B2BiQ features personal conversations about the business disciplines of Process Excellence, Shared Services, Customer Experience and Customer Management.
In this episode, Marcus Seibold and Dr Mohsen Seifi interview Brad Keselowski, the founder of Keselowski Advanced Manufacturing. Brad discusses the pain threshold and the need for corporate cover fire in AM, especially when tackling friction points for buyers and programme managers. He explains the delicate balance needed to achieve specs for creating the most cost-effective parts and how to improve confidence with the digital workflow. Siemens Energy is the series sponsor.
In this episode, sponsored by Siemens Energy, Marcus Seibold and Dr Mohsen Seifi interview Vishal Singh, Co-Founder and CTO at Link3D. He covers how to scale the AM business, minimise the risk of production and maximise output by applying learning from the software industry. These lessons give insight into the best economic, business, and cultural practices needed for success in the AM industry.
Success in Additive Manufacturing goes beyond technology. It encourages new ways to think about business governance. Sponsored by Siemens Energy, Marcus Seibold and Dr Mohsen Seifi invite experts to discuss the economics, operational constraints, and the role of culture in creating a successful AM business. Their first guest is Neil Mantle, Director of Manufacturing at Rolls-Royce, with whom we shall delve into the issues around AM with his banker concept and his views on how to build trust and confidence.
Data Scientist Jett Oristaglio joins us to talk about Humble AI. Trusted AI and asks, What is everything you need to trust in AI for your life? He goes on to share that trust is not binary- it’s multi -dimensional - and so, there are a number of criteria that should be evaluated. Performance- or, does the model predict the problem being solving for well- otherwise known as accuracy. Operations- or, how reliable is the system that the model is deployed in. And Ethics- or, how well does the model align with the values of the organization. Of course, most talked about is accuracy in that the model has to be fast enough, has to be stable (have strength). Not surprisingly- all of these aspects, you want in a human decision maker.
Tom Kartanowicz joins us and shares his thoughts on CISO Reporting, Prioritization and the evolution of the CISO journey.
Christine Vanderpool is an Executive Board Member for Cyber Security Hub. She was Inteligenca’s 2019 Woman Cyber Security Leader of the Year and Molson Coors’ CISO before being whisked away to the world’s larges sugar cane refiner- Florida Crystals (which includes Domino Foods). So Christine is certainly an excellent current example of a CISO. Her company is an industry leader, she’s the ultimate cyber security leader at her organization and she’s winning awards for her work. But her background doesn’t add up to what we once understood as a good example of a cyber security leader. She doesn’t have any military experience and “well, I'm definitely an extrovert.” Business case It’s safe to say that the ‘old guard’ of cyber security leaders is not a group of extroverts. “I love to use analogies and storytelling. It's really important for me that my user community, my executives, my leadership, they understand what it is that I'm trying to do. They don't just blindly believe me because I'm scared the bejesus out of them, but they actually get what I'm trying to tell them. They understand what our risks are. They understand how I want to mitigate those risks. And I try to do it in ways that are appropriate for our business at hand.” Budgets In describing her mission, Christine doesn’t use the word technology. And it’s not because she’s some marketing person- her formative years were spent with IBM, Hitachi and SAP technology- she’s a technology person. But she realizes that just talking tech won’t get the job done. As noted, her job is for her stakeholders to understand what she is doing. The Cyber Security Hub Mid Year Report showcased the fact that budgets are mostly flat or down. If Christine was arguing for budget, tech first- she would not find success. Her executives and leadership understand the risks and how to mitigate those risks in a way that’s appropriate for the business because she’s made the business case. Enabling business “I'm not going to buy the latest and greatest gadget just cause it's really cool, if we don't need it. My philosophy is you could take that same budgetary funding and use that on a say marketing project or a product development project that is going to increase your revenue. If your revenues increase, then my bonus increases. So I'm not stupid.” She says she’s not stupid- which of course, is obvious. But that statement actually shines a spotlight on her brilliance. She’s going in to budget meetings and telling her leadership to spend money on product development and marketing based on the confidence she has in the business case she’s made. She is not worried about losing her needed budget. Doctrine In Depth And there’s depth to that doctrine. She does things “that elevate and help the business is rather than just saying no.” As the interview with Bob Turner informed us, she’s leading the Department of Know, not the Department of No. When asked if she’s a BISO- a Business Information Security Officer with a CISO title, she responds, “I wouldn't have a job if, if we weren't doing what it is that we do as a company. I work for a consumer packaged goods organization. So I need to always remember that that is the purpose of why we are here. We are not here because of security. We are here because we make a product that is sold to consumers. And that should be the focus.”
Bob Turner- a friend and Board member of the Cyber Security Hub- as well as the University of Wisconsin-Madison CISO - was kind enough to make some time for an interview. The following is an overview of the past, the present and perceptions of the future cyber security reality. The University of Wisconsin is a research one level university with about 23,000 staff, roughly 44,000 students during the normal part of an old-normal year. This number jumps to a total of 80,000 users overall, when considers affiliates and ancillary personnel which means roughly a hundred thousand end points. Thus Bob notes that the University has a large amount of important research. His resources are focused- he's got 38 full time staff with about 20 students that are supporting governance, risk management, incident response, vulnerability and what they call the common system Cyber Security team- which focuses on the big ERP-type systems, HR, Finance and Student Information. During the March, 2020 migration off-prem- Bob's team was responsible for protecting that research, rolling out the BCP and moving 3,700 classroom courses to online delivery- to name a few initiatives. The BCP did in fact roll out well- Bob was happy with the team and confident in the execution, “the X factor, I think, was trying to understand how many of the different collaboration tools were out there and understanding about those tools that we may not have looked at very close in the past. We had to do that on the fly and we had to do it rapidly.” The Past: Shop in order It was confirmed for Bob and his team that ‘the past’ was secure. There were not issues in rolling out the business continuity plan, which was secure. There were not issues with the systems in place, which were secure. The team continued with business-as-usual, “daily security routines run a playbook and a SOC and the regular pattern and pace of risk assessments and policy management, as well as trying to ensure that our users are aware of issues.” The Present: Work to be done Now 100% remote, with business-as-usual going smoothly, on a dime- ‘the present’ presented a threat matrix, which could not have been anticipated based on the fact that a 100% remote global workforce was not anticipated by anyone. And so Bob and the team “had to put together a provisional policy on how to manage collaboration tools: What do you record? How do you record it? What type of data can you talk about over the air? Do the solutions have encryption in transit and encryption at rest, and is that encryption a suitable standard?” As Bob tells it, beyond collaboration tools, “COVID brought with it a whole bunch of fun, little scams, a lot, a dramatic increase in the phishing attacks, business, email, compromise attacks and anything social engineering happening in real time.” With digital machete in hand, Bob slashed through all of those new issues to ensure that he and his team could take a step back and have a big picture focus on what he’s always focused- people, process and technology. The Future: The Department of Know With a big picture focus on people, process and technology- technology could be construed as your tools and process could be construed as your tactics. Tools and tactics can be improved or replaced to fit better with a new reality. But changing people is a more delicate and more gradual shift. “If it's face to flat screen, not face to face, we need to be able to see the person on the other end and understand if they're stressed or if they're, calm and cool and collected. It's about listening very carefully to those indicators. We have staff who are spending part time as parents which means part time as a teachers and part time as the custodial staff in the house. And, and then they're also working for us.” “So the eight-hour workday is not contiguous. We have to make sure that we're compensating for that appropriately.” Truly understanding the human dynamic on his team is only the beginning. Bob is focused on understanding what each user needs and ensuring that user can appropriately and flexibly do their job with his support. He knows that his job is to ensure access with security. If he blocks access, the user will simply work-around with no security. As the future is now, he knows he cannot make decisions that negatively impact the work of his hundred thousand users. He has to be “thinking as a business enabler.” The department of no must become the department of know.
During this digital summit panel, Suresh Chawdhary, head of security & privacy for Nokia, stresses the importance of a layered, multi-pronged cyber security approach to best protect from phishing and whaling. This layer defense mechanism moves away from a one-size-fits-all strategy, ensuring that everyone across the enterprise is well equipped to stay protected against threats. Three Cyber Security Defense Layers To Consider By baseline testing employees for their susceptibility to phishing, an enterprise gathers statistics and builds an actionable and measurable improvement plan. Even within this layer, different departments are responsible for different deliverables. That means that malware threats and other vulnerabilities will affect separate industries and divisions within that industry to varying degrees. By customizing phishing tests—much like bad actors do—a holistic and accurate pattern emerges. A second layer is to have targeted training sessions for employees so that they understand what is anticipated and expected from them, how to report phishing attempts properly, and how to make sure that they are not processing payments or sending these kinds of sensitive personal information on emails when they get these kinds of emails. A third approach is targets key executives. Suresh warns that this can get tricky. Leadership team members are often global, meaning they’re traveling frequently to meet customers and vendors or participate in seminars and conferences. They also have a multiset of technologies at their disposal. With all these touchpoints, it is difficult for a CSO or an information security organization to inform executives of the varying degrees and types of risks. In this case, Suresh suggests relying on proactive, reactive, and detective controls to safeguard them. Because awareness alone doesn’t cut it for these busy individuals, multifactor authentication mechanisms and email encryption are a must. For example, a two-factor mechanism for approving invoices through email mitigates risk considerably. Things To Consider When Developing A Cyber Security Plan Finance and HR employees are particularly vulnerable due to their payment processing duties. An email spoofing the head of finance or the CEO may expertly convince an employee to urgently transfer money at the click of a button. The possibility of getting that money back is nearly zero. Additionally, HR has a massive amount of sensitive data at their fingertips. Data is the new oil in the cyber crime industry. All it takes is one slip or a single lapse in judgment for a breach to expose personal data so sensitive—such as credit card and social security numbers—that it creates a lawsuit or enough bad press to devastate an organization. Examining the big picture and important factors of an organization helps build a plan that fits the company in terms of cost, risk profiles, and the size of the organization. Considerations may include: Cloud service encryption packages Appropriate number of training sessions per year Regulations and limitations of certain technologies across different geographies A security plan isn’t going to be the same across an organization. Still, there are certain baseline technologies that build the foundation of security—namely an antivirus solution and a personal firewall for every employee across the globe. While email encryption is a nice-to-have for all employees, it is a must-have for people who are prone to whaling attacks, including the C-suite and leadership team. Other departments to keep in mind for customized control mechanisms are finance, HR, legal procurement, and suppliers. It is important to have a combination of proactive and reactive controls when dealing with these hidden enemies. Advanced Persistent Threats The obvious goal to a phishing or whaling attempt is an immediate financial gain. However, an advanced persistent threat can do much more damage. In this scenario, a bad actor gains access to an organization’s network by confiscating credentials. Once inside, they can find and extract data while remaining undetected for long periods of time. Of course losing money hurts, but the loss of IP like propriety algorithms or software can be a nail in the coffin. The Business Case For Proactive Controls Suresh estimates that only about half of all organizations have a solid baseline of security, although that estimate goes up to about 80% for middle and large sized companies. Unfortunately, too many companies make significant investment into cyber security reactively. The ROI and business case for a primary, proactive cyber security strategy often isn’t obvious until it’s too late—that is, a breach has occurred. It is a CSO’s job, then, to build and communicate a strong business case around why a security technology investment is worth it. Also, while training is a worthy and necessary investment, humans are only human, and phishing and whaling attempts will sometimes work. That is why a CSO must argue for build-on reactive honeypot technologies. Honeypot is a security mechanism that deploys within a network and spots malicious traffic patterns in an out of the network. Honeypot can be set up to divert traffic to particular devices that slow the traffic down and even forensically investigate the source, destination, and the TCP or UDP port numbers. It identifies the types of files and time of the breach as well. Closing Thoughts Suresh closes with a reminder for CSOs: they are responsible for not only protecting and safeguarding critical information assets, but also to mitigate these kinds of threats that might be underpinning on certain specifics or functions. Beyond security talent, management and business skills are required.
During this digital panel session, Jim Brady discusses real-time change in incident management. His extensive experience in a multitude of security roles throughout his career means he has seen a lot of changes in the healthcare cyber security field. Naturally, the latest change to make its mark is the new remote work environment COVID-19 has deemed nececessary. A New Reality in Cyber Security In the past, incident response plans are created and workshopped on location—in the case of healthcare, at the hospitals, command centers, etc. Now, with most of IT, the administration staff, and even doctors working remotely, new considerations must be taken. Now that vendors, legal counsel, and staff are working from home, are they vulnerable to new threat actors, or are the bad guys giving healthcare a break during this global pandemic? Unfortunately, opportunistic phishing scams are increasing as the world is combatting COVID-19. For example, some phishing attempts run under the guise of PPE equipment vendors. Additionally, while telehealth works as a good alternative to in-person doctor appointments, is it secure? Three Main Threats A well, executed cyber security incident has the possibility to severely disable or even take down organizations. In the healthcare field—especially during this time—it is imperative that hospital doors remain open. CSOs are especially on alert for the following three threats: Data breaches Ransomware and wiperware Medical device and IoT tampering There are a few key things CSOs can do to effectively mitigate these areas of vulnerability. The first challenge is managing the environment remotely now that key security staff is working from home. System access needs to be the same as it was onsite. Home networks require an appropriate amount of bandwidth and the right VPN access must be granted. Home workers need the proper security for their home router firewall. Incident Response Plans A holistic cyber security plan not only works to prevent incidents but respond to them as well. In the way that fire departments educate on fire prevention while also maintaining the ability to put fires out, responding quickly to a breach is imperative. For example: Knowing who to go to if a critical IT system needs to be shut down Knowing who the decision-makers are and having their contact information up to date and accessible Creating a communication plan across departments that includes at-home employees’ contact hours and preferred forms of communication. Keeping contact methods such as video chats on secure platforms Architecting a command center is difficult enough on prem with a team. It has only gotten harder with everyone spread out remotely. A communication grid helps clarify who communicates what to who. The C-suite needs regular high levels of communication. Clinicians on the front lines delivering care need access to the technologies that are required to do their jobs. Educating the administration staff on how to stay safe at home is also imperative. These non-technical positions are more prone to insecure home network and firewall setups. BOYB devices must not be used by family members or left insecure. All of these things need to be considered when developing an incident response plan during this pandemic. Staying Physically Safe While Keeping The Network Secure The health and safety of employees is also tied closely into cyber security. For example, is there a contingency plan if a large number of IT staff get sick? Are hospital-issued laptops and repurposed IT equipment disinfected properly? Are vendors shipping safe goods? If a cyber security attack affects technology tools at a hospital, who retrieves that device for forensics purposes? Do they have protective equipment to keep them safe? All of these considerations must be a part of an incident response plan. The business and IT side of healthcare banded together and willingly risked their health to set up the technological side of medical tents and drive-through testing. Jim considers the possibility that such a positive and efficient crisis response will set an impossible precedence in the future. Healthcare After COVID-19 If ever there were a silver lining to Coronavirus, long-term healthcare changes going forward may be it. Traditionally, healthcare is an industry that lags behind in technology adoption. Telehealth--a method of healthcare that brings down cost and increases patient satisfaction—will be the new way forward. Jim expands on this idea before answering live-audience questions.
Jamal Hartenstein is prior unified security management (USM) in military intelligence. He’s worked with the department of defense on military bases, as a part of joint task forces and has experience with every branch of service. He’s helped with cyber security and data privacy initiatives for hospitals, federal agencies, pension funds and other private sector industries. The Past: Not best in class Jamal is wary of thinking that everything was ‘wine and roses’ prior to the global pandemic. He’s aware that some organizations had it right- they were leading edge thinkers as far as cyber security. But most organizations were (by definition) not best in class. “The reality was that the threat vectors were more so contained within an enclave or an enterprise of a known like end points. There was easy to wrap your head around BYOD or CYOD policy. There was a CMDB [configured management database] that was probably accurate at one point but that’s if you were a mature enough organization.” The Present: Not prepared And so even if you’ve gotten to today without a major breach Jamal points out that with a completely new and 100% remote technology stack, “there is not an understanding of what data is entering our enclaves or enterprises.” He quickly follows that there is also not a complete understanding of where it's entering from via what equipment. That ‘completely new’ terminology is not for all, but it’s for most as, “not every organization was capable or mature or had a sophisticated remote work toolkit in place.” This has all lead to a threat landscape that has “expanded exponentially.” It’s not that Jamal’s outlook is bleak; he’s just concerned that those that have not been subject to major incidents do perhaps not understand the past correctly which means that they’re not dealing with the present with a suitable approach. He focuses on a would-be executive who feels that they remain prepared for CCPA or GDPR because they just had an assessment done in January. “Well in January, your work from home workforce and your threat landscape was dramatically different.” Beyond dealing with the traditional issues associated with a breach, “the settlements and fines and fees or payouts after data security, breach litigation are oftentimes much more than the cost of remediation or mitigating audit findings or a Cyber Security assessment. The Future: Still time to improve Jamal’s industry assessment is that there are some that have not felt the actual tectonic shift that’s occurred for humanity and thus, cyber security. His point is that everything is different now- whether you feel it yet or not. And so, with that understanding, he parts with... Five Pieces Of Advice Investigate new forms of data protection Ensure you have multifactor authentication Focus on encryption at deeper layers in the OSI model Realize the protection data in transit and data at rest Revisit your mitigation factors The bottom line- prepare yourself to address the new threat vectors on your new landscape
Robert Welborn is the Director, Data & Data Science for General Motors. As he sees it, global corporate enterprise has- for the most part, seen data as a luxury, “we'll get to reporting when we get to reporting, we'll upsell, we'll monetize.” Not that monetizing is a bad thing, but Robert’s point is that we haven’t been using data as the ultimate element of decision-making. Sure- data-driven decision-making has occurred, but not to the extent of managing enterprise existence. The global pandemic had a particular effect on Robert’s company. For over 100 years General Motors manufactured motor vehicles. Then on April 8th, 2020- General Motors became a ventilator manufacturer. What used to be a fun data dance that Robert and his team would do privately suddenly became precision choreographed ballet of the highest order with every decision-maker involved. “What we had used as a luxury before suddenly was driving everything. We're having conversations with our suppliers, with the UAW and with the plants showing them through data what we're going to do next.” And the data told them just what to do. Robert and his team were seeing vehicle-level data as the pandemic burst across the globe and made it’s way to the East Coast of the United States. “The data is saying we can shut down. And the data that we're getting from the state of New York in specific is saying that we, if we were doing anything right now- we should be building ventilators. If there's anything that we would do, we should build insulators and we should build masks.”
Max Just has been talking about the Future of Work for quite some time. We now all know that the conceptualizing Max had been doing paid off in immediate fashion as the Future of Work is here.
Elan Frank from Slack joins us and shares that the tool began life as a side project of another initiative. It's grown to be a true alternative to email. Channel based messaging is built for the future of work and as we discuss, the future of work is here, now.
This BFSI Panel features key industry experts who share their strategies around pushing their organization into the future. They note that the technology available is user-friendly and rarely the barrier to entry. It is the mapping, the process, and post-implementation that makes or breaks a digital transformation. Agile development and change management are both initiatives that work. Automation has the potential to save time, money, and improve the customer experience, but if it isn’t applied in a purposeful way, it is useless. The panelists share their personal journey through transformation, offering insights and advice along the way.
Fred Reichheld joins us again, this time to discuss employee engagement. The business benefit to ensuring a positive employee experience is because that translates to a positive customer experience. As Fred discussed last time, a good customer experience means an increase in profit. However, Fred is careful to clearly define what make a good employee experience. Is it lots of vacation time, the ability to shirk difficult customers, and taking on only the best shifts? Of course not, as this would lead to a bad customer experience. Fred instead focuses on “helping your employees lead great lives of meaningful service.” Technology is used as a tool to automate unfulfilling tasks that humans used to be responsible for. In turn, human talent is freed up to inform, innovate, and provide meaningful change to the customer experience. Finally, Fred makes suggestions on to achieve such a lofty goal. Ultimately, Fred says, “I think what inspires people to do their best is when they feel like they are being listened to, they have a voice, and that the team is consistently being put in a position where they can enrich the lives of customers and see that as the core purpose in their work.”
Max Just is accompanied by a special guest on this episode of Future of Work. Julie Seitz is an expert on all things workspace, which makes her the perfect partner for the topic of—you guessed it—the future of workspaces. While she notes that an enterprise can’t necessarily futureproof themselves in this regard, she encourages them to get out of their insular spaces for the sake of spotting trends in how people are working in universities, airports, etc. Flexibility and simplicity in a workspace make more practical investments than technological ones that will become outdated. Julie also reflects on the evolution of the public school classroom and how examining that process helps illustrate how different generations work differently. Max jumps in with the ah-hah moments he had while working with Julie, including the importance of providing collaborative workspaces for collaborative work. Ultimately, Max and Julie agree: workspaces matter.
Fred Reichheld, the creator of the Net Promoter System (NPS), joins us to discuss the task of building a customer-centric culture. Companies that do the best at enriching the lives of their customers are growing two-and-a-half times faster than their competition. Today, word of mouth and truth spreads like wildfire. The modern enterprise can no longer depend on clever advertising campaigns to mask their shortcomings. Building a customer-first culture isn’t always easy, though. Legacy companies have to fight through their capitalistic pasts. Metrics need to change. Shareholders must get on board with the new nature of business. The Net Promoter Score is successful because it provides data that proves the effectiveness of customer-centricity to the bottom line. It is a modern-day metric that replaces the ones that no longer serve today’s landscape. Fred offers both suggestions and examples on how to successfully pivot to a customer-centric business model during this insightful conversation.
Gary Pilacinski, director of business process improvement engineering with LA Care Health Plan, discusses the importance of cultural transformational change. From start-ups to legacy organizations, Gary stresses how critical culture is for the success of an enterprise. One common stumbling block to a successful culture change is a lack of buy-in from the C-suite. Conversely, if upper management sees a need for change but doesn’t effectively implement it, employees who have been with the organization for years—or decades, even—may get stuck in their ways. If that is the case, empowering frontline staff is key. Gary discusses ways to do just that. He also elaborates on how he is working to implement Lean and PI within his organization and how healthcare at large can approach the same issues. Hint: training the trainers is key. Change is uncomfortable. But with transparency, engagement, and most important, keeping the interests of the patient front and center, Gary believes Lean culture transformations are not only possible, but necessary for the success of the healthcare sector and those it serves.
Roland Haefs, with Henkel, discusses enterprise evolution and the shift from having purely transactional relationships to becoming a true business solutions provider. It takes strong leadership and an entrepreneurial spirit to pull off such a transformation, which Roland details. In order to demonstrate his point, Roland lays out Henkel’s approach to the shared services process of master data management. Next, the conversation turns to RPA and AI more specifically, including its role in shared services and how to make sure it is being deployed effectively. Further, Roland discusses Henkel’s four business priorities: fund growth, drive growth, excel at digitalization, and increase agility.
McDonald’s senior director of innovation, Deena John, joins us to talk about digital transformation. While definitions vary, Deena describes digital transformation as “transforming through integration of technology” with the goal of generating maximum value for the customer. End-to-end disruption means looking into the future and creating a transformation road map that leads to a new operating model. Deena discusses the differences and similarities between agile and lean, and the iterative process that makes scaling sustainable. Deena frames her key points with specific examples. Next, she asks and answers the question, “In an innovation culture what’s the importance of failing fast?” Ultimately, this insightful conversation with Deena focuses on the future of the enterprise and what needs to happen now to ensure corporations can keep up with the ever-changing landscape that technology brings to business.
Karen Tilstra is the co-founder of the Florida Hospital Innovation Lab. In this conversation, Karen emphasizes the intent of the Innovation Lab, which, not surprisingly, is innovation. However, the process to innovation is often overlooked. Karen describes it as a “multifaceted journey of learning, of discovery, of openness.” In other words, innovation isn’t instantaneous, nor does it happen in a silo. When a brand thinks they know what’s best for their customers—instead of interacting with those customers—it’s often the beginning of the end. Karen details Sears’ downward spiral as an example. Next, Karen questions the value of the typical enterprise growth mentality. Is “grow or die” a myth or a reality? True, meaningful innovation involves the application of certain soft skills that aren’t immediately apparent. Karen drives their importance home in this insightful, outside-of-the-box conversation.
Gerald Lackey, VP of Business Optimization and Agility at GAF, discusses their 18-month journey into their current transformation. Gerald is no stranger to enterprise transformations, having participated in a few himself, but he outlines a few unique strategies GAF is taking. For example, GAF is especially focused on business outcomes for their customers. That means that instead of creating a solution and selling it to customers, they are learning about the needs of their customers and creating solutions that fit those needs. Gerald describes this new strategy as a combination between the traditional top-down method and a social movement that involves everybody. Tapping into the entire workflow through internal social media is one strategy GAF employs to create a culture of customer centricity, inclusivity, and change. Gerald dives deep on other unique transformation strategies that meet people—internally and externally—where they are, instead of attempting to force change. Corporate stumbling blocks are more often than not a cause of “people problems.” Gerald wraps up this discussion by explaining how GAF’s agile approach helps navigate those problems effectively.
Dmitri Popov, global service management lead for Mann + Hummel Group, joins us today to discuss scaling RPA. Dmitri himself admits that such a process is painful, in part because of the few successful enterprise examples for which to model after. Dmitri points to IBM as a company who has done it well. Next, Dmitri discusses how to leverage shared services in the most efficient way, exemplifying R&D and certain purchasing aspects. One of the most difficult components of implementing RPA across the workflow is acceptance and adherence. Dmitri doesn’t mince words when it comes to what it takes in a person—not just an enterprise—to accept change, no matter how positive that change may ultimately be.
Todd Gillam joined Comcast a decade ago—when the word “Comcast” was met with severe negativity. During the first part of our conversation with Todd, he laments over those dark days and discusses the progress they made the first five years after he was hired. They cleaned up their image by addressing common complaints such as hold times and technician effectiveness. Stage two involved systematically identifying and fixing a broader range of customer pain points by utilizing NPS surveys. By combining the operation end of things with the product, Comcast is offering a single digital interface solution across its offerings. Todd gives a few clever examples of what this entails. Finally, Todd asks and answers three important questions: How does Comcast build something and make it useful to the customer? How do you make that work with the rest of the company? And finally, how does Comcast achieve a higher state of existence with respect to customer experiences that feel like a seamless part of the product?
Peter Van Den Heuval, product manager with Shell, is better known internally as Peter PI. In this conversation, he explains the origin story of his nickname, a nod to Shell’s use of OSIsoft’s PI System data infrastructure. Shell has been ahead of the data game since 1996, as they understood the long-term implications of real-time data and looked for a platform to store and analyze that data. PI fit the bill. Now, as technology and processing power has bumped data into the next frontier, Shell applies advanced analytics to the massive amount of data they’ve collected. Peter shares examples of complicated calculations they benefit from due to big data and real-time process analytics. Next, Peter explains how Shell plans to implement IoT in order to collect meaningful data for predictive analytics that leads to actionable change. Peter also explores the soft skills involved in staying passionate about data and its power. He enables Shell’s workflow the ability to take action on data by simplifying the data process through PI. Ultimately, creating a safe, effective product is Peter’s motivation.
On this episode of “Tomorrow Today,” Barbara Hodge discusses the power of continuous education. With the turn of the decade, Barbara decided to make some changes to her own learning path. She is fully open to, and expects, new insights from her new experience to spill over into the way she works. On an enterprise level, global corporations also expect talent to continuously peruse new avenues of education. Today’s ever-evolving landscape requires it. Next, Barbara discusses avalanches—both literal and metaphorical—and what they teach us about decision making and risk taking. Ultimately, Barbara’s point is this: if we’re open to new ideas from anywhere and everywhere and tie those ideas back to what we’re doing in our day-to-day, we benefit. Driving the conversation back to AI and technology, the lesson of the day is this: Diversity of thought prevents common pitfalls such as bias and instability.
Deepak Subbaru joins us again, this time, to discuss unstructured data. The recent explosion in technology inputs has raised the bar for customer expectations. They want more, and they want it now. Requests are coming via phone calls, social media, emails, etc. The product of this feedback is unstructured data. Deepak goes in depth on three actionable steps to take in order to leverage the power of unstructured data: know your data, know the sources of your data, and prepare your data. Next, Deepak discusses the importance of defining outcomes for your data, as opposed to cramming data into an algorithm and receiving an output that has no use case. As Deepak reiterates throughout the conversation, context is key.
Uzair Rashid, with CVS Healthcare, explains the importance of structuring innovation. Uzair brings a unique perspective to CVS, a Fortune 10 healthcare innovations company, because prior to CVS, he spent many years as a consultant. He understands how to level set and create meaningful change in legacy companies. When it comes to healthcare disruption, Uzair puts it this way: “Innovation at the speed of regulation.” Uzair’s goal is to seek out key technology enablers that create new patient experiences, drive down cost, and take the challenge of resource contention out of the game. By leveraging technology in conjunction with traditional medical resources, the healthcare system can clean up the funnel of patients who are better served with these new innovations. First, as the patient must take priority, it is imperative we understand the narrative of what they want. Then, we can power that with data and connected devices. The more proactive and preventative healthcare becomes, the healthier people become, the better healthcare becomes. Uzair summarizes the process beautifully with this simple phrase. “[With technology], you think about routing people appropriately to care.”
Intel’s Steven Remsen made the cross-country trip from Portland, OR to Orlando for OPEX Week. We caught up with him to discuss process mining. Steven starts out with a quick history of a few special algorithms before noting the strengths of traditional mapping methods. As a practitioner, he understands the three basic steps of process mining from the academic space: discovery, conformance, and enhancement. Steve’s science background sets him apart from some other data scientists who see the black boxes of AI as collateral. Steven looks under the hood. After all, he notes, finding an AI solution to a business problem isn’t enough—it must be the correct solution. Next, Stephen shares a multi-million-dollar solution to a bottleneck in Intel’s fabrication process that was achieved through a quick and easy process mining activity. Next, Steven drives home the backbone of any successful AI implementation: people. In order to process mine in a holistic way, as Steven says, “It’s always people, process, technology.” He demonstrates this point with one more fantastic story about how data won’t work together if people can’t.
Reka Mishra is the managing director of the transformation office for the SVB Financial Group. She lays out the basics of mergers and acquisitions before diving in on operational excellence. For M&A, it is imperative to have a target operating model in place. That model must consist of four key elements: people, process, technology, and data. Change management, communication, and HR must also be involved from the onset in order to best address the concerns of the employees. When M&A happens for the sake of digital transformation, it is especially critical that the enterprise is sensitive to the human element. Reka explains how to strike the right balance in order to make the transition as smooth as possible. Mergers and acquisitions aren’t a one-and-done, and they must lead from the top. As Reka says, “It's absolutely critical to get all the executives aligned and in agreement because then you can have a very clear path forward, and then you know you're meeting everybody's expectation. And also it's helpful in them communicating to their employees what's happening at an organization-wide level. It's a consistent message. It's a consistent buy-in.”
Heather King is the managing director for both the Shared Services & Outsourcing Network and the Intelligent Automation Division for the Americas. She oversees a team that puts on the dynamic events of relevant content for the industries of the same name. Having been in her role for the past seven years, Heather gives a brief timeline of the creation and growth of the IA series that was born out of SSON. The term RPA first presented itself in 2014 during a panel session and kept cropping up until Heather’s team decided to give it its own plenary session. It was just a matter of time before it became clear that automation needed its own home outside of SSON, and IA was born. Next, Heather goes into detail about the other conferences her team puts on each year, including the largest shared services event in the world, Shared Services & Outsourcing Week. Her passion for the importance of conferences—and the act of conferencing—is as clear as it is contagious.
The entertaining Genworth Financial team joins us from OPEX Week 2020 to tell us their enterprise’s transformation story—or journey, more accurately. Kathleen starts off by explaining her view of the company 15 years ago: “It was a very siloed organization. It was very much command and control; very hierarchical. We were focused very much on our processes, like manufacturing, because we came from GE.” Sometimes, as Martijn is quick to interject, they were focusing on the wrong processes. Their new goal was to focus on the customer and increase associate empathy. The leadership team achieved this with some creative physical props that mimic certain hardships their clients experience. However, leading by fear negatively impacts the service a customer receives as well, so Genworth devised a new workforce strategy. “If you really truly believe that the customer is the most important person--because he or she pays your salary--then the front line employees are the most important people, and therefore, your team leaders are the most important leaders. Most people leave their leader. They don't leave the organization.” The team details how they achieved this monumental task.
Joe Jordan joins us from OPEX Week in Orlando. As the director of operational excellence for Edward Jones, Joe sought inspiration from the hit TV show Shark Tank to give a platform to the innovative minds of Edward Jones. If anyone across the firm’s workflow has an idea about how to transform their part of the business, they are given the opportunity to present it to the C-suite. If the idea ultimately increases Edward Jones’s ROI, the C-suite signs of on funding the technology that bring the idea to fruition. It’s an exciting opportunity for voices across the company to be heard and is a win/win for morale and profit. Over the last year, they’ve held about 15 of these Shark Tank sessions and have signed off on 100% of them. Joe explains exactly how the process works and provides a few simple yet powerful examples, from automatic signature verification to RPA processes. Finally, Joe explains what they look for in an employee with the acronym BLT: that is, business acumen, leadership, and technology. Ultimately, the firm’s focus on a growth mindset across all verticals of the organization is what keeps Edward Jones as an industry leader.
Adrian Terry, VP of GM Financial’s OpEx function, discusses their unique approach to IT and RPA. Initially, IT had some processes they wanted to automate. From there, a pilot was developed. It soon became clear that the broader organization could benefit from similar processes, so GM onboarded their own RPA business automation talent. Now, IT and RPA have been conjoined. While each department still has their direct leadership, the “two headed monster” reports to a governance function. Next, Adrian details the execution and benefits of the pod model they’ve developed. After Adrian explains the structure, deployment, and communication aspects of the design, he talks scale. Finally, after briefly touching on some growing pains of the transformation, Adrian sums up the meticulous, thought-out execution of the pods and the future of the business. Adrian doesn’t do anything unless he does it well.
Dr. Ayanna Howard is a chair of the School of Interactive computing at Georgia Tech, an academic, and a startup founder. While her talents are as vast as her pursuits, she sums up their relation as interactive computing. In her words, “Interactive computing is really this theme that the human is center to everything that we do when we think about computing and artificial intelligence.” Dr. Howard pursues interactive computing for the greater good, including robotics in healthcare and education. She also discusses ethics in computing, including privacy and security.
James Dodkins, Customer Experience Expert and heavy metal enthusiast, discusses the parallels between the two. First, he touches on the cyclical nature of refining a product to please its audience. Whether it’s music or tech, improving upon the output based on feedback about the original product moves the needle forward. At the same time, innovation flourishes in a space void of customer input. The secret to balancing these two conflicting strategies is interpreting feedback to anticipate an unarticulated need. James then weighs the pros and cons of niching down and gaining a hardcore audience or going broad and creating a product that is widely accepted but lackluster, somehow tying in a relevant Nickleback reference. Ultimately, James boils it down to this: “We need to move away from this Industrial Age process standardization mindset and towards a 21st Century customer experience, personalization mindset. Embrace that variation. Understand that people are all different. They have different outcomes, different needs. Make sure that our companies are aligned towards the delivery of those things. Boom.”
Angie Fearn comes to us from OPEX Orlando to discuss diversity of thought and its importance for enterprise. While diversity has become a loaded buzzword, Angie refocuses its compass around the way different people come with their own set of skills and capabilities. As a leader—and a human—it is natural to want to hire people who look and think like you. It takes an insightful leader to actively diversify their talent in order to fill in the gaps that exist within the leadership team and the enterprise at large. Angie explores the differences between subject matter experts and soft skill experts. Balancing the two in a way that makes sense ensures that employees are ready for the future of work, while still bringing their current expertise into the role. Angie offers several in-depth examples of transformation done right, what the future of the workforce looks like, and the role AI plays in it all.
Barbara Hodge reflects on 2019, identifying the trends that shaped the decade. Data, self-service, and automation has affected us all. A new awareness of personal data and its power—for good and for evil—came to light, for example, with the Cambridge Analytica scandal. At the same time, all of that data that has been given and taken has made surprisingly little headway within industry, as enterprises grapple with how to funnel it into tangible action. While it’s easy to sensationalize the negative, Barbara reminds us that GBS and automation has made our lives easier. Barbara explores the automation ideal: a world in which we’re free to pursue our passions because the difficult work is done for us. It’s easy to take progress for granted and worry about the side effects of that progress, but Barbara is hopeful that this Fourth Industrial Revolution will lead humanity into a new era of innovation and inspiration.
BitCherry’s Paul Bao explains the blockchain process behind the platform’s commercial applications. Working similar to Amazon’s eCommerce model, BitCherry will offer a platform to buy, sell, and network goods using digital currency. Regulatory roadblocks make penetration in the U.S. difficult, but BitCherry has over 2 million members and 120,000 active daily users. Currently, these users simply buy and sell digital currency in anticipation for BitCherry’s retail applications. Bao expects the retail platform to go live in Q1 of 2020. Next, he details the brainstorming process behind BitCherry’s unique independent investor philosophy and marvels over the future implications of blockchain. While he may be a little ahead of his time, BitCherry’s users prove that there is a lot of faith in the future of eCommerce and digital currency.
Malta, a small European island, is quickly becoming a blockchain hub, and thus, accurately nicknamed “Blockchain Island.” This panel discussion delves into blockchain developments, standards, and laws. Malta’s progressive, global view of blockchain implications has allowed Blockchain Island to progress in a healthy, robust, safe way, complete with governance and legislation. The panel shares the infrastructure that has led to its success in the hope that others will implement a similar solution. With an end goal of international blockchain standards, a panelist sums up this discussion nicely: “We anticipated the need to regulate blockchain technologies, and that was while everyone else was focusing on the cryptocurrency aspect.” “The ISO standard is starting. So, the ISO standard is anticipating other jurisdictions, and it's starting to look into what it means to regulate blockchain technologies or standardize blockchain technologies.”
Tom Trowbridge is the former president and one of the founders of Hedera Hashgraph, a distributed ledger technology. He is also an avid investor and advisor in the technology space. Hedera’s governing council consists of companies like Nomura, Deutsche Telecom, IBM, Boeing, and Swisscom. Tom notes that Hedera met with the Facebook Cayenne team in 2018—they did not join. A year later, Facebook announced the digital currency Libra and its accompanying—but separate—digital wallet, Calibra. Tom has studied and followed the digital currency phenomena in great depth and puts blockchain technologies in perspective—including the strategy Facebook may deploy in order to get users on board with its digital currency. Will the Zuckerberg Reserve give the Federal Reserve a run for its money? Tom has thoughts on that as well.
Kexin Xie is a data scientist for Salesforce. Among other things, Kexin is responsible for building the engineering infrastructure, services, and frameworks that makes the Salesforce marketing cloud so powerful. In this conversation, Kexin discusses how the power of predictive analytics is leveraged in businesses for “next-best-action” interactions. While these tools drive more engagement and revenue from the customer side, which Kexin touches on, he dives deep on how data science makes this possible. Kexin makes the intangibles tangible by describing the process by which algorithms are designed—including some pitfalls to be aware of—and recognizing “valuable noise.” Kexin is a realist, though, saying, “There's the use case part, there's the data part, and we're trying to build a bridge between the end solution and how we get there from the initial raw form. Eventually, we’ll start to understand the raw data more and start to build even more pipelines and then see how they connect with each other; their commonalities. And eventually, I think the bridge will be formed, and then building new things will be much easier than the initial use case.”
Max Just is accompanied by a special guest on this episode of Future of Work. Julie Seitz is an expert on all things workspace, which makes her the perfect partner for the topic of—you guessed it—the future of workspaces. While she notes that an enterprise can’t necessarily futureproof themselves in this regard, she encourages them to get out of their insular spaces for the sake of spotting trends in how people are working in universities, airports, etc. Flexibility and simplicity in a workspace make more practical investments than technological ones that will become outdated. Julie also reflects on the evolution of the public school classroom and how examining that process helps illustrate how different generations work differently. Max jumps in with the ah-hah moments he had while working with Julie, including the importance of providing collaborative workspaces for collaborative work. Ultimately, Max and Julie agree: workspaces matter.
NASA’s Pam Wolfe joins us to discuss their RPA journey, which started over two years ago in their Shared Services Center. Establishing RPA governance across NASA has taken time, strategy, and strong support across the agency. In many ways, NASA’s move to RPA is very similar to the typical enterprise, but let’s not forget—NASA sends people to space. In fact, a recent decision was made to send astronauts to the moon and Mars by 2024. In order to reach their goals, NASA went through a cultural and digital transformation shift that received a high level of support from the top—which Pam defines as a necessity. Naturally, governance and security is of the utmost importance during this transformation. Pam shares some astonishing numbers in regard to their progress while laying out a path for the lay-enterprise, if you will, to accomplish similar workflow evolutions.
In this episode, IEEE’s Lee Coulter discusses the notion that the future of every successful company will depend on its transformation into a technology services business—even the local pizza joint. This far-reaching conversation covers the entirety of the current “data chasm.” Lee kicks the discussion off by justifying his aversion to the term RPA. He notes that organizations start with task automation before moving onto intelligent automation, a process that gets lost in the blanket term RPA. Lee says, “Where we are today and what's now happening is that the tool makers and the advanced practitioners are beginning to interact with unstructured data and expanding the use case to now include unstructured data. There's several different specific scenarios in which that occurs. Service initiation almost always begins with unstructured requests, like to a call center or chatbot.”
Kenneth Farrugia is the chief business development officer with the Bank of Valletta. Kenneth starts this conversation off with a bang, making the case that if banks don’t stay on top of the technological revolution, they run the risk of becoming irrelevant. Next, Kenneth, perhaps counterintuitively, labels legacy financial operations who’ve jumped on board with Industry 4.0 as FinTechs, while the up-and-comers are TechFins. Of course data and security is a big part of the conversation as well. Balancing the convenience of turning over one’s data with the risk of data breaches and/or privacy concerns is on the forefront of every financial institution’s mind. Kenneth discusses additional pain points to the future of banking, both for the client and corporation, and potential solutions for those pain points.
Juan Araya discusses structuring for scale from the eyes of the disruptor and disruptee—both of which Juan knows well. Juan reminds us that before making any actionable change, an end goal must be set. Next, Juan discusses the role speed plays in structuring for scale. Some industries need to move faster than others, which affects their decision making. In the case of Uber, Juan understood that transformative technology supported the speed of change Uber strived for, even more than the other scaling components: people and process. On the flipside, scaling legacy organizations quickly and through technology-first means isn’t conducive to success. His new role with Stryker moves slower and with an enterprise-wide intention different than Uber’s, which Juan details well. Finally, Juan paints a metaphor between scaling and art.
Robert Welborn joins us again for the second part of autonomous vehicle myths. During this discussion, Robert compares the vast and critical differences between the capabilities of today’s math and the necessity of developing tomorrow’s math before fully autonomous vehicles are a safe, mainstream option. He parses out the weakness in today’s autonomous vehicles. For example, converting visual information into digital information and then trying to extract features from that before making a decision off of those inputs. As one could imagine, and as Robert so vividly depicts, there are issues—namely safety—in expecting a computing system to respond quickly and correctly to the infinite numbers of inputs it may receive. Robert closes the discussion with a few viable ways of progressing the technology.
Dmitri Popov, global service management lead for Mann + Hummel Group, joins us today to discuss scaling RPA. Dmitri himself admits that such a process is painful, in part because of the few successful enterprise examples for which to model after. Dmitri points to IBM as a company who has done it well. Next, Dmitri discusses how to leverage shared services in the most efficient way, exemplifying R&D and certain purchasing aspects. One of the most difficult components of implementing RPA across the workflow is acceptance and adherence. Dmitri doesn’t mince words when it comes to what it takes in a person—not just an enterprise—to accept change, no matter how positive that change may ultimately be.