Interesting day at the CIO Summit down in London yesterday. This was my annual visit to an event focusing on IT in the wider, including corporate, world rather than within the education sector. I make an effort to do this simply to try and get a wider view of IT, digital transformation and digital innovation to help provide some context to my work in school. There were four key messages which definitely resonated with me.
Its about the problem we are solving, not the Tech.
The CDIO of HMRC, Jacky Wright, outlined the importance of focussing on the problems you are seeking to solve rather than coding, or the technology you have available. This is a message I have often heard Mark Anderson (@ICTEvangelist) state in relation to education, in that it is not about the technology, it is about Teaching and Learning. In a more recent post I think he hit the nail on the head when he said its not really #edtech after all, its simply #Ed. It would seem that this need to focus on the end outcome or product and not be distracted by shiny or new technology is something which impacts on the wider IT world rather than just education.
Culture eats strategy
The importance of organisational culture was stated by a number of presenters. Like a focus on the problem being solved, mentioned above, a focus on culture was identified as being more important than the Tech being used. I liked Rackspaces mission of providing a “Fantastical Experience” as both setting the tone and culture which they seek to achieve within the organisation. I wonder whether schools could be a little more inspirational in the missions they set rather than the usual “developing the best learners” or “preparing students to the future” style of mission which we commonly see. At the end of the day the culture of an organisation is key in what it achieves or does not achieve. The people, the leadership team and the staff, shape the culture.
Sustainability
A number of presenters discussed the issue of sustainability in relation to technology. This is a challenging area given that technology may be both part of the solution and part of the problem. In being the problem, as we consume more data, use more technology and even personally have more devices, we need more power. We also consume valuable resources in the manufacturing processes plus make use of valuable metals in the various tech products. This all adds up to using more energy at a time when we want to be using less. Thankfully tech can also be the solution here in using AI to match availability and demand, in harnessing greater amounts of renewable energy with greater levels of efficiency and in supporting remote collaboration reducing energy consumption associated with travel. A particular area of discussion in relation to sustainability was that of the supplier chain. It was highlighted that organisations need to be aware of the energy consumption of the third parties they use rather than treating this as an issue for the third party. If you are using Microsoft or Google cloud services, the resultant energy usage associated with their data centres, as used to store and process your data, needs to be considered in thinking about your organisations carbon footprint and energy usage. In addition, looking at devices, including PCs, printers, etc, we also need to consider how suppliers source their resources, manage energy use during production and also to what extent their devices can be recycled, refurbished or reused.
Cyber Security
This topic was always likely to arise as part of discussion. I found the presentation by Brigadier Alan Hill particularly interesting in discussion his views. The key issue is ensuring that the risk associated with cyber security is understood at a board level and then working on constant review, testing and preparation for cyber events. As he identified any plan made won’t survive an encounter with the enemy however the act of having and more importantly testing a plan will at least make you and your team as prepared as they possibly can be for when, and not if, a cyber incident happens.
This was my 2nd CIO Summit event and once again I found it to be useful and informative. Towards the end of the event the importance of sharing ideas and best practice with IT peers was discussed and for me attendance at this event is a key part of this. Our best chance for innovation and for security is collaboration and cooperation; we are all in this together. And so as I write this on the train on the way home I look forward to reviewing my many pages of notes and identifying the actions to take as a result of this event. I cant wait for next year.



A little bit of a technology post today: Backups including redundant solutions are increasingly important in organisations as we seek to keep our IT services up and running for our own internal users and also for external users or clients/customers. This might be taking backup copies of data to tapes, having a redundant firewall or internet connection or having a cloud-based service available to replicate on-premise services in the event of a disaster. My concern however is that we can feel better for having these solutions in place happy in the knowledge that we are better off and more protected than if we don’t have them. The issue is that this sense of additional protection is false. Just by having a backup solution of one type of another doesn’t mean that it will work when things go wrong. We also need to be cognisant of the fact that when things do go wrong the result is often one of stress and urgency as we seek to restore services while under pressure from users, business leaders and process owners among others. We need to adopt a scientific mindset and test the backup solution to make sure it works as intended. It is much better to test our backup solutions to a timetabled plan than having the first test of a solution being a full blown real life incident where failure of the system could result in difficulties for the organisation. We also need to bear in mind that just because it works on the day the solution was put in place, or even works today doesn’t mean it will work in a weeks or months’ time, or in a years’ time when we truly need it. We need to have a robust programme of testing our backup solutions to ensure that they work, that we are aware of how they work and any implications and that those who need to use them are comfortable with their use. Only by doing this can we be more comfortable in the knowledge that, when something does go wrong, we have a solution in place and are ready to put it to use.
The perfect example of the above, for me, was a recent test of our own backup solutions which included a service which indicated that recovery to a redundant system would be complete in 4 hours plus would be based on data backup taken regularly. Upon testing the solution we found that the 4 hours recovery period was exceeded due to issues with the backup and the data was 3 days old. We also found that there were implications for other systems when the test failure occurred.
Sat on the train going on my way back from London and I noticed my Samsung Galaxy phone was displaying a message telling me that it had detected a Samsung Gear device near me and wanted to connect. The connection it was trying to establish was via Bluetooth which was enabled to allow my phone to connect to my cars audio system. I hadn’t even thought to disable it.
The recent WannaCry ransomware outbreak clearly identified the importance of keeping operating systems and other apps up to date to protect against identified vulnerabilities. Given the high level of news publicity it is likely that a lot of us went home and updated our home PCs and also checked with IT departments to make sure they had done the same with company machines. The outbreak, in my opinion, highlights a number of critical issues.
The global cyber attack of yesterday marks a learning opportunity in relation to discussing cyber security with our students. It is important that our students are aware of the implications of such attacks including the impact and also the measures that can be taken to protect against attacks being successful or at least minimise their impact.
Our home networks have been ever growing. Originally it was just having a basic network for a PC at home, which at the time was usually just a desktop connected to a dial up connection. Now however, we have a host of devices, games consoles, personal devices and home appliances all on our home network, all adding to the complexity and therefore the security risk of our home networks.
Yesterday afternoon while sat at home I suddenly started to experience internet issues, with my routers connection being intermittently lost. I immediately carried out the usual checks to see if I could identify the issue however nothing on the internal network at home seemed to be amiss. As such it was time to call my network provider to ask them to look into the situation.
Yesterday I sat the ISACA Cybersecurity Fundamentals exam as part of my programme of continual professional development. This got me thinking about what tips we might give our students in making their home technology a little bit safer. As such I came up with the points below: