often are by-products of<br />

the evolving IT landscape. Existing<br />

security strategies, plans and measures<br />

may not measure up to quickly<br />

developed malware, floods and other<br />

threats. The result is a “crisis ofconfidence”<br />

that can overwhelm skills,<br />

deplete budget and resources, chip<br />

away at brand equity and fracture customer/partner<br />

relationships.<br />

Take the recent Equifax breach,<br />

which exposed over 145 million individuals<br />

and their personal information<br />

because of a Web application<br />

vulnerability. While there may have<br />

been governance and accountability<br />

plans in place, there may have been<br />

other actions, such as a Web Application<br />

Firewall (WAF), which could<br />

have mitigated such a massive attack<br />

had it been updated properly against<br />

known vulnerabilities. A simple question<br />

may have been: did the company<br />

have the confidence they could protect<br />

against a probability of attack or was<br />

false confidence in the “impossibility”<br />

of such an attack their strategic<br />

approach.<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

35


Security<br />

The growing prevalence of attacks is<br />

a known fact; thus, the more alarming<br />

finding is the uncertainty within these<br />

companies that they could even detect,<br />

prevent or contain these attacks,<br />

especially when it comes to emerging<br />

threats such as Layer 7 DDoS<br />

attacks. Research shows that 64% of<br />

financial services institutions, 62% of<br />

healthcare organizations and 58% of<br />

retailers acknowledge the difficulty in<br />

mitigating Layer 7 DDoS attacks.<br />

Bot Attacks<br />

Automated attack programs, such as<br />

‘bad’ bots, are the main force behind<br />

the majority of the attack landscape<br />

today. In fact, bots conduct more than<br />

half of all Internet traffic flow. For some<br />

organizations, bots represent more<br />

than 75% of their total traffic. This is<br />

a significant finding considering only<br />

one in three (33%) organizations cannot<br />

distinguish between good bots and bad<br />

ones. Good bots serve critical functions,<br />

such as price aggregators to customer<br />

service chatbots and search engine<br />

spiders. However, for every good bot<br />

in the world, there is a bad bot wreaking<br />

havoc. Bots make traditional attack<br />

vectors more effective, faster and larger<br />

than anything humans can accomplish<br />

on their own.<br />

1 in 3 organizations cannot<br />

distinguish between good bots and<br />

bad ones<br />

#2 Conundrum:<br />

Continuous Delivery<br />

Security Challenge<br />

Organizations are looking for ways to<br />

optimize the deployment of application<br />

services. Many try to fully automate<br />

the cycle of application development,<br />

QA, testing, modifying and deploying<br />

in staging, and the production environment<br />

in what is known as continuous<br />

delivery. A successful continuous<br />

delivery implementation can yield a<br />

competitive edge and save operational<br />

expenses. For some of the more dynamic<br />

application services, the fast pace is<br />

critical as they are required to deploy<br />

multiple versions into production per<br />

day. The challenge, on the other hand,<br />

is to ensure accurate application security<br />

throughout the process, as almost<br />

two-thirds (62%) believe it increases<br />

the attack surface. Continuous delivery<br />

is high priority for many organizations<br />

with half of respondents currently<br />

using this approach and another<br />

20% planning to do so within the<br />

next two years.<br />

Research indicated that security executives<br />

and other experts understand<br />

the impact continuous delivery is having<br />

on their organizations. While 62%<br />

believe continuous delivery increases<br />

the attack surface, risks and vulnerabilities,<br />

only 25% are confident that<br />

security is integrated with continuous<br />

delivery of in-house, Web or cloud.<br />

#3 Conundrum: GDPR<br />

Preparedness Effect<br />

Organizations around the world that<br />

do business in or with the European<br />

Union (EU) will soon need to meet<br />

stricter data privacy laws with the<br />

GDPR taking effect in May, <strong>2018</strong>.<br />

Any organization that offers goods<br />

or services to EU residents, monitors<br />

personal behavior or processes or<br />

handles personal data of EU residents<br />

will be impacted by this law. Those<br />

who do abide by the regulation will be<br />

subject to hefty fines. This is a particular<br />

challenge for large multi-national<br />

corporations that do business in the<br />

EU as well as companies that may be<br />

headquartered there.<br />

It is advised that whatever WAF<br />

solution an organization is evaluating,<br />

it covers critical security solution fundamentals<br />

- complete OWASP Top <strong>10</strong><br />

vulnerabilities, effective API security,<br />

HTTP DDoS mitigation. By evaluating<br />

existing security processes, systems<br />

and security tools, and implementing<br />

application security solutions and<br />

practices that augment and enhance<br />

these capabilities, organizations will<br />

build the foundation for an application-secure<br />

infrastructure<br />

—The author is Managing Director -<br />

India, SAARC & Middle East, Radware<br />

36 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


BANKING<br />

Farm All The Way To<br />

The Bank<br />

Adequate and timely access to agricultural credit plays a crucial<br />

role in improving farm production and productivity and thereby<br />

livelihood of the farmers<br />

By MS Rama Rao<br />

38 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>


Banking<br />

AAdequate and timely access to agricultural<br />

credit plays a crucial role in<br />

improving farm production and productivity<br />

and thereby the livelihood of<br />

farmers. Nearly 80% of our agriculturists<br />

are small and marginal farmers,<br />

heavily dependent on credit for carrying<br />

on their seasonal agricultural<br />

operations. The over hundred year old<br />

Cooperative Credit System (CCS) in the<br />

country has been a major provider of<br />

agricultural credit, mainly short-term<br />

loans for raising crops, serving an<br />

estimated 50% of all farmers served by<br />

institutional credit agencies, with over<br />

75% of the its credit disbursal being for<br />

small and marginal farmers.<br />

The rural cooperative banking system<br />

in our country is well over a century<br />

old, having taken birth in around<br />

the first decade of the 20th century<br />

during the British period. Although<br />

the system was intended to be shaped<br />

along the lines of the Raiffiesen Cooperatives<br />

in Germany, as autonomous<br />

self-reliant institutions, over time it<br />

took shape as a government supported<br />

mechanism for providing credit to<br />

the farmers in the rural areas.<br />

Over the decades and right into<br />

the early 90’s, the cooperative credit<br />

and banking system shored up as the<br />

mainstay for providing credit to the<br />

agriculturists, with the Reserve Bank<br />

of India right from its own inception<br />

detailing a policy of productionoriented<br />

systems of lending for agriculture<br />

and providing concessional<br />

refinance to the cooperative banks,<br />

towards supplementing their resources<br />

in meeting the credit requirement of<br />

agriculturists in the rural areas.<br />

The rural cooperative credit mechanism<br />

in India essentially comprises<br />

two parallel structures viz. the three<br />

tier short-term credit structure for<br />

dispensation of short- and mediumterm<br />

credit for crop production and<br />

agriculture allied activities; and the<br />

long-term credit structure for providing<br />

long-term credit for investments<br />

in agriculture e.g., land development,<br />

farm mechanization, horticulture, etc.<br />

These institutions have been supported<br />

both by way of policy and refinance<br />

supported for a considerable time<br />

by the RBI and later by the ARDC<br />

and NABARD.<br />

The short-term credit and banking<br />

structure in most states comprises State<br />

Cooperative Banks (St.CB), District<br />

Central Cooperative Banks (DCCB/<br />

CCB) at the District level, and Primary<br />

Agricultural Credit Societies (PACS) at<br />

the village level. Some smaller states /<br />

UTs have only State Cooperative Banks<br />

and PACS. The State and District level<br />

institutions which are part of the shortterm<br />

credit structure are recognized as<br />

banks by the RBI and carry out various<br />

banking activities in addition to<br />

providing agricultural credit through<br />

the PACS at the grassroots level. However,<br />

the PACS which are actually the<br />

last mile connect to the farmer, are not<br />

recognized as banking institutions.<br />

They are,however, exempted from the<br />

provisions of the Banking Regulations<br />

Nearly 80% of our<br />

agriculturists are<br />

small and marginal<br />

farmers, heavily<br />

dependent on credit<br />

for carrying out their<br />

seasonal agricultural<br />

operations<br />

Act, giving leeway for them to undertake<br />

banking activities. Many PACS<br />

undertake basic banking services for<br />

members along with credit and various<br />

other functions, such as input distribution,<br />

running consumer stores, warehousing,<br />

procurement & marketing,<br />

Public Distribution System (PDS), etc.<br />

The foray of commercial banks into<br />

agricultural credit post nationalization,<br />

setting up of RRBs, adoption<br />

of the multi-agency approach and<br />

directed credit programmes, saw<br />

in their wake the fall in the share of<br />

amount disbursed by rural cooperative<br />

banks for agricultural credit. In<br />

the euphoria of expanding credit supply<br />

by commercial banks, the need<br />

to shore up these institutions that up<br />

until then had played a major role and<br />

are geographically positioned for a<br />

better outreach, had been lost sight<br />

of. Central regulatory and financing<br />

agencies are observed to have maintained<br />

an arm’s length in this regard.<br />

Notwithstanding this, the short-term<br />

cooperative credit and banking system<br />

continues as a potent instrument in<br />

meeting the credit and related needs of<br />

the farmers. Around 5.5 crore farmers,<br />

mostly small and marginal farmers,<br />

continue to be dependent on the PACS<br />

supported by DCCBs, numbering 380<br />

with around 14000 branches and 32<br />

state coop banks for their agricultural<br />

loans. There are around one lakh<br />

PACS spread across the rural areas<br />

of the country, with over two-third of<br />

them being operationally viable.<br />

However, the grassroots level operations<br />

of this century old structure<br />

continue to be driven by outdated<br />

manual systems and processes, standing<br />

in the way of timely and adequate<br />

provision of credit to the farmers. As<br />

the PACS are not considered a part of<br />

the banking and payments system,<br />

the benefits of technology and digital<br />

payments environment is as yet to be<br />

positioned for ensuring timely and<br />

hassle free credit to their members.<br />

Given the vast geographic outreach<br />

of the Cooperative Credit Structure,<br />

<strong>January</strong> <strong>2018</strong> | <strong>CIO</strong>&<strong>LEADER</strong><br />

39


Banking<br />

The ideal tech solution must facilitate<br />

Rupay card based ops through ATMs<br />

there is urgency in mainstreaming<br />

the PACS into the emerging technobanking<br />

digital environment in a big<br />

way towards providing agricultural<br />

credit, other loans, agricultural inputs,<br />

basic banking facilities, procurement,<br />

warehousing and marketing and a<br />

host of other services. In the context of<br />

renewed signals of distress from farmers<br />

across various parts of the country,<br />

it is imperative to rejuvenate PACS<br />

through technology and provide them<br />

the interface to the mainstream banking<br />

environment and enable digital<br />

banking and payments related services<br />

at their end, so that their outreach<br />

can be fully harnessed in meeting the<br />

various needs of the farmers.<br />

The ideal technology solution must<br />

facilitate Rupay Card based operations<br />

through ATMs and micro-ATMs<br />

on KCC Accounts by farmer members<br />

on their accounts with the PACS, in<br />

tune with RBI/NABARD guidelines.<br />

The technology solution needs to be<br />

a cost-effective centralized solution<br />

with extensive parameterization to<br />

support the local usage and custom;<br />

be easy to use by grassroots level<br />

staff, preferably being picture/icon<br />

driven and having online help facility<br />

as well as being available in local<br />

languages. It should be expected to<br />

cover the entire functionality of all<br />

types of agricultural credit, covering<br />

short, medium- and long-term loans<br />

in a wide spectrum of parameterized<br />

options of loan products, origination<br />

and sanction systems-covering<br />

processes that span across different<br />

tiers of the credit system; cover different<br />

reporting system requirements to<br />

district level, state level, NABARD and<br />

GOI levels; handle various national<br />

and state level schemes, such as crop<br />

insurance ,interest subsidy and subvention,<br />

etc. The coverage of solution<br />

should include basic banking like<br />

savings bank, term deposits, recurring<br />

deposits, pigmy deposits, different<br />

types of non-agri. loans, personal<br />

loans, consumer loans, gold loans,<br />

etc. which PACS do. It should handle<br />

under the automated environment,<br />

various other functions handled by<br />

PACS, such as seed, fertilizer and<br />

other inputs supply, consumer stores,<br />

PDS, outlets for other items of business,<br />

as also warehousing, procurement<br />

and marketing, etc. On positioning<br />

such solution, online access to<br />

ground level information is expected<br />

to enhance inputs for policy formulation<br />

and facilitate timely monitoring<br />

of the progress of various schemes.<br />

The state of Odisha, in which the<br />

cooperative banks have a share of<br />

around 65% in agricultural credit,<br />

has been the early mover and taken<br />

the lead in adoption of technology in<br />

all the three tiers of the cooperative<br />

credit structure from the state level to<br />

village levels on the above lines. The<br />

implementation, currently in the final<br />

stages, provides Rupay Kisan cardbased<br />

operations to the farmers across<br />

the state. The adoption of technology<br />

in the cooperative credit system has<br />

also facilitated direct benefit transfer<br />

of money into farmers’ accounts of<br />

proceeds of paddy procurement made<br />

by state agencies running into several<br />

thousands of crores.<br />

Such technology led transformation<br />

of this important segment of our<br />

rural eco-system across the country<br />

is expected to go a long way to help in<br />

mitigating the problems of our farmers.<br />

It is in recognition of this imperative<br />

that the GOI in the Union Budget<br />

for 2017-18 has made its policy and<br />

financial commitment towards computerisation<br />

of all viable PACS in the<br />

country over a span of three years. It<br />

expected that technology adoption on<br />

the lines adopted by Odisha state will<br />

find favor for replication across the<br />

country for the benefit of a huge segment<br />

of farmers in our country comprising<br />

mostly small and marginal<br />

holders who are wedded to the cooperative<br />

banks for their credit and other<br />

needs. This would further the cause of<br />

financial inclusion of the excluded and<br />

marginalized segments of the rural<br />

population in a big way<br />

—The author is Chief Product Officer,<br />

VSoft Technologies<br />

40 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!