

TechTalk Daily
Executive Summary
The webinar, Thought Leadership Thursday, June featured several speakers discussing the importance of technology roadmaps, observability in IT systems, data management, automation, and cybersecurity. Celine, the Chief Information Officer of TE Connectivity, emphasized the need for a technology roadmap before implementing solutions, outlining a five-step process for its creation. Stuart Wakeling, Channel Executive at Akamai, discussed the benefits of observability platforms and introduced Traffic Peak, Akamai's Managed Observability service. The webinar also highlighted the increasing importance of data management in the digital age, the role of automation in streamlining business processes, and the rise of employee experience platforms. The discussion concluded with the challenges organizations face in terms of cybersecurity and the need for a security by design approach.
Speakers
TechTalk Summits
John Healy, Director of Operations, TechTalk Summits
Saleem Bahezaad, Chief Information Officer, Data & Devices Business Unit, TE Connectivity
Stuart Wakeling, Channel Executive, Akamai
Mike Ripley, Senior Product Marketing Manager, Cloudflare
Andrew Hayden, Senior Product Marketing Manager, Precisely
Gidi Pridor, Head of Marketing, Zoom
Marc St-Pierre, Global Practice Leader, Cybersecurity, OpenText
Key Takeaways
1. Technology Roadmap Essentials: A technology roadmap is crucial before implementing solutions, and it should be a living document that is regularly updated. The roadmap creation process includes understanding the business strategy, identifying opportunities and pain points, calculating ROI, prioritizing projects, and determining the effort required for each project.
2. Strategic Business Understanding: Understanding the business strategy is vital before implementing any solutions. Gathering information about opportunities and pain points can be done through face-to-face meetings, focus group sessions, and workshops.
3. Roadmap Checkpoints Importance: Regular checkpoints on the technology roadmap are necessary to ensure that the chosen technology and vendor are still the best fit for the organization. Measuring the ROI is also important to gain the trust of the business.
4. Observability Versus Monitoring: Observability can proactively safeguard customer experience. It differs from monitoring by providing insights into what's happening, why it's happening, and how to fix it.
5. Akamai's Observability Service: Akamai's Managed Observability service, Traffic Peak, offers several advantages including cost savings, the ability to ingest all data and store it for longer periods, uncovering incidents in real time, and showing trends over time.
6. Data Management Evolution: The evolution of organizations' view of data and the increasing importance of data management in the digital age were discussed. The speaker highlighted the exponential increase in log data and the need for organizations to make serious choices between the cost of data, querying of data, and the cost of site reliability engineers or SoC operators.
7. Hyper-Automation Concept: The concept of hyper-automation was introduced, which involves looking at automation beyond just being an IT activity and choosing the right tools for various aspects of the IT stack. A complete automation platform includes data automation and process automation.
8. Automation Efficiency Demonstration: Automation can streamline processes and reduce cycle times, as demonstrated by an energy drinks company. The company implemented automation, which reduced their cycle times by between 50 and 75% and allowed them to identify issues immediately.
9. Employee Experience Platforms: The rise of employee experience platforms, such as Work Vivo, was discussed. These platforms are used to reach, connect, and engage every employee, whether they work in the office, remotely, or on the frontline.
10. AI Security Integration: The importance of integrating security measures throughout the AI life cycle and constructing a security by design approach was highlighted. Open Text offers a Cyber Resilience Fast Track to help organizations navigate the cybersecurity landscape.
Key Quote
Information security is becoming more complex in the wake of increasing frequency, severity, and sophistication of attack vectors. Organizations must hone their cybersecurity capabilities, including threat intelligence and risk management. The goal is to continuously improve on your cyber resilience.
Related Content
Explore Related Content.
Webinar
Watch Full Webinar here.
**To access the related content and webcast, please fill out the registration form if you haven't registered for the event. You will be directed to the form before gaining access to these items.