Computerworld - Over lunch with four preeminent CIOs last Tuesday, I had a preview of the coming attraction. We had gathered to go over the final logistics for a presentation at Computerworld’s Premier 100 IT Leaders Conference that would be conducted that afternoon in a “talk show” format, with me as the host and the four CIOs as my guests.
The first order of business was for me to be certain that these guys knew what they were getting themselves into.
“I don’t want to spook you, because the only way we’re going to make this work is for you to be as open and candid as you can possibly be,” I told them. “But recognize that we’ll have reporters out there, and there’s no telling how many people in that audience have a blog somewhere. It’s a Web 2.0 world, so don’t say anything you wouldn’t want to watch on YouTube tomorrow.”
There wasn’t much of a verbal response, but there didn’t need to be. There was no antsy shifting in seats. Just nods of understanding and looks of quiet resolve that said it all.
The presentation was titled “Defining Moments in IT Leadership,” and it put a glaring spotlight on these four individuals — all Computerworld Premier 100 IT Leaders — and how they responded when confronted with extraordinarily difficult and controversial challenges.
First up was Dale Frantz, the CIO at Auto Warehousing Co. Last year, he defied a campaign of intimidation on the part of Microsoft by going public with the strong-arm tactics the vendor was using to pressure him to cooperate with a review of his software licenses. Frantz remains steadfast in his defiance, and when he was onstage, he revealed that the experience had prompted him to actively seek alternatives to Microsoft. Frantz is researching how to move his proprietary applications off of Windows and onto Apple’s Mac OS X. If he can accomplish that, he said, there’s an excellent chance he’ll convert to an Apple platform.
My next guest was Louis Gutierrez, who spent a turbulent nine months last year as CIO of the state of Massachusetts. True to form, Gutierrez shied away from nothing. With characteristic calm and eloquence, he discussed the state legislature’s failure to give him the funding he needed to do his job, and his resultant resignation. And, like Frantz, he spoke defiantly of his relationship with a relentless Microsoft — in this case, a lobbying apparatus that was determined to bend Massachusetts to its will on office document standards.
Third up was Clark Kelso, CIO of the state of California, who described a journey that began in 2002, when he was called in to clean up the mess made by an inept, scandal-plagued IT regime that had alienated that state’s legislature. Like Gutierrez, he refused to allow a tempestuous political climate to cloud his vision for what he felt he needed to accomplish.
Finally, the hot seat was taken by Darryl Lemecha, CIO at ChoicePoint, the personal information brokering company that last year was fined $10million by the Federal Trade Commission for a massive data security breach. Amazingly, that breach was the catalyst for re-engineering the company into one that’s now highly regarded for its data privacy and security best practices.
When I asked Lemecha if he had any advice for TJX, the clothing retailer whose data security breach is still making headlines, his response summed up, in four words, the message that all four of my guests had conveyed: “Do the right thing.”
There is no greater hallmark of an IT leader than the courage it takes to follow that advice.
Don Tennant is editor in chief of Computerworld. Contact him at firstname.lastname@example.org.
Read more about Management in Computerworld's Management Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts