Technology leaders in gaming and leisure need to adopt a framework for incorporating new technologies while maintaining desired security risk profiles. Furthermore, they need to adopt/build in the most effective way to avoid unnecessary complexity and overhead.
A recent analysis by MIT, “Technological Improvement Rate Predictions,” analyzed patent information across nearly 2,000 different domains. The study found that the average annual improvement rate for 80% of the domains was a rate of 25% improvement per year. Compare that average to the specific domain of enterprise information technology (which will ring true to IT leaders). The annual technological improvement rate for enterprise information technology was above 200% according to the MIT study. The pace of change in information technology was fast several years ago but it has continued to increase each and every year.
The complex set of tasks facing information technology leaders in the gaming and leisure industry include introducing technologies for new use cases on top of foundational infrastructure that itself is rooted in accelerated change. The adoption and implementation of mobile, geolocation tracking, data modeling, virtual reality, augmented reality, RFID, and facial recognition have spread broadly across our industry, and the use cases are expanding and deepening.
Technology leaders in gaming and leisure need to adopt a framework for incorporating new technologies while maintaining desired security risk profiles. Furthermore, they need to adopt/build in the most effective way to avoid unnecessary complexity and overhead.
In this editorial, I will present a Framework for Secure Change that has proven effective in dealing with these difficult and competing objectives. The framework begins with an organizational context. I will outline three components that will help align design and work streams with fundamental organizational requirements. Those three components that set the “context” will then provide direction to the three critical design elements. Finally, ongoing management of Risk of Obsolescence will be the governance wrapper for the framework.
Cyber security is a strategy and set of capabilities that are designed to help prevent a data breach and reduce the likelihood of a malicious disruption to your business.
Cyber resiliency is a strategy and set of capabilities that will help mitigate the impact of a business disruption.
It is important that both of these dimensions are designed into new technology project implementations. I can use the NIST Core Functions Framework – identify, protect, detect, respond, recover – to clarify. The cyber security dimension includes all of the parts of your security program that relate to the identify, protect, detect, respond core NIST functions. The cyber resilience dimension includes some of the respond function, but more broadly the recover function.
Professor David Harvey once said that, “planned obsolescence is only possible if the rate of technological change is contained.” This quote, along with today’s ever-increasing rate of change in enterprise information technology point out that proactively managing your company’s risk of obsolescence is vital to long-term success.
Not too long ago we made capital expenditures for technology and depreciated the amount over a planned lifespan and that was our way of financially managing risk of obsolescence. In today’s world we have many more complicating factors from cloud computing and software subscriptions to interoperability/compatibility issues. It has never been more difficult to plan out lifecycle management of IT assets. The first step is to make sure risk of obsolescence is a focus of the design of all new technology implementations. Even more important, that focus should not be exclusively on new acquisitions and implementations but rather as broad as possible to calibrate risk across the entire IT landscape with new technology introductions.
We are not going to be perfect in risk management or lifecycle planning, but we can be thoughtful and disciplined.
I will use one more quote to help frame this discussion. Keith Kitani, CEO of GuideSpark, and author may have captured my perspective the best, “Become a change-ready organization. This goes beyond being able to deploy a new tool or process – it means building a culture of communication structure that is ready, willing, and able to adapt to any change. After all, the rate of change and evolution in business and technology is only going to continue and even pick up speed.”
Much has been asked of IT leaders over the past two decades and even more was asked of them when the pandemic hit. There is a knee-jerk reaction to see work to be done and engage and execute on that work. I believe we are now at a point in time where IT leaders need to be the catalyst and change agent to help their organizations – people, process, and technology – reach a foundational state of agility through thoughtful and careful design and planning for extensibility, expansion, and reuse.
The pace of technological change is a complicating factor but the increase in cyber security risk and the growing need for well-structured and effective cyber resilience programs are the most pressing variables now in long-term IT architectural and capabilities planning. This approach will drive business value through security.
A secure framework for change that promotes repeatability is required today for new technology adoption initiatives.
Source: G&L Magazine Fall Edition 2022
John Wondolowski is the Chief Technology Officer for Solutions II. Solutions II is an Information Technology Services and Solutions Provider with an industry focus in Casino Gaming and Hospitality. John has been an Enterprise IT Executive for many years after earning degrees from the University of California at Berkeley, Haas School of Business, and California State University at Fullerton.