JOURNAL REPORT THE WALL STREET JOURNAL. © 2016 Dow Jones & Company. All Rights Reserved. Wednesday, February 10, 2016 | R1 At the Helm of the Digital Transformation Hilary Mason Andreas Weigend The Mistakes Firms Make With Big Data Hilary Mason and Andreas Weigend on how companies can better use all that information Big data has launched a boom industry in data analytics and science. To find out where this revolution is headed and how companies can get a competitive advantage, The Wall Street Journal’s Rebecca Blumenstein spoke with Hilary Mason, chief executive and founder of Fast Forward Labs and former chief scientist at Bitly, and Andreas Weigend, director of the Social Data Lab and former chief scientist at Amazon.com Inc. Here are edited excerpts. The big missteps MS. BLUMENSTEIN: What are some of the biggest misunderstandings about data? MS. MASON: Often people think that individual data is the most valuable thing they can collect. But it’s not useful to know what I am doing or where I am, unless you’re particularly interested in me, which is weird. But it is very useful to know what a population of people are doing. On the implementation side, one of the common mistakes is to think of their data as a liability, as something that can only go wrong. It leads to a defensive attitude. MS. BLUMENSTEIN: There’s a lot of talk of transparency, that the CIO role has shifted from protecting data to sharing it. Andreas, you had a good example, a top executive. MR. WEIGEND: He opened up all of his inbox and outbox for anybody within the [company] domain. Two things happened. From one day to the next, all the bickering stopped. And those people he was thinking, “How do I get rid of them?” They left. And people were more interested in his outbox than his inbox. MS. BLUMENSTEIN: What com- panies are making data trans- parent internally? MS. MASON: The big tech com- panies do this well. They have the infrastructure in place to collect and count whatever they like in that data, and that’s generally available widely. But I’m more interested in the companies you would not think about. We work with an insurance company that has put a ton of time and energy into taking information about customers. It used to be that if you wanted to do something with the data and you were not on the data team, you had to fill out a paper form and send it to somebody. A week later, they might send you a report that would also be on paper. Now you have a tool that anyone can use where they can see these metrics and these dashboards, and they can configure them a little bit themselves. If they need a more complex analysis, then it goes to that team. This democratization of data access has allowed that organization to become much more data oriented in decision making. MS. BLUMENSTEIN: Andreas, you were saying that companies need to radically change their mind-set about the customer relationship. MR. WEIGEND: The other day I called up [an airline]. It was Ms. Mary I talked to. She told me if I buy a full-price economy ticket, which was quite expensive, I get upgraded to business class. So I bought that ticket, and I show up at the check-in counter, and they seat me in economy. I said, “They said I would get upgraded.” And they said, “Who?” “Ms. Mary.” “Well, do you want to be on this flight or not?” Ms. Mary, with my frequent-flier number, she has visibility in who I am. Me, all I know is I talked to Ms. Mary. That is a lack of symmetry. I want the history of my conversations available as part of the ticket and not selectively when the airline feels it’s in their advantage to use it. The role of intuition MS. BLUMENSTEIN: What are some of the mistakes that you see companies making? MS. MASON: One of the common fallacies is that data is opposed to intuition. The Wall Street Journal CIO Network convened its annual meeting in an environment of increasing uncertainty. IT spending for last year posted its sharpest decrease since the financial crisis, as difficult conditions in the currency markets hit tech budgets. Cybersecurity and uncertainty over the global regulation of data pressured companies, too. In this environment, the CIO plays a key role, leading digital transformation at 40% of corporations surveyed, according to Gartner Inc. “We’re in this fascinating cycle that we seem all to have dubbed digital business,” Gartner research chief Peter Sondergaard said. “The issue is how do we orchestrate, from a business perspective, that transition?” Here’s how CIOs assess the challenges, ever mindful that their companies must continue to innovate and keep up with the digitization of their markets, which is only accelerating. —Steven Rosenbush What's It Worth? Uncertainty among IT and business leaders about how to value big data is reflected in their expectations for return on investment in big-data technology. Among those already invested Positive ROI Negative ROI 38% Don't know The right balance MS. WALLER: Dawn, you went from CIO to CEO in about five years. How did you do it? MS. LEPORE: I think it was a little longer than that! You know, I was lucky enough to work for Schwab, which is a company where technology is very strategic. And I think that’s one of the most important things as you’re thinking about your career as a CIO: Make sure you are with a com- a report card every quarter. “This is what I said I would do.” And “Did you do it or not?” So, in some ways it’s a good structure and good discipline. But it’s also difficult. You’ve got all sorts of things going on in the company. Some of them are going better. Some are going worse. How do you communicate that? You can’t be overly optimistic. But if you’re too pessimistic, then your stock goes down. That piece of it was difficult, especially the first year. Also, I don’t have a finance background, but I was lucky enough to have an outstanding [chief financial officer]. So that’s also important, knowing what you’re good at and what you aren’t good at, and making sure that you’ve got the right people around you. MS. WALLER: What is the most underestimated part of the shift from CIO to CEO? MS. LEPORE: I think it depends on whether it’s a public or private company. I happened to go to Drugstore, which was public, so [that meant] dealing with investors, the earnings calls, the quarterly cadence, which is both good and bad. On the one hand, you’ve got MS. WALLER: Is it easier for CIOs to go on to be CEOs of their own company, or do they need to leap to another kind of business? MS. LEPORE: I think it’s easier to go to another company, especially if you’ve grown up in a company. I also think it’s easier to get a CEO job at a company that is very technology based. Drugstore, for example, was a retail company, 54% 2% Source: Gartner Inc. global survey of 437 information-technology THE WALL STREET JOURNAL. and business leaders, conducted online in June 2015 Data is a tool for enhancing intuition. When I worked at the social-media company, one day the CMO of a frozenbreakfast-sausage brand came into our office. The guy said, “I want to know what my customers do on the social web.” And I said, “Great. So first we’ll figure out who your customers are.” He said, “I know who my customers are. They’re moms in the Midwest.” I said, “How do you know?” He looked at me like I was crazy. He said, “They’re my customers. I’ve been doing this for years.” He was not wrong. He had many customers. We didn’t know if they were moms, but they were looking at momtype things. They were in the Midwest. But he missed a cluster of customers in Texas, and they were into motorcycles and man things. He missed a cluster in the Northwest who were anti food additives [who liked his product because it] did not have these additives. We were able to show that his intuition was in no way wrong. But he was missing things that were too small to come up on his human radar. ’If all you talk about is technology, that’s going to limit you.’ Dawn Lepore has done it. Here’s what she learned along the way. pany where technology is the product, or technology is critical to the business. I also was CIO at a time when the Internet came along. Schwab came out with Internet trading very early, which allowed us to get some visibility and allowed technology to be viewed even more strategically. And then I was able to take on other responsibilities. So by the time I left Schwab—and I was at Schwab 21 years—I had operations and human resources and compliance and communications. I also had our active trader business, which was our business for very, very active traders. So I really had both a revenue unit and a broad array of responsibilities before I left to become the CEO of Drugstore.com. 43% 58% 3% The Path From CIO to CEO As technology’s role in business continues to grow, the chief information officer arguably has become one of the most important people in the C-suite. But what does it take for a CIO to become chief executive? Dawn Lepore knows. Before becoming CEO of Drugstore.com Inc., the online retailer she led from 2004 until its sale in 2011, Ms. Lepore was CIO at Charles Schwab Co., where she helped build the brokerage firm’s successful ecommerce business. Ms. Lepore sat down with Nikki Waller, who heads up management coverage at The Wall Street Journal, to discuss what it takes to migrate from a technology role to the corner office. Here are edited excerpts. Among those planning to invest but it was completely technology-enabled. Emotional blackmail MS. WALLER: What can CIOs do to be seen as business leaders and not just tech leaders within their companies? MS. LEPORE: I was never a particularly technical CIO. I had some technical training, but I didn’t have a computer science degree. I was actually a music major. So the business aspect of it was always more interesting to me. I was always drawn to that. So if that’s the case, it’s probably a little bit easier to be viewed as a businessperson. One of the things that one of my bosses said along the way when I was CIO was, “You never emotionally blackmail me, and I really appreciate that.” And I thought, “What does that mean?” And he said, “You know, I’ve seen so many tech people who come and say, ‘Well, I can cut my budget, but I can’t guarantee the system’s going to stay up, you know.’ ” So some of it is how you deal with senior management of the company. That’s going to be part of how you’re judged as a business leader. JOHN BUSSEY: What common behaviors must a CIO stop doing to become CEO? MS. LEPORE: One is that emotional blackmail that I was talking about before. The other is too much tech speak. I have seen, or been in situations, where the head of technology almost uses the complexity of technology as, “Well, if nobody else can understand it, then they must need me, right? And so I try to make it sound as complex as I possibly can, and I use lots of acronyms.” That doesn’t go over well. The third thing is making sure that you understand the business of your company, and that you can engage in very strategic discussions about the direction of your business and your competition. If all you talk about is technology, that’s going to limit you. INSIDE Gen. Michael Hayden warns companies not to depend on the government for cybersecurity, R4 Aaron Levie sees changes coming in what he calls a very young market for cloud services, R4 Andy Bryant on how CIOs need to hone their communications skills to get their points across to executives and boards, R5 Andy Ozment discusses the potential mpact of the Cybersecurity Information Sharing Act, R4 Jeremy Bailenson says virtual reality has the potential to change the way users feel—and behave, R5 PLUS: The CIO Network task forces’ top management and policy recommendations in five key areas, R2 CIO NETWORK VIDEOS WSJ .COM To watch videos of interviews with top technology executives and industry experts about the challenges of today’s tech world, go to wsj.com/LeadershipReport THE WALL STREET JOURNAL. R2 | Wednesday, February 10, 2016 JOURNAL REPORT | CIO NETWORK The Task Forces’ Priorities The technology executives at last week’s CIO Network conference divided into five task forces to debate their management and policy agendas in the following areas. Here are their top recommendations. DATA, DATA AND MORE DATA 1 Create a data culture CIOs should create a culture of data within their business. Firms should treat data as a product, whether consumed internally or externally. Its management needs to be as disciplined and rigorous as engineering. This applies to both data collection and analysis. They should create a mechanism to engage the entire organization, either through a data council or individual businesses. 2 Confront data politics Today’s CIO should recognize data as a corporate asset. Algorithms are often more objective than a single opinion. CIOs should try to make sure data isn’t being used simply to advance political means. 3 Deliver analytics in everyday decisions CIOs need to find ways to deliver analytics to the business in a timely manner and within the firm’s everyday decisions. Businesses are overwhelmed with dashboards and reports that don’t yield actionable results. How can we use data to determine if paying someone 10% more will impact their retention? 4 Understand data quality Companies face a torrent of data from devices and sensors whose quality is unproven. They need to understand the source of data, including the technology or devices that generate and deliver it. CIOs should help business partners understand the importance of data qual- ity and how it impacts decision making. Constantly question the rigor of the analysis. CO-CHAIRS Kathy McElligott, Executive Vice President and CIO/CTO, McKesson Corp. Kumar Mishra, Vice President, Architecture and Information Technology Operations, Nielsen Co. Stuart Sackman, Corporate Vice President, Global Product and Technology, Automatic Data Processing Inc. SUBJECT EXPERT Gam Dias, Chief Executive Officer and Co-Founder, Mo-Data Inc. Understand the business situation, strategy Measure the company’s progress along different dimensions to choose the best course of action. Understand the demographics, revenue, margin and risk. Strategies vary according to a unit’s place in its digital evolutionary life cycle. mance metrics for the business and its leaders. allows the organization to evolve in an agile manner. 3 CO-CHAIRS Gerhard Karba, CIO, Related Cos. Ross Meyercord, Executive Vice President and CIO, Salesforce.com Inc. Brad Strock, CIO, PayPal 2 4 Get the leadership right Put the company’s digital future in the hands of people who are digitally minded and collaborative. Develop appropriate perfor- Choose your starting point Decide whether you are going to create dedicated digital units, drive digital innovation to the core of the business, create one or more separate digital business units, or a mix. Treat organization as a product Approach the organization as a product or service, and assess the skill sets, tools and processes of each unit. This 1 Lead, not just enable, strategic change IT needs to shift from an enabler of business strategy to an input to business strategy. In some cases, IT and business are one and the same. 2 Understand business outcomes Too often, IT can deliver capabilities that don’t support a larger business goal. Help business digitize new processes. SUBJECT EXPERT Peter Sondergaard, Senior Vice President, Research, Gartner Inc. 3 Create operational excellence IT dial tone—services that work, projects on budget, planning makes sense—must be consistent before you can play at a higher level. If you can’t get the basics right, you don’t have credibility. 4 Become a trusted adviser Senior alignment is critical, but also important is alignment in the second and third layers of the organization. Build relationships at all levels between IT and business. Practice radical transparency. CO-CHAIRS Michael Brown, Vice President, Global Information Technology, ExxonMobil Global Services Co. Guillermo Diaz Jr., Senior Vice President and CIO, Cisco Systems Inc. Celso Yoshiyuki Guiotoko, CIO and Corporate Vice President, Nissan Motor Co. SUBJECT EXPERT Garth Saloner, Philip H. Knight Professor and Dean, Graduate School of Business, Stanford University IN SEARCH OF CYBERSECURITY 1 Share and share fast All entities, from private sector to government, should share threat indicators as quickly and as widely as possible in an automated way. And it should be free of cost and consequences. 2 Beef up deterrence Increase consequences for people trying to attack systems. Make them pay…somehow. 3 GETTING DIGITAL RIGHT 1 INTEGRATING IT AND THE BUSINESS language and independently validated standards for all constituencies to assess security. 4 Develop an NTSB for cybersecurity Create an entity that investigates and analyzes incidents for the purpose of sharing lessons learned and developing new best practices for security. A standard of care Create a common CO-CHAIRS Karen Chamberlain, Senior Vice President and CIO, Western & Southern Financial Group Eric Friedman, CTO and Co-Founder, Fitbit Inc. David Kleidermacher, Chief Security Officer, BlackBerry SUBJECT EXPERT Andy Ozment, Assistant Secretary, Office of Cybersecurity and Communications, Department of Homeland Security LEADING INNOVATION 1 Establish innovation culture Enable or establish a culture of innovation, led by the Csuite and a workforce of diverse perspectives and skills, both inside and outside the company, and by reducing barriers and friction. 2 Look beyond today Look beyond today’s business model and ask instead where are we going to be 10 years from now. Ask what that means from a technology perspective and how to enable that transformation. 3 Look outside for inspiration Avoid getting stuck in a specific paradigm by looking outside the company or industry for ideas. CO-CHAIRS Diane K. Schwarz, CIO and Vice President, Textron Inc. Creighton Warren, CIO, USG SUBJECT EXPERT Vish Krishnan, Professor, Rady School of Management, University of California, San Diego 4 Focus on the client Design thinking about the products, the process and technology to produce value for the client. CIO NETWORK MEMBERS (Chief information officers/ chief technology officers, except as noted) The Wall Street Journal would like to thank the 2016 sponsors for their generous support of the CIO Network annual meeting. For more information, please visit CIONetwork.wsj.com © 2016 Dow Jones & Company, Inc. All rights reserved. 3C8313 Steven B. Ambrose, DTE Carlos Amesquita, Hershey Brad Arkin, VP, Chief Security Officer, Adobe Tom Baltis, VP, Chief Information Security Officer, Blue Cross Blue Shield of Michigan Simon Benney, Rio Tinto Steve Betts, Health Care Service Corp. Michael S. Brown, VP, Global IT, ExxonMobil Global Services Co. Tony Buttrick, Flagstar Bank Robert J. Casale, Massachusetts Mutual Life Karen A. Chamberlain, Western & Southern Financial Paul Cheesbrough, News Corp Anil T. Cheriyan, SunTrust Stephen Crowley, WEX Inc. Richard Daniels, Kaiser Permanente Julia K. Davis, Aflac Inc. Guillermo Diaz Jr., Cisco Mandy Edwards, CBRE Tarek El-Sadany, Unisys Philip Fasano, AIG Victor Fetter, LPL Financial James Fowler, GE Eric Friedman, Fitbit Marc Frons, Deputy Head of Technology and Senior Vice President, Global Head of Mobile Platforms, News Corp Randall Gaboriault, Christiana Care Health System Sven Gerjets, Time Warner Cable Inc. Michael E. Gioja, Paychex Bruce Greer, VP, Strategic Planning and IT, Olin Matt Griffiths, Biogen Celso Guiotoko, Nissan Suren Gupta, EVP, Technology and Strategic Ventures, Allstate Insurance Gil Hoffman, Mercy Health Donald G. Imholz, Centene Chris Isaacson, BATS Guilda Javaheri, Golden State Foods Carol Juel, Synchrony Manish Kapoor, NuStar Gerhard Karba, Related Cos. Deborah Kerr, Sabre Corp. Justin Kershaw, Cargill Inc. Dan Kieny, Black & Veatch Stuart Kippelman, Platform Specialty Products David Kleidermacher, Chief Security Officer, BlackBerry Sue Kozik, Group Health Cooperative Suresh Kumar, Bank of New York Mellon Corp. Madelyn Lankton, Travelers Brian LeClaire, Humana Inc. Brian Lillie, Equinix Inc. Chad Lindbloom, C.H. Robinson Worldwide Inc. Brian Maloney, Chairman, Americas, Tech Mahindra Krish Mani, Jeld-Wen Inc. Meg McCarthy, Executive Vice President, Operations and Technology, Aetna Kathy McElligott, McKesson James M. McGlennon, Liberty Mutual Insurance Kelvin McGrath, Asciano Ltd. Paul Meller, Dow Jones & Co. Vincent Melvin, Arrow Electronics Inc. Rich Mendola, Emory University Ross Meyercord, Salesforce Todd Miner, VP, Corporate Infrastructure, Yelp Kumar Mishra, VP, Architecture and IT Operations, Nielsen Co. Berni Mobley, Senior Vice President, IT, SAS Sheldon Monteiro, SapientNitro Luke Moranda, Options Clearing Corp. Anne Mullins, Lockheed Martin Corp. Pushpendu Pal, SVP, Pharmacy Benefit Management IT, CVS Health Mike Parisi, Illinois Tool Works Inc. Edwina Payne, Zimmer Biomet Holdings Inc. Ravi Pendse, Brown University Steve Phillips, Avnet Inc. Scott Pittman, Dell Inc. Larry Quinlan, Deloitte Matthew V.T. Ray, President, HM Health Solutions Craig Richardville, Carolinas HealthCare System Stuart Sackman, Corporate Vice President, Global Product and Technology, Automatic Data Processing Inc. Trevor Schulze, Micron Technology Inc. Diane K. Schwarz, Textron Wayne Shurts, Sysco Corp. Mark Sims, Scotts MiracleGro Co. Sukhvinder Singh, Senior Vice President, IT, Host Hotels & Resorts Inc. Joseph C. Spagnoletti, Campbell Soup Co. Scott Spradley, HewlettPackard Enterprise Adam Stanley, Cushman & Wakefield Tony Stoupas, Moody’s Brad Strock, PayPal Luis Taveras, Barnabas Health Denise Taylor, Westfield Atticus Tysen, Intuit Inc. Sankara Viswanathan, Day & Zimmermann Group Inc. Edward Wagoner, Jones Lang LaSalle Inc. Charles Wardrip, Kindred Healthcare Creighton Warren, USG Corp. Yvonne Wassenaar, New Relic Mary Beth Westmoreland, Blackbaud Inc. Andrew Wilson, Accenture Kevin Winter, Booz Allen Hamilton Inc. Philip R. Wiser, Hearst Corp. Robert Worrall, Juniper Networks Inc. PARTICIPATING GUESTS Jeremy Bailenson, CoFounder, Strivr Labs; Director, Virtual Human Interaction Lab, Stanford University Andy D. Bryant, Chairman, Intel Corp. Stewart Butterfield, CoFounder and CEO, Slack Gam Dias, CEO and CoFounder, Mo-Data Inc. Ben Golub, CEO, Docker Gen. Michael Hayden, Principal, Chertoff Group; former Director, Central Intelligence Agency; former Director, National Security Agency Vish Krishnan, Professor, Rady School of Management, University of California, San Diego Dawn Lepore, former CEO, Drugstore.com Inc.; former CIO, Charles Schwab Aaron Levie, CEO, CoFounder, Chairman, Box Hilary Mason, CEO and Founder, Fast Forward Labs Andy Ozment, Assistant Secretary, Office of Cybersecurity and Communications, Department of Homeland Security Tom Reilly, CEO, Cloudera Garth Saloner, Philip H. Knight Professor and Dean, Stanford Graduate School of Business Peter Sondergaard, Senior Vice President, Research, Gartner Inc. Andreas Weigend, Director, Social Data Lab; former Chief Scientist, Amazon THE WALL STREET JOURNAL. Wednesday, February 10, 2016 | R3 EXPL RE What matters most to CIOs? Recent Deloitte research reveals four key areas in which CIOs should operate to lead their organizations effectively and create successful careers. Read the 2015 Global CIO Survey to learn how CIOs are creating impact and value today – and where their value proposition is headed in the future. The survey of over 1,200 CIOs and senior IT executives around the globe was conducted by Deloitte’s CIO Program, representing our commitment to helping advance the careers, contributions, and impact of CIOs worldwide. www.deloitte.com/us/ciosurvey Audit | Tax | Consulting | Advisory Copyright © 2016 Deloitte Development LLC. All rights reserved. THE WALL STREET JOURNAL. R4 | Wednesday, February 10, 2016 JOURNAL REPORT | CIO NETWORK GENESIS PHOTOS/DOW JONES (3) ‘The government, our government will be permanently late for your cybersecurity.’ A Cyberwar Update Gen. Michael Hayden says recent government moves to protect cyberspace are too little, too late We’re in a global cyberwar in which our corporate secrets are our chief prize. Are we up for the fight? To get a clearer answer, The Wall Street Journal’s John Bussey spoke with Gen. Michael Hayden, principal of Chertoff Group and former director of the Central Intelligence Agency and National Security Agency. Here are edited excerpts of the discussion. It’s up to you MR. BUSSEY: We got some news last month. There’s some legislation meant to increase cooperation between the government and business. Tell us about the bill and whether or not it helps CIOs protect corporate secrets. GEN. HAYDEN: We’re talking about CISA, the Cybersecurity Information Sharing Act. Good news, a step in the right direction. But it’s too long in coming, it’s too small a step. And it reveals that within any realistic planning horizon, you are largely responsible for your own defense in the cyber domain. The government, our government will be permanently late for your cybersecurity. Look, your armed forces view cyber as a domain. Land, sea, air, space, cyber. It’s a new domain. You and I have decided that this domain is so wonderful, empowering, we’re going to take things we used to keep down here in a safe, in a drawer, in a wallet, and put it up here where it’s largely undefended. This is the largest ungoverned space in recorded human history. There is no rule of law up here. As taxpayers, you and I are going to want our government to defend us up here the way we have become accustomed to relying on the government for defending us down here. But there’s the general sclero- ’This is a risk and you can manage it. Can you eliminate it? Of course not.’ Information Sharing And Cybersecurity Andy Ozment on the potential impact of new legislation Among other goals, the Cybersecurity Information Sharing Act aims to foster closer cooperation between government and the corporate sector. Under the act, passed in December and due to take effect soon, Washington will share information with businesses about cyberthreats and give companies protection from liability when sharing information with the government. To get a picture of the changing landscape, The Wall Street Journal’s Rebecca Blumenstein spoke with Andy Ozment, assistant secretary, Office of Cybersecurity and Communications, in the Department of Homeland Security. Here are edited excerpts of the conversation. The legislative front MS. BLUMENSTEIN: Can you explain what the Cybersecurity Act is and why it’s significant? MR. OZMENT: It took a while for policy makers to wrap their heads around information sharing. What do we even mean by that? The first thing to emphasize about this legislation is it’s about indicators, not incidents. What’s an indicator? It’s a “be on the lookout.” Be on the lookout for this IP address, this phishing email, you name it. That’s what we’re talking about. MS. BLUMENSTEIN: There’s also shared liability, right? MR. OZMENT: The idea is liability protection for you. Why did you have liability in the first place? Most of the laws that would have given you liability here were intended as privacy laws for consumers. This bill says if you’re sharing this information for cybersecurity purposes, you’re protected against liability. MS. BLUMENSTEIN: The private sector has been reluctant to work closely with the federal government. Do you think that this is going to be a tough sale? MR. OZMENT: We’re making progress. I have to somewhat limit my selling of this because we have done this extremely rapidly. We don’t want to start on day one with a million companies. We want to start on day one with a small number of companies, get them happy, scale from there. We have a lot of companies who are eagerly talking. And so part of what we’re doing here is not just building sis of government, and the technology is going to move much faster than any government can move. Then we have not yet decided what it is we want or what it is we will allow the government to keep us safe. You’re going to have to be responsible for your safety [in the cyber domain] in a way in which you have not been required to be responsible for your safety [in the physical domain] since the closing of the American frontier in 1890. Who follows whom? MR. BUSSEY: It does seem that before the war on cybersecurity can be fought as a nation, we have to resolve the civil war internally over privacy. GEN. HAYDEN: Yeah. And that’s a multigenerational thing. We haven’t arrived at a national consensus. In the American system, when the government doesn’t show up, we generally pick up the burden ourselves. the system to share this information. We’re also building the governance mechanisms, the trust groups where if you don’t want to talk directly to us, you want to talk in a trust group, your trust group can then share the information to the government. So, you’re already anonymized. And, obviously, if you do share with us, we’ll anonymize it before we push it back out. MS. BLUMENSTEIN: We’ve heard a lot of defeatism today about all the different actors in cybersecurity who are getting increasingly more sophisticated. Is there a reason to be hopeful that companies can protect themselves? MR. OZMENT: Absolutely. This is a risk and you can manage it. Can you eliminate it? Of course not. But you manage them all day, every day. It’s like we got a credit card from the Internet revolution 20 years ago, and we’ve been buying stuff. We haven’t paid our monthly bill for security. So we have debt racked up. But we already see sectors that have been putting time and attention and resources into this for six, eight years are doing pretty darn well. Do they still get breached? Absolutely. But they catch it quickly and they contain it. We can all get to that space. The malicious players MS. BLUMENSTEIN: Can we take a step back and look at the whole cyberthreat landscape? What is the biggest threat right now? MR. OZMENT: I bucket the threats into vandals, burglars, thugs, spies and saboteurs. Vandals are groups like Anonymous who are trying to have a reputation impact on you. Burglars, they’re after money. Thugs are a little more complicated. They just want to punch you. The North Korean attack on Sony Pictures is that. Spies want either national secrets or your intellectual property. And they want to use it obviously to the advantage of their nation. Saboteurs are an area we’re concerned about. This is where a nation-state or other adversary gets into our critical infrastructure and waits for a time of conflict. So, the good news is there’s a lot of private-sector activity designed to keep us safe. Let me explain this another way. When I think about a national-security problem, generally my instincts are the government is the prime mover. If you’re into Civil War history, Gen. Grant or Gen. Lee says, “You, sir, your corps is the main body. And you, gentlemen, you will conform your movements to the movements of the main body.” In government, I assumed that in cyberdefense, the main body was the government, and you shall conform your movements with the movements of the main body. In the cyber domain, you are the main body. What our government has to teach itself is that the government needs, in all but a few exceptional cases, to conform its movements to the movements of the main body, you. it’s getting worse. Beyond that, [people are trying] not just to steal data, but to create effects. So you’ve got Stuxnet, which is the destruction of a thousand centrifuges at Natanz in Iran. I view it as an unalloyed good, but it was done using a weapon comprised of ones and zeros to create physical destruction. Leon Panetta spent a lot of time in his last year or two in government talking about cyber Pearl Harbor, digital 9/11, catastrophic attack. I don’t Concerns and Constraints Where companies are focusing their information-security efforts and what's holding them back, according to an Ernst & Young survey Percentage of Criminal syndicates 59% respondents who Employee 56% considered the following to be among the most likely Hactivists 54% sources of an attack Lone-wolf hacker 43% External contractor working on our site 36% MR. BUSSEY: One of the things that the private sector is doing is to look again at encryption. GEN. HAYDEN: The issue here is end-to-end unbreakable encryption, should American firms be allowed to create such a thing. You’ve got Jim Comey, the director of the FBI, saying, “I am really going to suffer if I can’t read Tony Soprano’s email or if I’ve got to ask Tony for the PIN number before I get to read Tony’s emails.” I get it. There is an unarguable downside to unbreakable encryption. On the other side is the question: On balance, is America more or less secure with unbreakable end-to-end encryption, regardless of whether Jim can read Tony’s emails? I think Jim Comey’s wrong. Jim’s logic is based on the belief that he remains the main body and you should accommodate your movements to the movements of him, which is the main body. And I’m telling you, with regard to the cyber domain, he’s not. You are. MR. BUSSEY: Tell us how the landscape of threat is evolving or changing. GEN. HAYDEN: The stealingyour-data stuff is there, and think that’s what we have to worry about. I’m not frightened about the Chinese turning out all the lights east of the Mississippi. I’m not worried about that superpower, catastrophic attack. I’m worried about the isolated, nothing to lose, “Ah, what the hell? Let’s go see what happens,” nation state who goes after a North American enterprise to create physical destruction to show that they can. The Sony attack is the poster child for that. State-sponsored attacker 35% Percentage who ranked each of the following a high, medium or low priority for their organization over the coming 12 months Low Medium High Percentage who said each of the following was among the main obstacles or challenges for their information-security operations 62% 33% 56% 11% Budget constraints 55% 57% 12% Data leakage/ data loss prevention 41% 33% 47% 12% Lack of skilled resources Business continuity/ disaster recovery resilience 45% 32% Lack of executive awareness or support 44% 28% 11% Identity and access management Lack of quality tools for managing information security Security awareness and training 28% 44% 44% 12% Incident response capabilities 44% Management and governance issues 41% 15% Security operations (e.g., antivirus, patching, encryption) 23% Fragmentation of compliance/regulation Source: Ernst & Young's Global Information Security Survey 2015, a survey of 1,755 CIOs and other executives involved in information security in 67 countries, conducted in person and online between June and September 2015. THE WALL STREET JOURNAL. The Direction of the Cloud Aaron Levie says the market is still very young Cloud computing, where companies sell shared access to software or computing power that can be used over the Internet, is changing the way businesses work. Aaron Levie, co-founder and CEO of Box Inc., a provider of online storage and collaboration tools that allow employees to access and share files from any device, sat down with The Wall Street Journal’s global technology editor, Jonathan Krim, to discuss what this shift means. Here are edited excerpts. ‘We live in a world that is going to be incredibly heterogeneous.’ The layer between MR. KRIM: You have said the market for cloud services is still young. But it seems already to be hyper-coalescing around two or three players. Is that where you see it going? MR. LEVIE: Amazon got into the space first, and they have this amazing sort of competitive advantage because they see all of the new developer problems before anybody else does. But when you actually look at the public cloud market relative to the entire computing space, it’s still a very, very small portion of total spending. So yes, we are seeing who some of the names might be, but when you’re looking out five or 10 years from now, the space is going to look very different in terms of who’s taking the lead. MR. KRIM: Let’s imagine that Microsoft, Google and maybe Amazon are your cloud options. Why can’t they provide the services that you provide? MR. LEVIE: There was a really good article in TechCrunch a few weeks ago called “The Stack Fallacy,” and it was about why it’s so hard for companies to move up the stack, [into a different layer of the market,] in terms of their technology products. When you move up the stack, you tend to be dealing with a very different set of customers, and people, and individuals using your products. And so, if you’re building infrastructure, large-scale data centers and large-scale computing environments, that’s a very, very different problem than building business applications. MR. KRIM: But isn’t that what Google has done with Docs and Sheets, and those things? MR. LEVIE: In terms of enduser productivity tools, absolutely. But in terms of actual systems that are going to work across an entire enterprise to help you manage, share, store, collaborate around, add workflow to all of your data—we think that’s just a very different problem. We live in a world that is going to be incredibly heterogeneous. There are going to be a lot of different kinds of systems. And as the world gets more heterogeneous, you actually need different platforms in different parts of the stack to be agnostic to the other kinds of applications that you’re using. That is largely what our role is at Box. One day you might be using Office, the next day you might be using Google Docs, the next day you might be using Adobe, the next day you might want to access files from Salesforce. You need something that’s going to be able to broker how you do all of that sharing, and all of that organization of your information. We sort of live in between the infrastructure world and the SaaS [soft- ware as a service] world. Opening up MR. KRIM: We asked the CIOs here if, as they migrate applications to the cloud, they see themselves using multiple vendors for various applications or going with a more integrated solution. Overwhelmingly they said multiple vendors. What do you say? MR. LEVIE: In the cloud model, you no longer have the technological reason to require products to come from the same vendor. Assuming you have at least a federated security model, a federated analytics and identity-management model, the cost of working with multiple vendors has gone down precipitously. And being able to get best-of-breed applications at each layer of the stack is going to drive far more innovation within the IT sector. Even the biggest tech vendors are recognizing that the world is going to be heterogeneous, and they have to open up to companies that otherwise would be competitors. Last week, Microsoft opened up Office, so now you can get access to all of your Box files from Office on your iPhone. You can do real-time, collaborative editing with Office online. It’s shocking to say this, but Microsoft has become dramatically more open than Google, just in the past couple of years. THE WALL STREET JOURNAL. Wednesday, February 10, 2016 | R5 JOURNAL REPORT | CIO NETWORK Where Virtual Reality Is Heading Virtual reality is getting a lot better at simulating the real world. Just how good is it going to get, and how fast? And what’s the best way to deploy the technology for consumers and businesses alike? The Wall Street Journal’s Geoffrey A. Fowler spoke to Jeremy Bailenson, co-founder of Strivr Labs and director of the Virtual Human Interaction Lab at Stanford University. Here are edited excerpts of their discussion. A new experience MR. FOWLER: So what can VR do that you can’t just do with a computer screen? MR. BAILENSON: My Ph.D. is in cognitive psychology. And what I study is how the brain responds to virtual reality. It’s all about your movement. There’s a theory called embodied cognition, which is people learn by moving and doing stuff. When VR is done well, there are no gadgets. The interface goes away. It’s as if you’re in a space. You could make somebody fly to the moon. You could put them underwater. We can do that in VR, and the brain treats it as real. MR. FOWLER: How are some businesses using this right now? MR. BAILENSON: This is going to sound a little bit narcissistic. But right now, probably the only true B2B success of VR where VR has migrated from the living room to businesses at scale is in the sports-training world. This company, Strivr, that I cofounded. There are over 75 systems being used across the country in teams. They’re using it day to day where athletes get to learn decision making. They get to practice plays. And fans get to experience these. MR. FOWLER: In your lab, you’ve been also working on a number of other experiments and programs for businesses. What are some of them? MR. BAILENSON: In 2003, a woman approached me and said, “Can you build better diversity-training software?” When I do diversity training, I either sit in a room and I watch actors do banter or I do an online driver’s-ed type [thing]. It doesn’t make me think about women, issues of race, in a way that’s compelling. In VR in 2003, what we did is you stood up, and you put on this helmet, and you walked up to a virtual mirror, and you saw yourself in the mirror. As a white male, I would be transformed into a woman of color. I would then experience prejudice firsthand, meaning another avatar would walk in the room and would say horrible things to me about my race and about my gender. For about 12 years now, we’ve been running study after study showing that feeling discrimination firsthand while walking a mile in someone else’s shoes is a better way to change attitudes and behavior. MR. FOWLER: The equipment that allows consumers at The Language of the CIO Andy Bryant on how chief information officers need to hone their communications skills Chief information officers can sometimes feel as if they are talking to a brick wall when they make pleas for more funding and new projects. Sometimes, it’s because they need to improve their corporate communications skills. Wall Street Journal News Editor Ted Greenwald talked to Intel Corp. Chairman Andy Bryant about how CIOs can get their points across to boards and fellow executives. Edited excerpts follow. MR. GREENWALD: As a former chief financial officer, how would you advise CIOs go about building productive relationships with their CFOs? MR. BRYANT: Actually, you could ask my CIO, and he may say, “He’s not so good at that.” In my time, I learned that CIOs and CFOs almost don’t speak the same language, until they learn to work with each other. One time, I had a CFO and a CIO working for me, and I saw them talking past each other. Because the CIO would say, “If we approve this project, I can save, on our run rate spending, $10 million.” And the CFO said, “I don’t believe it.” They fought for a while. And I looked at the CIO. I said: “Simple question. Explain the detail. How do you explain $10 million?” [The CIO said:] “Well, instead of having people take orders, we can now have the machines take orders. And we can save that cost.” And I said, “So his [the CFO’s] problem is, what happens to those people?” [And the CIO says:] “Well, what happens to those people is they go to this other project I want to work on.” So the CFO looks at it and says, “You didn’t save me anything. All you did was fund a project that I didn’t care about. So now let’s talk about how the savings comes, how it’s going to be applied.” You have to go beyond the first-level analysis. But once you realize you both are trying ‘Help me understand again what the problem is. But you started by trying to blackmail me.’ to do the right thing, you both are very passionate about what you do and you speak just a little bit different language, you get those two on the same page, it’s amazing what can be accomplished. MR. GREENWALD: How can CIOs demonstrate return on investment? MR. BRYANT: There are interesting ways. For example, in the example I just gave, they could have said, “No, we’re going to actually save that money by letting these folks leave to different jobs, or we may do a layoff, but we will have a real savings.” You can actually find real ways to save money and document it. And then you can come back to the CEO and say, “These 100 people I saved, I’d like to reinvest them.” Now, that’s a new decision. The CFO will say, “I got my savings. And now the CEO’s making a decision about a new investment. I can live with that one.” The place it really gets hard is what we used to call faith investments. I do believe you have to have some faith investments. A CIO should, every now and then, say, “You’re going to have to trust me on this one.” MR. GREENWALD: Let’s talk about the CIO’s relationship with the board. As a chairman, and also as a member of sev- MORE AT WSJ.COM/LEADERSHIPREPORT n Stewart Butterfield, Slack CEO, says eventually all organizations will use communications apps like Slack n Peter Sondergaard, head of research at Gartner, on how companies can make the most of their IT spending n Ben Golub, Docker CEO, explains what digital containers are— and who uses them n Tom Reilly, CEO of Cloudera, talks about his company’s challenges helping customers make the most of big data eral other boards, what advice would you give to CIOs looking to strengthen that relationship? MR. BRYANT: I’m going to start with a negative. What I typically see from the boards I’m on is the CIO comes in and says, “If you don’t give me this, we will die. It’s over.” And you just kind of say, “Wow, that’s a big statement. Let’s go through this in some detail.” And they say, “Look, I need X dollars. And if you don’t give me the X dollars, we’re going to be breached. When we’re breached, the penalties will be enormous.” And you say, “OK, if I give you X dollars, then we won’t be breached?” No sensible CIO is ever going to say, “Well, yeah, we still will be.” Help me understand again what the problem is. But you started by trying to blackmail me. Don’t do that. You’ve made it a budget pitch. Don’t do that. Come in to me and say, “Look. First, I’m going to educate you. Here is what we do. Here are the problems we’re solving. Here are some things we’re worried about. Here’s the magnitude of those. And by the way, yeah, we’re going to eventually be breached. However, there are some inexpensive things we can do to help and some expensive things. Let’s talk about those.” MR. GREENWALD: Should boards include the CIO? MR. BRYANT: Yes. If I’m designing a board in today’s world, to have CIO knowledge is important. And by the way, we don’t have one. We have people who are in enterprise-type solutions. So we have people, I’ll say, on the periphery. But based on today’s world, I would say yes. I would also say I want that CIO on my board to be a business strategist as well as a CIO. You have to be both. I want somebody who can take that capability, understand the business strategy that goes with it, and help me figure out how to get through some of these waters. GENESIS PHOTOS/DOW JONES (2) Jeremy Bailenson says VR has the potential to change the way users feel—and behave ‘In five years, being fairly conservative, it’s going to feel like you’re here’ home and businesses to use VR is becoming available. Help us imagine. What are some other uses that folks might be trying here? Are we talking about teleconferencing? MR. BAILENSON: My dream has been to build a system that [lets you] feel present. I mean, we’re here. We have eye contact. We shook hands. If I can perfect a virtual handshake, all these women and men who flew here, they wouldn’t need to fly here. In five years, being fairly conservative, it’s going to feel like you’re here. My one-liner is, “You should travel when you want to, not when you have to.” We can build avatar systems that replicate what I call the virtual handshake. There’s all sorts of wonderful things that’ll happen. Lasting effect? MR. FOWLER: The premise of a lot of what you’ve been telling us is that a VR experience is going to do something that you couldn’t do in the real world and have a lasting impact on your brain. The way you think, the way you make decisions. How long can that impact really last? MR. BAILENSON: The longitudinal study, seeing how long these effects last, it’s hard to do. There have only been three longitudinal studies on the planet in VR, and I’ve done two of them. Whenever we look, VR lasts longer, say, than watching a video. We’ve done studies where we force you in virtual reality to cut down trees with the goal of teaching you how to recycle paper. What we’ve demonstrated, if you look at somebody a month out, they are still going be more conservation minded. They’ll actually use less paper later on. MR. FOWLER: So cutting down a virtual tree makes you buy less toilet paper? MR. BAILENSON: It makes you use less paper in your daily life when we track it unobtrusively. MR. FOWLER: The technology has gotten a lot better even in the last year. But it still doesn’t feel like I’m in this room. It feels like I am looking through a screen. MR. BAILENSON: I don’t think you’ve done great VR. When VR’s done well, you have this experience called presence. And let me just push a little bit about that. In 2001, I presented to the Federal Judicial Center, a bunch of federal lawyers and judges, about how to use VR in the courtroom. The home-run demo we have is called The Pit. It’s a demo that we have developed to treat fear of heights. [It’s designed to seem like] a big pit and we put a rickety plank over it. We had a gentleman. He was a federal judge. He was probably in his late 60s. He probably weighed north of 280. And when he went up to The Pit, he virtually took a wrong step, fell off the plank. And the gentleman literally, because he was terrified, dove at a 45-degree angle to try to catch the lip of the plank. In front of a room of 300 judges and lawyers. But it gets worse. His face was going right toward a sharp corner. He completely forgot he was in the physical room. So in one move, I had to dive and knock him down to redirect his trajectory. It was a really big deal. No one got hurt. No one got sued. MR. FOWLER: Doesn’t VR have equally large or even maybe greater potential for evil? Because you are totally controlling someone’s experience. MR. BAILENSON: VR is no different than the written word or video. It can be used for wonderful purposes. Or it can be used for evil. And it’s up to us to do the right thing. THE WALL STREET JOURNAL. R6 | Wednesday, February 10, 2016 Cognitive security is here. In a world where everything is connected, everything is vulnerable. IBM uses cognitive technology to help protect the critical assets of your business. It senses and helps detect millions of hidden threats from millions of sources and continuously learns how to defeat them. When your business thinks, you can outthink attacks. outthink threats ibm.com/outthink IBM and its logo and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. See current list at ibm.com/trademark. Other product and service names might be trademarks of IBM or other companies. ©International Business Machines Corp. 2015.
© Copyright 2026 Paperzz