Wall Street & Technology is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Infrastructure

07:00 AM
Tony Bishop
Tony Bishop
Commentary
50%
50%

Bridging the Business-IT Chasm

As the new digital reality transforms every part of the financial services business, IT and the business had better get on the same page.

Financial services have a problem. As a new digital reality transforms every financial organization’s ability to connect, transact, collaborate, and support clients and partners, IT is becoming the mission-critical backbone of the business. The success of new business capabilities, products, and services is directly dependent on IT and its service delivery performance. Ultimately, IT’s delivery performance will determine both top- and bottom-line business growth.

The fundamental barrier to financial firms and their IT service delivery performance today is the lack of understanding of how the "day-in-the-life' of the business intersects and executes across the IT supply chain. The barriers caused by this "business-IT chasm" include limits placed on customer interaction, ineffective and inconsistent decision-making, slow reaction to market changes, and increased cost to do business.

The business-IT chasm typically happens at most organizations because of disconnected decisions and actions made by both business and technology leaders.

The business can be faulted for not providing the insight into how the business operates. For instance, IT is often left in the dark about how a day-in-the-life of the business operates. Often IT knows little about the full end-to-end execution path of a transaction or other business processes. Instead, each business function drives the application of technology, while IT folks build systems focused only on their areas of responsibility. This creates an incomplete view of business execution. For the best results, IT needs a complete view of the business process so it can achieve optimal system development.

IT organizations take this siloed input from the business and expand on the concept in terms of applications, data repositories, and infrastructure systems. Both a top-down and bottom-up conflict occurs. Application and data folks build their own vertically oriented capabilities. The infrastructure folks define and provision infrastructure based on their datacenter strategy of compute, network, storage, placement, power, cooling, and physical characteristics. This amplifies the silo disconnect, resulting in waste, quality of delivery barriers, cost limitations, and operational risk.

The strategy
An effective change strategy is to employ a common system thinking process conforming to day-in-the-life.

Specifically, how does the business originate, service, and fulfill the generation of revenue and servicing of customers? The dialogue needs to incorporate the definition of the value chain of the business and how various business processes transpire across this chain in a typical daily process.

Variations such a business calendar events, client behavior demographics, and wall clock changes must be identified and understood. As these points of view and understanding are gathered, it is essential to ensure that they are captured along with business driver linkages, key performance indicator identification, and any associated perceived deficiencies. Ensure all of this is accurately documented, reviewed, and signed-off by the business to help prioritize decision-making and support strategy creation.

Simply put, let's call this: “Know how you make money.”

Now the key is to not stop there. Business and IT need to then understand and correlate the runtime execution of the business processes across the IT supply chain. This means: How do transactions, service requests, fulfillment requests, marketing actions, content sharing, online collaboration, and financial and compliance reporting actually occur across the various components and processes of the IT systems located in the datacenter? So there is a parallel day-in-the-life execution model of IT that the business and IT must mutually understand.

We can call this: “Know what fulfills your money-making process.”

Once the day-in-the-life framework is defined and documented, it becomes critical that firms start to gather objective data on usage demographics (business and users using systems); performance demographics (how user experience performs across the systems and datacenters); economic demographics (which users on what systems consume what supply in what trended manner against what asset allocation/depreciation/acquisition strategy); system demographics (inventory, composition, inter-dependency, fungability); and IT standards demographics (application patterns standards, infrastructure pattern standards, deployment model standards, and systems management and monitoring practices). This should be captured in some kind of portfolio management system linking supply-and-demand behavioral models that have been captured through the process defined above.

Let's call this: “Know your supply chain components and usage.”

The next part of the day-in-the-life of the IT side of the house is conducting a capability assessment of the people and associated processes to build the supply chain, run the supply chain, and govern the supply chain. Here it is critical to profile, analyze, assess, and score on a competency, maturity, and alignment basis. Information gathered and scored here should include skills inventory, planning and design processes, build and operate processes, and govern and optimize processes. It is critical to get this current state documented and digitized to support critical decision-making and strategy planning.

Lastly, let's call this: “Know how you operate your supply chain.”

The four steps above provide the key linkages of a business value chain tied to an IT supply chain. This common dialogue and data collection creates a systematic approach to close the business-IT chasm firms face, while simultaneously enabling business transformation to support the new digital business paradigm.

The call to action
To some in the Wall Street & Technology community, the approach outlined above is a no-brainer. Others may believe it is unnecessary or not an effective investment of time. In either case, financial organizations are facing a digital revolution that will become a strategic lever of growth or a catalyst of demise. Organizations that employ a strong discipline and understanding of business value creation tied to IT capabilities will realize successful transformation strategies for their business and IT operations.

As Chief Strategy Officer at The 451 Group, Tony is responsible for integrating the firm's value chain to create maximum impact for its enterprise, vendor, and service provider clients. Additionally, he serves as co-head of newly formed 451 Advisors, a strategy, planning, and ... View Full Bio
More Commentary
A Wild Ride Comes to an End
Covering the financial services technology space for the past 15 years has been a thrilling ride with many ups as downs.
The End of an Era: Farewell to an Icon
After more than two decades of writing for Wall Street & Technology, I am leaving the media brand. It's time to reflect on our mutual history and the road ahead.
Beyond Bitcoin: Why Counterparty Has Won Support From Overstock's Chairman
The combined excitement over the currency and the Blockchain has kept the market capitalization above $4 billion for more than a year. This has attracted both imitators and innovators.
Asset Managers Set Sights on Defragmenting Back-Office Data
Defragmenting back-office data and technology will be a top focus for asset managers in 2015.
4 Mobile Security Predictions for 2015
As we look ahead, mobility is the perfect breeding ground for attacks in 2015.
Register for Wall Street & Technology Newsletters
Video
7 Unusual Behaviors That Indicate Security Breaches
7 Unusual Behaviors That Indicate Security Breaches
Breaches create outliers. Identifying anomalous activity can help keep firms in compliance and out of the headlines.