5 key issues CIOs discussed at the CIO Leadership Exchange

CIO 2(1)

On July 16, some of the nation’s most accomplished chief information officers gathered in Chicago for IBM’s CIO Leadership Exchange, where they engaged in insightful discussions about the challenges they face. Despite tornado warnings and flash floods in the Chicago area that disrupted travel, and the happy distraction (at least for Blackhawks fans!) of Chicago winning the Stanley Cup, the CIOs who convened offered many lessons and takeaways for fellow senior executives. Here are five ideas fresh from the CIO Leadership Exchange, along with graphic summaries of many trends (like the one above), created by the THINK Leaders team.

1) CIOs need to be able to integrate complex systems. Below are some attributes of success.


2) Data is transforming industries and professions. CIOs need to balance the challenge of providing a new customer experience with personalization and innovation while protecting customer privacy.


3) When considering implementing cloud services, CIOs must be comprehensive and have a clear strategy for security as well as scalability.

4) Mobile and social technologies are changing how we work, not only the customer experience. We expect our work technologies to be as easy to use as our consumer technologies.

5) CIOs can look at their infrastructure like an immune system that is able to detect germs/viruses that infect IT systems, and provide antibodies to resolve security breaches.

There were so many amazing speakers and ideas shared. These were just some of the discussions. We also had discussion on Twitter #CIOExchange that you can still contribute to.

Senior Social Business and Digital Strategist, Performance Marketing, North America IBM Global Markets, Marketing

More stories

The benefits of automation you didn’t see coming

Automation pays out, and relatively quickly too. But some of the benefits come from less obvious places. The recent Forrester Total Economic Impact study looked at the impact — costs and benefits — of automation in the world of application management, based on in-depth interviews with IBM clients. For many organizations, the catalyst for considering […]

Continue reading

GDPR and protecting data privacy with cryptographic pseudonyms

Within two years, most of today’s cybersecurity technologies will be obsolete. Since the beginning of 2016, hackers have stolen more than 8 billion records — more than double the two previous years combined — and that doesn’t account for unreported intrusions. The current system of patches, firewalls and blacklists isn’t working. It’s no match for […]

Continue reading

The progress of automation in the financial services industry

Working across a range of industries as I do, I’m always interested to get the perspective of a peer group on the way automation is impacting their own particular industry. So when I gave the keynote speech at the recent Millennium Alliance FSI event in Palm Beach, FL, I relished the opportunity to meet with […]

Continue reading