{"id":1458,"date":"2011-10-04T20:32:00","date_gmt":"2011-10-04T20:32:00","guid":{"rendered":"http:\/\/localhost\/projects\/horsesforsources\/jim-slaby_100411\/"},"modified":"2011-10-04T20:32:00","modified_gmt":"2011-10-04T20:32:00","slug":"jim-slaby_100411","status":"publish","type":"post","link":"https:\/\/www.horsesforsources.com\/jim-slaby_100411\/","title":{"rendered":"HfS secures the services of Jim Slaby"},"content":{"rendered":"
James R Slaby is Research Director, Sourcing Security and Risk Strategies, HfS Research (click for bio)<\/p>\n<\/div>\n
How many different ways can you spin the wonders of accounts payable outsourcing… or the delights of application testing services? \u00a0Yes, folks, the outsourcing talk-track can get a little wearing these days. With 97% of enterprises today outsourcing varying degrees of IT and business support operations, the discussion about effective global sourcing needs to move to areas that have a broader business impact, such as how sourcing environments can help or hinder greater finance effectiveness, or more innovative technology, or better talent development… and especially a more secure, risk-effective global environment.<\/p>\n
It’s this last area we’ve been intensively focused on bringing to the global sourcing\u00a0discussion table – with the onset of Cloud, the additions of new sourcing locations, the political and economic\u00a0instability\u00a0in today’ world, the quagmire or new\u00a0regulations\u00a0and compliance standards.<\/p>\n
I’m personally delighted to unveil a very special talent to the sourcing industry – a respected veteran of the\u00a0infrastructure\u00a0security world and now seeking to ply his knowledge and experience to supporting global sourcing environments: \u00a0Jim Slaby. \u00a0Jim can frequently be found chitchatting with the finest cocktail bar staff in Boston, both before and after (and these days during) a miserable experience enduring the Boston Red Sox. \u00a0Anyhow, without any further\u00a0introduction, let’s hand over to Jim himself to explain why he’s joined HfS and what we can expect to see in the coming months…<\/p>\n
\u201cThe game done changed.\u201d As a newly-minted member of the fast-growing HfS Research team, I\u2019ve been asked to share a few thoughts about my coverage area, Sourcing Security & Risk Strategies. I\u2019m thrilled to have a chance to delve into the area of security and risk as it relates to sourcing, which HfS CEO Phil Fersht has been urging me to investigate since we worked together some years ago. In a sentence, I aim to help buyers and providers to better understand, quantify, and mitigate the security threats in sourcing engagements, and find ways to size and share appropriately the concomitant risks among buyers and providers.<\/p>\n In my Giga and Forrester days, I was stubbornly focused on security in the traditional enterprise data center and network environment. But in my most recent stint prior to HfS, running the security and networking practices at tech research firm TheInfoPro, I spent a lot of time interviewing senior IT budget-holders at Fortune 500 companies. One of the most resonant themes that emerged from those conversations was how their enthusiasm for cloud services was muted by their uncertainty about measuring and managing the associated risk. Time and again, security came up as the number one obstacle by a wide margin among large enterprises to moving to the cloud.<\/p>\n So when Phil called me this summer about joining HfS, the timing seemed right. The research community has not paid enough attention to the intersection of sourcing and risk, which suggests an ugly, multi-car pileup is in the offing there. It\u2019s a hotspot that HfS feels uniquely positioned to explicate. Not to pander like a stadium rocker here (\u201cThank you, Kansas City, you really know how to party!\u201d), but I\u2019m also excited about gaining access to HfS\u2019s subscriber base, the 60,000 highly-engaged business and IT professionals working at the front lines of this issue. Throw in the talent on the HfS Research team (like IT outsourcing maven Robert McNeill, whom I worked with in our salad days at Giga Information Group and Forrester Research), and I feel like I\u2019m not spelunking this particular cave without some very solid backup.<\/p>\n So what are the foundational sourcing security issues that buyers should focus on when evaluating their overall sourcing options and considering service providers? The evaluation framework I intend to build will start with table stakes: assessing a provider\u2019s physical security regime, its mechanisms to quash insider abuse, and its infrastructure for mitigating attacks against the network, the virtualization layer, applications, access controls and mobile platforms. I\u2019ll also be delving into compliance issues across regulatory domains, ensuring we understand where data resides and how it is protected in transit and at rest. In the wake of April\u2019s Amazon EC2 outage, there also appears to be new urgency around understanding provider architectures in reliability and disaster recovery terms.\u00a0 In addition,\u00a0 I will be assessing the global risks of operational interruptions that can be caused by many non- IT factors, such as industrial action, natural disasters and \u2013 perhaps most pertinent today \u2013 political risk.<\/p>\n
\n<\/strong><\/span>\u201cGame’s the same, just got more fierce.\u201d
\n<\/strong><\/span><\/span>The Wire, Season 3, \u201cAmsterdam\u201d<\/strong><\/span><\/p>\n