News & Commentary

04:10 PM
Kathy Burger
Kathy Burger
Commentary
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Banks Grapple With The Challenge Of IT Resource Management

The ability to economically manage IT resources and also secure the best of those resources -- whether employees or software or business partners -- is an increasingly critical capability of bank CIOs and line-of-business executives.

You don't hear the old saw from the 1980s and '90s, "People are our most important resource," too much anymore -- even though in many ways it's truer than ever. It's not that people no longer are valued in the workplace (although victims of downsizing might disagree). Rather, in banking, the human factor has become too complex, dynamic and, frankly, costly to reduce to a platitude. The ways IT professionals do their jobs, the ways in which workers interact, their expectations around their jobs and careers, and the skills required to do those jobs all have changed dramatically in recent years, paralleling developments in technology and in the banking industry at large. People in banking IT are trending younger, with a growing number of digital natives bringing their reliance on mobile and social tools and their expectations of work-life balance to a business that's challenged by new kinds of competitors, less-loyal customers, stricter regulation and less budget flexibility.

While no self-respecting banktech executive would admit to reducing a financial institution's IT employees to mere "resources," that same executive no doubt is trying to figure out how to get the most out of those employees -- how to tap their creativity and passion, while also keeping them focused on mission-critical projects and making sure that this work is done efficiently and economically. There are choices and trade-offs that have to be made in relation to automation, vendors and partners, outsourcers and contractors, remote work arrangements, regulatory requirements and shifting technical capabilities. Making the right choices about those trade-offs and investments is the focus of Bank Systems & Technology's 2013 IT Resource Management Guide, a special report that analyzes evolving workforce strategies along with new approaches banks are taking (or should be taking) around other complex activities on the CIO's priority list, such as outsourcing, vendor management and collaboration.

With technology unquestionably the foundation of everything from compliance and risk management to marketing to customer service and retention, the ability not only to economically manage IT resources but also to secure the best of those resources -- whether employees or software or business partners -- will be a critical, highly visible and scrutinized capability of bank CIOs and line-of-business managers. Executives who take that for granted and are unable to think beyond the platitudes and buzzwords either need a reality check or are in the wrong business.n

Katherine Burger is Editorial Director of Bank Systems & Technology and Insurance & Technology, members of UBM TechWeb's InformationWeek Financial Services. She assumed leadership of Bank Systems & Technology in 2003 and of Insurance & Technology in 1991. In addition to ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.