Adopting latest technologies to deliver products that drive value, optimizing business process and maximize utilization


By MYBRANDBOOK


Adopting latest technologies to deliver products that drive value, optimizing business process and maximize utilization

Bharat B Anand, Group CIO & CTO, EC-Council

 

Technology blueprint for year ahead
We in EC-Council, believe no project is a technical project as every IT project is delivering some business
aka transformational value. If it is not, then it does not need to exist even if it is operational or simple enhancements etc 


As part of Project Approval Kill Board we seriously look into what kind of benefits the project is going to deliver and it may not be in terms of revenue or growth alone but it could also be in terms of ease of doing business, productivity increase or employee centricity. This makes sure that we are putting the money at the right place. One thing that’s enshrined in our entire deliverables, and being a Cybersecurity EdTech, is security.


We have imbibed the same culture for our initiatives like digital initiative for our persona-based uses journey for our B2B/ B2C/ B2A/ B2G customers, delivering e-Learning courses & labs seamlessly using varied digital platforms & products, workflow/ office automations etc with ‘fewer actions’ as the mantra.

 

Latest technologies influencing growth
We have already adopted Artificial Intelligence (AI), Machine Learning (ML), Cloud, Hypervised Infrastructure, Mobility etc and are testing the utility of ChatGPT etc. While selecting a new technology we typically keep in mind is how well it integrates in our ecosystem, value it brings and the TCO. Hence, the real focus is always on maximizing the utilization, optimizing the business process and in turn delivering the real value which actually is also about the GTM that is how agile & fast we can turn around and take our projects, deliverables, products to the market.

 

Fortifying organization from cyber threats
This is one thing that none of the organisations can afford to lower guard, more so in present context, hence it’s important to look at the attack surface not from the technology landscape perspective alone but also, what are the touch points or integration points including but not limited to with your customers and suppliers. Each touch points have to be actively monitored. It is imperative to actively monitor 24/7, triage the alerts and take both corrective as well as preventive actions.. One of the most important aspects which we have imbibed in our organization is ’defence in depth’. It is one of the key criteria and related to that is Security by layers and Security by Design principles. Using these 3 concepts we try to look at right from the business integration perspective to technology integration. Bottomline is all touch points must be integrated, monitored, and tracked.

 E-Magazine 
 VIDEOS  Placeholder image

Copyright www.mybrandbook.co.in @1999-2024 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org