Tag: Europe

Advocating for IT Innovation in an Evolving Market | Blog

The biggest advocates for information technology transformation can come from inside your organization. Internal IT innovators can spark business growth and evolution. Learn how having employees as innovation champions can benefit your company in this blog. 

With companies increasingly relying on IT post-pandemic and through the current macroeconomic headwinds, innovation is vital to continue pushing the business world forward. Having employees as IT innovation advocates can help your company attract talent and optimize efficiency. While it may seem like a big undertaking to tackle, let’s explore how employees can play this important role in organizations.

How can IT organizations become more innovative?

Leadership alignment and buy-in can inspire innovation and make IT organizations more effective. Technology should enable and act as the catalyst for business objectives – not the end state. Organizational leadership should align on objectives. Executives responsible for IT and digitalization who report to the board and executive committees, such as CIOs and CTOs, should sponsor innovation initiatives.

Implementing contextual metrics for progress is another focus of innovation. Because IT organizations often are viewed as cost centers, they are typically measured on efficiency and policy only. As technology fundamentally enables new business models, organizations need to ensure they are using purpose-led metrics. Everest Group recommends using different metrics based on the objective, such as time to implement systems, improvement in customer onboarding scopes, and automating back-office processes that measure efficiency, and customer experience and new business model innovation that track growth. We believe IT is becoming an enabler for growth, through Systems of Growth thinking, Agile governance also drives innovation in IT organizations. Given the rapid technological change and disruption, IT organizations cannot be static. A cross-functional leadership team should re-examine IT organizations frequently to ensure they remain aligned to their “North Star” and quickly learn from mistakes and course correct.

What benefits come from being an IT innovator?

Innovative-driven IT organizations benefit in three main ways. First, organizations can respond to customer needs faster. More and more, an organization’s ability to use technology determines its success in a fast-changing environment as customer preferences and consumption patterns evolve.

Second, IT innovation improves the ability to attract the right talent. As Gen-Z (and beyond) become the primary workforce that organizations try to attract, they must provide the right tools and infrastructure to make the employee experience a key part of their value proposition. This is also the key to managing attrition and creating belonging in the workplace.

Lastly, IT innovation allows organizations to stay ahead of compliance and security needs. With the ever-evolving regulatory environment, using purpose-built technology can help organizations become resilient and secure. As a result, organizations can avoid brand, reputation, and financial loss.

How can IT leaders convince their business counterparts that it’s important to fund innovation?

Creating internal advocates and champions is vital to IT innovation. IT should seek greater feedback from internal and end users to create a distinctive business case. Beyond that, individuals can start promoting IT innovation.

The first way is to speak the language of business. IT enables business growth and innovation — thus, it needs to be referenced in the same context. Framing technology investments as anchored to growth, efficiency, and resilience will enable a wider cross-section of organizational counterparts to understand its impact.

Another avenue to garner support for IT innovation is to regularly report results. IT leaders shouldn’t wait for end-of-year results or budgeting cycles to showcase progress. They should do this quarterly or more frequently, so leaders see the impact and value.

The IT department shouldn’t be an isolated team but instead, plug into a company’s DNA and morph as the company changes. By collaborating with multiple sectors of the company, IT innovation can be built into the organizational framework. This will ensure the IT team is not at odds and can more easily assist their company by continuously adapting to changing markets.

For more information or to discuss how to implement innovation into your IT team, reach out to Nitish Mittal at [email protected].

You can also discover how technology, processes, and business networks will evolve in our webinar, What’s Ahead After a Decade of Digital Transformation?

IT Sourcing & Procurement Summit | Event

Event

IT sourcing & procurement summit

October 3-5, 2022
During the IT Procurement & Sourcing Summit, Ricky Sundrani, Vice President at Everest Group, will present on How to Manage Price Increases from Your IT Outsourcing Partners, and Nitish Mittal, Partner at Everest Group, will discuss The Road to Purpose-led Sustainability in Innovation and IT.
 

The event brings together more than 100 IT sourcing, procurement, finance, and vendor management decision makers from leading European companies to discuss effective IT Procurement strategies.

 
Nitish Mittal
Partner
Sundrani Ricky
Vice President

Who is Leading Customer Experience Management (CXM) Services in Europe? | LinkedIn Live

LINKEDIN LIVE

Who is Leading Customer Experience Management (CXM) Services in Europe?

View the event on LinkedIn, which was delivered live on Thursday, September 29, 2022.

📢The Customer Experience Management (CXM) market in EMEA is booming due to increased demand for outsourcing, as enterprises look to improve the customer experience, balance risk, and save money💲. With leading-edge capabilities like analytics, robotic process automation (RPA), and chatbots combined with traditional customer service skills, service providers are enabling enterprises to enhance their customer experience delivery significantly.

Join this LinkedIn Live session as our experts discuss the results of our recently completed PEAK Matrix® assessment showcasing our latest CXM research in the EMEA region🌏. We’ll explore the size of the market, key verticals, and which service providers are leading the CXM pack, as well as their standout capabilities.

Mark W
Mark Wootton
Former Snr Dir Procurement & GM for Contact Center Outsourcing
Microsoft

Building a Sovereign and Sustainable Cloud: How are European Organisations Evolving? | Webinar

ON-DEMAND WEBINAR

Building a Sovereign and Sustainable Cloud: How are European Organisations Evolving?

Europe and the UK (among other major markets) are increasingly looking at the sovereignty and environmental sustainability of their cloud transformations. Sovereign cloud initiatives have been accelerated by cybersecurity concerns from the Russian invasion of Ukraine and ongoing programs such as GAIA-X and Cloud de confiance in France, while sustainability and the carbon footprint of digital transformation initiatives are now a board-level agenda.

Europe and the UK (among other major markets) are increasingly looking at the sovereignty and environmental sustainability of their cloud transformations. Sovereign cloud initiatives have been accelerated by cybersecurity concerns from the Russian invasion of Ukraine and ongoing programs such as GAIA-X and Cloud de confiance in France, while sustainability and the carbon footprint of digital transformation initiatives are now a board-level agenda.

Based on Everest Group’s close tracking of the Europe and UK technology landscape, this webinar will focus on how organisations in this region are embracing sovereignty and sustainability and the opportunities that exist for technology and service providers.

What questions will the webinar answer for the participants?

  • How are organisations in Europe and the UK embracing sovereignty and sustainability as a part of their cloud transformation?
  • What are the critical investment areas and key challenges faced in this journey?
  • What opportunities exist for technology and service providers?
  • How will this ecosystem evolve as we approach a recession?

Who should attend?

  • CIOs and CTOs
  • Sourcing and procurement leaders
  • Heads of cloud, sustainability, and government relations
  • ESG officers / Chief sustainability officers
  • Service providers and technology vendors

Digital Transformation Week

HYBRID EVENT

DIGITAL TRANSFORMATION WEEK EUROPE

September 20-21, 2022

Join Everest Group experts at Digital Transformation Week (DTW), a two-day hybrid event held on September 21 – 22 at the RAI in Amsterdam, The Netherlands. Everest Group Partner, Nitish Mittal, will speak in the opening panel titled, “Moving from Now to Next – Shaping Digital Infrastructure for the Future.” This session will take place at 10:15 AM BST on September 21. The event will explore advanced DTX strategies for a “digital everything” world. Everest Group is proud to be DTW’s gold sponsor.

 
Stop by and meet our Client Directors, Nnamdi Ugo and Nick Hadjirallis, from our Europe team at Booth #221 at TechEx, a co-located event with Digital Transformation Week.
 
 
When: September 20-21, 2022
 
Where: The RAI, Amsterdam and virtual

"*" indicates required fields

Name*

Hadjirallis Nick 1

Client Director

Mittal Nitish

Partner

nnamdi ugo

Client Director

New Sourcing Models for an Agile World: Learnings from DNB | LinkedIn Live

LINKEDIN LIVE

New Sourcing Models for an Agile World | Learnings from DNB

View the event on LinkedIn, which was delivered live on Wednesday, September 14, 2022.

Sourcing teams strive to be more agile in how they support their business to meet rapidly changing needs🏃‍♀️. DNB, Norway’s largest financial services group, and its sourcing team developed an innovative and effective approach to its sourcing strategy by leveraging a DevOps model.

🎤Join this session to hear a conversation with DNB’s Robin Oberst and discover the shifts and improvements that DNB incorporated into its sourcing strategy. Our speakers will highlight the challenges faced by the company in its traditional sourcing approach and discuss how it adjusted its sourcing strategy to become more agile, collaborative, and efficient🌐.

Key questions our speakers will explore:

👉What challenges did the DNB sourcing team face in their traditional sourcing approach?
👉What did the team learn as they moved to a DevOps model?
👉What changes did they make to be more agile in the sourcing market?

Meet the Presenters

Six Common Challenges Customer Experience (CX) Leaders Face | Blog

Delivering exceptional customer experience has become essential to meet changing expectations post-pandemic. But various challenges – from data analytics to talent – can prevent companies from delivering the highly personalized interactions consumers crave. Learn what issues keep customer experience officers (CXOs) up at night in this blog.

The outsourced customer experience management (CXM) market has seen historic growth in recent years, rising about 12% to 14% last year to more than USD$100 billion, according to Everest Group estimates.

While COVID-19 increased demand for CX-related services, it was not the only driver. Senior business leaders now realize delivering exceptional customer experience is no longer a “nice to have” but a “must have” to grow their businesses and thrive in an increasingly competitive market, especially with tough economic times forecast.

As a result, greater focus is being put on customer experience (CX) and customer service (CS) leaders to deliver an exceptional experience. From our conversations with senior business leaders, they all face the following six similar challenges:

  • Using data to improve CX – With data security being critical to running a CX operation, leaders want to better understand all their data, such as contact reasons. They realize data will help them identify ways to improve the experience and lower contact volumes, ultimately improving customer satisfaction and reducing cost. To capitalize on this opportunity, data analytics use within outsourced contracts has grown significantly over the past few years, and our recent research shows that analytics is now present in 30% to 35% of CXM deals
  • Navigating the talent crisis – Much of North America and Europe, as well as other locations across the globe, are experiencing a talent shortage. CX leaders find either their in-house operations or outsourced service providers are struggling to attract and retain talent or that they have to pay premium wages. While this challenge may subside if the economic situation worsens, forward-thinking CX leaders are actively working to address this by evaluating alternative talent sources (such as using gig workers or impact sourcing) as well as exploring emerging locations (Sub-Saharan Africa, for example). They also are focusing on improving the employee experience (EX) to retain the talent they find
  • Optimising delivery and location models – CX leaders have to think about the right delivery and location models to support their business. Using Work at Home Agents (WAHA) in either full or hybrid models is a key consideration in finding and retaining talent. Delivery locations have also come into focus not only in the talent search but also for business continuity planning (BCP), as mitigating risks is now more top of mind than ever. CX leaders are increasingly demanding insights and analysis on emerging delivery models and locations to support their strategies
  • Increasing value while reducing cost – CX leaders feel pressure to deliver value to the business, whether through increased sales, higher retention rates, or better Net Promoter Scores (NPS)/Customer Satisfaction Scores (CSAT.) However, this responsibility does not come with a blank check, and leaders are still challenged to reduce support costs. Leaders need to balance high-value interactions served by humans and then identify low-value contacts (to the business and end customer) to eliminate or automate
  • Modernising the CX infrastructure – The customer experience infrastructure can be modernized and improved at any stage. CX leaders should avoid rushing into a solution because it seems to be the latest hot topic and should understand how the digital solution will integrate into the business and deliver the desired experience
  • Anticipating future customer, industry, and technology trends – As we know from our discussions and experiences, busy executives find it hard to look outside their organisations to understand broader trends when working hard to deliver an exceptional customer experience. Competitors are unlikely to share their plans, and opportunities to collaborate with peer CX leaders in non-competing firms are scarce. CX leaders are seeking an unbiased external industry lens that advisors can provide

The CX or CS leadership role has gained greater significance in recent years as the world has awoken to the importance of delivering great customer experiences. While challenging, the obstacles these leaders face are not insurmountable with the right insights, data, and teamwork.

To discuss CX trends further, contact David Rickard at [email protected].

Learn more about how to optimize your customer experience strategy in our LinkedIn Live session, “How are Leading Organizations Delivering Exceptional Customer Experience?

Contact Center Security Best Practices for Leaders to Consider | Blog

The expanded remote work environment post-pandemic and increasingly sophisticated security threats have compelled organizations to increase their focus on protecting contact center data. Learn how to build a holistic framework of best practices for technology, the business, and agents to shape contact center security in this blog.

Securing the landmine of customer data – from credit card numbers to health records – that reside in contact centers is a top concern for all businesses, particularly outsourced customer support. Data breaches can have serious financial, reputational, and legal consequences.

As new security threats constantly emerge and regulations change, strengthening contact center security is like aiming at a moving target. Now with the increase in remote work and more intricate ways to compromise data, this challenge has become more critical than ever. Let’s explore how it can be tackled.

Contact center security focus areas

Organizations should implement many different types of contact center security best practices related to the following three areas:

  • Technology – Ensuring the organization’s devices, including bring-your-own-devices (BYODs), are up to date with the latest security systems, software patches, and firewalls. Companies also should have technology contingency plans for legacy systems that can’t be replaced
  • Business – Establishing the organization has clear control and governance over its security standards and effective policies, especially in the face of ever-changing security requirements and newly emerging malware attacks and cybersecurity threats
  • Agents – Providing training and monitoring of both full-time human agents and gig workers who work in the office as well as remotely

Delivery models

Contact center security protocols can vary based on the delivery model. The complexity has increased as contact centers have evolved from entirely brick-and- mortar-driven service delivery to remote service delivery with Work at Home Agents (WAHA) and BYODs, which allow agents to choose their work location and use their own devices to conduct work.

As organizations move from working at offices to remote locations, contact center leaders need to be more vigilant to keep customer data safe. While the WAHA and BYOD models bring more operational agility to the workforce, they add heightened security concerns around endpoint safety management and agent monitoring.

The below graphic illustrates how the complexity increases with the newer work models:

1

Illustration 1: Everest Group

BYOD security

Defining a BYOD security policy is critical to maintaining company security. Stakeholders from different departments are key to the policy planning process and bring important input. Leadership, human resources, finance, IT operations, and the security team should be part of a BYOD project management team and be asked to contribute to policy development.

Security patches

Failing to routinely update machines with the most updated security patches is one of the biggest cybersecurity risks. Often this failure is simply due to not having enough IT resources. Even with in-center deployments, manually patching each device is a huge drain on time and resources. This challenge is further complicated in a remote/hybrid working environment where the device is off-site.

The patching process is a key part of vulnerability management. By employing best practices that expose any conflicts with existing systems configurations on which the patch is being installed, potential downtime can be avoided. For organizations with tens of thousands of network endpoints, remote patch management offers greater control over potential vulnerabilities caused by outdated patch versions, wherever they may be located on the network. This help ensures the threat is resolved as quickly as possible.

An automated patch deployment feature gives system administrators the ability to deploy patches missing in their network computers automatically without requiring manual intervention. While automated patch rollouts seem like a no-brainer for WFH and BYOD models, they also must be considered for in-center models to reduce the resource strain on the organization’s IT department.

Identifying the most critical security issues and software updates requires strong asset and software inventory management, which can be achieved using an automated patch management tool.

After that, creating a dedicated remote patch testing environment identical to the production system (using virtualization) can help run “smoke tests” to ensure behaviors/programs do not fail before moving to production. Alternatively, an initial test can be applied to less critical systems and expanded if they perform as expected. Even with a thorough patch testing program, organizations should have a contingency and rollback plan in case something goes wrong so systems can be restored to their pre-patched state.

While most security practices are agnostic of the model in which operations are run, WFH and BYOD models require an additional layer of security considerations to stay clear of any potential cybersecurity threats.

Holistic framework

Contact center leaders must look at a holistic framework of technology, business, and agent best practices to shape their security organization. The below table encapsulates some of the strategies leaders should consider:

  In-center model WFH Model BYOD model
Technology related
  • Encrypt data including voice transactions using encryption layers such as Secure Sockets Layer (SSL) and Transport Layer Security (TSL)
  • Build a secure network infrastructure by implementing firewalls that monitor network traffic, using VPNs, anti-virus softwares, and password management software
  • Update technology by installing software patches and eliminating legacy systems
  • Regularly test and monitor networks using penetration testing tools, vulnerability scanning softwares and alert systems that can notify suspicious activity in real time
  • Consider role-based access that allows for gradually increasing employee access based on trust and their position within the company
  • Encourage use of secure cloud services (such as office 365) to store data
  • Conduct mandatory backups using mobile device management (MDM)/enterprise mobility management systems (EMM) to manage devices while also separating corporate from personal data
  • Consider PII redaction that uses speech analytics technology to prevent sensitive cardholder data from being recorded; automatically mute call recording when account numbers, security codes, and other sensitive information is spoken
  • Offer containerization in conjunction with or paired with MDM solutions. This method can segregate part of a device into its own protected bubble, protected by a separate password and regulated by a separate set of policies
  • Use endpoint validation and centralized endpoint management to ensure that applications, antivirus, and operating systems of endpoint devices are up-to-date. Endpoint management should be coupled with location awareness to dynamically adapt to a remote end user’s permission, based on centrally defined policies as well as the local network’s established security level
Business related
  • Develop an information security policy by working with the IT department to identify which technologies and procedures need to be implemented for the IS policy to work as intended and ensuring every employee is aware of their responsibilities
  • Adhere to common security frameworks such as IST 27001, NIST 800-53, and COBIT. Identify which framework is most relevant to your contact center and then map out the strict security controls required by the framework and implement them
  • Develop WFH cybersecurity standards including multi-factor authentication and firewalls
  • Manage devices that remote agents use to ensure that password and screen lockout policies are followed; security and other updates occur in a timely manner; and companies can perform forensics and place data under legal hold if needed
  • Define a clear service policy for devices under BYOD that covers the support IT representatives will provide for broken devices as well as  support for applications installed on personal devices
  • Determine what apps will be allowed and banned (whitelisting and blacklisting)
  • Set up an employee exit strategy that addresses how the company will enforce the removal of access tokens, e-mail access, data and other proprietary applications and information
Agent related
  • Train agents to be “human firewalls” when it comes to security. More frequent training sessions will keep security and privacy top of mind and also create more opportunities for companies to check in with remote agents and keep them engaged
  • Monitor agent activity regularly and have policies that restrict access to certain data recognizing that agents may pose a risk to the center if they have access to sensitive information and become disgruntled
  • Safeguard against employees mistakenly clicking on links or opening files that they shouldn’t, leading to the installation of malware or data theft. Have strong password protection and use security software that restricts the unintentional or intentional downloading of malware, copying or deleting data, or accessing programs or websites that have not been vetted by the IT department
  • Ensure temporary/gig workers that are hired to handle peak volumes or cover for sick employees are trained on the center’s policies and procedures

Illustration 2: Everest Group

As infrastructure and networks grow in size and complexity, manually managing security and compliance checklists has become increasingly difficult.

Manual operations can result in slower issue detection and remediation, resource configuration errors, and inconsistent policy application, leaving systems vulnerable to compliance issues and attacks. Automating security update rollouts can help prevent unplanned and expensive downtime and improve functionality.

This approach needs to be complemented with good governance of the security landscape, ensuring the contact center is following the latest security frameworks based on their industry. Finally, organizations need to train agents on these standards and track and monitor their devices in real-time to ensure no security gaps exist that potential cybercriminals can leverage.

To discuss contact center security solutions in more detail, please reach out to [email protected] or [email protected].

Learn more about cybersecurity, incident detection, investigation, and response in our blog, “Is Managed Detection and Response (MDR) the Holy Grail for Cybersecurity Services?

How can we engage?

Please let us know how we can help you on your journey.

Contact Us

"*" indicates required fields

Please review our Privacy Notice and check the box below to consent to the use of Personal Data that you provide.
This field is for validation purposes and should be left unchanged.