{"id":2033,"date":"2004-01-05T00:00:00","date_gmt":"2004-01-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/05\/cio-priorities-for-2004\/"},"modified":"2021-12-30T11:40:31","modified_gmt":"2021-12-30T11:40:31","slug":"cio-priorities-for-2004","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/05\/cio-priorities-for-2004\/","title":{"rendered":"CIO priorities for 2004"},"content":{"rendered":"<p>International Data Corp. is predicting that IT spending in the U.S. will be 6% to 8% higher &#8212; maybe more &#8212; than it was in 2003.  Forrester Research of Cambridge, Mass., also has an optimistic outlook.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the SAS Institute Inc. CIO Suzanne Gordon said that security occupies the top spot on the Cary, N.C., software firm&#8217;s 2004 wish list.  Gordon said that SAS will have a rolling forecast and look at the budget every quarter, so if the company needs a weapon to combat a Blaster worm is needed, she can get it.<\/p>\n<p>For Tsvi Gal, CIO of Warner Music Group in New York, Web services and service-level management in heterogeneous environments, as well as digital rights management, rank in the upper tiers of his list.<\/p>\n<p>Both said that disaster recovery (DR) investments are high priorities, which is in keeping with Forrester&#8217;s prediction that DR will be right behind security on the CIO shopping list.  Gal said that his company is moving from a model in which DR is considered an issue only for IT departments to one that gets business divisions involved.<\/p>\n<p>The emphasis on DR and business continuity isn&#8217;t only a CIO priority, according to Bob Doyle of Dallas-based RPD Global Consulting and a CIO for more than two decades, most recently with Fleming Companies.  Rounding out Forrester&#8217;s top five CIO priorities for 2004: upgrading existing applications and desktops (&#8220;business-as-usual investments&#8221; as Gal called them) and compliance with new laws, namely the Sarbanes-Oxley Act.<\/p>\n<p>IT outsourcing, one of the hottest topics in 2003, finished closer to the bottom of the 2004 priority pile, with only 24% of respondents saying that they would be exploring outsourcing alternatives in 2004, and only 17% said that moving IT work offshore was of the utmost importance.  Forrester finding &#8212; that of the firms that already use offshore providers, 68% will send even more work overseas in 2004.<\/p>\n<p>More info: [url=http:\/\/searchcrm.techtarget.com\/originalContent\/0,289142,sid11_gci943125,00.html]http:\/\/searchcrm.techtarget.com\/originalContent\/0,289142,sid11_gci943125,00.html[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2033","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2033"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2033\/revisions"}],"predecessor-version":[{"id":4520,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2033\/revisions\/4520"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}