โŒ

Normal view

There are new articles available, click to refresh the page.
Yesterday โ€” 5 December 2025Main stream

Agents-as-a-service are poised to rewire the software industry and corporate structures

5 December 2025 at 05:00

This was the year of AI agents. Chatbots that simply answered questions are now evolving into autonomous agents that can carry out tasks on a userโ€™s behalf, so enterprises continue to invest in agentic platforms as transformation evolves. Software vendors are investing in it as fast as they can, too.

According to a National Research Group survey of more than 3,000 senior leaders, more than half of executives say their organization is already using AI agents. Of the companies that spend no less than half their AI budget on AI agents, 88% say theyโ€™re already seeing ROI on at least one use case, with top areas being customer service and experience, marketing, cybersecurity, and software development.

On the software provider side, Gartner predicts 40% of enterprise software applications in 2026 will include agentic AI, up from less than 5% today. And agentic AI could drive approximately 30% of enterprise application software revenue by 2035, surpassing $450 billion, up from 2% in 2025. In fact, business users might not have to interact directly with the business applications at all since AI agent ecosystems will carry out user instructions across multiple applications and business functions. At that point, a third of user experiences will shift from native applications to agentic front ends, Gartner predicts.

Itโ€™s already starting. Most enterprise applications will have embedded assistants, a precursor to agentic AI, by the end of this year, adds Gartner.

IDC has similar predictions. By 2028, 45% of IT product and service interactions will use agents as the primary interface, the firm says. Thatโ€™ll change not just how companies work, but how CIOs work as well.

Agents as employees

At financial services provider OneDigital, chief product officer Vinay Gidwaney is already working with AI agents, almost as if they were people.

โ€œWe decided to call them AI coworkers, and we set up an AI staffing team co-owned between my technology team and our chief people officer and her HR team,โ€ he says. โ€œThat team is responsible for hiring AI coworkers and bringing them into the organization.โ€ You heard that right: โ€œhiring.โ€

The first step is to sit down with the business leader and write a job description, which is fed to the AI agent, and then it becomes known as an intern.

โ€œWe have a lot of interns weโ€™re testing at the company,โ€ says Gidwaney. โ€œIf they pass, they get promoted to apprentices and we give them our best practices, guardrails, a personality, and human supervisors responsible for training them, auditing what they do, and writing improvement plans.โ€

The next promotion is to a full-time coworker, and it becomes available to be used by anyone at the company.

โ€œAnyone at our company can go on the corporate intranet, read the skill sets, and get ice breakers if they donโ€™t know how to start,โ€ he says. โ€œYou can pick a coworker off the shelf and start chatting with them.โ€

For example, thereโ€™s Ben, a benefits expert whoโ€™s trained on everything having to do with employee benefits.

โ€œWe have our employee benefits consultants sitting with clients every day,โ€ Gidwaney says. โ€œBen will take all the information and help the consultants strategize how to lower costs, and how to negotiate with carriers. Heโ€™s the consultantsโ€™ thought partner.โ€

There are similar AI coworkers working on retirement planning, and on property and casualty as well. These were built in-house because theyโ€™re core to the companyโ€™s business. But there are also external AI agents who can provide additional functionality in specialized yet less core areas, like legal or marketing content creation. In software development, OneDigital uses third-party AI agents as coding assistants.

When choosing whether to sign up for these agents, Gidwaney says he doesnโ€™t think of it the way he thinks about licensing software, but more to hiring a human consultant or contractor. For example, will the agent be a good cultural fit?

But in some cases, itโ€™s worse than hiring humans since a bad human hire who turns out to be toxic will only interact with a small number of other employees. But an AI agent might interact with thousands of them.

โ€œYou have to apply the same level of scrutiny as how you hire real humans,โ€ he says.

A vendor who looks like a technology company might also, in effect, be a staffing firm. โ€œThey look and feel like humans, and you have to treat them like that,โ€ he adds.

Another way that AI agents are similar to human consultants is when they leave the company, they take their expertise with them, including what they gained along the way. Data can be downloaded, Gidwaney says, but not necessarily the fine-tuning or other improvements the agent received. Realistically, there might not be any practical way to extract that from a third-party agent, and that could lead to AI vendor lock-in.

Edward Tull, VP of technology and operations at JBGoodwin Realtors, says he, too, sees AI agents as something akin to people. โ€œI see it more as a teammate,โ€ he says. โ€œAs we implement more across departments, I can see these teammates talking to each other. It becomes almost like a person.โ€

Today, JBGoodwin uses two main platforms for its AI agents. Zapier lets the company build its own and HubSpot has its own AaaS, and theyโ€™re already pre-built. โ€œThere are lead enrichment agents and workflow agents,โ€ says Tull.

And the company is open to using more. โ€œIn accounting, if someone builds an agent to work with this particular type of accounting software, we might hire that agent,โ€ he says. โ€œOr a marketing coordinator that we could hire thatโ€™s built and ready to go and connected to systems we already use.โ€

With agents, his job is becoming less about technology and more about management, he adds. โ€œItโ€™s less day-to-day building and more governance, and trying to position the company to be competitive in the world of AI,โ€ he says.

Heโ€™s not the only one thinking of AI agents as more akin to human workers than to software.

โ€œWith agents, because the technology is evolving so far, itโ€™s almost like youโ€™re hiring employees,โ€ says Sheldon Monteiro, chief product officer at Publicis Sapient. โ€œYou have to determine whom to hire, how to train them, make sure all the business units are getting value out of them, and figure when to fire them. Itโ€™s a continuous process, and this is very different from the past, where I make a commitment to a platform and stick with it because the solution works for the business.โ€

This changes how the technology solutions are managed, he adds. What companies will need now is a CHRO, but for agentic employees.

Managing outcomes, not persons

Vituity is one of the largest national, privately-held medical groups, with 600 hospitals, 13,800 employees, and nearly 14 million patients. The company is building its own AI agents, but is also using off-the-shelf ones, as AaaS. And AI agents arenโ€™t people, says CIO Amith Nair. โ€œThe agent has no feelings,โ€ he says. โ€œAGI isnโ€™t here yet.โ€

Instead, it all comes down to outcomes, he says. โ€œIf you define an outcome for a task, thatโ€™s the outcome youโ€™re holding that agent to.โ€ And that part isnโ€™t different to holding employees accountable to an outcome. โ€œBut you donโ€™t need to manage the agent,โ€ he adds. โ€œTheyโ€™re not people.โ€

Instead, the agent is orchestrated and you can plug and play them. โ€œIt needs to understand our business model and our business context, so you ground the agent to get the job done,โ€ he says.

For mission-critical functions, especially ones related to sensitive healthcare data, Vituity is building its own agents inside a HIPAA-certified LLM environment using the Workato agent development platform and the Microsoft agentic platform.

For other functions, especially ones having to do with public data, Vituity uses off-the-shelf agents, such as ones from Salesforce and Snowflake. The company is also using Claude with GitHub Copilot for coding. Nair can already see that agentic systems will change the way enterprise software works.

โ€œMost of the enterprise applications should get up to speed with MCP, the integration layer for standardization,โ€ he says. โ€œIf they donโ€™t get to it, itโ€™s going to become a challenge for them to keep selling their product.โ€

A company needs to be able to access its own data via an MCP connector, he says. โ€œAI needs data, and if they donโ€™t give you an MCP, you just start moving it all to a data warehouse,โ€ he adds.

Sharp learning curve

In addition to providing a way to store and organize your data, enterprise software vendors also offer logic and functionality, and AI will soon be able to handle that as well.

โ€œAll you need is a good workflow engine where you can develop new business processes on the fly, so it can orchestrate with other agents,โ€ Nair says. โ€œI donโ€™t think weโ€™re too far away, but weโ€™re not there yet. Until then, SaaS vendors are still relevant. The question is, can they charge that much money anymore.โ€

The costs of SaaS will eventually have to come down to the cost of inference, storage, and other infrastructure, but they canโ€™t survive the way theyโ€™re charging now he says. So SaaS vendors are building agents to augment or replace their current interfaces. But that approach itself has its limits. Say, for example, instead of using Salesforceโ€™s agent, a company can use its own agents to interact with the Salesforce environment.

โ€œItโ€™s already happening,โ€ Nair adds. โ€œMy SOC agent is pulling in all the log files from Salesforce. Theyโ€™re not providing me anything other than the security layer they need to protect the data that exists there.โ€

AI agents are set to change the dynamic between enterprises and software vendors in other ways, too. One major difference between software and agents is software is well-defined, operates in a particular way, and changes slowly, says Jinsook Han, chief of strategy, corporate development, and global agentic AI at Genpact.

โ€œBut we expect when the agent comes in, itโ€™s going to get smarter every day,โ€ she says. โ€œThe world will change dramatically because agents are continuously changing. And the expectations from the enterprises are also being reshaped.โ€

Another difference is agents can more easily work with data and systems where they are. Take for example a sales agent meeting with customers, says Anand Rao, AI professor at Carnegie Mellon University. Each salesperson has a calendar where all their meetings are scheduled, and they have emails, messages, and meeting recordings. An agent can simply access those emails when needed.

โ€œWhy put them all into Salesforce?โ€ Rao asks. โ€œIf the idea is to do and monitor the sale, it doesnโ€™t have to go into Salesforce, and the agents can go grab it.โ€

When Rao was a consultant having a conversation with a client, heโ€™d log it into Salesforce with a note, for instance, saying the client needs a white paper from the partner in charge of quantum.

With an agent taking notes during the meeting, it can immediately identify the action items and follow up to get the white paper.

โ€œRight now weโ€™re blindly automating the existing workflow,โ€ Rao says. โ€œBut why do we need to do that? Thereโ€™ll be a fundamental shift of how we see value chains and systems. Weโ€™ll get rid of all the intermediate steps. Thatโ€™s the biggest worry for the SAPs, Salesforces, and Workdays of the world.โ€

Another aspect of the agentic economy is instead of a human employee talking to a vendorโ€™s AI agent, a company agent can handle the conversation on the employeeโ€™s behalf. And if a company wants to switch vendors, the experience will be seamless for employees, since they never had to deal directly with the vendor anyway.

โ€œI think thatโ€™s something thatโ€™ll happen,โ€ says Ricardo Baeza-Yates, co-chair of theย  US technology policy committee at the Association for Computing Machinery. โ€œAnd it makes the market more competitive, and makes integrating things much easier.โ€

In the short term, however, it might make more sense for companies to use the vendorsโ€™ agents instead of creating their own.

โ€œI recommend people donโ€™t overbuild because everything is moving,โ€ says Bret Greenstein, CAIO at West Monroe Partners, a management consulting firm. โ€œIf you build a highly complicated system, youโ€™re going to be building yourself some tech debt. If an agent exists in your application and itโ€™s localized to the data in that application, use it.โ€

But over time, an agent thatโ€™s independent of the application can be more effective, he says, and thereโ€™s a lot of lock-in that goes into applications. โ€œItโ€™s going to be easier every day to build the agent you want without having to buy a giant license. โ€œThe effort to get effective agents is dropping rapidly, and the justification for getting expensive agents from your enterprise software vendors is getting less,โ€ he says.

The future of software

According to IDC, pure seat-based pricing will be obsolete by 2028, forcing 70% of vendors to figure out new business models.

With technology evolving as quickly as it is, JBGoodwin Realtors has already started to change its approach to buying tech, says Tull. It used to prefer long-term contracts, for example but thatโ€™s not the case anymore โ€œYou save more if you go longer, but Iโ€™ll ask for an option to re-sign with a cap,โ€ he says.

That doesnโ€™t mean SaaS will die overnight. Companies have made significant investments in their current technology infrastructure, says Patrycja Sobera, SVP of digital workplace solutions at Unisys.

โ€œTheyโ€™re not scrapping their strategies around cloud and SaaS,โ€ she says. โ€œTheyโ€™re not saying, โ€˜Letโ€™s abandon this and go straight to agentic.โ€™ Iโ€™m not seeing that at all.โ€

Ultimately, people are slow to change, and institutions are even slower. Many organizations are still running legacy systems. For example, the FAA has just come out with a bold plan to update its systems by getting rid of floppy disks and upgrading from Windows 95. They expect this to take four years.

But the center of gravity will move toward agents and, as it does, so will funding, innovation, green-field deployments, and the economics of the software industry.

โ€œThere are so many organizations and leaders who need to cross the chasm,โ€ says Sobera. โ€œYouโ€™re going to have organizations at different levels of maturity, and some will be stuck in SaaS mentality, but feeling more in control while some of our progressive clients will embrace the move. Weโ€™re also seeing those clients outperform their peers in revenue, innovation, and satisfaction.โ€

CIOs take note: talent will walk without real training and leadership

5 December 2025 at 05:00

Tech talent, especially with advanced and specialized skills, remains elusive. Findings from a recent IT global HR trends report by Gi Group show a 47% enterprise average struggles with sourcing and retaining talent. As a consequence, turnover remains high.

Another international study by Cegos highlights that 53% of 200 directors or managers of information systems in Italy alone say the difficulty of attracting and retaining IT talent is something they face daily.ย Cybersecurityย is the most relevant IT problem but a majority, albeit slight, feels confident of tackling it. Conversely, however, only 8% think theyโ€™ll be able to solve the IT talent problem. IT team skills development and talent retention are the next biggest issues facing CIOs in Italy, and only 24% and 9%, respectively, think they can successfully address it.

โ€œTalents arenโ€™t rare,โ€ says Cecilia Colasanti, CIO of Istat, the National Institute of Statistics. โ€œTheyโ€™re there but theyโ€™re not valued. Thatโ€™s why, more often, they prefer to go abroad. For me, talent is the right person in the right place. Managers, including CIOs, must have the ability to recognize talents, make them understand theyโ€™ve been identified, and enhance them with the right opportunities.โ€

The CIO as protagonist of talent management

Colasanti has very clear ideas on how to manage her talents to create a cohesive and motivated group. โ€œThe goal I set myself as CIO was to release increasingly high-quality products for statistical users, both internal and external,โ€ she says. โ€œI want to be concrete and close the projects weโ€™ve opened, to ensure the institution continues to improve with the contribution of IT, which is a driver of statistical production. I have the task of improving the IT function, the quality of the products released, the relevance of the management, and the well-being of people.โ€

Istatโ€™s IT department currently has 195 people, and represents about 10% of the instituteโ€™s entire staff. Colasantiโ€™s first step after her CIO appointment in October 2023 was to personally meet with all the resources assigned to management for an interview.

โ€œIโ€™ve been working at Istat since 2001 and almost everyone knows each other,โ€ she says. โ€œIโ€™ve held various roles in the IT department, and in my latest role as CIO, I want to listen to everyone to gather every possible viewpoint. Because how well we know each other, I feel my colleagues have a high expectation of our work together. Thatโ€™s why I try to establish a frank dialogue and avoid ambiguity. But I make it clear that listening doesnโ€™t mean delegating responsibility. I accept some proposals, reject others, and try to justify choices.โ€

Another move was to reinstate the two problems, two solutions initiative launched in Istat many years ago. Colasanti asked staff, on a voluntary basis, to identify two problems and propose two solutions. She then processed the material and shared the results in face-to-face meetings, commenting on the proposals, and evaluating those to be followed up.

โ€œIโ€™ve been very vocal about this initiative,โ€ she says, โ€œBut I also believe itโ€™s been an effective way to cement the relationship of trust with my colleagues.โ€

Some of the inquiries related to career opportunities and technical issues, but the most frequent pain points that emerged were internal communication and staff shortages. Colasanti spoke with everyone, clarifying which points she could or couldnโ€™t act on. Career paths and hiring in the public sector, for example, follow precise procedures where little could be influenced.

โ€œI tried to address all the issues from a proactive perspective,โ€ she says. โ€œWhere I perceived a generic resistance to change rather than a specific problem, I tried to focus on intrinsic motivation and peopleโ€™s commitment. Itโ€™s important to explain the strategies of the institution and the role of each person to achieve objectives. After all, people need and have the right to know the context in which they operate, and be aware of how their work affects the bigger picture.โ€

Engagement must be built day by day, so Colasanti regularly meets with staff including heads of department and service managers.

Small enterprise, big concerns

The case of Istat stands out for the size of its IT department, but in SMEs, IT functions can be just a handful of people, including the CIO, and much of the work is done by external consultants and suppliers. Itโ€™s a structure that has to be worked with, dividing themselves between coordinating various resources across different projects, and the actual IT work. Outsourcing to the cloud is an additional support but CIOs would generally like to have more in-house expertise rather than depend on partners to control supplier products.

โ€œAttracting and retaining talent is a problem, so things are outsourced,โ€ says the CIO of a small healthcare company with an IT team of three. โ€œYou offload the responsibility and free up internal resources at the risk of losing know-how in the company. But at the moment, we have no other choice. We canโ€™t offer the salaries of a large private group, and IT talent changes jobs every two years, so keeping people motivated is difficult. We hire a candidate, go through the training, and see them grow only to see them leave. But our sector is highly specialized and the necessary skills are rare.โ€

The sirens of the market are tempting for those with the skills to command premium positioning, and the private sector is able to attract talent more easily than public due to its hiring flexibility and career paths.

โ€œThe public sector offers the opportunity to research, explore and deepen issues that private companies often donโ€™t invest in because they donโ€™t see the profit,โ€ says Colasanti. โ€œThe public has the good of the community as its mission and can afford long-term investments.โ€

Training builds resource retention

To meet demand, CIOs are prioritizing hiring new IT profiles and training their teams, according to the Cegos international barometer. Offering reskilling and upskilling are effective ways to overcome the pitfalls of talent acquisition and retention.

โ€œThe market is competitive, so retaining talent requires barriers to exit,โ€ says Emanuela Pignataro, head of business transformation and execution at Cegos Italia. โ€œIf an employer creates a stimulating and rewarding environment with sufficient benefits, people are less likely to seek other opportunities or get caught up in the competition. Many feel theyโ€™re burdened with too many tasks they canโ€™t cope with on their own, and these are people with the most valuable skills, but who often work without much support. So if the company spends on training or onboarding new people who support these people, they create reassurance, which generates loyalty.โ€

In fact, Colasanti is a staunch supporter of life-long learning, and the experience that brings balance and management skills. But she doesnโ€™t have a large budget for IT training, yet solutions in response to certain requests are within reach.

โ€œIn these cases, I want serious commitment,โ€ she says. โ€œThe institution invests and the course must give a result. A higher budget would be useful, of course, especially for an ever-evolving subject like cybersecurity.โ€

The need for leadership

CIOs also recognize the importance of following people closely, empowering them, and giving them a precise and relevant role that enhances motivation. Itโ€™s also essential to collaborate with the HR function to develop tools for welfare and well-being.

According to the Gi Group study, the factors that IT candidates in Italy consider a priority when choosing an employer are, in descending order, salary, a hybrid job offer, work-life balance, the possibility of covering roles that donโ€™t involve high stress levels, and opportunities for career advancement and professional growth.

But thereโ€™s another aspect that helps solve the age-old issue of talent management. CIOs need to recognize more of the role of their leadership. At the moment, Italian IT directors place it at the bottom of their key qualities. In the Cegos study, technical expertise, strategic vision, and ability to innovate come first, while leadership came a distant second. But the leadership of the CIO is a founding basis, even when thereโ€™s disagreement with choices.

โ€œI believe in physical presence in the workplace,โ€ says Colasanti. โ€œIstat has a long tradition of applying teleworking and implementing smart working, which everyone can access if they wish. Personally, I prefer to be in the office, but I respect the need to reconcile private life and work, and I have no objection to agile working. Iโ€™m on site every day, though. My colleagues know Iโ€™m here.โ€

Before yesterdayMain stream

ํ‚จ๋“œ๋ฆด, ์ด๊ธฐ์—ด ์‹ ์ž„ ํ•œ๊ตญ ์ง€์‚ฌ์žฅ ์ž„๋ช…

4 December 2025 at 00:45

์ด๊ธฐ์—ด ์ง€์‚ฌ์žฅ์€ ํ•œ๊ตญ ๋‚ด ํ‚จ๋“œ๋ฆด์˜ ์ „๋žต์  ๋น„์ „์„ ์ˆ˜๋ฆฝํ•˜๊ณ  ์‹คํ–‰ํ•˜๋Š” ํ•ต์‹ฌ ๋ฆฌ๋”์‹ญ ์—ญํ• ์„ ๋งก์•„, IT ์ธํ”„๋ผ ๋ฐ ๋””์ง€ํ„ธ ์ „ํ™˜ ๋ถ„์•ผ์—์„œ ํ˜์‹ ๊ณผ ์šด์˜ ์šฐ์ˆ˜์„ฑ์„ ๊ฐ•ํ™”ํ•˜๋„๋ก ํ‚จ๋“œ๋ฆด์„ ์ด๋Œ ์˜ˆ์ •์ด๋‹ค. ๋˜ํ•œ, ํ†ต์‹ ยท๊ธˆ์œต ๋“ฑ ์ฃผ์š” ์‚ฐ์—… ๋ถ„์•ผ์—์„œ์˜ ์‹œ์žฅ ์ž…์ง€ ํ™•๋Œ€, ์ „๋žต์  ํŒŒํŠธ๋„ˆ์‹ญ ๊ตฌ์ถ•, ์ง€์† ๊ฐ€๋Šฅํ•œ ์„ฑ์žฅ๊ณผ ๋ฏธ๋ž˜ ๊ฒฝ์Ÿ๋ ฅ ํ™•๋ณด๋ฅผ ์œ„ํ•œ ์กฐ์ง ์šด์˜์„ ์ด๊ด„ํ•œ๋‹ค.

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/12/์‚ฌ์ง„-์ด๊ธฐ์—ด-ํ‚จ๋“œ๋ฆด-์ฝ”๋ฆฌ์•„-์ง€์‚ฌ์žฅ.jpg?quality=50&strip=all 697w, https://b2b-contenthub.com/wp-content/uploads/2025/12/์‚ฌ์ง„-์ด๊ธฐ์—ด-ํ‚จ๋“œ๋ฆด-์ฝ”๋ฆฌ์•„-์ง€์‚ฌ์žฅ.jpg?resize=284%2C300&quality=50&strip=all 284w, https://b2b-contenthub.com/wp-content/uploads/2025/12/์‚ฌ์ง„-์ด๊ธฐ์—ด-ํ‚จ๋“œ๋ฆด-์ฝ”๋ฆฌ์•„-์ง€์‚ฌ์žฅ.jpg?resize=660%2C697&quality=50&strip=all 660w, https://b2b-contenthub.com/wp-content/uploads/2025/12/์‚ฌ์ง„-์ด๊ธฐ์—ด-ํ‚จ๋“œ๋ฆด-์ฝ”๋ฆฌ์•„-์ง€์‚ฌ์žฅ.jpg?resize=159%2C168&quality=50&strip=all 159w, https://b2b-contenthub.com/wp-content/uploads/2025/12/์‚ฌ์ง„-์ด๊ธฐ์—ด-ํ‚จ๋“œ๋ฆด-์ฝ”๋ฆฌ์•„-์ง€์‚ฌ์žฅ.jpg?resize=80%2C84&quality=50&strip=all 80w, https://b2b-contenthub.com/wp-content/uploads/2025/12/์‚ฌ์ง„-์ด๊ธฐ์—ด-ํ‚จ๋“œ๋ฆด-์ฝ”๋ฆฌ์•„-์ง€์‚ฌ์žฅ.jpg?resize=455%2C480&quality=50&strip=all 455w, https://b2b-contenthub.com/wp-content/uploads/2025/12/์‚ฌ์ง„-์ด๊ธฐ์—ด-ํ‚จ๋“œ๋ฆด-์ฝ”๋ฆฌ์•„-์ง€์‚ฌ์žฅ.jpg?resize=341%2C360&quality=50&strip=all 341w, https://b2b-contenthub.com/wp-content/uploads/2025/12/์‚ฌ์ง„-์ด๊ธฐ์—ด-ํ‚จ๋“œ๋ฆด-์ฝ”๋ฆฌ์•„-์ง€์‚ฌ์žฅ.jpg?resize=237%2C250&quality=50&strip=all 237w" width="697" height="736" sizes="auto, (max-width: 697px) 100vw, 697px">

Kyndryl

์ด๊ธฐ์—ด ์ง€์‚ฌ์žฅ์€ 30์—ฌ ๋…„์— ๊ฑธ์ณ ๊ธฐ์ˆ  ๋ฐ ๋น„์ฆˆ๋‹ˆ์Šค ์ „ํ™˜ ๋ถ„์•ผ์—์„œ ๊ฒฝํ—˜์„ ์Œ“์•„์˜จ ์ „๋ฌธ๊ฐ€๋กœ, ๋‹ค์–‘ํ•œ ์‚ฐ์—…๊ณผ ์ง€์—ญ์„ ์•„์šฐ๋ฅด๋Š” ์ตœ๊ณ ๊ฒฝ์˜์ง„ ์—ญํ• ์„ ์ˆ˜ํ–‰ํ•˜๋ฉฐ ๋Œ€๊ทœ๋ชจ ๋””์ง€ํ„ธ ์ „๋žต์„ ์ด๊ด„ํ•˜๊ณ  ์ธ์žฌ ์œก์„ฑ๊ณผ ์ „๋žต์  ํŒŒํŠธ๋„ˆ์‹ญ ๊ตฌ์ถ•์„ ์ฃผ๋„ํ•ด ์™”๋‹ค. ๋ณต์žกํ•œ ์ „ํ™˜ ํ”„๋กœ์ ํŠธ๋ฅผ ์„ฑ๊ณต์ ์œผ๋กœ ์ด๋Œ๊ณ  ๋””์ง€ํ„ธ ์ƒํƒœ๊ณ„๋ฅผ ์กฐ์„ฑํ•˜๋ฉฐ ๊ณ ์„ฑ๊ณผ ์กฐ์ง์„ ์ด๋ˆ ๊ทธ์˜ ์—ญ๋Ÿ‰์€ ๊ธฐ์ˆ  ๋ถ„์•ผ์—์„œ ๋น„์ „ ์žˆ๋Š” ๋ฆฌ๋”์ด์ž ์ „๋žต์  ์„ค๊ณ„์ž๋กœ์„œ์˜ ๋ช…์„ฑ์„ ์ž…์ฆํ•œ๋‹ค.

ํ‚จ๋“œ๋ฆด ๋™๋‚จ์•„์‹œ์•„ ๋ฐ ํ•œ๊ตญ ์ด๊ด„ ์•ค๋“œ๋ฅ˜ ๋ฆผ์€ โ€œ์ด๊ธฐ์—ด ์ง€์‚ฌ์žฅ์€ ๊ณต๊ณต ๋ฐ ๋ฏผ๊ฐ„ ๋ถ€๋ฌธ ์ „๋ฐ˜์—์„œ ๋””์ง€ํ„ธ ์ „๋žต, ํด๋ผ์šฐ๋“œ, AI, ๋Œ€๊ทœ๋ชจ ํ˜์‹ ์— ๋Œ€ํ•œ ๊นŠ์€ ์ „๋ฌธ์„ฑ์„ ๊ฐ–์ถ”๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Š” ํ•œ๊ตญ ๊ธฐ์—…๋“ค์˜ ๋””์ง€ํ„ธ ์ „ํ™˜ ๊ฐ€์†ํ™”์— ์ค‘์š”ํ•œ ๊ธฐ์—ฌ๋ฅผ ํ•  ๊ฒƒโ€์ด๋ผ๋ฉฐ, โ€œ๊ทธ์˜ ๋ฆฌ๋”์‹ญ ์•„๋ž˜ ํ‚จ๋“œ๋ฆด ํ•œ๊ตญ ์ง€์‚ฌ๊ฐ€ ์ง€์†์ ์œผ๋กœ ์„ฑ์žฅํ•˜๊ณ  ์ƒˆ๋กœ์šด ์„ฑ๊ณผ๋ฅผ ์ฐฝ์ถœํ•  ๊ฒƒ์ด๋ผ๊ณ  ๋ณธ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

ํ‚จ๋“œ๋ฆด ์ฝ”๋ฆฌ์•„ ์ด๊ธฐ์—ด ์‹ ์ž„ ์ง€์‚ฌ์žฅ์€ โ€œํ•œ๊ตญ ๊ธฐ์—…์€ ํ˜„๋Œ€ํ™”๋ฅผ ๊ฐ€์†ํ™”ํ•˜๋ฉด์„œ, ๋ฏธ์…˜ ํฌ๋ฆฌํ‹ฐ์ปฌ ์‹œ์Šคํ…œ์ด ํ˜์‹ , ํšŒ๋ณตํƒ„๋ ฅ์„ฑ, ์žฅ๊ธฐ ์„ฑ์žฅ์„ ์–ด๋–ป๊ฒŒ ์ง€์›ํ•ด์•ผ ํ•˜๋Š”์ง€ ์žฌ์ •์˜ํ•˜๊ณ  ์žˆ๋‹ค. ํ•œ๊ตญ์˜ ์šฐ์ˆ˜ํ•œ ํŒ€๊ณผ ํŒŒํŠธ๋„ˆ๋“ค๊ณผ ํ˜‘๋ ฅํ•ด ๋ฏธ์…˜ ํฌ๋ฆฌํ‹ฐ์ปฌ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ , ์ „๋žต์  ํŒŒํŠธ๋„ˆ์‹ญ์„ ๊ฐ•ํ™”ํ•˜๋ฉฐ, ๊ณ ๊ฐ์˜ ํ˜„๋Œ€ํ™” ๋ชฉํ‘œ ๋‹ฌ์„ฑ์„ ์ง€์›ํ•  ์ˆ˜ ์žˆ๊ธฐ๋ฅผ ๊ธฐ๋Œ€ํ•œ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์ด๊ธฐ์—ด ์ง€์‚ฌ์žฅ์€ ํ‚จ๋“œ๋ฆด ํ•ฉ๋ฅ˜ ์ „, AI, ๋ธ”๋ก์ฒด์ธ, ์–‘์ž์ปดํ“จํŒ… ๊ธฐ๋ฐ˜ ๋””์ง€ํ„ธ ์ „ํ™˜์„ ์ „๋ฌธ์œผ๋กœ ํ•˜๋Š” ์ปจ์„คํŒ… ๊ธฐ์—… ๋””์ง€ํ„ธ ๋‹ฅํ„ฐ ์ฃผ์‹ํšŒ์‚ฌ(Digital Doctor Ltd)์˜ CEO๋กœ ์žฌ์งํ–ˆ๋‹ค. ๊ทธ ์ด์ „์—๋Š” SK๊ทธ๋ฃน, IBM, PwC์ปจ์„คํŒ…์—์„œ ์ฃผ์š” ๋ฆฌ๋”์‹ญ ์ง์ฑ…์„ ๋งก์•˜๋‹ค. ํ•œ์–‘๋Œ€ํ•™๊ต์—์„œ ์‚ฐ์—…๊ณตํ•™ ์„์‚ฌ ๋ฐ ํ•™์‚ฌ ํ•™์œ„๋ฅผ ์ทจ๋“ํ–ˆ์œผ๋ฉฐ, ํ•˜๋ฒ„๋“œ ๋น„์ฆˆ๋‹ˆ์Šค ์Šค์ฟจ(Harvard Business School)๊ณผ ์„œ๊ฐ•๋Œ€ํ•™๊ต ๊ฒฝ์˜๋Œ€ํ•™์›์—์„œ ๊ณ ๊ธ‰ ๋ฆฌ๋”์‹ญ ๊ณผ์ •์„ ์ˆ˜๋ฃŒํ–ˆ๋‹ค. ๋˜ํ•œ, MIT ์Šฌ๋ก  ๊ฒฝ์˜๋Œ€ํ•™์›(MIT Sloan)์—์„œ ๊ธฐ์ˆ  ๊ด€๋ จ ๊ณ ๊ธ‰ ๊ณผ์ •์„ ์ด์ˆ˜ํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com

How to get AI agent budgets right in 2026

3 December 2025 at 12:12

With the end of the year around the corner, Iโ€™ve been hearing a common refrain from enterprise IT and transformation leaders: โ€œWhat budget should I allocate for AI agents in 2026?โ€ The question comes as no surprise. While the rest of their organization might be winding down for the holidays, CIOs are gearing up for one of the most high-stakes planning cycles of the last decade.

AI agents are line items in almost every boardroom agenda. CIOs and CTOs are fielding a barrage of requests from their leadership cohort around โ€œWhere are our agents? What outcomes are we expecting? Whatโ€™s the plan for next year?โ€ According to Forrester, CIOs are set to receive more budget for AI in 2026, but itโ€™s a case of more money, more problems. Next year, IT and tech leaders can expect continued business volatility and intensified pressure to justify every AI dollar is well spent.

As CIOs set their AI budgets, itโ€™s worth taking a reality check: many AI projects are still struggling to make it from pilot to production, or if they do make it to production, they quickly find their use case cannot deliver the ROI they had hoped. Thatโ€™s why I believe 2026 is a defining budget cycle. The organizations that select the right projects, invest in talent and capabilities and carefully consider the architecture needed to support agents at scale will build sustainable competitive advantages. As for the others? Theyโ€™ll burn time and money on doomed pilots and incremental tools that offer no real business impact. To make smart bets for a critical year ahead, CIOs must start with understanding how AI agents can deliver real business outcomes instead of just excitement.

What do customers and employees actually want from AI agents?ย 

The reason AI agents are getting board-level attention is the promise to bridge the gap between human intent and business effect through automation. Over the course of the year, Iโ€™ve consulted with hundreds of enterprise leaders seeking to transform their business with AI agents. The ones able to turn those aspirations into transformations all possessed a similar ingredient โ€“ they identified the right use cases to start with. Any CIO and any organization can get this part right.

So what do customers and employees actually want from AI agents? Almost every high-impact AI agent project Iโ€™ve seen this year boils down to the same simple concept: a user expresses an intention, and an agent takes action on their behalf to deliver an outcome. This is the paradigm that separates agentic AI from chatbots. Agents promise to go beyond just information retrieval or recommendations. That capability is valuable, no doubt, but itโ€™s table stakes in todayโ€™s AI world. Customers and employees donโ€™t just want responses or insights; they want assistants that can take tangible actions. They donโ€™t just want AI to help them navigate their supply chain orders across SAP modules; they want to say โ€œorder 10 tons of productโ€ and have their agent deliver that outcome end to end.

The majority of successful AI agent projects Iโ€™ve seen look just like this. Agents for internal teams focus on meaningful ways to improve productivity by empowering workers to turn complex processes into simple requests. No one, especially anyone under 30, wants to spend time learning how to point-and-click their way through a needlessly complex user interface on a SaaS platform. Forward-thinkers are building their agents to ride a layer above core products to turn intention into outcomes. The ROI in these cases is driven by cost and time savings for the business, at scale.

As agentic capabilities evolve, Iโ€™m increasingly seeing this same concept also being applied to AI agents that reinvent the customer experience. Look at the mortgage industry for an example. These lenders report a high drop-off rate in online mortgage applications. The reality is that mortgage applications can be quite complicated. The average applicant is often overwhelmed by financial jargon or documents they may not have readily available. If the user gets confused and steps away, odds are they wonโ€™t come back. Now, imagine replacing that with an AI agent that interacts with the core service. It can answer questions, translate complex financial terms into plain terms in real-time, save the session if needed and securely reach out for bank documents. Just a 1-2% increase in completed applications from this represents a material impact on the bottom line. Thatโ€™s high-impact for the business.

Donโ€™t swing for the fences, just get on baseย 

As youโ€™re allocating your budget for AI in 2026, hereโ€™s my advice: stop chasing moonshots. These vaguely scoped, overgeneralized agent dreams are often expensive, they rarely ship and they burn resources faster than they can create value. Instead, look for opportunities to hit singles and doubles. Keep your eye out for specific, high-value and outcome-driven projects that can deliver wins in months, not years. Iโ€™ll walk you through the coaching that I use with enterprise leaders planning AI projects.

Start with this question: What are 10 processes that are repetitive, well-documented and still being manually performed by humans? Score each one on a 1-10 scale across these three dimensions: the impact if you automated it, the risk if the project fails (where 10 is catastrophic) and the complexity to build and deploy it. The winning formula is high impact, low risk and low complexity. Thatโ€™s your AI sweet spot. Aim your swings there.

One pharmaceutical company used this exact framework and landed on a sleeper hit: agent-based adverse event report processing. Thatโ€™s not glamorous, but it freed up 40% of the teamโ€™s time that went back into actual drug discovery. In sales, Iโ€™m seeing teams use agents to create content production pipelines for outbounds, proposals and follow-ups, which helps speed up cycle times and frees reps to focus on closing deals. In financial services, agents are automating tedious back-office processes that are expensive and labor-intensive, cutting costs and reducing turnaround times by days.

Nailing the ROI formula for AI Agentsย 

So youโ€™ve honed in on the right projects for 2026 AI agents, now comes the hard part: the investment. This is not free; youโ€™ve got to make tough decisions about how to appropriate the budget and how to beef up the teams that will actually go build them. But first, you need to understand something critical about the ROI formula. Return and investment mean widely different things from company to company.ย 

At the enterprise scale, the value proposition for AI rests much more on increasing the bottom line. Enterprises have many more customers, opportunities for efficiency and additional sources of revenue. So even a one to two percent upside on a critical workflow, such as customer acquisition or cost reduction, can yield a material improvement to the bottom line. The scale at which enterprises operate changes the calculus for what automation flows should look like, due to the impact on their core business.

CIOs across the board must assemble the right team and ensure it is properly budgeted and staffed (I wrote on this topic earlier this year). On top of that, organizations must ensure theyโ€™re building AI agents the right way. Your ROI is fundamentally dependent on your ability to scale AI agents across all different teams in your business. Without security, compliance and governance built in from the start, you canโ€™t scale at all. You need to solve for thousands of users, each with their own permissions, and be able to trace every action the agent takes on their behalf. Build these guardrails in from day one, and your agents can become force multipliers. Otherwise, they will drown under token costs to LLMs while the projects never go beyond a prototype.

If 2025 was the introduction to AI agents, then 2026 will be when the winners start to emerge. The companies that break away from the pack wonโ€™t be those that talked the loudest about agents or ran the most proof-of-cycle concepts. It will be the ones who shipped them to production and saved time, made money or created new customer experiences that resonate.ย  The difference wonโ€™t be luck; it will come down to those who approach agents with smart design, the right use case selection and informed bets on the teams and technology to bring automation to life. The right plan could change your companyโ€™s entire trajectory.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

The surprising places agentic AI is cutting the wait โ€” and the waste

3 December 2025 at 08:45

I have spent most of my career accountable for the parts of technology nobody thinks about until something breaks. Service delivery, back-office workflows, knowledge decay, compliance friction and the invisible handoffs that quietly drain budgets. For years, I invested in automation as the answer to operational drag. We built rules, mapped flows and tried to automate the edge cases. But whenever reality changed, those automations snapped. It took me longer to realize I was automating drift.

Agentic AI changes the equation by introducing autonomy, adaptability and multi-step reasoning based on a deep understanding of context. It can escalate when confidence falls and apply policy dynamically. Over the past two years, I have deployed agentic capabilities across IT operations and talent acquisition. The cost savings were real, but the reduction in operational risk mattered more.

What concerns me most is how quickly interest is outpacing understanding. A recent enterprise AI maturity study found that many organizations are considering adopting agentic AI in the next 12 months, yet far fewer report being deeply familiar with AI technology. There is widening daylight between investment and comprehension, and leaders can feel it.

The hidden economics of back-office drag

Service delivery is accounted for as a cost center, but in practice, it behaves like a risk center. When incidents spike, I burn labor hours and credibility. When change freezes, innovation slows. When knowledge walks out the door, complexity compounds. Research from McKinsey estimates that major incident outages can cost more than $300,000 per hour when accounting for downtime, lost productivity and recovery labor. Outages erode trust as quickly as they drain budgets, and the longer the system stays down, the more stakeholders begin to question leadershipโ€™s judgment rather than the failure itself.

Agentic AI gave me ways to address root causes rather than symptoms. It accelerated the pace at which risk surfaced and reduced the dependence on human memory to carry operational knowledge.

IT service automation that actually bends cost curves

The first breakthrough came from reducing low-value, high-volume work. Password resets, access requests, policy clarification and device troubleshooting represented a disproportionate share of tickets. Conversational agents served as the first point of contact, recognizing intent, authenticating users, enforcing policy and triggering workflows. The response someone received at 4 p.m. on a weekday became indistinguishable from the one they received at 2 a.m.

As these agents matured, they evolved beyond conversation. Diagnostic agents pulled logs and compared them to historical incident signatures. Identity agents validated entitlements through policy. Remediation agents performed corrective actions autonomously when confidence thresholds were high enough. The agents could reason, plan and act instead of merely responding.

I also deployed agents that assisted human analysts. They summarized lengthy ticket histories, suggested relevant knowledge articles and drafted follow-up communication. They even generated new content as knowledge articles from closed incidents to expand self-service coverage. This type of coexistence shifted work away from repetition and toward judgment.

In parallel, autonomous agents operated inside infrastructure operations. They validated alerts, correlated telemetry and occasionally took action before anyone knew an issue existed. It was not about removing humans. It was about removing hours of manual investigation that added no value.

These moves consistently reduced incident resolution times. Industry benchmarks already show double-digit percentage decreases in resolution duration when agentic orchestration is applied to major incidents. I saw similar patterns. The improvement compounds because every minute saved in response time reduces the blast radius downstream.

Strengthening compliance and finance through continuous automation

Compliance workflows suffer when human memory carries the load. Before AI, teams stored rules in shared folders and hallway conversations. Today, compliance agents reconcile invoices, validate contract terms and flag anomalies proactively. They create explainable audit trails continuously rather than quarterly. NISTโ€™s AI Risk Management Framework highlights traceability and explainability as foundational principles. Implementing those controls early reduced anxiety across audit teams and replaced after-the-fact cleanup with preventive action. This also reduced risk and elevated compliance reporting.

Finance experienced something similar. Reconciliation agents monitored variances and surfaced unusual patterns. What surprised me most was their reaction. They were not afraid of replacement. They were afraid of errors. When automation reduced manual variance, they became vocal advocates.

Finding use cases through process mapping

One of the most practical methods for identifying where agentic AI can help is process mapping. When I began visualizing workflows end-to-end, bottlenecks became obvious. Process mining tools uncovered rework loops, approval delays and exception handling that never made it onto formal documentation. Seeing work as a series of minor frictions makes it easier to understand where agents can step in.

The most compelling results emerged when agents were orchestrated together. A conversational agent collected symptoms and authenticated the user. A diagnostic agent pulled logs. A knowledge agent suggested resolutions based on pattern similarity. A remediation agent executed the corrective action. An orchestration layer coordinated all of it. That is where the returns accelerate.

Organizations that have leaned into this approach have reported dramatic improvements in self-submitted HR requests, faster employee onboarding and higher satisfaction due to real-time knowledge enrichment. This reinforces a simple truth: removing friction creates participation.

Workflow orchestration reduces cross-function friction

Most operational drag does not come from incidents. It comes from handoffs. Procurement requests that are bounced between finance, IT and security. Access approvals that depend on availability rather than policy. Tickets that accumulate because approvers are out of office or lack clarity. These interactions create delay and noise that nobody can see on a dashboard.

Orchestration agents change that dynamic. They trigger conditional workflows, collect missing information, validate approvals against policy and route requests without human intervention. Approval agents enforce thresholds. Inventory agents check asset life cycle status. Risk agents flag questionable suppliers. Tasks that previously took days now close in hours. And reducing interruptions had the same effect on productivity as adding headcount.

Why I do not build foundation models from scratch

At one point, I considered building a model internally. The idea was tempting. Owning the entire stack felt like a strategic advantage. But foundation models require massive compute, specialized research talent and years of iteration. Instead, I licensed access to best-in-class models and built the agentic layer on top. We used retrieval-augmented generation to feed proprietary documents and policy rules into the model, then layered business logic that governed behavior in context. We designed this with a strong emphasis on data governance, access control and privacy protection to ensure data was handled responsibly and in compliance with regulations.

This hybrid buy-and-enhance approach delivered faster time-to-value, reduced technical risk and allowed us to retain control of proprietary data and logic.

When I would build instead of buy

There are scenarios where owning the full stack makes sense. If AI is central to strategic product differentiation, if data cannot leave owned infrastructure, if regulatory constraints demand full control or if internal AI engineering maturity is high, then building becomes rational rather than romantic. MIT Sloan has explored the productivity paradox of AI, noting that capability without maturity can increase cost rather than reduce it. That matched my experience.

It is also important to recognize that both data and process maturity must be at a high bar before considering custom agentic development. Automating a broken or incomplete process does not eliminate chaos; it multiplies it. Inadequate governance, missing metadata, inconsistent runbooks or contradictory policies will produce unpredictable outcomes at machine speed. AI does not fix drift. It amplifies whatever it touches. When the substrate is clean, autonomy accelerates value. When it is not, it collapses into noise.

Agentic AI in talent acquisition was the unexpected hero

The biggest lift I saw came from HR. Application backlogs caused candidates to drop off. Interview scheduling created friction across time zones. Compensation exceptions slowed approvals. Agentic AI addressed all three. Conversational agents guide candidates through application steps. Scheduling agents reconciled calendars, set up interviews and sent confirmations. Qualification agents screened resumes against policy. Sentiment agents summarized tone and engagement from written and verbal communication, providing summaries of conversations to all parties.

Time-to-fill decreased and candidate satisfaction improved simply by eliminating the waiting. The SHRM Candidate Application Abandonment Study notes that delayed response time is one of the top drivers of candidate abandonment. Agents save time. And when you compress cycle time in recruiting, you increase talent density, which later reduces operational drag across the enterprise.

Cost is shifting from labor to compute

When human workload decreases, inference cost rises. Finance teams are not yet fluent in ROC (return on compute), but this metric will become as common as ROI. Without guardrails, cloud cost drift can quietly consume the savings that automation promised. I track ROC as closely as I track cost per ticket because unmonitored inference is the new runaway labor. Compute cycles do not call in sick or take a vacation and they scale without asking permission.

This is where leaders can get fooled. If compute spend rises faster than human workload declines, autonomy without financial guardrails can turn cloud cost into the new labor balloon โ€” just harder to see, harder to attribute and harder to challenge. The danger is that it hides in budgets where executives are not trained to look. Leaders know how to question headcount, overtime and contractor spend, but they rarely scrutinize the compute charges buried in cloud bills. AI costs grow in technical corners of the budget, where they can expand quietly and avoid the financial scrutiny applied to labor.

In the same way cloud transformed capital expense into operating expense overnight, agentic AI will force us to treat compute as a strategic cost center rather than a utility. If we do not build that discipline now, autonomy will become the most elegant form of overspending we have ever engineered.

What success looks like

In mature environments, I saw fewer escalations, shorter outages, improved hiring velocity and predictable change cycles. Operational friction decreased and innovation increased. Teams felt less interrupted and more trusted. That cultural shift was as valuable as the financial one.

Predictability is the real outcome. When service delivery becomes stable and repeatable, IT stops acting like an internal repair shop and starts behaving like an engine of growth. Reliable delivery creates the headroom to build new products, partner with the business on revenue initiatives and invest in automations that compound value instead of compensating for failure. As the operational noise floor drops, capacity shifts from firefighting to forward motion.

Agentic AI is not just about doing the same work cheaper. It is about creating the conditions where IT can participate in strategy, influence the customer experience and build digital capabilities that generate revenue rather than support it. When systems stop surprising us, we can finally focus on the work that moves the company forward.

Final thought

Agentic AI is not about replacing judgment. It is about protecting it. When machines remove drag, humans spend more time on the decisions that matter. The organizations that treat back-office operations as a resilience discipline, not a cost bucket, will bend cost curves and compress risk where it quietly accumulates.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

SAP employeesโ€™ trust in leadership has diminished since the restructuring

3 December 2025 at 02:09

SAPโ€™s restructuring may have been good for its bottom line, but behind the scenes, it has backfired.

The company did what it promised, said Greyhound Research chief analyst Sanchit Vir Gogia: It wrapped up its restructuring plan, affecting 10,000 employees, by early 2025, kept headcount steady, and delivered strong financial results. But, he said, โ€œNumbers only tell half the story. Inside the organization, something broke.โ€

Thatโ€™s evidenced by a recent internal survey, which revealed that many staff no longer trust company leaders or their strategy.

Trust in SAPโ€™s executive board has fallen by six percentage points since April, to a mere 59%, Chief People Officer Gina Vargiu-Breuer wrote in an internal email seen by Bloomberg. In April 2021, that number was more than 80%, said Bloomberg, citing a local media report.

Confidence in SAPโ€™s execution of its strategy has now dropped to 70%, from 77% in April of this year.

No time to learn

โ€œThat number drops even further in Germany, where only 38% say they fully trust leadership,โ€ Gogia said. โ€œAnd itโ€™s not just a sentiment dip. Over 38,000 employees voiced specific concerns. The pattern is clear: confusion around new performance goals, not enough support to implement AI, unstable team dynamics, and barely any breathing room to learn.โ€

This isnโ€™t resistance to change: โ€œPeople get the vision,โ€ he said. โ€œThe problem is executional load. You cannot drive large-scale transformation, especially AI-first initiatives, without building systems that carry your people with you.โ€

As part of SAPโ€™s plan to transform into a skills-led company by 2028, 80% of employees were to be assigned to modernized job profiles by the middle of this year, SAP chief people officer Gina Vargiu-Breuer told financial analysts attending a company event in May. This was intended to โ€œunleash AI-personalized growth opportunitiesโ€ based on an โ€œexternally benchmarked global skills taxonomyโ€ of 1,500 future-ready skills, she said. The company devotes 15% of working time to continuous personal development, she said.

In the recent email seen by Bloomberg, however, she admitted: โ€œThe feedback shows that not every step [in the transformation] has landed how it should.โ€

Unfiltered Pulse

In an email statement to CIO, SAP said that the Unfiltered Pulse survey that highlighted the issues โ€œwas designed to gather nuanced feedback from employees, focusing on both strengths and areas for improvement. Employees, for instance, have stated that helpful feedback as well as learning and development opportunities are supporting their growth. Results related to team culture are also positive worldwide.โ€

SAP said 84% of its more than 100,000 employees responded to the most recent of the surveys, conducted every six months, and while there were some positives this time, โ€œthe findings also clearly indicate that employee engagement and trust in the board require attention. Following increases in sentiment in the previous iteration, there has been a decrease in the recent Pulse survey. We greatly value this feedback and are taking targeted action in response. We are therefore implementing specific measures to address the input from our employees and to drive meaningful change.โ€

SAP has not revealed details of these measures.

However, Info-Tech Research Group senior advisory analyst Yaz Palanichamy said, โ€œSAP employees feel a sense of disillusionment as a result of the efforts undertaken in supporting this restructuring program.โ€

While SAP had framed the initiative as a strategic pivot towards embracing scalable cloud and AI growth, he said, the sheer number of roles affected, and the way that number ballooned well beyond the original target of 8,000, has left many of SAPโ€™s employees concerned about their jobs and about senior leadership.

They worry about organizational stability and clarity, and about whether there is adequate support for their reskilling, he said: โ€œIf the cultural and operational gaps concerning morale, talent retention, and organizational role alignment are not proactively addressed, this could severely hinder SAPโ€™s growth ambitions [in cloud and AI].โ€

SAP is not alone

SAP isnโ€™t the only company that has faced these issues, Gogia pointed out. โ€œLook beyond SAP, and the same symptoms show up elsewhere. Salesforce saw trust scores crater after its 2023 layoffs. Oracleโ€™s morale took a hit when staff felt shut out of decisions. But SAPโ€™s case stands out because performance at the top was solid, yet employee confidence eroded underneath. That divergence is dangerous. When momentum at the surface isnโ€™t backed by alignment at the core, cracks appear in delivery, consistency breaks down, and partners feel the wobble. Execution doesnโ€™t fail all at once. It frays. Quietly. Progressively.โ€

SAP isnโ€™t ignoring the issues, he noted. It has begun to take action, appointing leaders, communicating priorities, and revisiting how teams are measured.

โ€œThatโ€™s good,โ€ he said. โ€œBut the real fix will come not from announcements but from behavioral evidence. Trust comes back when people stop guessing whatโ€™s next, when systems stabilize, when leaders stay visible, when workloads balance out.โ€

Behavioral drift: The hidden risk every CIO must manage

2 December 2025 at 10:15

Itโ€™s the slow change no one notices: AI models evolve and people adapt to that. Systems learn and then they forget. Behavioral drift is quietly rewriting how enterprises operate, often without anyone noticing until it is too late.

In my own work leading AI-driven transformations, I have learned that change rarely happens through grand rewrites. It happens quietly, through hundreds of micro-adjustments and no dashboard flags. The model that once detected fraud with 95% accuracy slowly starts to slip. Employees sometimes clone automation scripts to meet deadlines. Chatbots begin answering differently than they were trained. Customers discover new ways to use your product that were never accommodated as part of the design.

This slow, cumulative divergence between intended and actual behavior is called behavioral drift: A phenomenon that happens when systems, models and humans evolve out of sync with their original design. It sounds subtle, but its impact is enormous: the line between reliable performance and systemic risk.

For CIOs running AI-native enterprises, understanding drift isnโ€™t optional anymore. Itโ€™s the foundation of reliability, accountability and innovation.

Why behavioral drift matters for CIOs

1. It impacts governance

Under frameworks like the EU Artificial Intelligence Act (2024) and the NIST AI Risk Management Framework (2023), enterprises must continuously monitor AI systems for changes in accuracy, bias and behavior. Drift monitoring isnโ€™t just a โ€œnice to haveโ€ anymore; instead itโ€™s a compliance requirement.

2. It erodes value quietly

Unlike outages, drift doesnโ€™t announce itself. Systems keep running, dashboards stay green, but results slowly degrade. The ROI that once justified an initiative evaporates. CIOs need to treat behavioral integrity the same way they treat uptime: to be measured and managed continuously.

3. Itโ€™s also a signal for innovation

Not all drift can be considered bad. When employees adapt workflows or customers use tools in unexpected ways, that leads to a productive drift. The best CIOs read these signals as early indicators of emerging value rather than deviations to correct.

What causes behavioral drift?

Drift doesnโ€™t come from one source; it emerges from overlapping feedback loops among data, models, systems and people. It often starts with data drift, as new inputs enter the system. That leads to model drift, where relationships between inputs and outcomes change. Then system drift creeps in as code and configurations evolve. Finally, human drift completes the loop where people adapt their behavior to the changing systems, often inventing workarounds.

These forces reinforce one another, creating a self-sustaining cycle. Unless CIOs monitor the feedback loop, theyโ€™ll notice it only when something breaks.

Chart 1: Forces behind behavioral drift

Ankush Dhar and Rohit Dhawan

The human side of drift

Behavioral drift doesnโ€™t just happen in code; it happens in culture as well. When delivery pressures rise, employees often create shadow automations: unofficial scripts or AI shortcuts that bypass governance. Teams adapt dashboards, override AI recommendations or alter workflows to meet goals. These micro-innovations may start as survival tactics but gradually reshape institutional behavior.

This is where policy drift also emerges: procedures written for static systems fail to reflect how AI-driven environments evolve. CIOs must therefore establish behavioral observability โ€” not just technical observability โ€” encouraging teams to report workarounds and exceptions as data points, not violations.

Some organizations run drift retrospectives, which are cross-functional sessions modeled on Agile reviews to discuss where behaviors or automations have diverged from their original intent. This human-centered feedback loop complements technical drift detection and helps identify when adaptive behavior signals opportunity instead of non-compliance.

Detecting and managing drift

Forward-thinking CIOs now treat behavioral drift as an operational metric, not a research curiosity.

  • Detection. Define what normal looks like for your critical systems and instrument your dashboards accordingly. At Uber, engineers built automated drift-detection pipelines that compared live data distributions with training data, flagging early deviations before performance collapses.
  • Diagnosis. Once drift is detected, it is critical to determine its cause. Is it harmful โ€” risking compliance or customer trust โ€” or productive, signaling innovation? Cross-functional analysis across IT, risk, data science and operations helps identify and separate what to fix from what to amplify.
  • Response. For a harmful drift, you can retrain it, adjust its settings or update your rules. For productive drift: document and formalize it into best practices.
  • Institutionalize. Make drift management part of your quarterly reviews. Align it with NISTโ€™s AI RMF 1.0 โ€œMeasure and Manageโ€ functions. Behavioral drift shouldnโ€™t live in the shadows; it belongs on your risk dashboard.

Frameworks and metrics for drift management

Once CIOs recognize how drift unfolds, the next challenge is operationalizing its detection and control. CIOs can anchor their drift monitoring efforts using established standards such as the NIST AI Risk Management Framework or the ISO/IEC 23894:2023 standard for AI risk governance. Both emphasize continuous validation loops and quantitative thresholds for behavioral integrity.

In practice, CIOs can operationalize this by implementing model observability stacks that include:

  • Data drift metrics: Utilize population stability index (PSI), Jensenโ€“Shannon divergence and KL divergence to measure how current input data deviates from training distributions.
  • Model drift metrics: Monitor changes in F1 Score, precision-recall trade-offs or calibration curves over time to assess predictive reliability.
  • Behavioral drift dashboards: Combine telemetry from system logs, automation scripts and user activity to visualize divergences across people, process and technology layers.
  • Automated retraining pipelines integrated with CI/CD workflows, where drift beyond tolerance automatically triggers retraining or human review.

Some organizations use tools from Evidently AI or Fiddler AI to implement these controls, embedding drift management directly into their MLOps life cycle. The goal isnโ€™t to eliminate drift altogether: itโ€™s to make it visible, measurable and actionable before it compounds into systemic risk

Seeing drift in action

Every dashboard tells a unique story. But the most valuable stories arenโ€™t about uptime or throughput; theyโ€™re about behavior. When your fraud modelโ€™s precision quietly slips or when customer-service escalations surge or when employees automate workarounds outside official tools, your organization is sending a message that something fundamental is shifting. These arenโ€™t anomalies; theyโ€™re patterns of evolution. CIOs who can read these signals early donโ€™t just prevent failure, they steer innovation.

The visual below captures that moment when alignment begins to fade. Performance starts as expected, but reality soon bends away from prediction. That growing distance, reflected as the space between designed intent and actual behavior, is where risk hides, but also where opportunity begins.

Chart 2: Behavioral drift over time

Ankush Dhar and Rhoit Dhawan

From risk control to strategic advantage

Behavioral drift management isnโ€™t only defensive: itโ€™s a strategic sensing mechanism. Global financial leaders such as Mastercard and American Express have publicly reported measurable improvements from monitoring how employees and customers interact with AI systems in real time. These adaptive behaviors, while not formally labeled as behavioral drift, illustrate how organizations can turn unplanned human-AI adjustments into structured innovation.

For example, Mastercardโ€™s customer-experience teams have leveraged AI insights to refine workflows and enhance service consistency, while American Express has used conversational-AI monitoring to identify and scale employee-driven adaptations that reduced IT escalations and improved service reliability.

By reframing drift as organizational learning, CIOs can turn adaptive behaviors into repeatable value creation. In continuous-learning enterprises, managing drift becomes a feedback engine for innovation, linking operational resilience with strategic agility.

The mindset shift

The most advanced CIOs are redefining behavioral management as the foundation of digital leadership. In the AI-native enterprise, behavior is infrastructure. When systems learn, people adapt and markets shift, your job isnโ€™t to freeze behavior; itโ€™s to keep everything aligned. Ignoring drift leads to slow decay. Over-controlling it kills creativity. Managing it well builds resilient, adaptive organizations that learn faster than their competitors. The CIO of tomorrow isnโ€™t just the architect of technology; theyโ€™re the steward of enterprise behavior.

CIOs who master this balance build learning architectures, systems and cultures designed to evolve safely. The organizations that thrive in the AI era wonโ€™t be those that eliminate drift, but those that can sense, interpret and harness it faster than their competitors.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

IT ๋ถ€์„œ๊ฐ€ ๋น„์ฆˆ๋‹ˆ์Šค์˜ ๊ธฐ๋Œ€๋ฅผ ๋›ฐ์–ด๋„˜์ง€ ๋ชปํ•˜๋Š” 7๊ฐ€์ง€ ์ด์œ 

1 December 2025 at 22:26

C ๋ ˆ๋ฒจ ๊ฒฝ์˜์ง„๊ณผ ๊ธฐ์—… ์ด์‚ฌํšŒ๋Š” ๋น„์ฆˆ๋‹ˆ์Šค ์„ฑ๊ณต ๊ณ„ํš์˜ ์ƒ๋‹น ๋ถ€๋ถ„์„ ๊ธฐ์ˆ ์— ๊ฑธ๊ณ  ์žˆ๋‹ค. ํผ์†Œ๋‹ˆ๋ธŒ(Personiv)์˜ ๋ณด๊ณ ์„œ์— ๋”ฐ๋ฅด๋ฉด, ๊ธฐ์—… ์ž„์›์˜ 78%๋Š” ํ˜„์žฌ ํ™˜๊ฒฝ์— ๋Œ€ํ•œ โ€œ์„ ์ œ์ ์ด๊ณ  ๋ฏผ์ฒฉํ•œ ๋Œ€์‘โ€์˜ ์ผํ™˜์œผ๋กœ ์ง€๋‚œ 6๊ฐœ์›” ๋™์•ˆ ๊ธฐ์ˆ  ํˆฌ์ž๋ฅผ ๋Š˜๋ ธ๊ฑฐ๋‚˜ ์•ž์œผ๋กœ 6๊ฐœ์›” ์•ˆ์— ๋Š˜๋ฆด ๊ณ„ํš์ด๋ผ๊ณ  ๋‹ตํ–ˆ๋‹ค.

๋˜ KPMG์˜ โ€˜2025 ๊ธ€๋กœ๋ฒŒ CEO ์ „๋งโ€™ ์กฐ์‚ฌ์—์„œ๋Š” CEO์˜ 71%๊ฐ€ AI๋ฅผ ์ตœ์šฐ์„  ํˆฌ์ž ์šฐ์„ ์ˆœ์œ„๋กœ ๊ผฝ์•˜๋Š”๋ฐ, 2024๋…„ 64%์—์„œ ์ฆ๊ฐ€ํ–ˆ๋‹ค. CEO์˜ 69%๋Š” ์ „์ฒด ์˜ˆ์‚ฐ์˜ 10%์—์„œ 20%๋ฅผ AI์—๋งŒ ๋ฐฐ์ •ํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์‘๋‹ตํ–ˆ๋‹ค.

์ „๋ฐ˜์ ์œผ๋กœ ์ง€๊ธˆ์˜ ํ™”๋‘๋Š” ๋””์ง€ํ„ธ ํŠธ๋žœ์Šคํฌ๋ฉ”์ด์…˜์ด๋‹ค. EY-ํŒŒ๋ฅดํ…Œ๋…ผ(EY-Parthenon)์ด 2025๋…„ 9์›”์— ์‹ค์‹œํ•œ CEO ์„ค๋ฌธ ์กฐ์‚ฌ์— ๋”ฐ๋ฅด๋ฉด, ์ตœ๊ณ  ๊ฒฝ์˜์ž์˜ 52%๊ฐ€ โ€œํฌํŠธํด๋ฆฌ์˜ค ์ „ํ™˜์„ ๊ฐ€์†ํ•˜๊ธฐ ์œ„ํ•ด ํˆฌ์ž๋ฅผ ํ™•๋Œ€ํ•  ๊ณ„ํšโ€์ด๋ผ๊ณ  ๋‹ตํ–ˆ๋‹ค. ์กฐ์‚ฌ ๋‚ด์šฉ์€ ์‹œ์žฅ๊ณผ ๊ณ ๊ฐ ๊ธฐ๋Œ€์˜ ๋ณ€ํ™”์— ์ ์‘ํ•˜๋Š” ์ผ์ด ๋” ์ด์ƒ ์„ ํƒ์ด ์•„๋‹ˆ๋ผ ์„ฑ์žฅ์„ ์œ„ํ•œ ํ•„์ˆ˜ ๊ณผ์ œ๋ผ๋Š” ์ธ์‹์„ ๋ณด์—ฌ์ค€๋‹ค.

์ด๋Ÿฐ ๊ธฐ๋Œ€๋Š” IT ๋ถ€์„œ๊ฐ€ ๋น„์ฆˆ๋‹ˆ์Šค ์„ฑ๊ณผ๋ฅผ ์ด๋„๋Š” ํ˜์‹ ๊ณผ ์ „ํ™˜์„ ์ œ๊ณตํ•ด์•ผ ํ•œ๋‹ค๋Š” ์••๋ฐ•์œผ๋กœ ์ด์–ด์ง„๋‹ค. ๋งŽ์€ ๊ฒฝ์šฐ ๊ธฐ์—…์€ IT ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๊ฐ€ ๋ชฉํ‘œ๋ฅผ ๋‹ฌ์„ฑํ•˜๋Š” ์ˆ˜์ค€์„ ๋„˜์–ด์„œ๋Š” ์„ฑ๊ณผ๋ฅผ ๋‚ด์ฃผ๊ธฐ๋ฅผ ๋ฐ”๋ž€๋‹ค.

์ด๋ ‡๊ฒŒ ์š”๊ตฌ ์ˆ˜์ค€์ด ๋†’๋‹ค๋Š” ๊ฒƒ์€ ์—ฌ๋Ÿฌ ์ด์œ ๋กœ ๋งŽ์€ IT ๋ถ€์„œ์— ๊ฐ๋‹นํ•˜๊ธฐ ์–ด๋ ค์šด ๊ณผ์ œ๊ฐ€ ๋œ๋‹ค. IT ๋ถ€์„œ๊ฐ€ ๊ธฐ๋Œ€์น˜๋ฅผ ๋„˜์–ด์„œ์ง€ ๋ชปํ•˜๋Š” 7๊ฐ€์ง€ ์ด์œ ์™€ CIO๋Š” ์–ด๋–ป๊ฒŒ ์ด๋Ÿฐ ์žฅ๋ฒฝ์„ ๊ทน๋ณตํ•ด์•ผ ํ•˜๋Š”์ง€ ์•Œ์•„๋ณธ๋‹ค.

1. ์ผ์ƒ ์šด์˜ ์œ ์ง€ ์—…๋ฌด์— ๋„ˆ๋ฌด ๋งŽ์€ ์‹œ๊ฐ„์„ ์“ด๋‹ค

์ธํฌํ… ๋ฆฌ์„œ์น˜ ๊ทธ๋ฃน(Info-Tech Research Group)์˜ CIO ํ”„๋ž™ํ‹ฐ์Šค ๋ฆฌ์„œ์น˜ ๋‹ด๋‹น ๋””๋ ‰ํ„ฐ ํ—ค์„œ ๋ฆฌ์–ด-๋จธ๋ฆฌ๋Š” โ€œ๊ธฐ์ˆ  ์—”์ง„์„ ์›ํ™œํžˆ ๋Œ๋ฆฌ๋Š” ์ผ์€ ํ•„์ˆ˜์ง€๋งŒ, ๊ทธ๊ฒƒ๋งŒ์œผ๋กœ๋Š” CEO์™€ ๋‹ค๋ฅธ ๊ธฐ์—… ๋ฆฌ๋”๋ฅผ ๊ฐ๋™์‹œํ‚ค์ง€๋Š” ๋ชปํ•œ๋‹คโ€๋ผ๊ณ  ์ง€์ ํ–ˆ๋‹ค.

๊ทธ๋Ÿผ์—๋„ ์—ฌ์ „ํžˆ ๋งŽ์€ IT ๋ถ€์„œ๊ฐ€ ์—ฌ๊ธฐ์— ์—…๋ฌด์˜ ์ƒ๋‹น ๋ถ€๋ถ„์„ ์Ÿ๊ณ  ์žˆ๋‹ค. ๋„คํŠธ์›Œํฌ ๊ด€๋ฆฌ ์†Œํ”„ํŠธ์›จ์–ด ์—…์ฒด ์˜ค๋น…(Auvik)์ด ๋ฐœ๊ฐ„ํ•œ ๋ณด๊ณ ์„œ์— ๋”ฐ๋ฅด๋ฉด, IT ์ „๋ฌธ๊ฐ€์˜ 58%๊ฐ€ ๊ทผ๋ฌด ์‹œ๊ฐ„์˜ ์ ˆ๋ฐ˜ ์ด์ƒ์„ ์ตœ์ข… ์‚ฌ์šฉ์ž๋ฅผ ์œ„ํ•œ ํ‹ฐ์ผ“ ์ฒ˜๋ฆฌ์— ์“ด๋‹ค๊ณ  ๋‹ตํ–ˆ๋‹ค. ๋˜ ์กฐ์‚ฌ ๋Œ€์ƒ IT ์ „๋ฌธ ์ธ๋ ฅ์˜ 32%๋Š” โ€˜์œ„์‹œ๋ฆฌ์ŠคํŠธ์— ์žˆ๋Š” ํ•ญ๋ชฉ์„ ๊ตฌํ˜„ํ•˜์ง€ ๋ชปํ•œ ์ด์œ โ€™๋กœ โ€œ์‹œ๊ฐ„์ด ๋ถ€์กฑํ•˜๋‹คโ€๋ฅผ ๊ผฝ์•˜๋Š”๋ฐ, ๊ฐ€์žฅ ๋†’์€ ๋น„์ค‘์„ ์ฐจ์ง€ํ–ˆ๋‹ค.

๋ฆฌ์–ด-๋จธ๋ฆฌ๋Š” โ€œ์กฐ์ง, ํŠนํžˆ ์ตœ๊ณ  ๊ฒฝ์˜์ง„์€ IT๊ฐ€ ๋” ๋†’์€ ์ˆ˜์ค€์˜ ์ผ์„ ํ•ด์ฃผ๊ธฐ๋ฅผ ๊ธฐ๋Œ€ํ•œ๋‹คโ€๋ผ๋ฉฐ, โ€œ๋””์ง€ํ„ธ ํŠธ๋žœ์Šคํฌ๋ฉ”์ด์…˜์„ ์ด๋Œ๊ณ  ๋น„์ฆˆ๋‹ˆ์Šค ํŒŒํŠธ๋„ˆ๊ฐ€ ๋˜๊ณ , ๋น„์ฆˆ๋‹ˆ์Šค ๊ธฐํšŒ๋ฅผ ํ™•์žฅํ•˜๋Š” ์—ญํ• ์„ IT์— ๊ธฐ๋Œ€ํ•œ๋‹ค. ๊ฒฝ์˜์ง„์€ IT๊ฐ€ ๋น„์ฆˆ๋‹ˆ์Šค๋ฅผ ์ „ํ™˜ํ•˜๊ณ  ํ™•์žฅํ•ด์ฃผ๊ธฐ๋ฅผ ์›ํ•œ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ์ด์–ด โ€œIT๋Š” ์œ ์ง€๋ณด์ˆ˜์™€ ๊ด€๋ฆฌ์— ๋ชจ๋“  ์‹œ๊ฐ„์„ ์“ฐ๊ณ  ์žˆ์–ด ์ด๋Ÿฐ ๊ธฐ๋Œ€๋ฅผ ๋”ฐ๋ผ๊ฐ€๊ฑฐ๋‚˜ ๋„˜์–ด์„œ์ง€ ๋ชปํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ๋ง๋ถ™์˜€๋‹ค.

๋ฆฌ์–ด-๋จธ๋ฆฌ์™€ ์—ฌ๋Ÿฌ ์ „๋ฌธ๊ฐ€์— ๋”ฐ๋ฅด๋ฉด, CIO๋Š” ๊ธฐ์ˆ ์„ ์‚ฌ์šฉํ•ด IT ํ”„๋กœ์„ธ์Šค์™€ ์›Œํฌํ”Œ๋กœ์šฐ๋ฅผ ์ „ํ™˜ํ•ด์•ผ ํ•œ๋‹ค. IT๋ถ€์„œ๊ฐ€ ๋‹ค๋ฅธ ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ€์„œ์—์„œ ํ•˜๋Š” ์ผ์ด๋‹ค. ์ผ์ƒ์ ์ธ ์œ ์ง€๋ณด์ˆ˜ ์—…๋ฌด๋Š” ์ž๋™ํ™”ํ•˜๊ณ  ๋ณต์žกํ•œ ํ”„๋กœ์„ธ์Šค๋Š” AI๋ฅผ ๋„์ž…ํ•ด ์ฒ˜๋ฆฌํ•˜๋ฉฐ, IT ์ง์›์ด ์‚ฌ์šฉํ•˜๋Š” ๋„๊ตฌ์™€ ๊ธฐ์ˆ ์„ ๋‹จ์ˆœํ™”ํ•ด ์—…๋ฌด๋ฅผ ๊ฐ„์†Œํ™”ํ•˜๊ณ  ์‹œ๊ฐ„์„ ๋˜์ฐพ์•„์•ผ ํ•œ๋‹ค. ๋˜ CIO๋Š” ๋น„์ฆˆ๋‹ˆ์Šค์— ๊ฐ€์žฅ ํฐ ๊ฐ€์น˜๋ฅผ ์ฃผ๋Š” ์ „๋žต์  ์—…๋ฌด๋ฅผ, ์˜ํ–ฅ์ด ํฌ์ง€ ์•Š์€ ์œ ์ง€๋ณด์ˆ˜ ์—…๋ฌด๋ณด๋‹ค ์šฐ์„ ์ˆœ์œ„์— ๋‘์–ด์•ผ ํ•œ๋‹ค.

2. ๊ธฐ๋Œ€์น˜์— ๋Œ€ํ•œ ๋ช…ํ™•์„ฑ์ด ๋ถ€์กฑํ•˜๋‹ค

IT ๋ถ€์„œ๊ฐ€ ๊ธฐ๋Œ€์น˜๋ฅผ ๋„˜์–ด์„œ์ง€ ๋ชปํ•˜๋Š” ๋˜ ๋‹ค๋ฅธ ์ด์œ ๋Š” ๊ธฐ๋Œ€์น˜๊ฐ€ ๋ฌด์—‡์ธ์ง€ ๋ช…ํ™•ํžˆ ์ดํ•ดํ•˜์ง€ ๋ชปํ•˜๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

ํŽ˜๊ฐ€์‹œ์Šคํ…œ์ฆˆ(Pegasystems)์˜ CIO ๋ฐ์ด๋น„๋“œ ๋น„๋„๋‹ˆ๋Š” โ€œ์„ฑ๊ณต์ด ๋ฌด์—‡์ธ์ง€์— ๋Œ€ํ•œ ๋ถ„๋ช…ํ•œ ๊ทธ๋ฆผ์ด ์—†์–ด์„œ ๊ธฐ๋Œ€์น˜๊ฐ€ ๋ช…ํ™•ํžˆ ์ •์˜๋˜์ง€ ์•Š๊ณ , ๊ทธ ๋•Œ๋ฌธ์— ๊ธฐ๋Œ€์— ๊ฒฉ์ฐจ๊ฐ€ ์ƒ๊ธฐ๋Š” ๊ฒฝ์šฐ๋ฅผ ์—ฌ๋Ÿฌ ๋ฒˆ ๋ดค๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ๋น„๋„๋‹ˆ๋Š” ๋ช…ํ™•์„ฑ์„ ์–ป์œผ๋ ค๋ฉด IT๊ฐ€ ๋น„์ฆˆ๋‹ˆ์Šค ๋ฆฌ๋”๊ฐ€ ์›ํ•˜๋Š” ๊ฒฐ๊ณผ์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ , ๋น„์ฆˆ๋‹ˆ์Šค ์ง€ํ‘œ๋ฅผ ์‚ฌ์šฉํ•ด ์„ฑ๊ณต์„ ์ธก์ •ํ•ด์•ผ ํ•œ๋‹ค๊ณ  ์กฐ์–ธํ–ˆ๋‹ค.

์ปจ์„คํŒ… ๋ฐ ์„œ๋น„์Šค ๊ธฐ์—… CGI์˜ ๊ธ€๋กœ๋ฒŒ ๋น„์ฆˆ๋‹ˆ์Šค ์—”์ง€๋‹ˆ์–ด๋ง ๋‹ด๋‹น ์ˆ˜์„ ๋ถ€์‚ฌ์žฅ ์•„๋งˆ๋ฅด ์•„์Šค์™€ํƒ€๋Š” โ€œ์šฐ์„  ์˜ฌ๋ฐ”๋ฅธ ์„ฑ๊ณผ๋ฅผ ์ธก์ •ํ•˜๋Š” ๊ฒƒ๋ถ€ํ„ฐ ์‹œ์ž‘ํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๋ฉฐ, โ€œ์ง„์ทจ์ ์ธ CIO๋Š” โ€˜์šฐ๋ฆฌ๊ฐ€ ๋ฌธ์ œ๋ฅผ ์ œ๋Œ€๋กœ ํ•ด๊ฒฐํ•˜๊ณ  ์žˆ๋Š”๊ฐ€?โ€™๋ผ๊ณ  ์งˆ๋ฌธํ•˜๊ณ , ๋น„์ฆˆ๋‹ˆ์Šค์™€ ์ž์ฃผ ํ™•์ธํ•˜๋ฉด์„œ โ€˜๊ฐ™์€ ๊ฒฐ๊ณผ๋ฅผ ๋ชฉํ‘œ๋กœ ํ•˜๊ณ  ์žˆ๋Š”๊ฐ€?โ€™๋ผ๊ณ  ๋ฌป๋Š”๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์•„์Šค์™€ํƒ€๋Š” ๋˜ ์„ ๋„์ ์ธ CIO๋Š” IT ๋ถ€์„œ์— ์–ด๋–ค ํ”„๋กœ์ ํŠธ์™€ ํ”„๋กœ๊ทธ๋žจ์„ ์ถ”์ง„ํ•˜๋Š”์ง€, ๊ทธ ๊ฒฐ๊ณผ๊ฐ€ ์กฐ์ง์— ์™œ ์ค‘์š”ํ•œ์ง€ ๊ทธ ์ด์œ ๋ฅผ ๊ณต์œ ํ•œ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์•„์Šค์™€ํƒ€๋Š” โ€œ์ด ์ ์„ ์„ค๋ช…ํ•˜๊ณ  ๋ฐ˜๋ณตํ•ด ๊ฐ•์กฐํ•˜๋Š” ์ผ์ด ๋งค์šฐ ์ค‘์š”ํ•˜๋‹ค. IT ๋ถ€์„œ๋Š” ๊ทธ ์ผ์ด ์–ด๋–ค ์ฐจ์ด๋ฅผ ๋งŒ๋“œ๋Š”์ง€ ์•Œ๊ณ  ์‹ถ์–ด ํ•˜๊ณ , ๋ชฉ์  ์˜์‹์„ ๋ถ€์—ฌํ•˜๋Š” ์ผ์ด ์ค‘์š”ํ•˜๋‹คโ€๋ผ๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

3. ๋น„์ฆˆ๋‹ˆ์Šค ํŒŒํŠธ๋„ˆ๊ฐ€ ์•„๋‹ˆ๋ผ ์†”๋ฃจ์…˜ ์—…์ฒด์ฒ˜๋Ÿผ ํ–‰๋™ํ•œ๋‹ค

๋น” ์†Œํ”„ํŠธ์›จ์–ด ๊ทธ๋ฃน(Veeam Software Group)์˜ CIO ๋„ค์ดํŠธ ์ปค์ธ ๋Š” CIO์™€ ์ง์›์ด ๊ฑฐ์˜ ๊ฑฐ๋ž˜์—๋งŒ ์ดˆ์ ์„ ๋งž์ถฐ ์†”๋ฃจ์…˜ ์—…์ฒด์ฒ˜๋Ÿผ ์ผํ•˜๋Š” IT ๋ถ€์„œ๋ฅผ ๋ณธ ๊ฒฝํ—˜์ด ์žˆ๋‹ค๊ณ  ๋งํ–ˆ๋‹ค. ๋™์‹œ์— ๋น„์ฆˆ๋‹ˆ์Šค ๋™๋ฃŒ์™€ ์–ด๊นจ๋ฅผ ๋‚˜๋ž€ํžˆ ํ•˜๋ฉฐ ์ผํ•˜๊ณ , ์›ํ•˜๋Š” ๊ฒฐ๊ณผ๋ฅผ ํ•จ๊ป˜ ๋‹ฌ์„ฑํ•˜๊ธฐ ์œ„ํ•ด ์ดํ•ด๊ด€๊ณ„์™€ ์ฑ…์ž„์„ ๊ณต์œ ํ•˜๋Š” ์ „๋žต์  ํŒŒํŠธ๋„ˆ๋กœ ํ–‰๋™ํ•˜๋Š” IT ๋ถ€์„œ๋„ ๋ดค๋‹ค๊ณ  ๋ง๋ถ™์˜€๋‹ค.

์ „๋žต์  ํŒŒํŠธ๋„ˆ๋กœ ํ–‰๋™ํ•˜๋Š” IT ๋ถ€์„œ๊ฐ€ ๊ธฐ๋Œ€์น˜๋ฅผ ๋„˜๋Š” ์„ฑ๊ณผ๋ฅผ ๋‚ธ๋‹ค. ์ปค์ธ ๋Š” โ€œ์˜ค๋Š˜๋‚  CIO๋Š” ์กฐ์ง์—์„œ ๋งค์šฐ ์ค‘์š”ํ•œ ์—ญํ• ์ด๋‹ค. IT๋Š” ์กฐ์ง์˜ ๋ชจ๋“  ๊ตฌ์„ฑ์›์„ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ๋ช‡ ์•ˆ ๋˜๋Š” ๊ธฐ๋Šฅ ๊ฐ€์šด๋ฐ ํ•˜๋‚˜์ด๊ธฐ ๋•Œ๋ฌธ์ด๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ๋˜, โ€œCIO๋Š” ์กฐ์ง ์ „์ฒด๋ฅผ ์กฐ๋งํ•  ์ˆ˜ ์žˆ๊ณ , ์กฐ์ง์„ ๊ฐœ์„ ํ•  ๋ฐฉ๋ฒ•์„ ๋ฐœ๊ฒฌํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋ž˜์„œ CIO๋Š” IT ๋ถ€์„œ์™€ ๋‹ค๋ฅธ ์ž„์›์—๊ฒŒ IT๊ฐ€ ์กฐ์ง์„ ์•ž์œผ๋กœ ๋‚˜์•„๊ฐ€๊ฒŒ ํ•˜๋Š” ๋ฐ ๊ธฐ์—ฌํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ๊ด€์ ์„ ๋ถ„๋ช…ํžˆ ์ œ์‹œํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

4. ์„ฑ๊ณต์„ ์œ„ํ•ด ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ€์„œ์— ์š”๊ตฌํ•ด์•ผ ํ•  ์—ญํ• ์„ ์ถฉ๋ถ„ํžˆ ๊ฐ•์กฐํ•˜์ง€ ๋ชปํ•œ๋‹ค

IT์™€ ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ€์„œ์˜ ํŒŒํŠธ๋„ˆ์‹ญ์ด ์„ฑ๊ณตํ•˜๋ ค๋ฉด ์–‘์ธก ๋ชจ๋‘๊ฐ€ ๊ธฐ์—ฌํ•ด์•ผ ํ•œ๋‹ค. ํ•˜์ง€๋งŒ, ํ•ญ์ƒ ๊ทธ๋Ÿฐ ๊ฒƒ์€ ์•„๋‹ˆ๋‹ค. ๋น„๋„๋‹ˆ์˜ ์„ค๋ช…์— ๋”ฐ๋ฅด๋ฉด, IT ์ธ๋ ฅ์ด ์„ฑ๊ณต์ ์ธ ์ œํ’ˆ์„ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด ๋ฌด์—‡์ด ํ•„์š”ํ•˜๊ณ , ๋ชฉํ‘œ๋ฅผ ๋›ฐ์–ด๋„˜๋Š” ๊ฒฐ๊ณผ๋ฅผ ๋‚ด๊ธฐ ์œ„ํ•ด ๋ฌด์—‡์„ ํ•ด์•ผ ํ•˜๋Š”์ง€ ๋ช…ํ™•ํžˆ ์ดํ•ดํ•˜๋Š” ๋ฐ˜๋ฉด, ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ€์„œ๋Š” ๊ทธ ์ˆ˜์ค€์— ์ด๋ฅด์ง€ ๋ชปํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋‹ค.

๋น„๋„๋‹ˆ๋Š” ์ฑ—๋ด‡ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋ฅผ ์˜ˆ๋กœ ๋“ค์—ˆ๋‹ค. IT ๋ถ€์„œ๋Š” ํŠน์ • ๋ฐ์ดํ„ฐ ํ™•๋ณด๊ฐ€ ์„ฑ๊ณต์˜ ํ•ต์‹ฌ์ด๋ผ๋Š” ์‚ฌ์‹ค์„ ์ธ์‹ํ–ˆ์ง€๋งŒ, ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ€์„œ๋Š” ์ด ๋ฐ์ดํ„ฐ ์ œ๊ณต์—์„œ ์–ด๋–ค ์—ญํ• ์„ ํ•ด์•ผ ํ•˜๋Š”์ง€, ๋ฐ์ดํ„ฐ๋ฅผ ์–‘ํ˜ธํ•œ ํ˜•ํƒœ๋กœ ์ค€๋น„ํ•ด์•ผ ํ•œ๋‹ค๋Š” ์ , ์ด๋ฅผ ์ œ๋•Œ ์ œ๊ณตํ•ด์•ผ ํ•œ๋‹ค๋Š” ์ ์„ ์ถฉ๋ถ„ํžˆ ์ดํ•ดํ•˜์ง€ ๋ชปํ–ˆ๋‹ค.

๋น„๋„๋‹ˆ๋Š” โ€œ๋น„์ฆˆ๋‹ˆ์Šค ์กฐ์ง์€ IT ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋ฅผ ์„ฑ๊ณต์‹œํ‚ค๊ธฐ ์œ„ํ•ด ๋ฌด์—‡์ด ๊ฒฐํ•ฉ๋ผ์•ผ ํ•˜๋Š”์ง€, ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ€์„œ๊ฐ€ ๋ฌด์—‡์„ ๊ฐ€์ ธ์™€์•ผ ํ•˜๋Š”์ง€, IT๊ฐ€ ๋ฌด์—‡์„ ๊ฐ€์ ธ์™€์•ผ ํ•˜๋Š”์ง€๋ฅผ ์™„์ „ํžˆ ์ดํ•ดํ•˜์ง€ ๋ชปํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋‹คโ€๋ผ๊ณ  ์ง€์ ํ–ˆ๋‹ค.

์ด๋Ÿฐ ๊ฒฝ์šฐ ์ตœ์ข… ๊ฒฐ๊ณผ๋ฌผ์€ ์ฑ—๋ด‡ ์‚ฌ๋ก€์ฒ˜๋Ÿผ โ€œ์ข‹์€ ๊ฒฐ๊ณผ๋ฅผ ๋‚ด์ง€๋งŒ ํƒ์›”ํ•œ ๊ฒฐ๊ณผ๊นŒ์ง€๋Š” ๊ฐ€์ง€ ๋ชปํ•˜๋Š”โ€ ์ˆ˜์ค€์— ๋จธ๋ฌด๋ฅผ ์ˆ˜ ์žˆ๋‹ค. ๋น„๋„๋‹ˆ๋Š” ์ด๋Ÿฐ ๊ฒฝํ—˜์„ ํ†ตํ•ด ์ดˆ๊ธฐ ๋‹จ๊ณ„์—์„œ ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ€์„œ๊ฐ€ ํ•ด์•ผ ํ•  ์ผ๊ณผ ํ•„์š”ํ•œ ์‹œ๊ฐ„์„ ๋ช…ํ™•ํžˆ ์„ค๋ช…ํ•˜๋Š” ๋ฒ•์„ ๋ฐฐ์› ๋‹ค๊ณ  ๋งํ–ˆ๋‹ค. ์ด๋Ÿฐ ๊ตํ›ˆ์€ ํƒ„ํƒ„ํ•œ ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜๊ณผ ์น˜๋ฐ€ํ•œ ๊ณ„ํš์˜ ๊ฐ€์น˜๋ฅผ ๋‹ค์‹œ ํ™•์ธ์‹œ์ผœ ์ค€๋‹ค.

5. ํšจ๊ณผ์ ์ธ ํ”„๋กœ์ ํŠธ ์šฐ์„ ์ˆœ์œ„ ์„ค์ • ํ”„๋ž™ํ‹ฐ์Šค๋ฅผ ์ง€ํ‚ค์ง€ ๋ชปํ•œ๋‹ค

CIO๋Š” ์˜ค๋Š˜๋‚  IT์— ๊ณผ์ค‘ํ•œ ์—…๋ฌด๊ฐ€ ์Ÿ์•„์ง€๊ณ  ์žˆ๋‹ค๊ณ  ์ž…์„ ๋ชจ์€๋‹ค. ๋น„๋„๋‹ˆ๋Š” โ€œ๋ชจ๋‘๊ฐ€ ์„œ๋กœ ๋‹ค๋ฅธ ํ”„๋กœ์ ํŠธ์™€ ์„œ๋กœ ๋‹ค๋ฅธ ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ€์„œ์˜ ๋‹ค์–‘ํ•œ ์šฐ์„ ์ˆœ์œ„๋ฅผ ๋™์‹œ์— ์ฒ˜๋ฆฌํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๋ฉฐ, โ€œIT ๋ฆฌ๋”๋Š” ๋„๋Š” ์š”์ฒญ์„ ๊ฑฐ์ ˆํ•˜์ง€ ์•Š๊ณ , ๊ฐ€๋Šฅํ•˜๊ฒŒ ๋งŒ๋“ค๊ณ  ์‹ถ์–ด ํ•œ๋‹ค. ํ•˜์ง€๋งŒ ์–ด๋–ค ํ•œ๊ณ„๋ฅผ ๊ฐ–๊ณ  ์žˆ๋Š”์ง€ ์ดํ•ดํ•˜๋Š” ์ผ์ด ์ค‘์š”ํ•˜๋‹ค. ์ง€๋‚˜์น˜๊ฒŒ ๋งŽ์€ ์ผ์„ ๋– ๋งก์œผ๋ฉด ๊ธฐ๋Œ€๋ฅผ ์ถฉ์กฑํ•˜์ง€ ๋ชปํ•˜๊ณ  ๊ธ์ •์ ์ธ ๊ฒฐ๊ณผ๋„ ๋‚ด์ง€ ๋ชปํ•œ๋‹คโ€๋ผ๊ณ  ์ง€์ ํ–ˆ๋‹ค.

์ด๋Ÿฐ ์ƒํ™ฉ์„ ํ”ผํ•˜๊ธฐ ์œ„ํ•ด ๋น„๋„๋‹ˆ๋Š” ๊ธฐ์—… ๋ชฉํ‘œ์— ๋ถ€ํ•ฉํ•˜๋Š” ํ”„๋กœ์ ํŠธ๋ฅผ ์šฐ์„ ์ˆœ์œ„์— ๋‘๊ณ  ์—ญ๋Ÿ‰ ๊ณ„ํš์„ ์—„๊ฒฉํ•˜๊ฒŒ ๊ด€๋ฆฌํ•œ๋‹ค. ๋˜ ํŒ€ ๊ตฌ์„ฑ์›์ด ์ด๋Ÿฐ ํ”„๋ž™ํ‹ฐ์Šค๋ฅผ ๋”ฐ๋ฅด๋„๋ก ํ•ด ๋น„์ฆˆ๋‹ˆ์Šค ๋™๋ฃŒ์™€์˜ ํšŒ์˜์—์„œ ๊ฐ‘์ž๊ธฐ ๋‚˜์˜จ โ€˜์• ์ • ํ”„๋กœ์ ํŠธโ€™์— IT ์ž์›์„ ์•ฝ์†ํ•˜๋Š” ์ผ์ด ์—†๋„๋ก ํ•˜๊ณ  ์žˆ๋‹ค.

6. ์ง€๋‚˜์น˜๊ณ  ๋น„ํ˜„์‹ค์ ์ธ ๊ธฐ๋Œ€๋ฅผ ๋งž์ถ”๋ ค ํ•œ๋‹ค

ํ”ผ๋‹‰์Šค ๋Œ€ํ•™๊ต IT ๋ถ€์‚ฌ์žฅ ์„€๋„Œ T. ์œŒ์Šจ์€ โ€œํŠนํžˆ AI ๋“ฑ์žฅ ์ดํ›„ ๋„์ž…๊ณผ ๊ด€๋ จ๋œ ๊ธฐ๋Œ€ ์ˆ˜์ค€์ด ๋ถˆ๊ณผ 1๋…„ ์ „๋ณด๋‹ค ํ›จ์”ฌ ๋†’์•„์กŒ๋‹ค. ๊ฒฐ๊ณผ๋ฌผ์— ๋Œ€ํ•œ ์š”๊ตฌ๊ฐ€ ๊ณผ๊ฑฐ ์–ด๋А ๋•Œ๋ณด๋‹ค ํฌ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ์œŒ์Šจ์€ ์ด๋ ‡๊ฒŒ ๋†’์•„์ง€๋Š” ๊ธฐ๋Œ€๋ฅผ ์ถฉ์กฑํ•˜๊ธฐ ์œ„ํ•ด ํ”ผ๋‹‰์Šค ๋Œ€ํ•™๊ต IT ๋ถ€์„œ๊ฐ€ AI๋ฅผ ํฌํ•จํ•œ ๋‹ค์–‘ํ•œ ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•ด ์—…๋ฌด ๋ฐฉ์‹์„ ๋ฐ”๊พธ๊ณ , IT ์ธ๋ ฅ์— ๋Œ€ํ•œ ๊ต์œก์„ ์˜๋ฌดํ™”ํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์ด ๊ฐ™์€ ์กฐ์น˜ ๋•๋ถ„์— IT ๋ถ€์„œ๋Š” ์š”๊ตฌ ์ˆ˜์ค€์„ ๋”ฐ๋ผ๊ฐ€๋Š” ๋ฐ ๊ทธ์น˜์ง€ ์•Š๊ณ  โ€œ์—ฌ๋Ÿฌ ๋ฐฐ์˜ ์„ฑ๊ณผ๋ฅผ ๋Œ๋ ค์ฃผ๋Š”โ€ ๊ฒฐ๊ณผ๋ฅผ ๋‚ด๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ์œŒ์Šจ์€ IT ๋ฆฌ๋”๊ฐ€ โ€œ๋ณด์œ  ์ž์›์œผ๋กœ ํŒ€์ด ๋ฌด์—‡์„ ์ œ๊ณตํ•  ์ˆ˜ ์žˆ๋Š”์ง€์— ๋Œ€ํ•œ ์ ์ ˆํ•œ ๊ธฐ๋Œ€์น˜๋ฅผ ์„ค์ •ํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค. ๋˜, โ€œ์ˆ˜์š”๋Š” ํ•ญ์ƒ ์ œ๊ณต ์—ญ๋Ÿ‰์„ ์ดˆ๊ณผํ•  ๊ฒƒโ€์ด๋ผ๊ณ  ๋ง๋ถ™์˜€๋‹ค.

ํ”ผ๋‹‰์Šค ๋Œ€ํ•™๊ต๋Š” IT ๋ถ€์„œ๊ฐ€ ์ œ๊ณตํ•  ์ˆ˜ ์žˆ๋Š” ๋‚ด์šฉ์„ ์ •ํ™•ํžˆ ๊ณ„ํšํ•  ์ˆ˜ ์žˆ๋„๋ก ์ˆ˜ํ–‰ ์ค‘์ธ ์—…๋ฌด๋ฅผ ๋ฉด๋ฐ€ํžˆ ์ถ”์ ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฐ ๋ฐฉ์‹์œผ๋กœ ํŒ€์ด ๊ณผ๋„ํ•œ ์•ฝ์†์„ ํ•˜์ง€ ์•Š๋„๋ก ๊ด€๋ฆฌํ•œ๋‹ค. ๋˜ 2025๋…„ 10์›” AWS ์žฅ์• ๋กœ ์ž‘์—… ๊ณ„ํš์— ์ฐจ์งˆ์ด ์ƒ๊ฒผ์„ ๋•Œ์ฒ˜๋Ÿผ, IT ๋ฆฌ๋”๋Š” ๋น„์ฆˆ๋‹ˆ์Šค ๋™๋ฃŒ์™€ ์ž์ฃผ ์†Œํ†ตํ•˜๋ฉด์„œ ์—…๋ฌด๊ฐ€ ๊ณ„ํš๋Œ€๋กœ ์ง„ํ–‰๋˜๋Š”์ง€ ํ™•์ธํ•˜๊ณ  ๊ทธ๋ ‡์ง€ ์•Š์„ ๊ฒฝ์šฐ ์ƒํ™ฉ์„ ์•Œ๋ฆฐ๋‹ค.

์œŒ์Šจ์€ ์ด๋Ÿฐ ์กฐ์น˜๊ฐ€ ๊ธฐ๋Œ€ ์ˆ˜์ค€์„ ๋‹ฌ์„ฑ ๊ฐ€๋Šฅํ•œ ๋ฒ”์œ„ ์•ˆ์— ๋‘๋Š” ๋ฐ ๋„์›€์ด ๋๋‹ค๋ฉฐ, โ€œ๊ธฐ๋Œ€์™€ ์‚ฐ์ถœ๋ฌผ ์‚ฌ์ด์—์„œ ๋‹จ์ ˆ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ์ง€์ ์„ ์ตœ๋Œ€ํ•œ ์ค„์ด๋ ค๊ณ  ํ–ˆ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

7. IT ์ธ๋ ฅ์ด ๋น„์ฆˆ๋‹ˆ์Šค ๊ด€์ ์œผ๋กœ ์ƒ๊ฐํ•˜์ง€ ์•Š๋Š”๋‹ค

IT ์„œ๋น„์Šคยท์ปจ์„คํŒ…ยท์—”์ง€๋‹ˆ์–ด๋ง ๊ธฐ์—… UST์˜ CTO ๋‹ˆ๋ž€์ž” ๋žŒ์ˆœ๋”๋Š” โ€œIT ํŒ€์€ ๊ทธ๋™์•ˆ ๋ถ€์„œ ๋ชฉํ‘œ๋ฅผ ์œ„ํ•ด ์ผํ•˜๋Š” ๋ฐ ์ต์ˆ™ํ–ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ๊ธฐ์ˆ  ์—…๊ทธ๋ ˆ์ด๋“œ, ์ง€์› ๋ณต์žก์„ฑ ๊ฐ์†Œ, ๊ธฐ๋Šฅ ๊ฐœ์„  ์ œ๊ณต์— ๊ฑธ๋ฆฌ๋Š” ์‹œ๊ฐ„ ๋‹จ์ถ• ๊ฐ™์€ ๋ชฉํ‘œ๋ฅผ ์œ„ํ•ด ์ผํ•˜๊ณ , IT ๊ฒฝ์˜์ง„์—๊ฒŒ ๋ณด๊ณ ํ–ˆ๋‹ค. ํ•˜์ง€๋งŒ, ์ด์ œ IT ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ์— ์ž๊ธˆ์„ ๋Œ€๋Š” ๋น„์ฆˆ๋‹ˆ์Šค ์ดํ•ด๊ด€๊ณ„์ž์—๊ฒŒ ์ง์ ‘ ๋ณด๊ณ ํ•˜๋Š” ์ƒํ™ฉ์ด ๊ฑฐ์˜ ํ•ญ์ƒ ๋ฐœ์ƒํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์ด๋Ÿฐ ๋ณ€ํ™”๊ฐ€ ์ผ๋ถ€ IT ์ธ๋ ฅ์—๊ฒŒ๋Š” ๋„์ „ ๊ณผ์ œ๊ฐ€ ๋œ๋‹ค. ๊ธฐ์กด IT ๋ถ€์„œ์—๋Š” ์กด์žฌํ•˜์ง€ ์•Š์•˜๋˜ โ€œ์ƒˆ๋กœ์šด ์—ญ๋Ÿ‰์ด ํ•„์š”ํ•˜๊ธฐ ๋•Œ๋ฌธโ€์ด๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, IT ์ธ๋ ฅ์ด ๋น„์ฆˆ๋‹ˆ์Šค ROI์™€ ์šฐ์„ ์ˆœ์œ„๋ฅผ ์ดํ•ดํ•ด์•ผ ํ•œ๋‹ค. ๋žŒ์ˆœ๋”๋Š” โ€œCRM์˜ ์ƒˆ๋กœ์šด ๊ธฐ๋Šฅ์„ ์ œ๋•Œ, ์˜ˆ์‚ฐ ์•ˆ์—์„œ ๋ฐฐํฌํ•˜๋Š” ๊ฒƒ๋งŒ์œผ๋กœ๋Š” ์ถฉ๋ถ„ํ•˜์ง€ ์•Š๋‹คโ€๋ผ๋Š” ์ ์„ ๊นจ๋‹ฌ์•„์•ผ ํ•œ๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค. ๋˜ ์‹œ์žฅ์˜ ๊ธฐ๋Œ€ ์†๋„์— ๋งž์ถฐ ์ดํ•ดํ•˜๊ณ  ์ผํ•  ์ˆ˜ ์žˆ์–ด์•ผ ํ•œ๋‹ค.

๋žŒ์ˆœ๋”๋Š” CIO๊ฐ€ ํƒ์›”ํ•œ ์„ฑ๊ณผ๋ฅผ ๊ฐ€๋กœ๋ง‰๋Š” ์ด๋Ÿฐ ์žฅ์• ๋ฌผ์„ ์ œ๊ฑฐํ•˜๊ธฐ ์œ„ํ•ด ์—ฌ๋Ÿฌ ์กฐ์น˜๋ฅผ ์ทจํ•  ๊ฒƒ์„ ์กฐ์–ธํ–ˆ๋‹ค. ๋น„์ฆˆ๋‹ˆ์Šค๊ฐ€ ์„ฑ๊ณต์„ ์ธก์ •ํ•˜๋Š” ๋ฐ ์‚ฌ์šฉํ•˜๋Š” ์ง€ํ‘œ๋ฅผ IT ์ธ๋ ฅ์—๊ฒŒ ์ต์ˆ™ํ•˜๊ฒŒ ๋งŒ๋“ค๊ณ  AI ๋„๊ตฌยท์˜คํ”ˆ์†Œ์Šค ์ปดํฌ๋„ŒํŠธยทํ†ตํ•ฉ ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•ด ์†๋„๋ฅผ ๋†’์ผ ์ˆ˜ ์žˆ๋„๋ก IT ํŒ€์„ ๊ต์œกํ•˜๋ฉฐ, ๋น„์ฆˆ๋‹ˆ์Šค ์˜ํ–ฅ๋„๋ฅผ ๊ธฐ์ค€์œผ๋กœ IT ํ”„๋กœ์ ํŠธ์— ์šฐ์„ ์ˆœ์œ„๋ฅผ ๋งค๊ฒจ์•ผ ํ•œ๋‹ค๋Š” ์„ค๋ช…์ด๋‹ค.

๋˜ํ•œ, โ€œIT ์—ญ๋Ÿ‰๊ณผ ์ธก์ • ์ง€ํ‘œ๋ฅผ ๋น„์ฆˆ๋‹ˆ์Šค ๊ด€์ ์—์„œ ๋ฐ”๋ผ๋ณด๋Š” ๊ต์œก ํ”„๋กœ๊ทธ๋žจ์„ ์˜์‹์ ์œผ๋กœ ๊ฐœ๋ฐœํ•˜๊ณ , AI ์—์ด์ „ํŠธ๋ฅผ ํฌํ•จํ•˜๋Š” ์ƒˆ๋กœ์šด ์กฐ์ง ๊ตฌ์กฐ๋ฅผ ๋„์ž…ํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•˜๋‹คโ€๋ผ๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค. IT ๋ถ€์„œ๋Š” LLM๊ณผ ์—์ด์ „ํŠธ๋ฅผ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•€์˜ต์Šค ์—ญ๋Ÿ‰์„ ํ•ต์‹ฌ ๊ธฐ์ˆ ๊ณผ ํ•จ๊ป˜ ๊ฐœ๋ฐœํ•ด์•ผ ํ•œ๋‹ค๊ณ  ๋ง๋ถ™์˜€๋‹ค.

๋žŒ์ˆœ๋”๋Š” โ€œCIO์™€ IT ๋ถ€์„œ๋Š” ์ƒˆ๋กœ์šด AI ๋„๊ตฌ๋ฅผ ๋น ๋ฅด๊ฒŒ ์˜จ๋ณด๋”ฉํ•  ์ˆ˜ ์žˆ๋Š” ์ ์ ˆํ•œ ๋„๊ตฌ์™€ ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ๊ฐ–์ถฐ์•ผ ํ•œ๋‹คโ€๋ผ๋ฉฐ, โ€œIT ๋ถ€์„œ ์•ˆ์— โ€˜๊ทธ๋ž˜์„œ ์ด๊ฒŒ ๋น„์ฆˆ๋‹ˆ์Šค์— ์–ด๋–ค ์˜๋ฏธ๊ฐ€ ์žˆ๋Š”๊ฐ€?โ€™๋ฅผ ๋ฌป๋Š” ์‚ฌ๊ณ ๋ฐฉ์‹์„ ๊ธธ๋Ÿฌ, ์ž์‹ ์ด ํ•˜๋Š” ์ผ์˜ ๋น„์ฆˆ๋‹ˆ์Šค ๊ฐ€์น˜๋ฅผ ์ƒ๊ฐํ•˜๊ณ  ๋‹จ์ง€ ์š”์ฒญ๋ฐ›์€ ๋Œ€๋กœ๋งŒ ์ œ๊ณตํ•˜๋Š” ์ˆ˜์ค€์„ ๋„˜์–ด ์ฐจ๋ณ„ํ™”๋œ ๋น„์ฆˆ๋‹ˆ์Šค๋ฅผ ๋งŒ๋“œ๋Š” ๋ฐ ์ ๊ทน์ ์œผ๋กœ ์ฐธ์—ฌํ•˜๋„๋ก ํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com

7 reasons IT teams fail to exceed your expectations

1 December 2025 at 05:01

The C-suite and corporate boardroom have pinned much of their plans for success on technology.

According to the 2025 Executive Outlook report by Personiv, 78% of execs have increased technology investment or will increase it in the next six months in what researchers termed โ€œproactive, agile responses to the current environment.โ€

And AI is proving to be a key area for that investment, as the KPMG 2025 Global CEO Outlook found that 71% of CEOs listed AI as a top investment priority, up from 64% in 2024, with 69% allocating 10% to 20% of their budget on AI alone.

Overall, transformation is the order of the day. Accoding to the September 2025 EY-Parthenon CEO Outlook Survey, 52% of chief executives โ€œplan to increase investment to accelerate portfolio transformation, reflecting a recognition that adapting to shifting markets and customer expectations is no longer optional but essential for growth.โ€

Such expectations put pressure on IT teams to deliver innovations and transformations that drive business results โ€” and the expectations are often that IT initiatives will exceed objectives.

Thatโ€™s a tall order, one that many IT departments canโ€™t fulfill for various reasons. Here long-serving IT leaders share seven reasons why IT teams fail to exceed expectations and how CIOs can lead their teams to overcome those challenges.

1. Too much time spent on lights-on activities

Keeping the technology engines humming smoothly, while essential, will not impress CEOs and other enterprise leaders, says Heather Leier-Murray, a research director in the CIO practice at Info-Tech Research Group.

Yet thatโ€™s where many IT teams still focus much of their attention.

The IT Trends 2025: Industry Report from Auvik, a maker of network management software, found that โ€œ58% of IT professionals shared that they spend half or more of their work week on tickets for the end-user.โ€ It also found that 32% of surveyed IT pros cited โ€œdonโ€™t have enough timeโ€ as a reason for not implementing wish-list items โ€” the No. 1 reason given.

โ€œWeโ€™re seeing that the organization โ€” the C-suite, and the CEO particularly โ€” is increasing expectations that IT should be working at higher levels, so leading transformations, being business partners, expanding business opportunities. They want IT to transform and expand the business,โ€ Leier-Murray says. โ€œAnd IT is not able to keep up, or exceed, with this expectation because it is spending all its time on maintenance and administration.โ€

Leier-Murray and others say CIOs need to use technology to transform IT processes and workflows โ€” just as theyโ€™re doing in other business units. They should automate routine maintenance tasks, deploy AI to perform more complex processes, and simplify the tools and technologies IT staffers use as a way to streamline jobs and gain back time. Furthermore, CIOs must prioritize strategic work that delivers the most value over maintenance work that has little to no critical impact.

2. Lack of clarity on expectations

Another reason why IT teams fail to exceed expectations is that they donโ€™t have a clear understanding of what the expectations are.

โ€œSometimes there is not a clear picture of what success is, and that means there are gaps in expectations because they werenโ€™t well defined. Iโ€™ve seen that happen time and time again,โ€ says Pegasystems CIO David Vidoni.

To gain clarity, Vidoni says IT needs to focus on the outcomes business leaders want and use business metrics to measure success.

Others offer similar advice.

โ€œStart by measuring the right types of progress,โ€ says Amar Aswatha, senior vice president for global business engineering at CGI, a consulting and services firm. โ€œProgressive CIOs will ask, โ€˜Are we solving the right problem?โ€™ and theyโ€™ll check back with the business often and ask, โ€˜Are we aligned to the same outcome?โ€™โ€

Aswatha says leading CIOs also share with their IT teams the reasons for the projects and programs theyโ€™re pursuing and why the outcomes are important for the organization. โ€œExplaining that and reiterating that is extremely important. IT teams want to know what difference it makes, and giving them the sense of purpose matters,โ€ he says.

3. Acting more like a vendor than a partner

Nate Kurtz, CIO of Veeam Software Group, has seen some IT departments work like vendors, with CIOs and staffers taking an almost transactional approach, while others act like strategic partners, working shoulder to shoulder with business colleagues, sharing a stake in โ€” and responsibility for โ€” achieving a desired outcome.

Those who act like strategic partners are the ones who exceed expectations, he says.

โ€œThe CIO is a critical role in an organization today, because IT is one of the few functions that touch everyone in an organization,โ€ he says. โ€œCIOs can see across an organization; we can see ways to improve it. So the CIO has to frame that perspective to the IT team and other executives, that IT can help drive the organization forward.โ€

4. Falling short on ensuring the business does its part for success

Both sides must contribute to the IT-business partnership for it to work successfully, yet experienced CIOs say thatโ€™s not always the case. There are times when IT workers are clear on what it will take to deliver a successful product, and what they must do to exceed target outcomes, but the business does not have that same level of understanding, Vidoni says.

As an example, he points to a chatbot initiative. The technologists recognized that having certain data was essential for success, but the business unit did not seem to grasp its role in delivering that data, ensuring it was in good form, and doing so in a timely manner.

โ€œBusiness may not fully understand all that needs to come together for [a technology initiative] to succeed, what needs to be brought to the table from the business team, and what IT needs to bring to the table,โ€ he says.

The end product in such cases may โ€œproduce good results, but not spectacular results,โ€ as was the case with the chatbot, says Vidoni, adding that he learned from that experience to outline at the outset what the business needs to do and allocate the time they need to do it โ€” a lesson that reinforces the value of strong communication and good planning.

5. Failing to enforce effective project prioritization practices

CIOs attest to the heavy workload put on IT today.

โ€œEveryone is juggling different projects and different priorities for different business units,โ€ Vidoni says. โ€œAnd IT leaders want to please and satisfy, and that can come out as not pushing back on requests, saying yes, and striving to make things happen. But itโ€™s important to understand what boundaries you have, to make sure you do not overcommit, because if youโ€™re stretched too thin, youโ€™ll miss expectations and not have positive outcomes.โ€

To avoid such scenarios, Vidoni prioritizes projects aligned to enterprise objectives and has a strong discipline around capacity planning. He also makes sure team members adhere to those practices so theyโ€™re not committing IT resources to pet projects that come up in their meetings with business colleagues.

6. Trying to keep up with excessive, unrealistic expectations

โ€œThe expectations for delivery, especially with the advent of AI, are that much greater today than they were just a year ago,โ€ says Shannon T. Wilson, vice president of IT at the University of Phoenix. โ€œThe demands for output are greater than they have ever been in the past.โ€

To meet those increasing expectations, Wilson says his IT department is transforming how it works, using technology โ€” including AI โ€” to become more effective and efficient, and is mandating training for its IT workforce.

Such moves have helped IT not only keep pace with demands but also deliver โ€œmultiples back.โ€

But Wilson says IT leaders also must โ€œset the proper expectations for what their teams can deliver with the resources they have,โ€ noting that โ€œdemand will always exceed what the capacity is to deliver.โ€

He says his IT department diligently tracks its work so it can accurately plan what it can deliver, ensuring the team doesnโ€™t overpromise. And IT leaders frequently check in with business colleagues to ensure work is on track and communicate when itโ€™s not, such as when the October AWS outage threw work plans out of whack.

Wilson says such moves have helped ensure expectations are high but achievable.

โ€œWeโ€™ve tried to shrink all the places where we can get disconnected between expectations and deliverables,โ€ he says.

7. IT staffers donโ€™t think like the business

โ€œIT teams are used to working for their groupโ€™s objectives โ€” upgrades to technologies, reduce support complications, time taken to provide enhancements โ€” and answering to IT management,โ€ says Niranjan Ramsunder, CTO of UST, which provides IT services, consulting and engineering. โ€œNow they almost always answer to business stakeholders who fund most initiatives.โ€

This presents challenges for some IT workers as it requires them to use โ€œnew skills which are not always available in current teams,โ€ he says.

They need to understand business ROI and priorities, for example, he says, and realize that โ€œdoing a rollout for a new feature in a CRM on time and under budget is not enough.โ€

And they must know and work to the speed of market expectations, he adds.

Ramsunder advises CIOs to take several steps to remove such roadblocks to delivery excellence: familiarize IT staffers with the metrics that the business uses to measure success; train IT teams to use AI tools, open-source components, and integration to increase their speed; and prioritize IT projects based on business impact.

โ€œIt is critical to develop a conscious training program on the business view of IT capabilities and measurements as well as a new org structure incorporating AI agents,โ€ he says, adding that IT teams must also develop FinOps capabilities along with core skills to leverage LLMs and agents.

โ€œCIOs and the IT teams that report to them need to enable the right kind of tools and framework for onboarding new AI tools quickly,โ€ he adds. โ€œIn addition, they need to cultivate in their teams a โ€˜so whatโ€™ mindset urging them to think about the business value of their work and actively participate in creating a differentiated business rather than simply delivering to what is being asked for.โ€

์นผ๋Ÿผ | ์„ฃ๋ถ€๋ฅธ ๊ทœ๋ชจ ํ™•์žฅ์ด ์ดˆ๋ž˜ํ•˜๋Š” โ€˜์ˆจ์€ ๋น„์šฉโ€™ยทยทยท์ด๋ฅผ ํ”ผํ•  ๋ฐฉ๋ฒ•์€?

1 December 2025 at 01:06

โ€˜ํ™•์žฅโ€™์€ ์ข…์ข… ์„ฑ๊ณต์œผ๋กœ ์˜คํ•ด๋œ๋‹ค. ์ด๋Š” ๋ฌด์–ธ๊ฐ€ ์ œ๋Œ€๋กœ ์ž‘๋™ํ•˜๊ณ  ์žˆ๋‹ค๋Š” ์‹ ํ˜ธ์ฒ˜๋Ÿผ ์—ฌ๊ฒจ์ง€๊ธฐ ์‰ฝ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์‹ค์ œ ํ˜„์žฅ์—์„œ๋Š” ์„ฑ์žฅ ์••๋ฐ•์ด ๋กœ๋“œ๋งต๋ฟ ์•„๋‹ˆ๋ผ ์•„ํ‚คํ…์ฒ˜, ๋ฐ์ดํ„ฐ ๋ ˆ์ด์–ด, ์‚ฌ๊ณ  ๋Œ€์‘ ์ฒด๊ณ„, ๊ณ ๋ถ€ํ•˜ ํ™˜๊ฒฝ์—์„œ ์›€์ง์—ฌ์•ผ ํ•˜๋Š” ํŒ€์˜ ์šด์˜ ์—ญ๋Ÿ‰๊นŒ์ง€ ์ „๋ฐ˜์— ์˜ํ–ฅ์„ ๋ฏธ์นœ๋‹ค. ์ดˆ๊ธฐ ๋‹จ๊ณ„์—์„œ ์ถฉ๋ถ„ํžˆ ๊ดœ์ฐฎ๋‹ค๊ณ  ์—ฌ๊ฒผ๋˜ ์„œ๋น„์Šค ์ˆ˜์ค€ ๊ณ„์•ฝ(SLA), ์„œ๋น„์Šค ์ˆ˜์ค€ ๋ชฉํ‘œ(SLO), ์ง€์—ฐ ์‹œ๊ฐ„ ์˜ˆ์‚ฐ์€ ์ƒˆ๋กœ์šด ๋™์‹œ ์ ‘์† ๋ฐ ํŠธ๋ž˜ํ”ฝ ํŒจํ„ด์ด ๋‚˜ํƒ€๋‚˜๋ฉด ์‰ฝ๊ฒŒ ๋ฌด๋„ˆ์งˆ ์ˆ˜ ์žˆ๋‹ค. ๊ฒ‰์œผ๋กœ๋Š” ๊ฑด์ „ํ•ด ๋ณด์ด๋Š” ์ง€ํ‘œ๊ฐ€ ์‹ค์ œ๋กœ๋Š” ์ทจ์•ฝํ•œ ์‹œ์Šคํ…œ์„ ๊ฐ€๋ฆฌ๊ณ  ์žˆ๋‹ค๊ฐ€, ํŠน์ • ๊ธฐ๋Šฅ ํ•˜๋‚˜๋ฅผ ์ถœ์‹œํ•˜๋Š” ์ˆœ๊ฐ„ ์ „์ฒด๊ฐ€ ํ•œ๊บผ๋ฒˆ์— ๋ถ•๊ดดํ•˜๋Š” ์ƒํ™ฉ๋„ ์—ฌ๋Ÿฌ ์ฐจ๋ก€ ๋ชฉ๊ฒฉํ–ˆ๋‹ค.

  • ์ง€ํ‘œ๊ฐ€ ์ •๋ ฌ๋˜์ง€ ์•Š๊ณ  ์šด์˜ ์ฒด๊ณ„๊ฐ€ ์ทจ์•ฝํ•œ ์ƒํƒœ์—์„œ ๋„ˆ๋ฌด ์ด๋ฅธ ์‹œ์ ์— ๊ทœ๋ชจ ํ™•์žฅ์— ๋‚˜์„œ๋Š” ๊ฒƒ์€ ์—ฌ์ „ํžˆ ์ œํ’ˆ ์‹คํŒจ์˜ ์ฃผ์š” ์›์ธ์œผ๋กœ ๊ผฝํžŒ๋‹ค.
  • ์ง€ํ‘œ๋Š” ์™ธ๋ถ€์—์„œ ๊ฐ€์ ธ์˜จ ๋ฒค์น˜๋งˆํฌ๊ฐ€ ์•„๋‹ˆ๋ผ, ๊ฐ ์กฐ์ง์˜ ๊ตฌ์ฒด์  ๋งฅ๋ฝ ์•ˆ์—์„œ ์˜๋ฏธ๋ฅผ ๊ฐ€์ง„๋‹ค.
  • DORA, ์˜ค๋ฅ˜ ์˜ˆ์‚ฐ, SLO ๋“ฑ ์—”์ง€๋‹ˆ์–ด๋ง ์ค€๋น„ ์ง€ํ‘œ ์—ญ์‹œ ์ œํ’ˆ ์„ฑ์žฅ์— ๋งž์ถฐ ์ง„ํ™”ํ•ด์•ผ ํ•œ๋‹ค. ๊ทธ๋ ‡์ง€ ์•Š์œผ๋ฉด ๊ณ ๋ถ€ํ•˜ ํ™˜๊ฒฝ์—์„œ ์‹คํŒจ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค.

์ง€๋‚œ 10์—ฌ ๋…„ ๋™์•ˆ ์ž ์žฌ๋ ฅ์ด ํฐ ํŒ€์ด ์ž˜๋ชป๋œ ์ง€ํ‘œ์— ๋งค๋‹ฌ๋ฆฌ๋‹ค ์†Œ์ง„๋˜๊ฑฐ๋‚˜, ์ œํ’ˆ์ด ์ค€๋น„๋˜์ง€ ์•Š์€ ์ƒํƒœ์—์„œ ๋ฌด๋ฆฌํ•˜๊ฒŒ ํ™•์žฅ์„ ์‹œ๋„ํ•˜๋‹ค๊ฐ€ ์‹คํŒจํ•˜๋Š” ์‚ฌ๋ก€๋ฅผ ์ง€์ผœ๋ด ์™”๋‹ค. ์‹ค์ œ๋กœ ์Šคํƒ€ํŠธ์—…์˜ 70%๋Š” ์ œํ’ˆ๊ณผ ํ”Œ๋žซํผ์ด ์ถฉ๋ถ„ํžˆ ์„ฑ์ˆ™ํ•˜์ง€ ์•Š์€ ์ƒํƒœ์—์„œ ์„ฑ์žฅ์„ ์‹œ๋„ํ•ด ๊ฒฐ๊ตญ ์‹คํŒจํ•œ๋‹ค๋Š” ์กฐ์‚ฌ ๊ฒฐ๊ณผ๊ฐ€ ์žˆ๋‹ค. ํ•ต์‹ฌ ๊ณผ์ œ๋Š” ๋” ๋นจ๋ฆฌ ์„ฑ์žฅํ•˜๋Š” ๋ฒ•์ด ์•„๋‹ˆ๋ผ ์‹œ์Šคํ…œ์„ ๋ถ•๊ดด์‹œํ‚ค์ง€ ์•Š๊ณ  ์„ฑ์žฅํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ฐพ๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋ฅผ ์œ„ํ•ด์„œ๋Š” ์ง€ํ‘œ, ์ œํ’ˆ์˜ ์„ฑ์ˆ™๋„, ์—”์ง€๋‹ˆ์–ด๋ง ํƒ„๋ ฅ์„ฑ ์ „๋ฐ˜์—์„œ ๊ธด๋ฐ€ํ•œ ์กฐ์œจ์ด ํ•„์š”ํ•˜๋‹ค.

๊ฐ€์žฅ ๋จผ์ € ๋ฐฐ์šด ๊ตํ›ˆ ์ค‘ ํ•˜๋‚˜๋Š” ์ง€ํ‘œ๊ฐ€ โ€˜ํŠธ๋กœํ”ผโ€™๊ฐ€ ์•„๋‹ˆ๋ผ โ€˜๊ฑฐ์šธโ€™์ด๋ผ๋Š” ์ ์ด๋‹ค. ํ•œ๋•Œ โ€˜์›”๊ฐ„ ํ™œ์„ฑ ์ด์šฉ์žโ€™ ๊ฐ™์€ ๋‹จ์ผ ์ง€ํ‘œ์— ์ง‘์ฐฉํ•˜๋ฉด์„œ ๋ณด๊ธฐ ์ข‹์€ ๊ทธ๋ž˜ํ”„๋Š” ๋งŒ๋“ค์—ˆ์ง€๋งŒ, ์‚ฌ์—… ์ž์ฒด๋Š” ์ทจ์•ฝํ•ด์กŒ๋‹ค. ๋‹น์‹œ ํ™•๋Œ€ํ•˜๊ณ  ์žˆ์—ˆ๋˜ ๊ฒƒ์€ ๊ฐ€์น˜๊ฐ€ ์•„๋‹ˆ๋ผ ๊ฒ‰๋ชจ์Šต์ด์—ˆ๋‹ค. ๊ทธ๋ž˜์„œ ์ง€๊ธˆ์€ ๋ฒ”์šฉ KPI ๋Œ€์‹  ์‹ค์ œ ๊ฐ€์น˜ ํ๋ฆ„์„ ๋ณด์—ฌ์ฃผ๋Š” 4~6๊ฐœ์˜ ์ œํ’ˆ ํŠนํ™” ์ง€ํ‘œ์— ์ง‘์ค‘ํ•œ๋‹ค. ๊ฐ€์ž… ์ „ํ™˜์œจ, ๊ณ ๊ฐ ํš๋“ ๋น„์šฉ(CAC), ์ผ์ผ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๋Œ€๋น„ ์›”๊ฐ„ ์‚ฌ์šฉ์ž(DAU-MAU) ๋น„์œจ, ์ฒซ ํ•ต์‹ฌ ํ–‰๋™ ์ˆ˜ํ–‰๋ฅ , ํŠน์ • ํ–‰๋™ ์œ ์ง€์œจ ๋“ฑ์ด๋‹ค. ์ง€ํ‘œ๋Š” ์„ฑ๊ณต์„ ํ™•์ธํ•˜๋Š” ์šฉ๋„๊ฐ€ ์•„๋‹ˆ๋ผ ์ƒํ™ฉ์„ ์ดํ•ดํ•˜๊ฒŒ ํ•ด์ฃผ๋Š” ๋„๊ตฌ์—ฌ์•ผ ํ•œ๋‹ค. ์ฐฐ์Šค ๊ตฟํ•˜ํŠธ ๊ต์ˆ˜๋Š” โ€œ์ธก์ • ๊ธฐ์ค€์ด ๋ชฉํ‘œ๊ฐ€ ๋˜๋ฉด ๋” ์ด์ƒ ์ข‹์€ ์ธก์ • ๊ธฐ์ค€์ด ์•„๋‹ˆ๋‹คโ€๋ผ๋Š” ๋ฒ•์น™์„ ์ œ์‹œํ•œ ๋ฐ” ์žˆ๋‹ค.

์ง€ํ‘œ๊ฐ€ ๋ชฉํ‘œ๊ฐ€ ๋˜๊ธฐ ์‹œ์ž‘ํ•˜๋ฉด ์‚ฌ๋žŒ๋“ค์€ ์‹ค์งˆ์  ์„ฑ๊ณผ๊ฐ€ ์•„๋‹Œ ์ˆซ์ž๋ฅผ ์˜ฌ๋ฆฌ๋Š” ๋ฐ ์ง‘์ค‘ํ•˜๊ฑฐ๋‚˜ ์™œ๊ณก๋œ ๋ฐฉ์‹์œผ๋กœ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๋ ค ํ•œ๋‹ค. ๋Œ€ํ‘œ์  ์‚ฌ๋ก€๊ฐ€ ์›ฐ์ŠคํŒŒ๊ณ (Wells Fargo) ๊ต์ฐจํŒ๋งค ์Šค์บ”๋“ค์ด๋‹ค. 2010๋…„๋Œ€ ์›ฐ์ŠคํŒŒ๊ณ  ๊ฒฝ์˜์ง„์€ โ€˜๊ณ ๊ฐ 1์ธ๋‹น ๊ณ„์ขŒ ์ˆ˜โ€™๋ผ๋Š” ์ง€ํ‘œ์— ์ง€๋‚˜์น˜๊ฒŒ ์ง‘์ฐฉํ•˜๋ฉด์„œ ๊ณผ๋„ํ•œ ๋ชฉํ‘œ๋ฅผ ์„ค์ •ํ–ˆ๊ณ , ๊ฒฐ๊ตญ ์ง์›๋“ค์€ ๋ชฉํ‘œ ๋‹ฌ์„ฑ์„ ์œ„ํ•ด ์ˆ˜๋ฐฑ๋งŒ ๊ฐœ์˜ ์œ ๋ น ๊ณ„์ขŒ๋ฅผ ๊ฐœ์„คํ•˜๊ธฐ ์‹œ์ž‘ํ–ˆ๋‹ค. ์ง€ํ‘œ๋Š” ๊ฒ‰๋ณด๊ธฐ์—” ์ข‹์•„ ๋ณด์˜€์ง€๋งŒ, ๊ณ ๊ฐ ์‹ ๋ขฐ๋Š” ๋ถ•๊ดด๋๊ณ  ํšŒ์‚ฌ๋Š” ๋ง‰๋Œ€ํ•œ ๋ฒŒ๊ธˆ์„ ๊ฐ๋‹นํ•ด์•ผ ํ–ˆ๋‹ค. ์—ฌ๊ธฐ์„œ ์–ป๋Š” ๊ตํ›ˆ์€ ๋‹จ์ผ ์ง€ํ‘œ๋ฅผ ์ ˆ๋Œ€์  ๊ธฐ์ค€์œผ๋กœ ์‚ผ์•„์„œ๋Š” ์•ˆ ๋œ๋‹ค๋Š” ์ ์ด๋‹ค. ์ œํ’ˆ๊ณผ ์‚ฌ์šฉ์ž๊ฐ€ ์‹ค์ œ๋กœ ์–ป๋Š” ๊ฐ€์น˜๋ฅผ ๊ท ํ˜• ์žˆ๊ฒŒ ๋ฐ˜์˜ํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ์„ฑ๊ณต์„ ์ •์˜ํ•ด์•ผ ํ•œ๋‹ค.

๊ฐ€๋“œ๋ ˆ์ผ๋กœ์„œ์˜ ๋ฒค์น˜๋งˆํฌ

๋ฒค์น˜๋งˆํฌ๋Š” ๋ถ„๋ช… ์œ ์šฉํ•˜์ง€๋งŒ, ๊ธฐ์ค€์ ์ผ ๋ฟ ์ ˆ๋Œ€์  ๊ทœ์น™์œผ๋กœ ๋ฐ›์•„๋“ค์—ฌ์„œ๋Š” ์•ˆ ๋œ๋‹ค. ๋น„์ •์ƒ์ ์œผ๋กœ ๋‚ฎ์€ ์ „ํ™˜์œจ ๊ฐ™์€ ์ด์ƒ ์ง•ํ›„๋ฅผ ํŒŒ์•…ํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋˜์ง€๋งŒ, ํŠน์ • ์ œํ’ˆ์˜ ์„ฑ๊ณต์„ ์–ด๋–ป๊ฒŒ ์ •์˜ํ•ด์•ผ ํ•˜๋Š”์ง€๊นŒ์ง€ ๊ทœ์ •ํ•˜๋Š” ๋„๊ตฌ๋Š” ์•„๋‹ˆ๋‹ค. ๊ณผ๊ฑฐ ํ•„์ž๋Š” ํŒ€์˜ โ€˜์ฑ•ํ„ฐ 2โ€™๋ฅผ ๋‹ค๋ฅธ ๊ธฐ์—…์˜ โ€˜์ฑ•ํ„ฐ 10โ€™๊ณผ ๋น„๊ตํ•˜๋Š” ์‹ค์ˆ˜๋ฅผ ์ €์งˆ๋ €๋‹ค. ์–ด๋–ค SaaS ์„œ๋น„์Šค๊ฐ€ ์ฒซ๋‚  ์œ ์ง€์œจ 50%๋ฅผ ๊ธฐ๋กํ–ˆ๋‹ค๋Š” ์ด์•ผ๊ธฐ๋ฅผ ๋ณด๊ณ , ์šฐ๋ฆฌ๋Š” 30%์— ๋ถˆ๊ณผํ•˜๋‹ค๋Š” ์ด์œ ๋กœ ์Šค์Šค๋กœ๋ฅผ ๊ณผ์†Œํ‰๊ฐ€ํ–ˆ์ง€๋งŒ, ํ•ด๊ฒฐํ•˜๋ ค๋Š” ๋ฌธ์ œ๋„, ์‹œ์žฅ ๋‹จ๊ณ„๋„, ์‚ฌ์šฉ์ž ๊ตฌ์„ฑ๋„ ์™„์ „ํžˆ ๋‹ค๋ฅด๋‹ค๋Š” ์‚ฌ์‹ค์„ ๋†“์ณค๋‹ค.

์ด๋Ÿฐ ๋น„๊ต ๋ฐฉ์‹์€ ํŒ€์ด ๋งž์ง€ ์•Š๋Š” ๊ฒฝ๊ธฐ์žฅ์—์„œ ๋›ฐ๋Š” ๊ฒฐ๊ณผ๋กœ ์ด์–ด์ง„๋‹ค. ๋ชจ๋“  ์ œํ’ˆ์€ ์ถœ์‹œ ์‹œ์ , ์˜ˆ์‚ฐ, ํŒ€์˜ ์„ฑ์ˆ™๋„, ์‹œ์žฅ์˜ ๋ณต์žก์„ฑ ๋“ฑ ์„œ๋กœ ๋‹ค๋ฅธ ๋งฅ๋ฝ ์†์— ์กด์žฌํ•œ๋‹ค. ๋ฒค์น˜๋งˆํฌ๊ฐ€ ์ฐธ๊ณ  ์ž๋ฃŒ์ผ ์ˆ˜๋Š” ์žˆ์ง€๋งŒ ์˜์‚ฌ๊ฒฐ์ •์„ ์ง€๋ฐฐํ•ด์„œ๋Š” ์•ˆ ๋œ๋‹ค. ์ด๋ฅผ ์ ˆ๋Œ€์  ๊ธฐ์ค€์ฒ˜๋Ÿผ ๋‹ค๋ฃจ๊ธฐ ์‹œ์ž‘ํ•˜๋ฉด ๊ฐ๊ด€์„ฑ์ด ์žˆ๋‹ค๋Š” ์ฐฉ๊ฐ์— ๋น ์ ธ ์‹ค์ œ ์ œ์•ฝ ์กฐ๊ฑด์„ ๋ฌด์‹œํ•˜๊ฑฐ๋‚˜ ์• ์ดˆ์— ํŒ€๊ณผ ๋ฌด๊ด€ํ•œ ์ง€ํ‘œ๋ฅผ ์ซ“๊ฒŒ ๋œ๋‹ค.

ํ˜„์‹ค์ ์œผ๋กœ๋Š” ๋ฒค์น˜๋งˆํฌ๋ฅผ ์ผ์ข…์˜ ์ผ๊ธฐ์˜ˆ๋ณด์ฒ˜๋Ÿผ ํ™œ์šฉํ•˜๋Š” ๊ฒƒ์ด ์œ ์šฉํ•˜๋‹ค. ๋‹ค์‹œ ๋งํ•ด ์–ด๋–ค ํ™˜๊ฒฝ์—์„œ ์›€์ง์ด๊ฒŒ ๋ ์ง€ ์˜ˆ์ƒํ•˜๊ฒŒ ํ•ด์ฃผ์ง€๋งŒ, ๊ฒฝ๋กœ ์ž์ฒด๋ฅผ ๊ฒฐ์ •ํ•ด์ฃผ์ง€๋Š” ์•Š๋Š”๋‹ค. ์‹ค์ œ๋กœ ์ค‘์š”ํ•œ ์ผ์€ ์ œํ’ˆ์˜ ๊ฐ€์น˜๋ฅผ ์ •ํ™•ํ•˜๊ฒŒ ๋ฐ˜์˜ํ•˜๋Š” ์ง€ํ‘œ๊ฐ€ ๋ฌด์—‡์ธ์ง€ ํŒŒ์•…ํ•˜๊ณ , ๊ทธ ์ง€ํ‘œ๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ์‹œ์Šคํ…œ ์ „์ฒด๋ฅผ ์กฐ์œจํ•˜๋Š” ๊ฒƒ์ด๋‹ค.

์šด์˜ ์ค€๋น„

์ง€ํ‘œ๊ฐ€ ์•„๋ฌด๋ฆฌ ์œ ๋งํ•ด ๋ณด์—ฌ๋„ ์—”์ง€๋‹ˆ์–ด๋ง ์ค€๋น„ ์—†์ด ์ œํ’ˆ์„ ํ™•์žฅํ•˜๋Š” ์ผ์€ ๋ถ€์‹คํ•œ ์ง€๋ฐ˜ ์œ„์— ๊ฑด๋ฌผ์„ ์˜ฌ๋ฆฌ๋Š” ๊ฒƒ๊ณผ ๋‹ค๋ฅด์ง€ ์•Š๋‹ค. ์„ฑ์žฅ์€ ์šด์˜ ์‹œ์Šคํ…œ ์ „๋ฐ˜์— ๋ถ€๋‹ด์„ ์ค€๋‹ค. ๋ฐฐํฌ ํŒŒ์ดํ”„๋ผ์ธ, ๊ด€์ธก ๋„๊ตฌ, ์ง€์—ฐ ์‹œ๊ฐ„ ์˜ˆ์‚ฐ, ๋ฆด๋ฆฌ์Šค ์ฃผ๊ธฐ ๋“ฑ์ด ๋ชจ๋‘ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์ŠคํŠธ๋ ˆ์Šค ํ…Œ์ŠคํŠธ๋ฅผ ๋ฐ›๋Š”๋‹ค. ๊ทธ๋ž˜์„œ ์šฐ๋ฆฌ๋Š” ๋ฐฐํฌ ๋นˆ๋„, ๋ณ€๊ฒฝ ์‹คํŒจ์œจ ๊ฐ™์€ DORA ์ง€ํ‘œ๋ฅผ ๋‹จ์ˆœํ•œ ์—”์ง€๋‹ˆ์–ด๋ง KPI๊ฐ€ ์•„๋‹ˆ๋ผ ํ™•์žฅ ๊ฐ€๋Šฅ์„ฑ์„ ๊ฐ€๋Š ํ•˜๋Š” ์ดˆ๊ธฐ ์ง€ํ‘œ๋กœ ํ™œ์šฉํ•œ๋‹ค.

๋˜ํ•œ ์„ฑ์žฅ ๋ฃจํ”„์˜ ๊ฐ€์†์„ ๊ณ ๋ฏผํ•˜๊ธฐ ์ „์— ์—ฌ๋Ÿฌ ์งˆ๋ฌธ์„ ๋˜์ง„๋‹ค. ์‚ฌ๊ณ  ๋Œ€์‘ ํ”„๋กœ์„ธ์Šค๋Š” ์ถฉ๋ถ„ํžˆ ๊ฒฌ๊ณ ํ•œ๊ฐ€? ์˜ค๋ฅ˜ ์˜ˆ์‚ฐ์„ ๋งˆ๋ จํ•ด ๋‘๊ณ  ์‹ค์ œ๋กœ ์ค€์ˆ˜ํ•˜๊ณ  ์žˆ๋Š”๊ฐ€? ์„ฑ๋Šฅ ์ €ํ•˜๊ฐ€ ๊ณ ๊ฐ ๋ถˆํŽธ์œผ๋กœ ์ด์–ด์ง€๊ธฐ ์ „์— ์ถฉ๋ถ„ํžˆ ๋น ๋ฅด๊ฒŒ ๊ฐ์ง€๋˜๊ณ  ์žˆ๋Š”๊ฐ€?

ํ™•์žฅ์€ ๋‹จ์ˆœํžˆ ์‚ฌ์šฉ์ž๋ฅผ ๋” ๋งŽ์ด ํ™•๋ณดํ•˜๋Š” ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋‹ค. ์‹ ๋ขฐ์™€ ์•ˆ์ •์„ฑ์„ ํ•ด์น˜์ง€ ์•Š๋Š” ๊ฒƒ์ด ํ•ต์‹ฌ์ด๋‹ค. ๊ธฐ์ˆ  ๋ถ€์ฑ„๊ฐ€ ๋‹น์žฅ ๋‹ค์Œ ๋ฆด๋ฆฌ์Šค๋ฅผ ๋ง‰์ง€๋Š” ์•Š์„ ์ˆ˜ ์žˆ์ง€๋งŒ, ์ด๋Š” ์„ฑ์žฅ ์••๋ ฅ์ด ์ปค์ง€๋Š” ์ˆœ๊ฐ„ ๋น ๋ฅด๊ฒŒ ๋ˆ„์ ๋œ๋‹ค. ๊ทธ๋Ÿฐ ์ ์—์„œ ์ธํ”„๋ผ์™€ ํ”Œ๋žซํผ์˜ ๊ฑด๊ฐ• ์ƒํƒœ๊ฐ€ ๊ฒฐ๊ตญ ์ œํ’ˆ ์ „๋žต์˜ ์ผ๋ถ€๋ผ๊ณ  ํ•  ์ˆ˜ ์žˆ๋‹ค. ์„ฑ์žฅ์˜ ์ˆœ๊ฐ„์ด ์™”์„ ๋•Œ ์–ผ๋งˆ๋‚˜ ๋น ๋ฅด๊ณ  ์•ˆ์ „ํ•˜๊ฒŒ ์›€์ง์ผ ์ˆ˜ ์žˆ๋Š”์ง€ ๊ฒฐ์ •ํ•˜๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

์ง€ํ‘œ๊ฐ€ ํ™•์žฅ ๊ณผ์ •์—์„œ ์˜๋ฏธ๋ฅผ ์žƒ๋Š” ์ด์œ ๋Š” ์ธํ”„๋ผ ๋ฌธ์ œ ๋•Œ๋ฌธ๋งŒ์ด ์•„๋‹ˆ๋‹ค. ๋” ํฐ ์›์ธ์€ ์ง€ํ‘œ๋ฅผ ์–ด๋–ป๊ฒŒ ํ•ด์„ํ•˜๋А๋ƒ์— ์žˆ๋‹ค.

์˜ฌ๋ฐ”๋ฅธ ์ง€ํ‘œ ๊ด€๋ฆฌ

๋Œ€๊ทœ๋ชจ ์„ฑ๊ณผ ๊ฒ€ํ† ๋‚˜ ์„ฑ์žฅ ํ˜„ํ™ฉ์„ ๊ณต์œ ํ•˜๋Š” ํšŒ์˜๋ฅผ ์•ž๋‘๊ณ  ์žˆ์„ ๋•Œ, ํ•„์ž๊ฐ€ ์ด๋„๋Š” ํŒ€์€ โ€˜๋ฐ์ดํ„ฐ ์œ„์ƒ ์ ๊ฒ€โ€™์„ ์ค€๋น„ํ•œ๋‹ค. ์ด๋Š” ๊ฒ‰์œผ๋กœ ๋“œ๋Ÿฌ๋‚˜๋Š” ์ž‘์—…์ด ์•„๋‹ˆ์ง€๋งŒ ๋ฐ˜๋“œ์‹œ ํ•„์š”ํ•œ ๊ณผ์ •์ด๋‹ค. ํ•ต์‹ฌ ์ด๋ฒคํŠธ๊ฐ€ ์˜ฌ๋ฐ”๋ฅด๊ฒŒ ์ˆ˜์ง‘๋˜๊ณ  ์žˆ๋Š”์ง€, ๋ช…๋ช… ๊ทœ์น™์ด ์ผ๊ด€๋˜๋Š”์ง€, ํผ๋„์ด ์‹ค์ œ ์‚ฌ์šฉ์ž ํ๋ฆ„์„ ์ •ํ™•ํžˆ ๋ฐ˜์˜ํ•˜๋Š”์ง€ ๊ผผ๊ผผํžˆ ํ™•์ธํ•œ๋‹ค. ์ด๋Ÿฐ ์Šต๊ด€์€ ํ•œ๋•Œ ์˜จ๋ณด๋”ฉ ์ง€ํ‘œ๊ฐ€ ๊ธ‰์ฆํ–ˆ๋‹ค๋ฉฐ ๊ธฐ๋ปํ–ˆ๋‹ค๊ฐ€, ์•Œ๊ณ  ๋ณด๋‹ˆ ํŠน์ • ์ด๋ฒคํŠธ๊ฐ€ ๋„ˆ๋ฌด ์ผ์ฐ ๋ฐœ์ƒํ•˜๋Š” ๋ฒ„๊ทธ ๋•Œ๋ฌธ์ด์—ˆ๋‹ค๋Š” ์‚ฌ์‹ค์„ ๋’ค๋Šฆ๊ฒŒ ํ™•์ธํ•œ ๊ฒฝํ—˜์—์„œ ๋น„๋กฏ๋๋‹ค. ์ด ์‚ฌ๊ฑด์€ ์ž˜๋ชป๋œ ๋ฐ์ดํ„ฐ๊ฐ€ ์–ผ๋งˆ๋‚˜ ํฐ ๋น„์šฉ์„ ์ดˆ๋ž˜ํ•˜๋Š”์ง€ ๋ถ„๋ช…ํ•˜๊ฒŒ ๋ณด์—ฌ์คฌ๋‹ค. ๋ถ€์ •ํ™•ํ•œ ๋ฐ์ดํ„ฐ๋Š” ์ž˜๋ชป๋œ ํ™•์‹ ์œผ๋กœ ์ด์–ด์ง€๋ฉฐ, ์ด๋Ÿฐ ํ™•์‹ ์€ ๊ฐ€์žฅ ๊ฐ’๋น„์‹ผ ์˜ค๋ฅ˜๋‹ค.

๋”ฐ๋ผ์„œ ์ง€๊ธˆ์€ ์ง€ํ‘œ๋ฅผ ์น˜๋ช…์  ์†Œํ”„ํŠธ์›จ์–ด ๋ฒ„๊ทธ๋ฅผ ์ˆ˜์ •ํ•˜๋Š” ๊ฒƒ๋งŒํผ ์ค‘์š”ํ•˜๊ฒŒ ๋‹ค๋ฃฌ๋‹ค. ์ด๋Š” ๋‹จ์ˆœํ•œ ๊ฐœ์ธ์  ์„ฑํ–ฅ์ด ์•„๋‹ˆ๋ผ, ์—ฌ๋Ÿฌ ์กฐ์‚ฌ ๊ฒฐ๊ณผ๋กœ๋„ ํ™•์ธ๋˜๋Š” ์‚ฌ์‹ค์ด๋‹ค. ๊ฐ์ข… ์„ค๋ฌธ์— ๋”ฐ๋ฅด๋ฉด ๊ฒฝ์˜์ง„์˜ ์•ฝ 58%๋Š” ํ•ต์‹ฌ ์˜์‚ฌ๊ฒฐ์ •์ด ๋ถ€์ •ํ™•ํ•˜๊ฑฐ๋‚˜ ์ผ๊ด€๋˜์ง€ ์•Š์€ ๋ฐ์ดํ„ฐ์— ๊ธฐ๋ฐ˜ํ•ด ์ด๋ค„์ง€๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹ค๊ณ  ๋‹ตํ–ˆ๋‹ค. ๋‹ค์‹œ ๋งํ•ด ์ ˆ๋ฐ˜์ด ๋„˜๋Š” ๊ธฐ์—…์ด ๋ถˆ์•ˆ์ •ํ•œ ์ˆซ์ž๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์˜์‚ฌ๊ฒฐ์ •์„ ๋‚ด๋ฆฌ๊ณ  ์žˆ๋‹ค. ์žฅ๊ธฐ์ ์œผ๋กœ ๋ณด๋ฉด ๋ฐ์ดํ„ฐ ํ’ˆ์งˆ์ด ๋–จ์–ด์ง€๋Š” ๋ฐ ๋”ฐ๋ฅธ ๋น„์šฉ๋„ ์ ์ง€ ์•Š๋‹ค. ๊ฐ€ํŠธ๋„ˆ ๋ณด๊ณ ์„œ๋Š” ๋ฐ์ดํ„ฐ ํ’ˆ์งˆ ์ €ํ•˜๊ฐ€ ๊ธฐ์—…์— ์—ฐ๊ฐ„ ํ‰๊ท  1,500๋งŒ ๋‹ฌ๋Ÿฌ์˜ ์†์‹ค์„ ์ดˆ๋ž˜ํ•œ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค. ์ •ํ™•ํ•œ ์ง€ํ‘œ๋Š” ๋‹จ์ˆœํ•œ ๊ธฐ์ˆ ์  ์œ„์ƒ ๋ฌธ์ œ๋ฅผ ๋„˜์–ด, ์œ„ํ—˜์„ ๊ด€๋ฆฌํ•˜๋Š” ์ˆ˜๋‹จ์ด๋‹ค. ์„ฑ๊ณผ๋ฅผ ์ž์ถ•ํ•˜๊ธฐ ์ „์—, ์ธก์ • ์ฒด๊ณ„๊ฐ€ ์ž˜๋ชป๋œ ์‹ ํ˜ธ๋ฅผ ๋ณด๋‚ด๊ณ  ์žˆ์ง€ ์•Š์€์ง€ ๋ฐ˜๋“œ์‹œ ํ™•์ธํ•ด์•ผ ํ•œ๋‹ค.

์„ฑ์žฅ์˜ ์‚ฌ๊ฐ์ง€๋Œ€์ธ โ€˜๋Œ€๋ฆฌ ์ง€ํ‘œโ€™์— ์ฃผ์˜ํ•  ์ด์œ 

์ˆซ์ž๊ฐ€ ์˜ค๋ฅธ๋‹ค๊ณ  ํ•ด์„œ ํ•ญ์ƒ ์„ฑ๊ณต์„ ์˜๋ฏธํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋‹ค. ์‹ค์ œ ๊ฐ€์น˜๊ฐ€ ์ •์ฒด๋˜๊ฑฐ๋‚˜ ์˜คํžˆ๋ ค ๋–จ์–ด์ง€๊ณ  ์žˆ์Œ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ , ๊ฒ‰์œผ๋กœ๋งŒ ์„ฑ์žฅํ•˜๋Š” ๊ฒƒ์ฒ˜๋Ÿผ ๋ณด์ด๊ฒŒ ๋งŒ๋“œ๋Š” ์ง€ํ‘œ๋“ค์ด ์žˆ๋‹ค. ์ด๋ฅผ โ€˜๋Œ€๋ฆฌ ์ง€ํ‘œโ€™ ๋˜๋Š” โ€˜๋งน๋ชฉ์  ์ง€ํ‘œโ€™๋ผ๊ณ  ๋ถ€๋ฅธ๋‹ค. ์ด๋Ÿฐ ์ง€ํ‘œ๋“ค์€ ์„ฑ๊ณต์˜ ์ฐฉ์‹œ๋ฅผ ๋งŒ๋“ค์ง€๋งŒ, ์ •์ž‘ ํ•ต์‹ฌ ๊ฐ€์น˜ ์ œ์•ˆ์€ ์ œ์ž๋ฆฌ์ธ ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹ค. ๋Œ€ํ‘œ์ ์ธ ์˜ˆ๊ฐ€ ์•ฑ ๋‹ค์šด๋กœ๋“œ ์ˆ˜๋‹ค. ๋‹ค์šด๋กœ๋“œ๋Š” ํญ์ฆํ•˜๋Š”๋ฐ ์‹ค์ œ ํ™œ์„ฑ ์ด์šฉ์ž๋Š” ์ •์ฒด ์ƒํƒœ์ผ ์ˆ˜ ์žˆ๋‹ค. ์›น์‚ฌ์ดํŠธ ํŽ˜์ด์ง€๋ทฐ๊ฐ€ ๋†’์•„๋„, ํด๋ฆญ์„ ์œ ๋„ํ•˜๋Š” ๋งˆ์ผ€ํŒ… ๋•Œ๋ฌธ์ผ ๋ฟ ์‹ค์ œ ์œ ๋ฃŒ ์ „ํ™˜์œจ์€ ๋‚ฎ์„ ์ˆ˜ ์žˆ๋‹ค. ์ด๋Ÿฐ ์ƒํ™ฉ์—์„œ ์ˆซ์ž๊ฐ€ ์˜ฌ๋ผ๊ฐ€๋Š” ๊ทธ๋ž˜ํ”„๋งŒ ๋ณด๊ณ , ๊ทธ ์˜๋ฏธ๋ฅผ ์˜์‹ฌํ•˜์ง€ ์•Š๋Š” ์ƒํƒœ์— ๋น ์ง€๊ธฐ ์‰ฝ๋‹ค.

์ฐฉ์‹œ๋ฅผ ํ”ผํ•˜๊ธฐ ์œ„ํ•ด ํ•„์ž๋Š” ์ง€ํ‘œ๋ฅผ ๊ฐ„๋‹จํ•œ ๊ณ„์ธต ๊ตฌ์กฐ๋กœ ์ •๋ฆฌํ•ด ๊ด€๋ฆฌํ•œ๋‹ค. ์ผ์ข…์˜ โ€˜์ง€ํ‘œ ํ”ผ๋ผ๋ฏธ๋“œโ€™๋‹ค. ๊ฐ€์žฅ ์•„๋ž˜์ธต์—๋Š” ์šด์˜ ์ง€ํ‘œ๊ฐ€ ์žˆ๋‹ค. ์ด๋Š” ์ง์ ‘ ํ†ต์ œํ•˜๊ฑฐ๋‚˜ ์˜ํ–ฅ์„ ์ค„ ์ˆ˜ ์žˆ๋Š” ์ˆซ์ž๋“ค์ด๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ์˜์—… ์ฝœ ํšŸ์ˆ˜, ํ•ด๊ฒฐ๋œ ๋ฒ„๊ทธ ์ˆ˜, ๋งˆ์ผ€ํŒ… ์ง‘ํ–‰ ๋น„์šฉ ๋“ฑ์ด ์—ฌ๊ธฐ์— ํ•ด๋‹นํ•œ๋‹ค. ์ค‘๊ฐ„์—๋Š” ํ–‰๋™ ๋˜๋Š” ์ œํ’ˆ ์ง€ํ‘œ๊ฐ€ ์œ„์น˜ํ•œ๋‹ค. ์‚ฌ์šฉ์ž ํ–‰๋™๊ณผ ์ฐธ์—ฌ๋„๋ฅผ ๋ณด์—ฌ์ฃผ๋Š” ์ง€ํ‘œ๋กœ, ์ผ๊ฐ„ ํ™œ์„ฑ ์ด์šฉ์ž, ์ฒด๋ฅ˜ ์‹œ๊ฐ„, ๊ธฐ๋Šฅ ์‚ฌ์šฉ๋ฅ  ๋“ฑ์ด ํฌํ•จ๋œ๋‹ค. ์ด๋Š” ์šด์˜ ํ™œ๋™์˜ ๊ฒฐ๊ณผ๋ฌผ์ด์ง€๋งŒ, ์™„์ „ํžˆ ํ†ต์ œํ•  ์ˆ˜ ์žˆ๋Š” ์ˆ˜์น˜๋Š” ์•„๋‹ˆ๋‹ค.

ํ”ผ๋ผ๋ฏธ๋“œ์˜ ์ตœ์ƒ๋‹จ์—๋Š” ๊ฒฐ๊ณผ ์ง€ํ‘œ๊ฐ€ ์žˆ๋‹ค. ์ด๋Š” ๊ถ๊ทน์  ๋ชฉํ‘œ, ๋‹ค์‹œ ๋งํ•ด โ€˜์™œ ์ด ์ผ์„ ํ•˜๋Š”๊ฐ€โ€™๋ฅผ ๋ณด์—ฌ์ฃผ๋Š” ์ˆ˜์น˜๋‹ค. ๋งค์ถœ, ๊ณ ๊ฐ ์œ ์ง€์œจ, ๊ณ ๊ฐ ๋งŒ์กฑ๋„์ฒ˜๋Ÿผ ์‹ค์ œ๋กœ ์ „๋‹ฌ๋œ ๊ฐ€์น˜๋ฅผ ๋ฐ˜์˜ํ•˜๋Š” ์ง€ํ‘œ๋“ค์ด ์—ฌ๊ธฐ์— ํ•ด๋‹นํ•œ๋‹ค. ์ด ํ”ผ๋ผ๋ฏธ๋“œ๋Š” ์ „์ˆ ์  ์ง€ํ‘œ์™€ ์ „๋žต์  ๋ชฉํ‘œ๋ฅผ ์ž์—ฐ์Šค๋Ÿฝ๊ฒŒ ์—ฐ๊ฒฐํ•ด ์ค€๋‹ค. ์—ฌ๋Ÿฌ ํŒ€์ด ํ™œ์šฉํ•˜๋Š” โ€˜๋ถ๊ทน์„ฑ ์ง€ํ‘œโ€™์™€๋„ ์œ ์‚ฌํ•˜๋‹ค. ์ตœ์ƒ์œ„์— ํ•ต์‹ฌ ์ง€ํ‘œ๊ฐ€ ํ•˜๋‚˜ ์žˆ๊ณ , ๊ทธ ์•„๋ž˜ ์ด๋ฅผ ๊ฒฌ์ธํ•˜๋Š” ์ฃผ์š” ์ง€ํ‘œ๋“ค์ด ์žˆ์œผ๋ฉฐ, ๊ฐ€์žฅ ์•„๋ž˜์—๋Š” ์˜์‚ฌ๊ฒฐ์ •๊ณผ ๋ฌธ์ œ ํ•ด๊ฒฐ์„ ๋•๋Š” ๋ณด๋‹ค ์„ธ๋ฐ€ํ•œ ๋ฐ์ดํ„ฐ๊ฐ€ ์œ„์น˜ํ•˜๋Š” ๋ฐฉ์‹์ด๋‹ค. ์‹ค์ œ๋กœ ๋งŽ์€ ์ œํ’ˆ ๊ด€๋ฆฌ ๊ฐ€์ด๋“œ ์—ญ์‹œ ๋ช…ํ™•์„ฑ์„ ์œ„ํ•ด ์ด๋Ÿฐ ์ง€ํ‘œ ํ”ผ๋ผ๋ฏธ๋“œ ์ ‘๊ทผ์„ ๊ถŒ์žฅํ•œ๋‹ค.

์ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ, โ€˜์›”๊ฐ„ ์„ธ์…˜ ์ˆ˜โ€™ ๊ฐ™์€ ์ง€ํ‘œ๊ฐ€ ์ƒ์Šนํ•˜๋ฉด โ€œ์ด๊ฒƒ์€ ์„ฑ๊ณผ์ธ๊ฐ€, ๋‹จ์ˆœํ•œ ์ถœ๋ ฅ์ธ๊ฐ€?โ€๋ผ๋Š” ์งˆ๋ฌธ์„ ์Šค์Šค๋กœ ๋˜์ง„๋‹ค. ์„ธ์…˜์ด ๋Š˜์–ด๋‚˜๋Š” ๊ฒƒ์ด ๋งค์ถœ ์ฆ๊ฐ€๋‚˜ ์œ ์ง€์œจ ํ–ฅ์ƒ์ฒ˜๋Ÿผ ๊ฒฐ๊ณผ ์ง€ํ‘œ์™€ ์—ฐ๊ด€๋œ๋‹ค๋ฉด ์ ๊ทน์  ์‹ ํ˜ธ์ผ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ UI ๋ณ€๊ฒฝ์ฒ˜๋Ÿผ ๋‹จ์ˆœํžˆ ์•ฑ์„ ๋” ์ž์ฃผ ์—ด๊ฒŒ ๋งŒ๋“  ์š”์ธ ๋•Œ๋ฌธ์ด๋ผ๋ฉด ์ด๋Š” ๋Œ€๋ฆฌ ์ง€ํ‘œ์— ๋ถˆ๊ณผํ•˜๋‹ค. ํ”ผ๋ผ๋ฏธ๋“œ ๊ตฌ์กฐ๋กœ ์‚ฌ๊ณ ํ•˜๋ฉด ํ•˜์œ„ ์ง€ํ‘œ์˜ ์ƒ์Šน์ด ์ƒ์œ„ ๋ชฉํ‘œ ๋‹ฌ์„ฑ์œผ๋กœ ์ด์–ด์ง€๋Š”์ง€, ํ˜น์€ ๋‹จ์ˆœํ•œ ๋…ธ์ด์ฆˆ์ธ์ง€ ๋ช…ํ™•ํ•˜๊ฒŒ ๊ตฌ๋ถ„ํ•  ์ˆ˜ ์žˆ๋‹ค. ํ•˜๋‹จ ์ง€ํ‘œ๊ฐ€ ์˜ฌ๋ž๋‹ค๊ณ  ํ•ด์„œ ์ƒ๋‹จ ์ง€ํ‘œ๊ฐ€ ์›€์ง์ธ๋‹ค๋Š” ๋ณด์žฅ์€ ์—†๋‹ค๋Š” ์ ์„ ํ•ญ์ƒ ์ƒ๊ธฐํ•˜๊ฒŒ ๋œ๋‹ค.

โ€˜์ œํ’ˆโ€“์‹œ์žฅ ์ ํ•ฉ์„ฑโ€™์˜ ์‹ ํ™”

์Šคํƒ€ํŠธ์—… ์„ธ๊ณ„์—์„œ ์ œํ’ˆโ€“์‹œ์žฅ ์ ํ•ฉ์„ฑ(Product Market Fit, PMF)๋งŒํผ ์ฐฌ์‚ฌ๋ฅผ ๋ฐ›๋Š” ๊ฐœ๋…๋„ ๋“œ๋ฌผ๋‹ค. ์ด๋Š” ๋ชจ๋“  ์š”์†Œ๊ฐ€ ๋งž์•„๋–จ์–ด์ง€๋Š” ๋งˆ๋ฒ• ๊ฐ™์€ ์ˆœ๊ฐ„, ์ฆ‰ ์‚ฌ์šฉ์ž๊ฐ€ ์—ด๊ด‘ํ•˜๊ณ  ์„ฑ์žฅ์„ธ๊ฐ€ ํญ๋ฐœํ•˜๋ฉฐ ๋งˆ์นจ๋‚ด ์„ฑ๊ณตํ–ˆ๋‹ค๊ณ  ๋А๋ผ๋Š” ์‹œ์ ์„ ๋งํ•œ๋‹ค. ํ•˜์ง€๋งŒ ํ•„์ž๋Š” PMF๋ฅผ ๋‹จ ํ•œ ๋ฒˆ์˜ ๊นจ๋‹ฌ์Œ์ฒ˜๋Ÿผ ๋‹ค๋ฃจ๋Š” ์ž…์žฅ์— ์ ์  ํšŒ์˜์ ์ด ๋๋‹ค. ์‹ค์ œ๋กœ ์ ํ•ฉ์„ฑ์€ ๊ณ ์ •๋œ ๋ชฉํ‘œ๊ฐ€ ์•„๋‹ˆ๋ผ ๊ณ„์† ์›€์ง์ธ๋‹ค. ์ดˆ๊ธฐ ์„ฑ๊ณผ๊ฐ€ ์žฅ๊ธฐ์  ์ ํ•ฉ์„ฑ์„ ๋ณด์žฅํ•˜์ง€๋„ ์•Š๋Š”๋‹ค. ๊ณ ๊ฐ์˜ ์š”๊ตฌ๋Š” ๋ณ€ํ•˜๊ณ , ๊ฒฝ์Ÿ์ž๋Š” ๋Œ€์‘ํ•˜๋ฉฐ, ์–ด์ œ ๋งž์•˜๋˜ ๊ฒƒ์ด ๋‚ด์ผ๋„ ๋งž๋Š”๋‹ค๋Š” ๋ณด์žฅ์€ ์—†๋‹ค. ๊ทธ๋ž˜์„œ PMF๋ฅผ ๋„๋‹ฌ์ ์ด ์•„๋‹ˆ๋ผ ์ง€์†์ ์ธ ์กฐ์ • ๊ณผ์ •์œผ๋กœ ๋ฐ”๋ผ๋ณธ๋‹ค.

๋”ฐ๋ผ์„œ ์‹ ํ™”์  ์ˆœ๊ฐ„์„ ์ซ“๊ธฐ๋ณด๋‹ค ์ถ”์„ธ์™€ ํ๋ฆ„์„ ์‚ดํ•„ ํ•„์š”๊ฐ€ ์žˆ๋‹ค. โ€œPMF๋ฅผ ๋‹ฌ์„ฑํ–ˆ๋‹คโ€๋ผ๊ณ  ์„ ์–ธํ•˜๋Š” ๋Œ€์‹ , ์ง€๊ธˆ๋„ ์—ฌ์ „ํžˆ ์‹ค์ œ ์‚ฌ๋žŒ๋“ค์˜ ์‹ค์ œ ๋ฌธ์ œ๋ฅผ ์ œ๋Œ€๋กœ ํ•ด๊ฒฐํ•˜๊ณ  ์žˆ๋Š”์ง€, ๊ทธ๋ฆฌ๊ณ  ๋‹ค๋ฅธ ๋Œ€์•ˆ๋ณด๋‹ค ๋” ๋‚˜์€ ํ•ด๊ฒฐ์ฑ…์„ ์ œ๊ณตํ•˜๊ณ  ์žˆ๋Š”์ง€๋ฅผ ๋ฌผ์–ด์•ผ ํ•œ๋‹ค. ์˜ค๋ž˜ ์‚ด์•„๋‚จ๋Š” ํŒ€์€ ์ ํ•ฉ์„ฑ์„ ํ•œ ๋ฒˆ ์ฐพ๋Š” ๋ฐ ๊ทธ์น˜์ง€ ์•Š๊ณ  ์ง€์†์ ์œผ๋กœ ๋‹ค๋“ฌ์–ด ๋‚˜๊ฐ€๋Š” ํŒ€์ด๋‹ค.

๋น ๋ฅด๊ฒŒ ๋Œ์•„๊ฐ€๋Š” ์ œํ’ˆ ๊ฐœ๋ฐœ ์‚ฌ์ดํด์—์„œ๋Š” ๋‹ค์Œ ํ”„๋กœ์ ํŠธ๋กœ ๊ณง๋ฐ”๋กœ ๋„˜์–ด๊ฐ€๋ฉฐ ๋Œ์•„๋ณผ ์‹œ๊ฐ„์„ ๋†“์น˜๊ธฐ ์‰ฝ๋‹ค. ๊ทธ๋ž˜์„œ ์ฃผ์š” ๋ฆด๋ฆฌ์Šค๋‚˜ ์„ฑ์žฅ ์‹คํ—˜์„ ๋งˆ์น  ๋•Œ๋งˆ๋‹ค โ€˜๋ฐ˜์„ฑ ํšŒ์˜โ€™๋ฅผ ์—ฌ๋Š” ๊ฒƒ์„ ์˜๋ก€๋กœ ์‚ผ๊ณ  ์žˆ๋‹ค. ์ด ์ž๋ฆฌ์—์„œ๋Š” ํฌ๊ฒŒ 3๊ฐ€์ง€ ์งˆ๋ฌธ์„ ๋˜์ง„๋‹ค.

  1. ์˜ฌ๋ฐ”๋ฅธ ์ง€ํ‘œ๋ฅผ ์ธก์ •ํ–ˆ๋Š”๊ฐ€?
  2. ์–ด๋–ค ์ง€ํ‘œ๊ฐ€ ์‹ค์ œ๋กœ ํ†ต์ฐฐ์„ ์คฌ๊ณ , ์–ด๋–ค ์ง€ํ‘œ๊ฐ€ ์˜คํžˆ๋ ค ํŒ๋‹จ์„ ํ๋ฆฌ๊ฒŒ ํ–ˆ๋Š”๊ฐ€?
  3. ์„ฑ์žฅ ๊ฐ€์„ค ์ค‘ ๋ฌด์—‡์ด ์‹ค์ œ๋กœ ํ‹€๋ ธ๋Š”๊ฐ€?

์ด ๊ณผ์ •์„ ๊พธ์ค€ํžˆ ์‹ค์ฒœํ•œ ํŒ€์€ ์‹œ๊ฐ„์ด ๊ฐˆ์ˆ˜๋ก ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ค๋ฃจ๋Š” ๋ฐ ํ›จ์”ฌ ๋Šฅ์ˆ™ํ•ด์กŒ๋‹ค. ์ด๋•Œ ์ง€ํ‘œ๋Š” ์ ์ˆ˜ํŒ์ด๋‚˜ ์••๋ฐ• ๋„๊ตฌ๊ฐ€ ์•„๋‹ˆ๋ผ, ์•ž์œผ๋กœ ๊ฐ€์•ผ ํ•  ๋ฐฉํ–ฅ์„ ๋น„์ถฐ์ฃผ๋Š” ์†์ „๋“ฑ์ด ๋œ๋‹ค.

์˜์‹์˜ ์ค‘์š”์„ฑ

์ง€๊ธˆ๊นŒ์ง€์˜ ๋ชจ๋“  ๋…ผ์ ์„ ํ•˜๋‚˜๋กœ ๋ฌถ๋Š” ์ฃผ์ œ๋Š” ์„ฑ์žฅ์—์„œ ์˜์‹์˜ ์ค‘์š”์„ฑ์ด๋‹ค. ๋ถ๊ทน์„ฑ ์ง€ํ‘œ, ์„ฑ์žฅ ๋ฃจํ”„, ๋ฐ”์ด๋Ÿด ๊ณ„์ˆ˜, OKR ๊ฐ™์€ ํ”„๋ ˆ์ž„์›Œํฌ๋Š” ์œ ์šฉํ•œ ๋„๊ตฌ์ง€๋งŒ, ๋งฅ๋ฝ๊ณผ ์ž๊ธฐ ์ธ์‹์„ ๊ฐ–๊ณ  ์‚ฌ์šฉํ•  ๋•Œ๋งŒ ํšจ๊ณผ๊ฐ€ ์žˆ๋‹ค. ๊ทธ๋ž˜์„œ ํŒ€์—๋Š” โ€œ์ˆซ์ž์™€ ๋งฅ๋ฝ(์ง๊ด€, ์‚ฌ์šฉ์ž ์กฐ์‚ฌ, ์‹œ์žฅ ์‹ ํ˜ธ)์ด ์„œ๋กœ ๋‹ค๋ฅธ ๋ฉ”์‹œ์ง€๋ฅผ ์ œ์‹œํ•œ๋‹ค๋ฉด ๋งฅ๋ฝ์„ ์šฐ์„ ํ•˜๋ผโ€๋ผ๊ณ  ์ง€์‹œํ•œ๋‹ค.

์„ฑ์žฅ์€ ์ „๋žต์ด ์•„๋‹ˆ๋ผ ๊ฒฐ๊ณผ๋‹ค. ๊ณผ๊ฑฐ์˜ ์Šค์Šค๋กœ์—๊ฒŒ ์กฐ์–ธํ•  ์ˆ˜ ์žˆ๋‹ค๋ฉด, โ€œํŠธ๋ Œ๋“œ๋ผ์ธ์„ ์ซ“์ง€ ๋ง๊ณ , ์ดํ•ด๋ฅผ ์ซ“์•„๋ผโ€๋ผ๊ณ  ๋งํ•˜๊ณ  ์‹ถ๋‹ค. ์—ญ์„ค์ ์ด๊ฒŒ๋„ ์‚ฌ์šฉ์ž์™€ ๊ฐ€์น˜์— ๋Œ€ํ•œ ์ดํ•ด๊ฐ€ ๊นŠ์–ด์งˆ์ˆ˜๋ก, ์„ฑ์žฅ์€ ๋” ์ž์—ฐ์Šค๋Ÿฝ๊ฒŒ ๋’ค๋”ฐ๋ฅด๊ณ  ๋” ๊ฑด๊ฐ•ํ•˜๋ฉฐ ์ง€์† ๊ฐ€๋Šฅํ•ด์ง„๋‹ค.
dl-ciokorea@foundryco.com

6 strategies for CIOs to effectively manage shadow AI

28 November 2025 at 05:00

As employees experiment with gen AI tools on their own, CIOs are facing a familiar challenge with shadow AI. Although itโ€™s often well-intentioned innovation, it can create serious risks around data privacy, compliance, and security.

According to 1Passwordโ€™s 2025 annual report, The Access-Trust Gap, shadow AI increases an organizationโ€™s risk as 43% of employees use AI apps to do work on personal devices, while 25% use unapproved AI apps at work.

Despite these risks, experts say shadow AI isnโ€™t something to do away with completely. Rather, itโ€™s something to understand, guide, and manage. Here are six strategies that can help CIOs encourage responsible experimentation while keeping sensitive data safe.

1. Establish clear guardrails with room to experiment

Managing shadow AI begins with getting clear on whatโ€™s allowed and what isnโ€™t. Danny Fisher, chief technology officer at West Shore Home, recommends that CIOs classify AI tools into three simple categories:ย approved, restricted, and forbidden.

โ€œApproved tools are vetted and supported,โ€ he says. โ€œRestricted tools can be used in a controlled space with clear limits, like only using dummy data. Forbidden tools, which are typically public or unencrypted AI systems, should be blocked at the network or API level.โ€

Matching each type of AI use with a safe testing space, such as an internal OpenAI workspace or a secure API proxy, lets teams experiment freely without risking company data, he adds.

Jason Taylor, principal enterprise architect at LeanIX, an SAP company, says clear rules are essential in todayโ€™s fast-moving AI world.

โ€œBe clear which tools and platforms are approved and which ones arenโ€™t,โ€ he says. โ€œAlso be clear which scenarios and use cases are approved versus not, and how employees are allowed to work with company data and information when using AI like, for example, one-time upload as opposed to cut-and-paste or deeper integration.โ€

Taylor adds that companies should also create a clear list that explains which types of data are or arenโ€™t safe to use, and in what situations. A modern data loss prevention tool can help by automatically finding and labeling data, and enforcing least-privilege or zero-trust rules on who can access what.

Patty Patria, CIO at Babson College, notes itโ€™s also important for CIOs to establish specific guardrails for no-code/low-code AI tools and vibe-coding platforms.

โ€œThese tools empower employees to quickly prototype ideas and experiment with AI-driven solutions, but they also introduce unique risks when connecting to proprietary or sensitive data,โ€ she says.

To deal with this, Patria says companies should set up security layers that let people experiment safely on their own but require extra review and approval whenever someone wants to connect an AI tool to sensitive systems.

โ€œFor example, weโ€™ve recently developed clear internal guidance for employees outlining when to involve the security team for application review and when these tools can be used autonomously, ensuring both innovation and data protection are prioritized,โ€ she says. โ€œWe also maintain a list of AI tools we support, and which we donโ€™t recommend if theyโ€™re too risky.โ€

2. Maintain continuous visibility and inventory tracking

CIOs canโ€™t manage what they canโ€™t see. Experts say maintaining an accurate, up-to-date inventory of AI tools is one of the most important defenses against shadow AI.

โ€œThe most important thing is creating a culture where employees feel comfortable sharing what they use rather than hiding it,โ€ says Fisher. His team combines quarterly surveys with a self-service registry where employees log the AI tools they use. IT then validates those entries through network scans and API monitoring.

Ari Harrison, VP of IT at branding manufacturer Bamko, says his team takes a layered approach to maintaining visibility.

โ€œWe maintain a living registry of connected applications by pulling from Google Workspaceโ€™s connected-apps view and piping those events into our SIEM [security information and event management system],โ€ he says. โ€œMicrosoft 365 offers similar telemetry, and cloud access security broker tools can supplement visibility where needed.โ€

That layered approach gives Bamko a clear map of which AI tools are touching corporate data, who authorized them, and what permissions they have.

Mani Gill, SVP of product at cloud-based iPaaS Boomi, argues that manual audits are no longer enough.

โ€œEffective inventory management requires moving beyond periodic audits to continuous, automated visibility across the entire data ecosystem,โ€ he says, adding that good governance policies ensure all AI agents, whether approved or built into other tools, send their data in and out through one central platform. This gives organizations instant, real-time visibility into what each agent is doing, how much data itโ€™s using, and whether itโ€™s following the rules.

Tanium chief security advisor Tim Morris agrees that continuous discovery across every device and application is key. โ€œAI tools can pop up overnight,โ€ he says. โ€œIf a new AI app or browser plugin appears in your environment, you should know about it immediately.โ€

3. Strengthen data protection and access controls

When it comes to securing data from shadow AI exposure, experts point to the same foundation:ย data loss prevention (DLP), encryption, and least privilege.

โ€œUse DLP rules to block uploads of personal information, contracts, or source code to unapproved domains,โ€ Fisher says. He also recommends masking sensitive data before it leaves the organization, and turning on logging and audit trails to track every prompt and response in approved AI tools.

Harrison echoes that approach, noting that Bamko focuses on the security controls that matter most in practice: Outbound DLP and content inspection to prevent sensitive data from leaving; OAuth governance to keep third-party permissions to least privilege; and access limits that restrict uploads of confidential data to only approved AI connectors within its productivity suite.

In addition, the company treats broad permissions, such as read and write access to documents or email, as high-risk and requires explicit approval, while narrow, read-only permissions can move faster, Harrison adds.

โ€œThe goal is to allow safe day-to-day creativity while reducing the chance of a single click granting an AI tool more power than intended,โ€ he says.

Taylor adds that security must be consistent across environments. โ€œEncrypt all sensitive data at rest, in use, and in motion, employ least-privilege and zero-trust policies for data access permissions, and ensure DLP systems can scan for, tag, and protect sensitive data.โ€

He notes that companies should ensure these controls work the same on desktop, mobile, and web, and keep checking and updating them as new situations come up.

4. Clearly define and communicate risk tolerance

Defining risk tolerance is as much about communication as it is about control. Fisher advises CIOs to tie risk tolerance to data classification instead of opinion. His team uses a simple color-coded system: green for low-risk activities, such as marketing content; yellow for internal documents that must use approved tools; and red for customer or financial data that canโ€™t be used with AI systems.

โ€œRisk tolerance should be grounded in business value and regulatory obligation,โ€ says Morris. Like Fisher, Morris recommends classifying AI use into clear categories, whatโ€™s permitted, what needs approval, and whatโ€™s prohibited, and communicating that framework through leadership briefings, onboarding, and internal portals.

Patria says Babsonโ€™s AI Governance Committee plays a key role in this process. โ€œWhen potential risks emerge, we bring them to the committee for discussion and collaboratively develop mitigation strategies,โ€ she says. โ€œIn some cases, weโ€™ve decided to block tools for staff but permit them for classroom use. That balance helps manage risk without stifling innovation.โ€

5. Foster transparency and a culture of trust

Transparency is the key to managing shadow AI well. Employees need to know whatโ€™s being monitored and why.

โ€œTransparency means employees always know whatโ€™s allowed, whatโ€™s being monitored, and why,โ€ Fisher says. โ€œPublish your governance approach on the company intranet and include real examples of both good and risky AI use. Itโ€™s not about catching people. Youโ€™re building confidence that utilizing AI is safe and fair.โ€

Taylor recommends publishing a list of officially sanctioned AI offerings and keeping it updated. โ€œBe clear about the roadmap for delivering capabilities that arenโ€™t yet available,โ€ he says, and provide a process to request exceptions or new tools. That openness shows governance exists to support innovation, not hinder it.

Patria says in addition to technical controls and clear policies, establishing dedicated governance groups, like the AI Governance Committee, can greatly enhance an organizationโ€™s ability to manage shadow AI risks.

โ€œWhen potential risks emerge, such as concerns about tools like DeepSeek and Fireflies.AI, we collaboratively develop mitigation strategies,โ€ she says.

This governance group not only looks at and handles risks, but explains its decisions and the reasons behind them, helping create transparency and shared responsibility, Patria adds.

Morris agrees. โ€œTransparency means there are no surprises. Employees should know which AI tools are approved, how decisions are made, and where to go with questions or new ideas,โ€ he says.

6. Build continuous, role-based AI training

Training is one of the most effective ways to prevent accidental misuse of AI tools. The key is be succinct, relevant, and recurring.

โ€œKeep training short, visual, and role-specific,โ€ says Fisher. โ€œAvoid long slide decks and use stories, quick demos, and clear examples instead.โ€

Patria says Babson integrates AI risk awareness into annual information security training, and sends periodic newsletters about new tools and emerging risks.

โ€œRoutine training sessions are offered to ensure employees understand approved AI tools and emerging risks, while departmental AI champions are encouraged to facilitate dialogue and share practical experiences, highlighting both the benefits and potential pitfalls of AI adoption,โ€ she adds.

Taylor recommends embedding training in-browser, so employees learn best practices directly in the tools theyโ€™re using. โ€œCutting and pasting into a web browser or dragging and dropping a presentation seems innocuous until your sensitive data has left your ecosystem,โ€ he says.

Gill notes that training should connect responsible use with performance outcomes.

โ€œEmployees need to understand that compliance and productivity work together,โ€ he says. โ€œApproved tools deliver faster results, better data accuracy, and fewer security incidents compared with shadow AI. Role-based, ongoing training can demonstrate how guardrails and governance protect both data and efficiency, ensuring that AI accelerates workflows rather than creating risk.โ€

Responsible AI use is good business

Ultimately, managing shadow AI isnโ€™t just about reducing risk, itโ€™s about supporting responsible innovation. CIOs who focus on trust, communication, and transparency can turn a potential problem into a competitive advantage.

โ€œPeople generally donโ€™t try and buck the system when the system is giving them what theyโ€™re looking for, especially when thereโ€™s more friction for the user in taking the shadow AI approach,โ€ says Taylor.

Morris concurs. โ€œThe goal isnโ€™t to scare people but to make them think before they act,โ€ he says. โ€œIf they know the approved path is easy and safe, theyโ€™ll take it.โ€

Thatโ€™s the future CIOs should work toward: a place where people can innovate safely, feel trusted to experiment, and keep data protected because responsible AI use isnโ€™t just compliance, itโ€™s good business.

์‹ ์ž„ IT ๋ฆฌ๋”์™€ ๊ด€๋ฆฌ์ž๊ฐ€ ํ”ํžˆ ์ €์ง€๋ฅด๋Š” ์‹ค์ˆ˜ 8๊ฐ€์ง€

27 November 2025 at 23:58

์š”์ ์€ ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค.

  • ์ƒˆ๋กœ์šด ๊ด€๋ฆฌ์ž๋Š” ๋ฌด๋ฆฌํ•œ ํ–‰๋™์— ๋‚˜์„œ๊ธฐ๋ณด๋‹ค ์ง์› ์ฐธ์—ฌ๋ฅผ ํ†ตํ•ด ๋ณ€ํ™”๋ฅผ ์ถ”์ง„ํ•ด์•ผ ํ•œ๋‹ค.
  • ์กฐ์ง ๋‚ด ์กฐํ™”๋ฅผ ์ง€๋‚˜์น˜๊ฒŒ ์ค‘์‹œํ•˜๋Š” ๋ฆฌ๋”๋Š” ๋Œ€์ฒด๋กœ ๊ฐˆ๋“ฑ์„ ํšŒํ”ผํ•˜๋Š” ๊ฒฝํ–ฅ์ด ์žˆ์–ด ๋ฌธ์ œ ๋Œ€์‘์ด ๋Šฆ์–ด์งˆ ๋•Œ๊ฐ€ ๋งŽ๋‹ค.
  • ๋ชฉํ‘œ๋ฅผ ๋‹ฌ์„ฑํ•˜๋ ค๋ฉด ๊ด€๋ฆฌ์ž๋Š” ์ ์ ˆํ•œ ๊ถŒํ•œ ์œ„์ž„์„ ํ†ตํ•ด ์‹œ๊ฐ„์„ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ์–ด์•ผ ํ•œ๋‹ค.

์Šน์ง„์„ ํ†ตํ•ด ๋ฆฌ๋”๊ฐ€ ๋œ ๊ฒƒ์€ ๋ถ„๋ช… ์˜๋ฏธ ์žˆ๋Š” ์„ฑ์ทจ๋‹ค. ์ด์ œ ๋ˆˆ์•ž์—๋Š” ํฅ๋ฏธ๋กญ๊ณ ๋„ ๋ฐฐ์›€ ๋งŽ์€ ์‹œ๊ธฐ๊ฐ€ ํŽผ์ณ์ง€๋ฉฐ, ๋™์‹œ์— ๊ณณ๊ณณ์—๋Š” ์‹œํ–‰์ฐฉ์˜ค์™€ ์œ„ํ—˜ ์š”์†Œ๊ฐ€ ๋„์‚ฌ๋ฆฌ๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ๋งŽ์€ ์‹ ์ž„ ๋ฆฌ๋”์™€ ๊ด€๋ฆฌ์ž๊ฐ€ ์ €์ง€๋ฅด๋Š” ๋‹ค์Œ 8๊ฐ€์ง€ ์‹ค์ˆ˜๋ฅผ ๋ฏธ๋ฆฌ ์ดํ•ดํ•œ๋‹ค๋ฉด, ๊ฑธ๋ฆผ๋Œ์„ ์ถฉ๋ถ„ํžˆ ์˜ˆ์ธกํ•˜๊ณ  ํ”ผํ•  ์ˆ˜ ์žˆ๋‹ค.

์ทจ์ž„ ์ธ์‚ฌ์˜ ์ค‘์š”์„ฑ์„ ๊ณผ์†Œํ‰๊ฐ€ํ•œ๋‹ค

๊ธฐ์กด ๊ตฌ์„ฑ์›๊ณผ ์ด๋ฏธ ํ•จ๊ป˜ ์ผํ•ด์™”๋“  ์™„์ „ํžˆ ์ƒˆ๋กœ์šด ํ™˜๊ฒฝ์—์„œ ๋ฆฌ๋” ์—ญํ• ์„ ๋งก๊ฒŒ ๋๋“ , ์ง์›๋“ค์€ ์ƒˆ ์ƒ์‚ฌ๋ฅผ ๋นจ๋ฆฌ ๋งŒ๋‚˜๊ณ  ์‹ถ์–ด ํ•œ๋‹ค. ๋ถ€์ž„ ํ›„ ์ดํ‹€ ๋˜๋Š” ์‚ฌํ˜์งธ ๋˜๋Š” ๋‚  ํŒ€์„ ์ดˆ๋Œ€ํ•ด ๊ฐ„๋‹จํ•œ ํ™˜์˜ ์ž๋ฆฌ๋ฅผ ๋งˆ๋ จํ•˜๊ณ , ๊ณต์‹์ ์œผ๋กœ ์ž์‹ ์„ ์†Œ๊ฐœํ•˜๋Š” ๊ฒƒ์ด ์ข‹๋‹ค. ์งง์€ ์ธ์‚ฌ๋ง์—๋Š” ์ž์‹ ์˜ ๊ฒฝ๋ ฅ๊ณผ ์—…๋ฌด ๊ฒฝํ—˜์„ ๊ฐ„๋‹จํžˆ ์†Œ๊ฐœํ•˜๊ณ , ๋ฆฌ๋”์‹ญ ์Šคํƒ€์ผ๊ณผ ๊ฐ€์น˜๊ด€, ์ดˆ๊ธฐ ๋ชฉํ‘œ์— ๋Œ€ํ•œ ์œค๊ณฝ์„ ์ œ์‹œํ•ด์•ผ ํ•œ๋‹ค. ์ง์› ๋ฉด๋‹ด ์ผ์ •๊ณผ ํ˜„์žฅ ๋ฐฉ๋ฌธ, ํ‚ฅ์˜คํ”„ ๋ฏธํŒ… ๊ณ„ํš ๋“ฑ ์ดˆ๊ธฐ ์šด์˜ ๋ฐฉํ–ฅ์— ๋Œ€ํ•œ ๊ตฌ์ฒด์ ์ธ ์ •๋ณด๋„ ํ•จ๊ป˜ ์ „๋‹ฌํ•˜๋Š” ํŽธ์ด ๋ฐ”๋žŒ์งํ•˜๋‹ค.

์ฃผ์˜ํ•  ์ ๋„ ์žˆ๋‹ค. โ€œํŠผํŠผํ•œ ํ† ๋Œ€๋ฅผ ์œ„ํ•œ ์ตœ๊ณ ์˜ ์ „์ œ ์กฐ๊ฑด์€ ๊ฒฌ๊ณ ํ•œ ๊ธฐ๋ฐ˜์ด๋‹คโ€ ๊ฐ™์€ ๊ณตํ—ˆํ•œ ๋ฌธ๊ตฌ๋Š” ์ƒˆ๋กœ์šด ์—ญํ• ์—์„œ ์ข‹์€ ์ถœ๋ฐœ์„ ๋ง์น  ๋ฟ์ด๋‹ค. ์ด๋Š” ๋…์ผ ์—ฐ๋ฐฉ์˜ํšŒ์—์„œ๋„ ์‹ค์ œ๋กœ ์‚ฌ์šฉ๋œ ํ‘œํ˜„์ธ๋ฐ, ์˜๋ฏธ ์—†๋Š” ์ˆ˜์‚ฌ, ์ง€๋‚˜์น˜๊ฒŒ ๊ธด ์ž๊ธฐ์†Œ๊ฐœ, ์ „์ž„์ž์— ๋Œ€ํ•œ ํ‰๊ฐ€๋‚˜ ๊ธฐ์กด ๋ฐฉ์‹์— ๋Œ€ํ•œ ๋น„ํŒ์€ ์‹ ๋ขฐ๋ฅผ ์–ป๋Š” ๋ฐ ์ „ํ˜€ ๋„์›€์ด ๋˜์ง€ ์•Š๋Š”๋‹ค.

๋ถ€์ž„ ์ดˆ๊ธฐ 100์ผ ๋™์•ˆ ๋ชจ๋“  ๊ฒƒ์„ ๋’ค์ง‘๋Š”๋‹ค

์ƒˆ๋กœ์šด ๊ด€๋ฆฌ์ž๊ฐ€ ์˜ค๋ฉด ์กฐ์ง์€ ๋‹น์—ฐํ•˜๊ฒŒ๋„ ๋ณ€ํ™”๋ฅผ ๊ธฐ๋Œ€ํ•œ๋‹ค. ์ด๋Ÿฐ ๋ถ„์œ„๊ธฐ ์†์—์„œ ์‹ ์ž„ ๊ด€๋ฆฌ์ž๋Š” ๊ณผ๋„ํ•œ ํ™œ๋™์— ๋ชฐ๋‘ํ•˜๋ฉฐ ์ž์‹ ์˜ ์กด์žฌ๊ฐ์„ ์ž…์ฆํ•˜๋ ค๋Š” ๊ฒฝํ–ฅ์„ ๋ณด์ธ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Ÿฐ ๋ชจ์Šต์€ ํŒ€์„ ์ด๋Œ๋ฉฐ ๋ฐฉํ–ฅ์„ ์žก๊ธฐ๋ณด๋‹ค, ์Šค์Šค๋กœ์˜ ์œ„์น˜์™€ ์„ฑ๊ณผ์—๋งŒ ์ง€๋‚˜์น˜๊ฒŒ ์ง‘์ค‘ํ•˜๋Š” ์‚ฌ๋žŒ์ฒ˜๋Ÿผ ๋น„์น  ์ˆ˜ ์žˆ๋‹ค.

์ดˆ๊ธฐ ๋ช‡ ์ฃผ๋Š” ์ง์› ๋ฉด๋‹ด๊ณผ ์—…๋ฌด ํ˜„์žฅ ๋ฐฉ๋ฌธ์— ์ง‘์ค‘ํ•˜๋Š” ํŽธ์ด ํ›จ์”ฌ ํšจ๊ณผ์ ์ด๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๊ตฌ์„ฑ์›์ด ๊ธฐ๋Œ€ํ•˜๋Š” ๋ฐ”, ๋งก๊ณ  ์žˆ๋Š” ์—…๋ฌด, ํ˜‘์—… ๋ฐฉ์‹, ๋‚ด๋ถ€ ํ”„๋กœ์„ธ์Šค, ์ž ์žฌ์  ๋ฌธ์ œ ์ง€์  ๋“ฑ์„ ์ „์ฒด์ ์œผ๋กœ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ํ‰๊ฐ€์™€ ์ดํ•ด๊ฐ€ ์ถฉ๋ถ„ํžˆ ์ด๋ค„์ง„ ๋’ค์—์•ผ, ์ง์› ์ฐธ์—ฌ๋ฅผ ํ†ตํ•œ ๋ณ€ํ™”๊ฐ€ ๋น„๋กœ์†Œ ์˜๋ฏธ ์žˆ๊ฒŒ ์ถ”์ง„๋  ์ˆ˜ ์žˆ๋‹ค.

์ง์›์—๊ฒŒ ํœ˜๋‘˜๋ฆฐ๋‹ค

๋ฌธ์ œ๊ฐ€ ์ƒ๊ธฐ๋ฉด ์ง์›์€ ๋Œ€์ฒด๋กœ ์ƒ์‚ฌ์˜ ๋„์›€์„ ๊ธฐ๋Œ€ํ•œ๋‹ค. ์ƒ๋ถ€์˜ ์••๋ฐ•์ด๋“ , ์™ธ๋ถ€ ์ดํ•ด๊ด€๊ณ„์ž์™€์˜ ๊ฐˆ๋“ฑ์ด๋“ , ํŒ€ ๋‚ด๋ถ€์˜ ๋ฌธ์ œ์ด๋“  ๋งˆ์ฐฌ๊ฐ€์ง€๋‹ค. ์ƒˆ ๊ด€๋ฆฌ์ž๊ฐ€ ๋ถ€์ž„ํ•˜๋ฉด ์ง์›๋“ค์€ ๊ทธ๋™์•ˆ ํ•ด๊ฒฐ๋˜์ง€ ์•Š์•˜๋˜ ๋ถˆ๋งŒ์ด๋‚˜ ๋ฏธํ•ด๊ฒฐ ์‚ฌ์•ˆ์„ ํ’€์–ด๋‹ฌ๋ผ๋ฉฐ ์ƒˆ๋กœ์šด ์ƒ์‚ฌ๋ฅผ ์ ๊ทน์ ์œผ๋กœ ๋Œ์–ด๋“ค์ด๋ ค ํ•œ๋‹ค. ๋Œ€์™ธ์ ์œผ๋กœ ๋Œ€์‹  ๋ชฉ์†Œ๋ฆฌ๋ฅผ ๋‚ด์ฃผ๊ธธ ๊ธฐ๋Œ€ํ•˜๋Š” ๊ฒƒ์ด๋‹ค.

๊ทธ๋Ÿฌ๋‚˜ ์ด๋•Œ ์ฃผ์˜๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ์ด๋Ÿฐ ์ƒํ™ฉ์—์„œ๋Š” ์ง์› ๊ฐœ์ธ์˜ ์ฃผ๊ด€์  ํŒ๋‹จ๋งŒ ์ „๋‹ฌ๋˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹ค. ๋”ฐ๋ผ์„œ ์„ฑ๊ธ‰ํ•œ ์•ฝ์†์ด๋‚˜ ์ฆ‰ํฅ์  ๊ฒฐ์ •์„ ํ”ผํ•˜๊ณ , ์šฐ์„  ํ˜„์žฌ ์ƒํ™ฉ๊ณผ ์ฑ…์ž„ ๊ตฌ์กฐ๋ฅผ ์ถฉ๋ถ„ํžˆ ์ดํ•ดํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•˜๋‹ค.

ํŠน์ • ์ง์›๊ณผ ๊ณผ๋„ํ•˜๊ฒŒ ๊ฐ€๊นŒ์›Œ์ง„๋‹ค

๋™๋ฃŒ ๊ฐ„ ์šฐํ˜ธ์ ์ธ ๋ถ„์œ„๊ธฐ๋Š” ์—…๋ฌด ๋งŒ์กฑ๋„๋ฅผ ๋†’์ด๊ณ , ๊ทผ๋ฌด ์™ธ ์‹œ๊ฐ„์— ๋‚˜๋ˆ„๋Š” ๋Œ€ํ™” ์—ญ์‹œ ๊ธ์ •์ ์ธ ์กฐ์ง ๋ฌธํ™”๋ฅผ ๋งŒ๋“œ๋Š” ๋ฐ ๋„์›€์ด ๋œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ํŠน์ • ์ง์›๊ณผ ๊ฐœ์ธ์  ์นœ๋ถ„์ด ๊นŠ์–ด์ง€๋ฉด, ์ด ๊ด€๊ณ„๊ฐ€ ์—…๋ฌด์— ์–ด๋–ค ์˜ํ–ฅ์„ ๋ฏธ์น ์ง€ ์ ๊ฒ€ํ•ด์•ผ ํ•œ๋‹ค. ํŠนํžˆ ์ค‘์š”ํ•œ ์˜์‚ฌ๊ฒฐ์ •์ด๋‚˜ ๊ฐˆ๋“ฑ ์ƒํ™ฉ์—์„œ ๊ณต์ •์„ฑ์„ ์œ ์ง€ํ•  ์ˆ˜ ์žˆ๋Š”์ง€, ๋‹ค๋ฅธ ์ง์›ยท๋™๋ฃŒยท์ƒ์‚ฌ๋Š” ์ด๋ฅผ ์–ด๋–ป๊ฒŒ ๋ฐ›์•„๋“ค์ผ์ง€ ์ž๋ฌธํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ๋ฆฌ๋”์™€ ์ง์› ๋ชจ๋‘๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์ ์ ˆํ•œ ๊ฑฐ๋ฆฌ๊ฐ์„ ์œ ์ง€ํ•˜๋Š” ๊ฒƒ์ด ๋ฐ”๋žŒ์งํ•˜๋‹ค.

ํ•ญ์ƒ ์˜ณ๋‹ค๊ณ  ์ฃผ์žฅํ•˜๊ณ  ์‹ค์ˆ˜๋ฅผ ์ธ์ •ํ•˜์ง€ ์•Š๋Š”๋‹ค

์‹ค์ˆ˜๋ฅผ ์ธ์ •ํ•˜๊ฑฐ๋‚˜ ์ง์›์˜ ๋น„ํŒ์„ ๋ฐ›์•„๋“ค์ด๋Š” ๊ฒƒ์€ ์ข…์ข… ์•ฝ์ ์„ ๋“œ๋Ÿฌ๋‚ด๋Š” ํ–‰๋™์ด๋ผ๊ณ  ํ•ด์„๋˜๊ณค ํ•œ๋‹ค. ํ•˜์ง€๋งŒ ์‹ค์ œ๋กœ๋Š” ์ •๋ฐ˜๋Œ€๋‹ค. ์ •๋‹นํ•œ ๋น„ํŒ์— ์—ด๋ฆฐ ํƒœ๋„๋ฅผ ๋ณด์ด๊ณ , ํ•„์š”ํ•˜๋‹ค๋ฉด ๊ฒฐ์ •์„ ๋ฐ”๋กœ์žก์œผ๋ ค๋Š” ์ž์„ธ์•ผ๋ง๋กœ ์ง„์ •ํ•œ ๋ฆฌ๋”์‹ญ ์—ญ๋Ÿ‰์„ ๋ณด์—ฌ์ค€๋‹ค. ์ด๋Ÿฌํ•œ ํƒœ๋„๋Š” ๋ฆฌ๋”์˜ ์‹ ๋ขฐ๋„๋ฅผ ๋†’์ด๊ณ  ๊ตฌ์„ฑ์›์—๊ฒŒ ๋ชจ๋ฒ”์„ ์ œ์‹œํ•œ๋‹ค. ์Šค์Šค๋กœ ์‹ค์ฒœํ•˜์ง€ ๋ชปํ•˜๋Š” ๊ฒƒ์„ ์ง์›์—๊ฒŒ ์š”๊ตฌํ•  ์ˆ˜๋Š” ์—†๋‹ค.

๊ฐˆ๋“ฑ์„ ํ”ผํ•˜๋ ค ํ•œ๋‹ค

์กฐ์ง ๋‚ด ์กฐํ™”๋ฅผ ์ค‘์‹œํ•˜๋Š” ๋ฆฌ๋”๋Š” ๋Œ€๊ฐœ ๊ฐˆ๋“ฑ์„ ํšŒํ”ผํ•˜๋Š” ์„ฑํ–ฅ์„ ๋ณด์ธ๋‹ค. ๋ฌธ์ œ๊ฐ€ ์ €์ ˆ๋กœ ํ•ด๊ฒฐ๋˜๊ธธ ๋ฐ”๋ผ๋Š” ๋งˆ์Œ์— ์ƒํ™ฉ์ด ์•…ํ™”๋  ๋•Œ๊นŒ์ง€ ๋Œ€์‘์„ ๋ฏธ๋ฃจ๋Š” ๊ฒฝ์šฐ๋„ ํ”ํ•˜๋‹ค. ์ง์›์˜ ๋ถ€์ ์ ˆํ•œ ํ–‰๋™์ด๋“ , ํŒ€ ๋‚ด ๊ฐˆ๋“ฑ์ด๋“ , ๋ฆฌ๋”๋Š” ์ดˆ๊ธฐ์— ๊ธฐ๋Œ€์น˜๋ฅผ ๋ช…ํ™•ํžˆ ์ „๋‹ฌํ•˜๊ณ , ์ง€์†์ ์œผ๋กœ ๊ฑด์„ค์ ์ธ ํ”ผ๋“œ๋ฐฑ์„ ์ œ๊ณตํ•˜๋ฉฐ, ํ•„์š”ํ•  ๋•Œ ์ฆ‰์‹œ ๋ฐฉํ–ฅ์„ ์กฐ์ •ํ•ด์•ผ ํ•œ๋‹ค. ๋Œ€์‘์ด ๋Šฆ์–ด์ง€๋ฉด ํ”ผ๋กœ๊ฐ์ด ์ปค์ง€๊ณ  ์˜คํ•ด๊ฐ€ ์Œ“์ธ๋‹ค. ๋ช…ํ™•์„ฑ์€ ๋ฆฌ๋”์‹ญ์˜ ํ•ต์‹ฌ ์„ฑ๊ณต ์š”์ธ์ด๋ฉฐ, ์นœ์ ˆํ•จ๊ณผ ์–‘๋ฆฝํ•  ์ˆ˜ ์—†๋Š” ๊ฐ€์น˜๊ฐ€ ์•„๋‹ˆ๋‹ค.

ํ•ญ์ƒ ๋ฌธ์„ ์—ด์–ด๋‘ฌ์•ผ ํ•œ๋‹ค๊ณ  ์ƒ๊ฐํ•œ๋‹ค

์ƒ์‚ฌ๊ฐ€ ์ง์›์˜ ์š”๊ตฌ์‚ฌํ•ญ์— ๊ด€์‹ฌ์„ ๊ฐ–๊ณ  ์žˆ๋‹ค๋Š” ์ธ์ƒ์„ ์ฃผ๋Š” ๊ฒƒ์€ ์ค‘์š”ํ•˜์ง€๋งŒ, โ€œ์–ธ์ œ๋“  ์ฐพ์•„์˜ค๋ผโ€๋ผ๋Š” ๋ง์€ ๋ฆฌ๋”์—๊ฒŒ ์น˜๋ช…์ ์ผ ์ˆ˜ ์žˆ๋‹ค. ๊ณ„ํš๋˜์ง€ ์•Š์€ ๋Œ€ํ™”๋Š” ์ผ์˜ ํ๋ฆ„์„ ๋Š๊ณ , ์ง„ํ–‰ ์ค‘์ธ ์ค‘์š”ํ•œ ์—…๋ฌด๋ฅผ ๋ฐฉํ•ดํ•˜๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

๋‹ค์‹œ ๋งํ•ด, โ€˜์ค‘๊ฐ„์ค‘๊ฐ„โ€™ ๋ฆฌ๋”์‹ญ์„ ๋ฐœํœ˜ํ•˜๋ ค๋Š” ๋ฐฉ์‹์€ ์ ์ ˆํ•˜์ง€ ์•Š๋‹ค. ์‚ฌ์ „์— ์‹œ๊ฐ„์„ ์ •ํ•ด ์ง์› ์ƒ๋‹ด์„ ์œ„ํ•œ ๋ณ„๋„ ์‹œ๊ฐ„์„ ํ™•๋ณดํ•ด์•ผ ํ•œ๋‹ค. ๋ฐ˜๋Œ€๋กœ ์ง‘์ค‘์ด ํ•„์š”ํ•œ ์—…๋ฌด ์‹œ๊ฐ„์—๋Š” ๋ฌธ์„ ๋‹ซ๋Š” ๊ฒƒ์ด ํšจ์œจ์ ์ด๋‹ค. โ€˜์—ด๋ฆฐ ๋ฌธโ€™์ด๋ผ๋Š” ํ™˜์ƒ์€ ์ง์›์ด ์ถฉ๋ถ„ํžˆ ์Šค์Šค๋กœ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ๋Š” ๋ฌธ์ œ๊นŒ์ง€ ์ƒ์‚ฌ์—๊ฒŒ ์˜์กดํ•˜๊ฒŒ ๋งŒ๋“œ๋Š” ๋ถ€์ •์  ๊ฒฐ๊ณผ๋ฅผ ๋‚ณ์„ ์ˆ˜ ์žˆ๋‹ค.

์ „๋ฌธ๊ฐ€๋ฅผ ๋Šฅ๊ฐ€ํ•˜๋ ค ํ•œ๋‹ค

๋ชจ๋“  ๊ธฐ์ˆ ์  ์งˆ๋ฌธ์— ๋‹ตํ•˜๊ฑฐ๋‚˜ ๋ชจ๋“  ๋ฌธ์ œ๋ฅผ ์ง์ ‘ ํ•ด๊ฒฐํ•ด์•ผ ํ•œ๋‹ค๊ณ  ๋ฏฟ๋Š” ๊ฒƒ์€ ํฐ ์ฐฉ๊ฐ์ด๋‹ค. ์ด๋Š” ๊ฐ ๋ถ„์•ผ์˜ ์ „๋ฌธ์„ฑ์„ ๊ฐ€์ง„ ์ง์›์˜ ์—ญํ• ์ด๋ฉฐ, ๊ด€๋ฆฌ์ž์˜ ๋ณธ๋ž˜ ์ž„๋ฌด๋Š” ๋ฆฌ๋”์‹ญ๊ณผ ์กฐ์ง ์šด์˜์— ์žˆ๋‹ค. ์ด๋Ÿฐ ์ฑ…์ž„๊นŒ์ง€ ์Šค์Šค๋กœ ๋– ์•ˆ์œผ๋ ค ํ•˜๋ฉด ๊ฒฐ๊ตญ ํ•ต์‹ฌ ์—…๋ฌด์— ์ง‘์ค‘ํ•˜์ง€ ๋ชปํ•˜๊ฒŒ ๋œ๋‹ค. ์‹œ๊ฐ„์„ ํ™•๋ณดํ•˜๊ณ  ๋ชฉํ‘œ๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ๋‹ฌ์„ฑํ•˜๋ ค๋ฉด, ์ ์ ˆํ•œ ์œ„์ž„์ด ํ•„์ˆ˜์ ์ด๋‹ค.
dl-ciokorea@foundryco.com

Build, Buy, or Borrow Compute? โ€“ A CIOโ€™s call on LLM infrastructure

27 November 2025 at 18:20

Across enterprise deployments, the decisive variable isnโ€™t only the specific LLM; itโ€™s the infrastructure strategy as well โ€”how organizations provision, govern, and scale GPU capacity. Projects stall not because teams lack ideas, but because we pick the wrong way to power them. We still treat GPUs like a procurement item when they are closer to an operating strategy. If your strategy is still formingโ€”as it is for many sensible companiesโ€”the pragmatic default is to borrow first: Start by prototyping on GPU-as-a-Serviceโ€”run multiple models on top of rented GPUs; validate ROI with live benchmarks before you decide what to build or buy.

Picture a Tuesday budget review. One team wants an on-prem cluster โ€œso weโ€™re not at the mercy of the cloud.โ€ Another wants to keep everything with a hyperscaler because โ€œwe canโ€™t wait twelve weeks.โ€ Finance is staring at a graph that looks more like a mountain range than a plan. None of them are wrong. Owning capacity is compelling when you fine-tune frequently, need hard latency guarantees, or must keep data in a strict boundary. You control interconnects and schedulers, and unit costs look attractiveโ€”if utilization stays high. But racks and cards are the easy part. The less glamorous reality is drivers, firmware, cooling, observability, security, and an ops team that runs this like a product. Private clusters idling at โ€œrespectableโ€ 35% are not cheap; they are expensive in time.

Buying from a managed platform is the opposite energy: idea on Monday, demo on Friday. You borrow the providerโ€™s maturityโ€”tooling, accelerators, global reachโ€”and pay for that privilege. The risks are familiar: multi-tenant guardrails, the creep of lock-in if you donโ€™t standardize interfaces, and egress that bites. But for many programs, speed is the difference between a pilot that ships and a pilot that fades into a wiki.

This is why I nudge uncertain teams toward borrowingโ€”GPU-as-a-Serviceโ€”first. Treat it as an option, not a crutch. It absorbs spikes, enables honest bake-offs across model families and hardware generations, and turns capital debates into measured operating experiments. After a few cycles, your own data starts to talk back: what you spend per 1,000 tokens, which workloads are spiky theatre and which are boring baseload, where latency really matters (as in users notice) and where it doesnโ€™t. Only then decide what to own, what to reserve, and what to keep elastic.

All of this only works if the architecture is portable by design. Containerize training and inference. Use open interfacesโ€”ONNX for models, KServe/KFServing for servingโ€”and keep a neutral registry so versions donโ€™t vanish into ticket threads. Keep data flows honest about gravity. Retrieval-augmented generation is a good test: embeddings and sources should live where latency and policy demand, not where a providerโ€™s defaults land them. If shifting a workload from borrowed to reserved capacity requires a rewrite, you donโ€™t have an architectureโ€”you have a dependency with good intentions.

Governance canโ€™t wait for โ€œphase two.โ€ Trust is not a slide; it is evaluation harnesses that run every day. Keep a small, boring set of testsโ€”factuality, safety, toxicity, fairnessโ€”and run them across environments. Log prompts and decisions. Track lineage from data source to output so auditors, and your future self, can explain why a model said what it said. Apply the same discipline to money. Treat inference like a product with service levels for latency, availability, and cost per request. Then squeeze it: smaller specialist models where they fit; distillation and quantization where they donโ€™t. In the real world, servingโ€”not trainingโ€”often dominates the bill.

If you want a straightforward way to start, admit uncertainty. Stand up GPU-as-a-Service and run two benchmark rounds: first across model families, then across hardware. Keep the scoring plainโ€”end-to-end latency people feel, accuracy the business accepts, and a cost you can explain to finance without footnotes. Over a quarter, youโ€™ll see a curve of โ€œknown work.โ€ Move that steady baseload to owned or reserved capacityโ€”whichever the math favors. Leave seasonality, experiments, migrations, and cross-generation tests on the borrowed tier. Push the lowest-latency inference to the edge where decisions actually happenโ€”shops, plants, fleetsโ€”and keep the rest near your data lakes. Most important, operate with one fabric for observability and policy across all three modes so youโ€™re not running three AI programs that merely share a name.

Youโ€™ll notice I havenโ€™t said โ€œnever buildโ€ or โ€œalways buy.โ€ The truth is less dramatic. Owning pays when utilization is real and sovereignty is non-negotiable. Buying pays when speed compounds and you need to move a portfolio of ideas across the finish line. Borrowing pays when youโ€™re honest about not knowing the mix yetโ€”and you want the learning to be cheap and fast. That isnโ€™t fence-sitting; itโ€™s how you stop arguing about ideology and start arguing about facts.

My bias is clear: if your strategy is still forming, start with GPU-as-a-Service. It buys time without buying regret and keeps options open while you learn your own economics. When youโ€™re ready, land your baseload where it belongsโ€”owned or reservedโ€”and keep the rest elastic. Do that, and the conversation with your board shifts from โ€œCan we trust this?โ€ to โ€œWhere else can we apply it, and whatโ€™s the payback?โ€ Compute stops being a bottleneck and starts behaving like what it really is in 2025: an instrument of strategy.

10 benefits of an optimized third-party IT services portfolio

26 November 2025 at 05:00

In todayโ€™s rapidly changing digital landscape, CEOs and CIOs are under constant pressure to do more with less, reduce costs, increase agility, and ensure technology investments directly enable business growth. One of the most effective ways to achieve these objectives is by optimizing your third-party IT services portfolio.

An optimized portfolio not only unlocks cost savings but also enhances flexibility, strengthens risk management, and fosters innovation by aligning IT delivery with broader strategic goals. Here are the top 10 benefits to such a strategy:

Cost efficiency

An optimized portfolio can help with cost reduction and better financial management of IT services spend. By outsourcing certain IT functions to specialized vendors, companies can often achieve cost savings compared to in-house solutions. CEOs are always focused on maximizing profits and reducing unnecessary expenses, making cost-efficient IT services a priority.

Optimizing a decentralized portfolio into a centralized model can reduce IT services spend by up to 30% in fees alone. Beyond direct savings, consolidation creates a stronger base of institutional knowledge around systems, culture, and talent, accelerating onboarding and ensuring continuity of delivery.

Concentrating spend among a select set of strategic partners also creates meaningful leverage. Expect sustainable volume discounts, provider-led investments in technology and COEs, andbest-in-class commercial terms. The result is a more cost-effective, stable, and performance-driven services ecosystem.

Focus on core business

Outsourcing non-core IT functions allows the organization to concentrate on primary business activities. This aligns with the strategic goals of the CEO, who wants the company to excel in its main areas of expertise.

Technology is advancing at its most aggressive pace in decades, and staying current requires time and specialized skills. By entrusting day-to-day IT operations to trusted providers, organizations can reallocate internal resources toward higher-value initiatives such as digital transformation, automation, and product innovation. This accelerates adoption of emerging technologies, and allows internal teams to deepen business expertise, strengthen cross-functional collaboration, and focus on driving growth where it matters most.

Scalability and flexibility

A well-structured third-party IT services portfolio can provide flexibility to scale up or down based on business needs. This is particularly valuable for CEOs who need to adapt to changing market conditions and seize growth opportunities.

Securing talent in the market today is challenging and time consuming, so tapping into the talent pools of your strategic IT services partner base allows organizations to leverage their bench strength to fill immediate needs for talent.

Highly optimized IT service provider portfolios benefit from the institutional knowledge partners obtain over multiple engagements to ensure onboarded resources are the right fit for the organizationโ€™s culture. Provider partners often tap resources to fill needs that have worked in some capacity for the organization on prior engagements, allowing resources to hit the ground running by having experience in the environment, with people, and processes.

Innovation and expertise

Outsourcing IT services can grant access to specialized expertise and innovative technologies that the organization might not possess in-house. CEOs are often interested in staying ahead of the curve and leveraging the latest advancements to drive competitive advantage. They also increasingly look to IT service provider expertise in IT security solutions, as well as in advancements and innovation by leveraging AI.

IT service providers continuously invest in advanced tech and talent development, enabling clients to benefit from cutting-edge innovations without bearing the full cost of adoption. As AI, automation, and cybersecurity evolve, providers offer the subject matter expertise and tools organizations need to stay ahead of disruption.

By tapping into this ecosystem, businesses can improve stability, enhance operational efficiency, and accelerate transformation, positioning IT as a true driver of competitive differentiation.

Risk management

CIOs and CEOs share a concern for managing and mitigating risks. By partnering with reliable and experienced third-party IT service providers, organizations can offload some risks associated with technology management, cybersecurity, compliance, and regulatory issues.

The largest risks reside within the security of an organizationโ€™s data, its platforms, and applications. Providers like Accenture, Wipro, and TCS have built strong security services platforms that allow organizations to leverage the depth and breadth of partner resources to keep up with technology advances.

Focus on strategy

With operational stability ensured through a balance of internal talent and trusted third parties, CIOs can dedicate more focus to long-term strategic initiatives that fuel growth and innovation. As technology evolves, shifts in spend across your provider landscape can reveal new leverage opportunities, whether through volume consolidation, strategic renewals, or rebalanced sourcing models.

A well-optimized portfolio gives CIOs the visibility and flexibility to adjust quickly, align investments with business priorities, and continually extract greater value from every provider relationship.

Agility and time to market

Third-party IT services can accelerate project timelines and improve time to market for new products or services. This aligns with CEO desires to be agile and responsive to market demands.ย 

An optimized IT services portfolio enables organizations to tap into providers with proven delivery methodologies, agile frameworks, and global delivery centers that operate around the clock. This delivery model shortens development cycles, enhances responsiveness, and ensures critical initiatives move from concept to deployment faster. When providers are strategically aligned to your business priorities, they proactively identify opportunities to streamline workflows and eliminate bottlenecks, turning IT into an enabler of innovation rather than a constraint on progress.

Resource allocation

CEOs and CIOs can allocate internal resources more effectively by leveraging external expertise. This can lead to better resource allocation, improved efficiency, and enhanced overall performance.

Optimized portfolios ensure that resources, both internal and external, are strategically aligned with enterprise goals. By clearly defining roles and responsibilities across your IT ecosystem, internal teams can focus on initiatives that differentiate the business while third-party providers manage standardized or commodity functions. This balance creates organizational clarity, eliminates duplication of effort, and enhances operational efficiency.

Over time, this structure supports workforce planning and succession development, allowing organizations to invest in the right internal skillsets for long-term strategic growth.

Competitive edge

A well-managed third-party IT services portfolio can provide an edge by allowing organizations to leverage external partner expertise and resources to outpace competitors. Organizations that view their IT service providers not merely as vendors, but as strategic extensions of their teams usually have an upper hand.

Through continuous engagement, co-innovation, and shared investment models, organizations can pilot emerging technologies faster than peers and bring differentiated offerings to market. Providers with deep domain expertise often introduce industry best practices and benchmark insights that inform strategic decision-making. When these partnerships are managed proactively and built on mutual value, the result is a sustained competitive advantage rooted in speed, innovation, and operational excellence.

Business continuity

Outsourcing certain IT functions can contribute to business continuity planning by having redundancy and backup systems in place through third-party providers. Optimized third-party portfolios enhance resilience by ensuring redundancy across critical infrastructure, applications, and operations.

Leading IT service providers invest heavily in high-availability architectures, disaster recovery capabilities, and geographically diverse data centers, all of which strengthen your organizationโ€™s continuity posture. A diversified yet coordinated provider ecosystem ensures rapid recovery in the event of outages, cyber incidents, or natural disasters.

Overall, an optimized third-party IT services portfolio can contribute significantly to achieving the strategic objectives of CEOs and CIOs, including cost savings, efficiency improvements, innovation, risk management, and competitive advantage. However, itโ€™s important to carefully select and manage third-party vendors to ensure they align with the organizationโ€™s goals. Otherwise, significant value and cost savings could be left on the table.

The hidden costs of premature scale โ€” and how to avoid them

25 November 2025 at 10:24

โ€œScaleโ€ is often mistaken for success โ€” a signal that something works. But in practice, growth stresses not just the roadmap, but the architecture, the data layer, the incident response system and the teamโ€™s ability to operate under load. SLAs, SLOs and latency budgets that felt โ€œgood enoughโ€ at early stages begin to collapse under new concurrency and traffic patterns. Iโ€™ve seen healthy metrics mask brittle systems โ€” until one feature launch brings everything crashing down.

  • Scaling too early โ€” without aligned metrics and operational resilience โ€” remains a top reason for product failure.
  • Metrics are only meaningful when rooted in your specific context, not borrowed benchmarks.
  • Engineering readiness (DORA, error budgets, SLOs) must evolve alongside product growth or risk failure under load.

Over the past decade, Iโ€™ve watched promising teams burn out chasing vanity metrics and products buckle from premature scale. In fact, 70% of startups fail because they try to grow before the product and platform are truly ready. The real challenge isnโ€™t how to grow faster โ€” itโ€™s how to grow without collapsing the system. That requires alignment across metrics, product maturity and engineering resilience.

One of the earliest lessons I learned: Metrics arenโ€™t trophies โ€” theyโ€™re mirrors. Chasing a single number, like monthly active users, once gave us impressive charts but a weak business. We were scaling vanity, not value. Today, instead of generic KPIs, I focus on 4โ€“6 product-specific indicators โ€” signup conversion rate, CAC, DAU-to-MAU ratio, first key action rate, retention in specific action โ€” that reflect how value actually moves through the system. Metrics should guide awareness, not just validate success. As Goodhartโ€™s Law reminds us: Once a measure becomes a target, it stops being a good measure.

People start gaming the number or optimizing for it at the expense of true outcomes. A notorious example was Wells Fargoโ€™s sales scandal โ€” management fixated on a metric (number of accounts per customer) and set such aggressive targets that employees began opening millions of fake accounts just to hit the goal. The metric looked great on paper, but it destroyed customer trust and led to billions in fines. The lesson: Donโ€™t let any single metric become a false idol. Define success in a more balanced way that reflects real value creation for your product and users.

Benchmarks as guardrails

Benchmarks are useful โ€” but only when treated as reference points, not commandments. They help spot when somethingโ€™s off (say, an unusually low conversion rate), but theyโ€™re not meant to define what success should look like for your product. Early on, I made the mistake of comparing our โ€œchapter twoโ€ to someone elseโ€™s โ€œchapter ten.โ€ Iโ€™d see another SaaS boasting 50% Day-1 retention and panic that we were underperforming at 30%, without factoring in that we were solving a different problem, at a different stage, with a different user base.

Thatโ€™s how teams end up racing in a lane that isnโ€™t theirs. Every product exists in its own context โ€” timing, budget, team maturity, market complexity. Benchmarks can inform, but they should never dictate. Treating them as gospel can create a dangerous illusion of objectivity โ€” leading you to ignore your actual constraints or chase metrics that were never yours to begin with.

In practice, I use benchmarks the way I use weather forecasts: They tell me what kind of conditions to expect, but they donโ€™t determine the route. The real job is understanding which metrics actually reflect value for your product โ€” and then tuning the rest of the system around that.

Operational readiness

No matter how promising the metrics look, scaling a product without engineering readiness is like building on soft ground. Growth puts operational systems under pressure โ€” deployment pipelines, observability tools, latency budgets and release cadences all get stress-tested in real time.ย  Thatโ€™s why we treat DORA metrics (like deployment frequency and change failure rate) as early indicators of scaling capacity, not just engineering KPIs.

Before dialing up growth loops, we ask: Are our incident response processes resilient? Do we have error budgets in place, and are they respected? Are performance regressions visible early enough to prevent customer pain?

Scaling isnโ€™t just about acquiring more users โ€” itโ€™s about handling them without breaking trust or stability. Tech debt may not block your next release, but it will compound under pressure. In that sense, infrastructure and platform health are product decisions โ€” because they shape how fast and safely you can move when growth actually arrives.

But metrics donโ€™t just fail at scale because of bad infrastructure โ€” they fail because of how we interpret them.

Metric hygiene

Before any big โ€œresults reviewโ€ meeting or growth update, my team knows Iโ€™ll be declaring a data hygiene day. Itโ€™s not glamorous, but itโ€™s essential. We verify that key events are tracked correctly, naming is consistent and funnels reflect actual user flows. This habit formed after we celebrated a spike in onboarding โ€” only to later discover it was caused by a faulty event firing too early. That incident taught me the cost of bad data: It creates fake confidence and misleads decision-making. Bad data creates fake confidence โ€“ and fake confidence is the most expensive bug of all.

I now treat metric hygiene as seriously as fixing a critical software bug. This isnโ€™t just my eccentricity; itโ€™s borne out by broader evidence. Surveys indicate that 58% of business leaders claim key decisions are often based on inaccurate or inconsistent data. Imagine that โ€“ more than half of companies may be betting on wrong numbers, or at least shaky. In the long run, the cost of poor data quality is substantial: A Gartner study reveals that poor data quality costs organizations an average of $15 million annually. Clean metrics are not just technical hygiene โ€” theyโ€™re a form of risk management. Before celebrating progress, make sure your measurement system isnโ€™t lying.

Beware of proxy metrics, the โ€˜blind spotsโ€™ of growth

Not every growing number means youโ€™re winning. In fact, some metrics can grow impressively while masking stagnation or decline in actual value. I call these proxy metrics (or sometimes โ€œblind metricsโ€). Theyโ€™re the numbers that give an illusion of success while your core value proposition languishes. Classic examples: App downloads can be skyrocketing, but active usage could be flat. Or page views on your site might be high (perhaps due to clickbait marketing) while conversion to paying customers remains low. We often become metric-blind in these cases: We see the graph going up, but donโ€™t question what it really means.

To stay grounded, I organize metrics in a simple hierarchy โ€” a metric pyramid of sorts. At the base are operational metrics (the day-to-day numbers you can directly control or influence: e.g., number of sales calls made, bugs resolved or marketing spend). In the middle are behavioral or product metrics (these show user behavior and engagement: e.g., daily active users, time spent, feature adoption rates โ€” they result from your operations but arenโ€™t solely under your control).

At the top are outcome metrics, which capture the ultimate goals or the โ€œWhyโ€ โ€” often things like revenue, customer retention rate or customer satisfaction that reflect delivered value. This pyramid ensures we connect the tactical metrics to strategic outcomes. Itโ€™s similar to the North Star framework many teams use, where a single top-level metric is supported by a few key drivers, and beneath those are a plethora of granular metrics. In fact, product management guides suggest using a metrics pyramid for clarity: At the top you have a North Star outcome, in the middle, the metrics tied to actions youโ€™re taking to influence that outcome, and at the bottom, the finer data points that help troubleshoot and inform decisions.

When I see a metric like โ€œmonthly sessionsโ€ rising, I force myself to ask: Is this an outcome or just an output? More sessions could mean success if it correlates to the outcome (say, higher revenue or better retention), but it could also be a proxy metric โ€” perhaps users are opening the app more frequently because of a UI change, but not actually getting more value. By structuring our thinking in a pyramid, we remind ourselves that an uptick at the bottom doesnโ€™t guarantee movement at the top.

The myth of โ€˜product-market fitโ€™

In startup lore, few concepts are more celebrated than product-market fit (PMF) โ€” that magical moment when everything clicks: Users love the product, growth surges and you feel like youโ€™ve โ€œmade it.โ€ But Iโ€™ve grown skeptical of framing PMF as a one-time epiphany. In reality, fit is a moving target โ€” a continuous process, not a milestone. Early traction doesnโ€™t guarantee long-term alignment. Customer needs shift, competitors respond and what fit yesterday might not work tomorrow. Thatโ€™s why I treat PMF as ongoing calibration, not a finish line.

So instead of chasing a mythical moment, I pay attention to trends and trajectories. Rather than declaring โ€œwe have PMF,โ€ I ask: How well are we still solving a real problem for real people โ€” and are we doing it better than alternatives? Teams that endure donโ€™t just find fit once โ€” they continuously refine it.

In fast-paced product cycles, itโ€™s easy to jump from one project to the next without pausing. But Iโ€™ve made it a ritual that after every major release or growth experiment, we hold a reflection session. In that session, we ask three questions:

  1. Did we measure the right things?
  2. Which metrics truly gave us clarity, and which ended up misleading or blinding us?
  3. Which of our growth assumptions were proven wrong by reality?

Iโ€™ve noticed that teams who embrace this reflective practice become much more data-savvy over time. The metrics then stop being a scorecard or cudgel, and become a flashlight โ€” something that illuminates the path forward.

Final thoughts

If thereโ€™s one theme that ties all these lessons together, itโ€™s the importance of consciousness in growth. Frameworks and tactics โ€” North Star metrics, growth loops, viral coefficients, OKRs โ€” all of these are useful tools, but only if wielded with self-awareness and context. I often tell myself and my team: When the numbers say one thing and your context (your intuition, user research, market signals) says another, trust the context.

Growth is an outcome, not a strategy. If I could send advice to my younger self, it would be: Donโ€™t chase the trendline, chase understanding. Ironically, when you truly understand your users and your value, growth tends to follow naturally โ€” and it will be healthier and more sustainable.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

Unlocking the talents of neurodivergent IT pros

25 November 2025 at 04:30

Neurodiversity in the workforce can bring new perspectives, fresh ideas, and has the potential to make teams 30% more productive, according to research from Deloitte. Neurodivergent professionals often demonstrate strengths in areas such as creativity, systems thinking, and the ability to hyperfocus on areas of interest.

However, those strengths also come with increased challenges around sensory overload and navigating unstructured social and professional interactions. But with the right accommodations implemented, IT leaders stand to benefit from increased diversity of thought and perspective when hiring neurodivergent tech professionals.

Enteprise technology vendor Pure Storage is one company that has worked to build a more inclusive environment for neurodiverse tech workers. Paolo Juvara, chief digital transformation officer and executive sponsor for the companyโ€™s ABLE employee resource group, says the company recognized, based on โ€œgeneral population statistics,โ€ that there is likely to be a high percentage of neurodiverse employees in its organization. As a result, Pure Storage set about fostering an inclusive environment where neurodiverse employees can thrive. ย ย 

โ€œBetter understanding this population is key to serving them well. For that reason, we encourage employees to disclose their diagnosis, but we are aware that this is a very sensitive topic, and we do not want to create any sort of pressure around it,โ€ Juvara says.

Creating a culture for disclosure

Receiving a diagnosis of neurodivergence can be a significant moment for any individual, often โ€œproviding a sense of validation and self-understanding,โ€ according to the Promoting Neurodiversity report from the Association of Project Management. But disclosing that diagnosis at work is a nuanced and complex decision, with โ€œpotential risks, particularly for those in junior roles.โ€

In addition to fears of discrimination or misunderstanding, neurodivergent professionals can also be concerned that any work-related issues will be drawn back to their individual diagnosis. Because of this, employees need a sense of security around disclosing a diagnosis. Examples of how doing so will benefit their careers and professional life, rather than work against them, can help.

Employees who donโ€™t feel comfortable disclosing neurodivergent conditions often find themselves โ€œgrappling with escalating levels of stress and frustration,โ€ according to Change The Faceโ€™s Neurodiversity in the Tech Sector report. On the employerโ€™s side, this discomfort can turn into โ€œdiminished engagement and productivity.โ€ ย Only 43% of neurodivergent respondents say they had disclosed their diagnosis to their employer, with 57% saying they did not disclose.

Reasons for not disclosing include feeling that the potential outcomes of disclosure are not worth the risk (53%), concerns about stigma (27%), and fears of career impact (24%). Only 9% of neurodivergent employees said they seek adjustments โ€” and of those who did seek accommodations, 56% said they received what they asked for, while 29% said they received partial accommodations. Reasons cited for not seeking accommodations include concerns about perception (32%) and uncertainty about needed adjustments (29%).

At Pure Storge, cultivating an environment that welcomes disclosure of neurodivergent diagnosis has helped many employees to come forward to share their disabilities. ล tฤ›pรกn Hladรญk, a technical sourcer in R&D recruiting, has disclosed his neurodivergence at work, noting he feels โ€œtruly privileged to have been around colleagues who are willing to understand or actively try to learn about biases that impact all of us.โ€

While thatโ€™s been his experience at Pure Storage, Hladรญk notes that heโ€™s had previous experiences at other companies that left him feeling misunderstood or frustrated.

โ€œThe structure [at Pure Storage] helps me quite a bit,โ€ says Hladรญk, who works closely with his team to identify accommodations. He has also brought his perspective to the companyโ€™s hiring process to help ensure the company better accommodates neurodivergent candidates and reduces bias.

Implementing accommodations and formal policies

Neurodivergent professionals are skilled at managing their disabilities through self-initiated coping strategies, whether thatโ€™s through therapy or interpersonal networks. But itโ€™s still critical for organizations to implement formal organizational support and policies to help reduce stress on neurodivergent employees.

Neurodivergent employees have an increased need for clear and structured communication, such as creating predictability around meetings and communication. This can help improve engagement and reduce stress or anxiety for neurodivergent workers. Itโ€™s also important to be consistent in maintaining these policies, so that theyโ€™re respected across the organization and become part of the organizationโ€™s core business practices.

Juvara says Pure Storage partnered with Auticon, an IT consulting business that employs and supports adults on the autism spectrum in IT and tech, to assess the companyโ€™s environment, policies, and processes to ensure they are welcoming and inclusive. Through this partnership with Auticon, Pure Storage was able to implement new accommodations and training programs for managers, with a focus on how to nurture neurodivergent talent. As initiatives grow, the company continues to identify other benefits and accommodations it can offer to support neurodiversity.

โ€œA lot of accommodations are very easy to make โ€” itโ€™s all about balance,โ€ says Juvara.

In one instance, he says the organization was planning the company kick-off, including a โ€œbig stage and flashing lights, intended to amplify the buzz and excitement.โ€ However, a few employees approached him to express concerns about it being an โ€œoverwhelming sensory experience,โ€ so the company decided to establish โ€œquiet overflow rooms, where people can go to participate without the sensory overload,โ€ he says.

Considering this accommodation was well-received, Pure Storage extended it to the workplace, establishing โ€œdesignated quiet areas, where the team can go and thereโ€™s no chit-chat or other distractions,โ€ Juvara says, noting that this accommodation has been received positively by both neurotypical and neurodivergent employees โ€” boosting morale across the board.

In addition to implementing quiet rooms and designated quiet areas, Juvara says they are โ€œcontinuously incorporating feedback into ongoing office design,โ€ identifying opportunities for accommodations and proper ergonomics across all Pure Storage offices. Incorporating this feedback into the design has been โ€œinfinitely more effective than trying to force fit accommodations in after the fact,โ€ he says.

Building awareness through training

Itโ€™s important to remember that not all neurodivergent professionals are the same โ€” some will need accommodations that others donโ€™t, and vice versa. For example, in the report from Change the Face, when asked about remote work, one in two neurodivergent employees reported โ€œfeeling overwhelmed by distractions in the office on a regular basis,โ€ while others โ€œexpressed a preference for the office environment due to the stimulation it provides when working alongside colleagues, as opposed to working remotely from home.โ€

Although determining the right accommodations for your workforce may be challenging, the need to do so is vital. Just 6% of neurodivergent professions said they never felt impacted by their condition(s), while 46% said they are affected nearly every day, according to the Change the Face report. Additionally, 68% of those affected daily by their condition reported fair or worse mental health. For context, 78% of neurotypical employees described their mental health as โ€œgood or very good,โ€ while only 48% of neurodivergent employees said the same.

In addition to taking stock of their corporate culture and committing to making accommodations, organizations should also provide training opportunities to educate employees, especially leaders and managers, about neurodivergence and how to better support colleagues that have disabilities.

โ€œI was initially very skeptical about some of our ABLE ERG program offerings as I couldnโ€™t find anything in it that I didnโ€™t already know from my own experiences,โ€ says Hladรญk. โ€œBut I realized the benefit for others, especially people managers, who are looking to educate themselves. While Iโ€™m very familiar with my neurodiversity, training platforms can be very helpful to others.โ€

Employers will find that neurodiverse employees are skilled at managing their own disabilities โ€” itโ€™s how they got to where they are in their careers. But education and awareness can go a long way in helping to alleviate some of the added burden of managing neurodiverse conditions in the workforce. And companies will find that oftentimes these accommodations have positive impacts for everyone in the organization, not just those with disabilities. ย 

โ€œNeurodivergence is an invisible condition and one of the things that I observed is that often this community feels unseen โ€” creating awareness is critical to create an inclusive environment,โ€ Juvara says.

See also:

โ€œ10๋…„์—์„œ 2๋…„์œผ๋กœโ€ฆโ€ IT ์—ญ๋Ÿ‰์˜ โ€˜์œ ํ†ต๊ธฐํ•œโ€™์ด ์งง์•„์ง„๋‹ค

25 November 2025 at 01:24

ํ˜„์žฌ ๋†’์€ ์ˆ˜์š”๋ฅผ ๋ณด์ด๋Š” ๋Œ€ํ‘œ์ ์ธ ์—ญ๋Ÿ‰์—๋Š” ํ•€์˜ต์Šค(FinOps)๊ฐ€ ์žˆ๋‹ค.

๊ธฐ์—…์€ AI ๋„์ž…์ด ํด๋ผ์šฐ๋“œ ๋น„์šฉ์„ ๊ธ‰๊ฒฉํžˆ ์ฆ๊ฐ€์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค๋Š” ์šฐ๋ ค๋ฅผ ๊ฐ–๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์„ ์žฌ์ •์ ์œผ๋กœ ํšจ์œจ์ ์œผ๋กœ ์šด์˜ํ•  ๋Šฅ๋ ฅ์„ ๊ฐ–์ถ˜ IT ์ธ์žฌ๊ฐ€ ์ตœ๊ทผ ๋†’์€ ๊ด€์‹ฌ์„ ๋ฐ›๊ณ  ์žˆ๋‹ค.

ํ•˜์ง€๋งŒ IT ์ฑ„์šฉยท์•„์›ƒ์†Œ์‹ฑ ์„œ๋น„์Šค ๊ธฐ์—… ํ•˜๋น„ ๋‚ด์‰ฌ(Harvey Nash)์˜ CIO ์•™์ฟ ๋ฅด ์•„๋‚œ๋“œ๋Š” AI์™€ ์ž๋™ํ™”๊ฐ€ ํ•€์˜ต์Šค ์—…๋ฌด๋ฅผ ๋” ์•ˆ์ •์ ์œผ๋กœ ์ˆ˜ํ–‰ํ•˜๋Š” ์ˆ˜์ค€์— ๋น ๋ฅด๊ฒŒ ๋„๋‹ฌ ์ค‘์ธ ๋งŒํผ, ํ•ด๋‹น ์—ญ๋Ÿ‰์ด ํ–ฅํ›„ 1~2๋…„ ๋’ค์—๋„ ์ง€๊ธˆ๋งŒํผ ๊ฐ๊ด‘๋ฐ›์„์ง€ ์˜๋ฌธ์ด๋ผ๊ณ  ์ง€์ ํ–ˆ๋‹ค.

์•„๋‚œ๋“œ๋Š” ์—ญ๋Ÿ‰ ์ˆ˜์š”๊ฐ€ ๋น ๋ฅด๊ฒŒ ์ƒ์Šนํ–ˆ๋‹ค๊ฐ€ ๊ณง๋ฐ”๋กœ ํ•˜๋ฝํ•˜๋Š” ํ˜„์ƒ์ด ํ•€์˜ต์Šค๋งŒ์˜ ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋ผ, ์˜ค๋Š˜๋‚  ๋‹ค์–‘ํ•œ IT ์—ญ๋Ÿ‰ ์ „๋ฐ˜์—์„œ ๋‚˜ํƒ€๋‚˜๋Š” ํ๋ฆ„์ด๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๊ทธ๋Š” โ€œ1970~80๋…„๋Œ€๋งŒ ํ•ด๋„ IT ์—ญ๋Ÿ‰์˜ ์ˆ˜๋ช…์€ 10๋…„ ์ด์ƒ์ด์—ˆ๋‹ค. ์ง€๊ธˆ์€ 2๋…„๋„ ๋˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์•„๋‚œ๋“œ์˜ ์ฃผ์žฅ์€ ์˜ˆ์™ธ์ ์ธ ๊ด€์ ์ด ์•„๋‹ˆ๋‹ค. ์„ธ๊ณ„๊ฒฝ์ œํฌ๋Ÿผ(WEF)์„ ๋น„๋กฏํ•œ ์—ฌ๋Ÿฌ ๊ธ€๋กœ๋ฒŒ ๋ถ„์„๊ธฐ๊ด€์€ ๊ณผ๊ฑฐ ์ˆ˜์‹ญ ๋…„ ๋™์•ˆ ์œ ์ง€๋˜๋˜ ์ง๋ฌด ์—ญ๋Ÿ‰์˜ โ€˜๋ฐ˜๊ฐ๊ธฐ(half-life)โ€™๊ฐ€ ์ด์ œ ์•ฝ 7๋…„ ์ˆ˜์ค€์œผ๋กœ ์ค„์–ด๋“ค์—ˆ๋‹ค๊ณ  ๋ดค๋‹ค. 2023๋…„ IBM ์กฐ์‚ฌ์—์„œ๋„ ๊ฒฝ์˜์ง„์€ ํ–ฅํ›„ 3๋…„ ๋™์•ˆ AI์™€ ์ž๋™ํ™” ๋„์ž…์˜ ์˜ํ–ฅ์œผ๋กœ ์ „์ฒด ์ง์›์˜ ์•ฝ 40%๊ฐ€ ์žฌ๊ต์œก์„ ๋ฐ›์•„์•ผ ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒํ–ˆ๋‹ค. ๋˜ํ•œ 2025๋…„ WEF ๋ณด๊ณ ์„œ๋Š” 2025๋…„๋ถ€ํ„ฐ 2030๋…„ ์‚ฌ์ด ๊ธฐ์กด ์—ญ๋Ÿ‰์˜ ์•ฝ 39%๊ฐ€ ๋ณ€ํ™”ํ•˜๊ฑฐ๋‚˜ ๋” ์ด์ƒ ์œ ํšจํ•˜์ง€ ์•Š๊ฒŒ ๋  ๊ฒƒ์ด๋ผ๊ณ  ์ „๋งํ–ˆ๋‹ค.

IT ๋ถ„์•ผ์—์„œ๋Š” ์ด๋Ÿฌํ•œ ๋ณ€ํ™”๊ฐ€ ๋” ๊ทน์ ์œผ๋กœ ๋‚˜ํƒ€๋‚˜๊ณ  ์žˆ๋‹ค. ์—ฐ๊ตฌ์ž๋“ค์€ ์ตœ๊ทผ ์ฃผ๋ชฉ๋ฐ›๋Š” IT ์—ญ๋Ÿ‰์ด ๋ถˆ๊ณผ 2๋…„, ํ˜น์€ ๋ช‡ ๋‹ฌ ๋งŒ์— ๊ตฌ์‹์ด ๋  ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

์ด๋Ÿฐ ๋ณ€ํ™”๋Š” IT ์กฐ์ง ์ „๋ฐ˜์— ์ƒ๋‹นํ•œ ์••๋ฐ•์„ ์ฃผ๊ณ  ์žˆ๋‹ค. ์•„๋‚œ๋“œ๋Š” โ€œ๊ธฐ์ˆ  ๋ฐœ์ „ ์†๋„๊ฐ€ ๊ธฐ์ˆ  ์ธ์žฌ์˜ ์—ญ๋Ÿ‰ ๊ฐœ๋ฐœ ์†๋„๋ณด๋‹ค ๋น ๋ฅด๋‹คโ€๋ผ๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

IT ๊ธฐ์ˆ  ์‹œ์žฅ์˜ ๊ธ‰๊ฒฉํ•œ ๋ณ€ํ™”๋Š” ๊ฐœ์ธ์˜ ๊ฒฝ๋ ฅ ๊ณ„ํš๋งŒ ํ”๋“œ๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋‹ค. IT ๊ธฐ๋Šฅ ์ „์ฒด์™€ ์กฐ์ง ์šด์˜ ๋ฐฉ์‹ ์ „๋ฐ˜์—๋„ ์˜ํ–ฅ์„ ๋ฏธ์น˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋กœ ์ธํ•ด CIO์™€ HR ๋ฆฌ๋”, ๊ฒฝ์˜์ง„์€ ์ง์›์ด ๋น ๋ฅด๊ฒŒ ์žฌํ•™์Šตํ•˜๊ณ  ๋ฐœ์ „ํ•  ์ˆ˜ ์žˆ๋Š” ํ™˜๊ฒฝ์„ ๋งŒ๋“ค ์ „๋žต์„ ๊ณ ๋ฏผํ•ด์•ผ ํ•˜๋Š” ์ƒํ™ฉ์ด๋‹ค.

์ธํฌํ…Œํฌ ๋ฆฌ์„œ์น˜ ๊ทธ๋ฃน(Info-Tech Research Group) CIO ์‹ค๋ฌด ์—ฐ๊ตฌ ์ฑ…์ž„์ž์ธ ํ—ค๋” ๋ผ์ด์–ด-๋จธ๋ฆฌ๋Š” โ€œIT ๋ถ„์•ผ๋Š” ๊ฑฐ์˜ 18๊ฐœ์›”๋งˆ๋‹ค ๋ณ€ํ™”๋ฅผ ๊ฒช๊ณ , ์ด์— ๋”ฐ๋ผ ํ•„์š”ํ•œ ์—ญ๋Ÿ‰๋„ ๋‹ฌ๋ผ์ง„๋‹ค. ๊ธฐ์กด ์—ญ๋Ÿ‰์ด ์™„์ „ํžˆ ์‚ฌ๋ผ์ง„๋‹ค๋Š” ์˜๋ฏธ๋Š” ์•„๋‹ˆ์ง€๋งŒ, ์ด๋Š” IT ์ธ์žฌ๊ฐ€ ์–ผ๋งˆ๋‚˜ ์œ ์—ฐํ•˜๊ฒŒ ์›€์ง์ผ ์ˆ˜ ์žˆ์–ด์•ผ ํ•˜๋Š”์ง€๋ฅผ ๋ณด์—ฌ์ค€๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

๊ด€๋ จ์„ฑ ๋†’์€ IT ์—ญ๋Ÿ‰์˜ ๋ณ€ํ™”

์ธํฌํ…Œํฌ ๋ฆฌ์„œ์น˜ ๊ทธ๋ฃน์€ โ€˜IT ์ธ์žฌ ํŠธ๋ Œ๋“œ 2025โ€™ ๋ณด๊ณ ์„œ์—์„œ, โ€œ๊ธฐ์ˆ  ๊ด€์ ์—์„œ ๊ธฐ๋Šฅ์  ์—ญ๋Ÿ‰์€ ํ‰๊ท  2.5๋…„๋งˆ๋‹ค ๊ตฌ์‹์ด ๋œ๋‹คโ€๋ผ๊ณ  ๋ถ„์„ํ–ˆ๋‹ค. ๋ณด๊ณ ์„œ๋Š” ๋˜ํ•œ โ€œ์„ฑ์ˆ™ํ•œ ์กฐ์ง์ผ์ˆ˜๋ก ์ „๋ฐ˜์ ์ธ ์—ญ๋Ÿ‰์„ ๋ณ€๊ฒฝํ•ด์•ผ ํ•œ๋‹ค๋Š” ํ•„์š”์„ฑ์„ ์ธ์‹ํ•  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์œผ๋ฉฐ, ์ด๋Ÿฌํ•œ ์กฐ์ง์€ AIยทML ์—ญ๋Ÿ‰์„ ํ•ต์‹ฌ ์—ญ๋Ÿ‰์œผ๋กœ ๋ณผ ๊ฐ€๋Šฅ์„ฑ์ด 2.5๋ฐฐ๋‚˜ ๋†’์•˜๋‹ค. ์ด๋“ค ์กฐ์ง์€ ๋ฏธ๋ž˜์˜ ์š”๊ตฌ์™€ ๋ชฉํ‘œ๋ฅผ ์ถฉ์กฑํ•  ์ค€๋น„๊ฐ€ ๊ฐ€์žฅ ์ž˜ ๋˜์–ด ์žˆ์„ ๊ฒƒโ€์ด๋ผ๊ณ  ์ง„๋‹จํ–ˆ๋‹ค.

๋˜ํ•œ ์ธํฌํ…Œํฌ๋Š” ๋ณด๊ณ ์„œ ์กฐ์‚ฌ์— ์ฐธ์—ฌํ•œ IT ์ „๋ฌธ๊ฐ€์˜ 95%๊ฐ€ 2030๋…„๊นŒ์ง€ ์ ์–ด๋„ ์ผ๋ถ€ ์—ญ๋Ÿ‰์— ๋ณ€ํ™”๊ฐ€ ํ•„์š”ํ•˜๋‹ค๊ณ  ๋‹ตํ–ˆ๋‹ค. ์‘๋‹ต์ž์˜ 28%๋Š” ๋Œ€๋ถ€๋ถ„์˜ ์—ญ๋Ÿ‰์ด ๋ฐ”๋€Œ์–ด์•ผ ํ•œ๋‹ค๊ณ  ํ–ˆ์œผ๋ฉฐ, 17%๋Š” ๋ชจ๋“  ์—ญ๋Ÿ‰์ด ๋ณ€ํ™”ํ•ด์•ผ ํ•œ๋‹ค๊ณ  ํŒ๋‹จํ–ˆ๋‹ค.

IT ๊ต์œกยท์ž๊ฒฉ ์ธ์ฆ ๊ธฐ๊ด€ ์ปดํ‹ฐ์•„(CompTIA)์˜ ์ตœ๊ณ  ๊ธฐ์ˆ  ์—๋ฐ˜์ ค๋ฆฌ์ŠคํŠธ์ธ ์ œ์ž„์Šค ์Šคํƒฑ์–ด๋Š” ์ˆ˜์‹ญ ๋…„์— ๊ฑธ์ณ ๊ฐ€์†๋œ ๊ธฐ์ˆ  ํ˜์‹  ์†๋„๊ฐ€ IT ์—ญ๋Ÿ‰์˜ ๋น ๋ฅธ ๊ต์ฒด ์ฃผ๊ธฐ๋ฅผ ์ฃผ๋„ํ•˜๋Š” ํ•ต์‹ฌ ์š”์ธ์ด๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์Šคํƒฑ์–ด๋Š” โ€œ์˜ˆ๋ฅผ ๋“ค์–ด ํ—ฌ์Šค์ผ€์–ด ๋ถ„์•ผ์—์„œ ํด๋ผ์šฐ๋“œ ์ „์šฉ ์†”๋ฃจ์…˜์„ ๊ฐœ๋ฐœํ•˜๋Š” ์ „๋ฌธ๊ฐ€๋“ค์˜ ๊ฒฝ์šฐ, ์ฃผ์š” ๋ฒค๋” ๋„๊ตฌ๊ฐ€ ํ‰๊ท  ํ•œ ๋‹ฌ ์ฃผ๊ธฐ๋กœ ๋ฐ”๋€Œ๋Š” ์ƒํ™ฉ์„ ๋ชฉ๊ฒฉํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

IT ๋ฆฌ๋”๋“ค์€ ์–ด๋–ค IT ์—ญ๋Ÿ‰์ด ํ•„์š”ํ•ด์ง€๊ณ , ์–ด๋–ค ์—ญ๋Ÿ‰์ด ๋‚ก์•„์ง€๋Š”์ง€๋ฅผ ๊ฒฐ์ •ํ•˜๋Š” ๋ฐ AI์™€ ์ž๋™ํ™”๊ฐ€ ํฐ ์˜ํ–ฅ์„ ๋ฏธ์นœ๋‹ค๊ณ  ๋ดค๋‹ค. 1~2๋…„ ์ „๋งŒ ํ•ด๋„ ์ˆ™๋ จ๋œ ์ธ์žฌ๊ฐ€ ์ง์ ‘ ์ˆ˜ํ–‰ํ•˜๋˜ ๋ฐ˜๋ณต ์—…๋ฌด ์ƒ๋‹น์ˆ˜๊ฐ€ ์ด์ œ AI์™€ ์ž๋™ํ™”์— ์˜ํ•ด ์ฒ˜๋ฆฌ๋˜๊ณ  ์žˆ๋‹ค. ์•ž์œผ๋กœ๋Š” ๋” ๋งŽ์€ ์ „๋ฌธ์  ์—…๋ฌด๊นŒ์ง€ ์ž๋™ํ™”๋˜๋ฉด์„œ, ์š”๊ตฌ๋˜๋Š” IT ์—ญ๋Ÿ‰์˜ ์œ ํ˜•์€ ๋”์šฑ ๋น ๋ฅด๊ฒŒ ๋ณ€ํ™”ํ•˜๊ณ  ๋ถˆํ•„์š”ํ•ด์ง€๋Š” ์—ญ๋Ÿ‰๋„ ๋Š˜์–ด๋‚  ์ „๋ง์ด๋‹ค.

์„œ๋น„์Šค๋‚˜์šฐ(ServiceNow)์˜ ์ตœ๊ณ  ๋””์ง€ํ„ธ์ •๋ณด ์ฑ…์ž„์ž ์ผˆ๋ฆฌ ๋กœ๋งฅ์€ โ€œ๊ณผ๊ฑฐ์—๋Š” ์ˆ˜์ž‘์—… ๊ธฐ๋ฐ˜ ์„œ๋น„์Šค ๋ฐ์Šคํฌ ์šด์˜, ์ธํ”„๋ผ ๊ด€๋ฆฌ, ERP ์‹ฌ์ธต ์„ค์ • ๋“ฑ์ด 3~6๋…„ ๋’ค๊นŒ์ง€๋„ ์•ˆ์ •์ ์œผ๋กœ ์œ ์ง€๋  ํ•ต์‹ฌ ์—ญ๋Ÿ‰์ด์—ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ž๋™ํ™”์™€ AI๊ฐ€ ์›Œ๋‚™ ๋น ๋ฅด๊ฒŒ ๋ฐœ์ „ํ•˜๋ฉด์„œ, ์ด๋Ÿฐ ์—ญ๋Ÿ‰์€ ์•ž์œผ๋กœ 1~3๋…„ ์ •๋„๋งŒ ์˜๋ฏธ๋ฅผ ๊ฐ–๊ณ  ๊ทธ ์ดํ›„์—๋Š” ์™„์ „ํžˆ ์žฌํŽธ๋  ์ˆ˜ ์žˆ๋‹คโ€๋ผ๊ณ  ์ง„๋‹จํ–ˆ๋‹ค.

์œ ์—ฐํ•˜๊ณ  ๋ฏผ์ฒฉํ•˜๋ฉฐ ์ ์‘๋ ฅ ์žˆ๋Š” ์ธ์žฌ ํ•„์š”

๋กœ๋งฅ์„ ํฌํ•จํ•œ IT ๋ฆฌ๋”๋“ค์€ IT ์ง๋ฌด ์ž์ฒด๊ฐ€ ์‚ฌ๋ผ์ง€๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค. ๊ฐœ๋ฐœ์ž, ์—”์ง€๋‹ˆ์–ด, ์•„ํ‚คํ…ํŠธ, ๋ณด์•ˆ ์ „๋ฌธ๊ฐ€ ๋“ฑ์€ ์•ž์œผ๋กœ๋„ ์ง€์†์ ์œผ๋กœ ํ•„์š”ํ•  ์ „๋ง์ด๋‹ค. ๋‹ค๋งŒ ์ด๋“ค์ด ์ผ์ƒ ์—…๋ฌด์—์„œ ํ™œ์šฉํ•˜๋Š” ๊ธฐ๋Šฅ์˜ ๋ณ€ํ™” ์†๋„๊ฐ€ ์–ด๋А ๋•Œ๋ณด๋‹ค ๋นจ๋ผ์กŒ๋‹ค๋Š” ์ ์ด ๋ฌธ์ œ๋ผ๋Š” ์ง€์ ์ด๋‹ค.

์ผ๋ถ€ CIO์™€ IT ์ž๋ฌธ๊ฐ€๋Š” ์—ญ๋Ÿ‰์˜ ์ˆ˜๋ช…์ด ์งง์•„์ง€๋Š” ํ˜„์ƒ์ด ๋ชจ๋“  ์กฐ์ง์— ๋™์ผํ•˜๊ฒŒ ๋‚˜ํƒ€๋‚˜๋Š” ๊ฒƒ๋„ ์•„๋‹ˆ๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์—ฌ์ „ํžˆ ๊ธฐ์กด ๊ธฐ์ˆ ์„ ์šด์˜ํ•˜๋Š” ๊ธฐ์—…์—์„œ๋Š” ํŠน์ • ์—ญ๋Ÿ‰์ด ์˜ค๋ž˜ ์œ ์ง€๋˜๋Š” ๊ฒฝ์šฐ๋„ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

ํ…Œํฌ ์ „๋ฌธ ์ฑ„์šฉ ํ”Œ๋žซํผ ๋‹ค์ด์Šค(Dice)์˜ โ€˜2025 ๊ธฐ์ˆ  ์—ฐ๋ด‰ ๋ณด๊ณ ์„œโ€™๋Š” ์ด ๊ฐ™์€ ์ด์ค‘์  ํ˜„์‹ค์„ ๋ณด์—ฌ์ค€๋‹ค. ๋ณด๊ณ ์„œ์— ๋”ฐ๋ฅด๋ฉด ์ตœ๊ทผ ๊ฐ€์žฅ ๋น ๋ฅด๊ฒŒ ์—ฐ๋ด‰์ด ์ƒ์Šนํ•œ ์—ญ๋Ÿ‰์€ AI, ๋ฐ์ดํ„ฐ, ํด๋ผ์šฐ๋“œ ์—”์ง€๋‹ˆ์–ด๋ง์ด์—ˆ์ง€๋งŒ, ์—ฌ๊ธฐ์—๋Š” ์ˆ˜์‹ญ ๋…„ ์ „ ์ฒ˜์Œ ๋“ฑ์žฅํ•œ ๊ธฐ์ˆ ๋„ ํฌํ•จ๋๋‹ค. ๊ทธ ์ค‘์—์„œ ์ž์—ฐ์–ด ์ฒ˜๋ฆฌ(NLP)์™€ ๋ฌธ์„œ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋Š” ๊ฐ๊ฐ 1์œ„์™€ 2์œ„๋ฅผ ์ฐจ์ง€ํ–ˆ๊ณ , ์ฝ”๋ณผ(COBOL)์€ 7์œ„, ๋ฃจ๋น„(Ruby)๋Š” 10์œ„์— ์˜ฌ๋ž๋‹ค.

IT ๋ฆฌ๋”๋“ค์€ ์˜ค๋Š˜๋‚  ๊ฐ๊ด‘๋ฐ›๋Š” ์—ญ๋Ÿ‰ ์ค‘ ์–ด๋–ค ๊ฒƒ์ด ๋ฃจ๋น„(1993๋…„ ๊ฐœ๋ฐœ)๋‚˜ ์ฝ”๋ณผ(1959๋…„ ๊ฐœ๋ฐœ)์ฒ˜๋Ÿผ ์žฅ๊ธฐ์ ์ธ ์ƒ๋ช…๋ ฅ์„ ๊ฐ€์งˆ์ง€ ์˜ˆ์ธกํ•  ์ˆ˜ ์—†๋‹ค๊ณ  ์ง„๋‹จํ–ˆ๋‹ค. ๊ธฐ์ˆ  ๋ฐœ์ „๊ณผ ํ˜์‹  ์†๋„๋กœ ์ธํ•ด ๋ช‡ ๋‹ฌ ๋งŒ์— ์‚ฌ๋ผ์งˆ ์—ญ๋Ÿ‰์ด ๋ฌด์—‡์ธ์ง€๋„ ๋‹จ์ •ํ•  ์ˆ˜ ์—†๋‹ค๋Š” ๊ฒƒ์ด๋‹ค.

๋Œ€์‹  IT ๋ฆฌ๋”๋“ค์€ ์„ธ๊ณ„๊ฒฝ์ œํฌ๋Ÿผ(WEF)์ด โ€˜์—ญ๋Ÿ‰ ๋ถˆ์•ˆ์ •์„ฑโ€™์ด๋ผ๊ณ  ๋ถ€๋ฅด๋Š” ํ™˜๊ฒฝ ์†์—์„œ ์–ด๋–ป๊ฒŒ ์ ์‘ํ•˜๊ณ  ์„ฑ์žฅํ• ์ง€ ํ•™์Šตํ•ด์•ผ ํ•œ๋‹ค๊ณ  ์กฐ์–ธํ–ˆ๋‹ค.

์ปดํ‹ฐ์•„์˜ ์Šคํƒฑ์–ด๋Š” ๊ณผ๊ฑฐ์ฒ˜๋Ÿผ IT ์ธ์žฌ๊ฐ€ ํŒŒ์ด์ฌ ํ”„๋กœ๊ทธ๋ž˜๋ฐ ์–ธ์–ด์™€ ๊ฐ™์€ ํŠน์ • ์—ญ๋Ÿ‰ ํ•˜๋‚˜๋งŒ์œผ๋กœ ์žฅ๊ธฐ์ ์ธ ๊ฒฝ๋ ฅ์„ ๋ณด์žฅ๋ฐ›๋˜ ์‹œ๋Œ€๋Š” ์ง€๋‚ฌ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค. ๊ทธ๋Š” โ€œ์–ด๋–ค ์—ญ๋Ÿ‰์€ ๋งค์šฐ ๋น ๋ฅด๊ฒŒ ๋ถ€์ƒํ–ˆ๋‹ค๊ฐ€ ๋˜ ๋น ๋ฅด๊ฒŒ ์‚ฌ๋ผ์ง„๋‹ค. ๋”ฐ๋ผ์„œ ์ด์ œ๋Š” ์ƒˆ๋กœ์šด ์—ญ๋Ÿ‰์„ ์–ผ๋งˆ๋‚˜ ์‹ ์†ํ•˜๊ฒŒ ์Šต๋“ํ•  ์ˆ˜ ์žˆ๋Š”์ง€๊ฐ€ ๊ธฐ์ค€์ด ๋ผ์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

๋ผ์ด์–ด-๋จธ๋ฆฌ๋Š” CIO๊ฐ€ ์ง์›๋“ค์ด ์—ญ๋Ÿ‰์„ ๊ฐœ๋ฐœํ•  ์ˆ˜ ์žˆ๋„๋ก ์‹œ๊ฐ„์„ ํ™•๋ณดํ•ด ์ฃผ๊ณ , ํ˜„๋Œ€์  IT ์กฐ์ง์˜ ์—…๋ฌด ์š”๊ตฌ๋ฅผ ๋”ฐ๋ผ๊ฐˆ ์ˆ˜ ์žˆ๋„๋ก ํŒ€์›๋“ค์—๊ฒŒ ๋” ๋งŽ์€ ์ฝ”์นญ์„ ์ œ๊ณตํ•ด์•ผ ํ•œ๋‹ค๊ณ  ๋งํ–ˆ๋‹ค. ๊ทธ๋Š” CIO์—๊ฒŒ ์„ฑ์žฅ ๋งˆ์ธ๋“œ์…‹์„ ๊ฐ–์ถ˜ ์ธ์žฌ๋ฅผ ์ฑ„์šฉํ•˜๊ฑฐ๋‚˜, ๊ธฐ์กด ์ง์›์ด ์ด๋Ÿฐ ํƒœ๋„๋ฅผ ํ‚ค์šฐ๋„๋ก ์ง€์›ํ•  ๊ฒƒ์„ ์กฐ์–ธํ•˜๊ณ  ์žˆ๋‹ค.

ํ”ผ๋‹‰์Šค๋Œ€ํ•™๊ต(University of Phoenix) IT ๋ถ€์„œ์˜ ์• ์ž์ผ ํ”ผํ”Œ ๋ฆฌ๋”์ธ ํƒ€์ด ์กด์Šค๋Š” ์ด๋Ÿฌํ•œ ๋ฐฉํ–ฅ์„ฑ์„ ์‹ค์ œ๋กœ ์‹คํ–‰ํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค. ์• ์ž์ผ ํ”ผํ”Œ ๋ฆฌ๋”๋Š” CIO ์ œ์ด๋ฏธ ์Šค๋ฏธ์Šค๊ฐ€ ๋ฏธ๋ž˜ ์—…๋ฌด ํ™˜๊ฒฝ์— ๋Œ€๋น„ํ•˜๊ธฐ ์œ„ํ•ด ์ตœ๊ทผ ์‹ ์„คํ•œ ์ง์ฑ…์ด๋‹ค.

์กด์Šค๋Š” โ€œ์ผํ•˜๋Š” ๋ฐฉ์‹์ด ๊ณ„์†ํ•ด์„œ ์žฌ์ •์˜๋˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ•˜๋ฉด์„œ, ์ผ๋ถ€ IT์™€ HR ๋ฆฌ๋”๋“ค์ด 9์›”์— ITยท๋ฐ์ดํ„ฐ ์ง๊ตฐ์ด ๋น ๋ฅด๊ฒŒ ๋ณ€ํ•˜๋Š” ํ™˜๊ฒฝ์—์„œ ์„ฑ๊ณตํ•˜๊ธฐ ์œ„ํ•ด ๊ฐ–์ถฐ์•ผ ํ•  ์—ญ๋Ÿ‰ ๋ชฉ๋ก์„ ๊ณต๊ฐœํ–ˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์ด ๋ชฉ๋ก์—๋Š” ์ฐฝ์˜์  ๋ฌธ์ œ ํ•ด๊ฒฐ, ๋ฆฌ๋”์‹ญ, AI ์œค๋ฆฌ ํ™œ์šฉ, ์ ์‘๋ ฅ, ํ˜ธ๊ธฐ์‹ฌ, ๋ˆ๊ธฐ, ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜, ๊ธฐ์ˆ ์  ์œ ์ฐฝ์„ฑ, ๋ฏธ๋ž˜ ํŠธ๋ Œ๋“œ ์ดํ•ด, ์ฃผ๋„์„ฑ, ํ˜์‹  ๋“ฑ์ด ํฌํ•จ๋๋‹ค.

์กด์Šค๋Š” ๋Œ€ํ•™ IT ๋ฆฌ๋”์‹ญ์ด ์ฝ”์นญ์„ ํ†ตํ•ด ์ด๋Ÿฌํ•œ ์—ญ๋Ÿ‰์„ ๊ฐœ๋ฐœํ•˜๋„๋ก ์ง€์›ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ง์›๋“ค์ด ์ƒˆ๋กœ์šด ์—ญ๋Ÿ‰์„ ์ตํž ์ˆ˜ ์žˆ๋„๋ก ์—…๋ฌด ์‹œ๊ฐ„ ์ค‘ ์ผ์ • ๋ถ€๋ถ„์„ ํ•™์Šต์— ํ• ๋‹นํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์ „ํ–ˆ๋‹ค.

์กด์Šค๋Š” โ€œ์—”์ง€๋‹ˆ์–ด์™€ ๊ธฐ์ˆ  ์กฐ์ง์€ ์ƒˆ๋กญ๊ฒŒ ๋“ฑ์žฅํ•˜๋Š” ์–ด๋–ค ์—ญ๋Ÿ‰์ด๋“  ์ฆ‰์‹œ ๋ฐ›์•„๋“ค์ผ ์ค€๋น„๊ฐ€ ๋˜์–ด ์žˆ์–ด์•ผ ํ•œ๋‹ค. ๊ณ„์†ํ•ด์„œ ์ž์‹ ์„ ์žฌ์ •๋น„ํ•ด์•ผ ํ•œ๋‹ค. ํ”ผ๋‹‰์Šค๋Œ€ํ•™๊ต IT ์กฐ์ง์€ ์กฐ์ •ํ•˜๊ณ  ์œ ์—ฐํ•˜๊ฒŒ ์›€์ง์ด๋Š” ๋Šฅ๋ ฅ์„ ๊ฐ•์กฐํ•˜๊ณ  ์žˆ๋‹ค. ํ˜ธ๊ธฐ์‹ฌ์ด ์žˆ๊ณ  ๋ฐฐ์šธ ์ˆ˜ ์žˆ๋Š” ์‚ฌ๋žŒ์ด ํ•„์š”ํ•˜๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com

The incredible shrinking shelf life of IT skills

24 November 2025 at 05:01

FinOps skills are in high demand today.

With organizations fearful of AI initiatives ballooning their cloud costs, the ability to manage cloud environments in a financially efficient way is earning IT pros with FinOps skills a premium of late.

But Ankur Anand, CIO of Harvey Nash, an IT recruitment and outsourcing services provider, wonders whether those skills will be as hot in another year or two, as artificial intelligence and automation become more reliably capable of handling FinOps tasks.

The idea that demand for such skills could rise and fall so quickly is not unique to FinOps, Anand says; itโ€™s applicable to many IT skills today.

โ€œThe shelf life of IT skills back in the โ€™70s or โ€™80s was a decade or more. Today it can be less than two years,โ€ Anand says.

Anand is not an outlier in making such assertions. The World Economic Forum (WEF) and other thought leaders say the half-life of many workplace skills has shrunk from decades to closer to seven years. A 2023 IBM study found that executives estimate that 40% of their workforce will need to reskill as a result of implementing AI and automation over the next three years. And a 2025 WEF report says workers can expect that 39% of their existing skill sets will be transformed or become outdated between 2025 and 2030.

IT workers have seen the half-life of IT skills compressed even more dramatically, with researchers saying some skills today go from hot to not in less than two years โ€” sometimes mere months.

Itโ€™s putting a lot of pressure on IT teams. As Anand says, โ€œTechnology is developing faster than tech workers can upskill.โ€

Ever-quickening churn in the IT skills market is upending more than individualsโ€™ career plans, too. It is impacting the entire IT function and the organization as a whole. That in turn is forcing CIOs, HR leaders, and other executives to devise strategies to create an environment where workers are capable of reinvention at a rapid clip.

โ€œIT has a transformation almost every 18 months, and the skills needed in IT are impacted by that. It doesnโ€™t mean skills become obsolete, but it impacts how fluid IT employees need to be,โ€ says Heather Leier-Murray, a research director in the CIO practice at Info-Tech Research Group.

Transforming which IT skills are relevant

In its IT Talent Trends 2025, Info-Tech asserted the idea that โ€œfrom a technology standpoint, functional skills are becoming outdated every 2.5 years.โ€ It noted that โ€œmature organizations are more likely to see the need to change most if not all their skills. These organizations are also 2.5 times more likely to see AI and ML skills as critical. It will be these IT organizations that have best prepared themselves to deliver on the needs and objectives of the future.โ€

Furthermore, Info-Tech found that 95% of IT professionals surveyed for the report believe at least some skills will need to change by 2030, with 28% saying most skills need to change and 17% saying all skills need to change.

The pace of technology innovation, which itself has sped up over the decades, is driving the rapid turnover of needed IT skills, says James Stanger, chief technology evangelist at IT training and certification organization CompTIA.

โ€œFor example, some folks I know who work in the healthcare industry have noticed that as they create cloud-specific solutions, theyโ€™re seeing vendor tools change on an average of one month. Yes, one month,โ€ he says.

AI and automation also have a big impact on what IT skills are needed and which become outdated, IT leaders say. AI and automation are handling a growing number of repetitive tasks that even just a year or two ago had required skilled workers to do. Looking forward, AI and automation will take on even more skilled work, further transforming which IT skills are relevant and which are no longer needed.

โ€œManual service desk operations, infrastructure management, and deep ERP configuration used to be core competencies and safe skills to bank on, looking out three to six years. Since automation and AI are advancing so quickly, those same skills might only be relevant for the next one to three years before theyโ€™re completely transformed by technology,โ€ says Kellie Romack, chief digital information officer of tech company ServiceNow.

Fluid, agile, adaptive workers needed

To be clear, neither Romack nor other IT leaders are saying that IT jobs are becoming obsolete; there is and will remain a need for developers, engineers, architects, security pros, and the like. Rather, they say itโ€™s the functional skills that they need most in their day-to-day roles that are changing faster now than ever before.

CIOs and IT advisers also say the shortening shelf life of skills is not experienced universally, as some organizations still have a lot of legacy tech in place.

Data from the 2025 Tech Salary Report from Dice, a job-searching platform for tech professionals, hints at these dual realities. The report found that skills related to AI, data, and cloud engineering saw the fastest growth in salaries. But some entries on its list of fastest growing tech salaries by skill date back decades. The skills range from natural language processing and document databases, which take the No. 1 and No. 2 spots, to COBOL at No. 7 and Ruby at No. 10.

IT leaders say they canโ€™t predict which functional skills that are hot today might have the staying power of Ruby (created in 1993) or COBOL (created in 1959). Nor are they saying which skills will fade away months from now due to tech advancements and innovation.

Instead, they stress the need for CIOs and their teams to learn how to thrive in what the WEF called โ€œskill instability.โ€

The days when an IT worker could ensure career longevity by specializing in and sticking with one skill โ€” the Python programming language, for example โ€” are over, CompTIAโ€™s Stanger says.

โ€œCertain skills will come up very quickly and then go away very quickly, so now that person has to be seen as someone who can build up skills quickly,โ€ he adds.

Info-Tech Research Groupโ€™s Leier-Murray says CIOs must free up time for their staffers to upskill and provide more coaching to their team members to ensure they keep pace with the work demands of a modern IT shop.

She and others advise CIOs to hire workers with or cultivate in existing staffers a growth mindset.

The IT department at the University of Phoenix is taking such steps, says Ty Jones. Jones is the principal agile people leader for the universityโ€™s IT department, a role that CIO Jamie Smith recently created to help prepare staffers for whatever the future of work requires.

โ€œThe way that everybody is working is continuously being redefined,โ€ Jones says.

She says IT and HR leaders in September rolled out a list of competencies they believe IT and data workers must have to succeed in a field where skills quickly come and go. Those competencies are creative problem-solving, leadership, ethical use of AI, adaptability, curiosity, grit, communication, technical fluency, future trends, ownership, and innovation.

IT leadership at the university is helping workers develop these competencies through coaching, Jones says, and is allotting them time during their work schedules to master new skills.

โ€œOur engineers and technical teams need to be ready to adopt any emerging skills, and theyโ€™re going to need to continue to regenerate,โ€ Jones says. โ€œSo weโ€™re emphasizing the ability to adjust and be fluid. We need individuals with curiosity and the ability to learn.โ€

Los futuros retos para los CIO en finanzas: Verifactu y la facturaciรณn electrรณnica

24 November 2025 at 04:45

Con 2026 a la vuelta de la esquina, es tiempo de que las compaรฑรญas preparen los desafรญos del nuevo aรฑo. Uno de los principales serรก el cambio de aรฑo en los sistemas de facturaciรณn: la implementaciรณn del sistema de verificaciรณn antifraude Verifactu. No es extraรฑo ver menciones a este cambio como el paso a la facturaciรณn electrรณnica. Pero llamarlo asรญ puede llevar a confusiรณn, porque se trata de dos elementos distintos, regidos por normativas distintas.

Lucรญa Pรฉrez y Meritxell Yus, abogadas especializadas en Fiscalidad Indirecta de Cuatrecasas, son tajantes. โ€œNo debe confundirse la obligaciรณn de facturaciรณn electrรณnica B2B con la normativa sobre sistemas informรกticos de facturaciรณnโ€ โ€”el conocido como VeriFactuโ€” โ€œque establece la obligaciรณn del cumplimiento de los requisitos de integridad, conservaciรณn, accesibilidad, legibilidad, trazabilidad e inalterabilidad de los registros de los sistemas informรกticos de facturaciรณn. Ambos proyectos se encuentran regulados en normativa diferentes con un distinto objetivoโ€. Si bien convivirรกn y se complementarรกn, buscan distintas finalidades, explican. โ€œLa facturaciรณn electrรณnica regula el formato y la transmisiรณn estructurada de las facturas entre empresarios y profesionales y su finalidad principal es reducir la morosidad comercial, mientras que la normativa de sistemas de facturaciรณn se centra en la calidad, seguridad y fiabilidad de los datos generados por los programas de facturaciรณn, con la finalidad de reducir el fraudeโ€.

El paso a Verifactu

La primera en entrar en vigor es la Ley 11/2021, de 9 de julio, de medidas de prevenciรณn y lucha contra el fraude fiscal, conocida popularmente como Ley Antifraude. Esta regulaciรณn transpone una directiva europea que quiere limitar las prรกcticas de evasiรณn fiscal. Aunque el texto habla de concentrar los esfuerzos en las grandes fortunas, sus implicaciones afectan a todo tipo de profesionales, de grandes empresas a personas que cotizan como pequeรฑas autรณnomas. La normativa incorpora distintas medidas para lograr el cumplimiento de los requerimientos fiscales, entre las que se plantea un modelo basado en el control de los softwares de contabilidad y gestiรณn, que quedan obligados a ajustarse a determinados requisitos.

Al calor de esta normativa se ha desarrollado el reglamento Verifactu, que establece los requisitos que deben contemplar los programas de facturaciรณn. Entre otros, se contempla que, al expedir una factura, se genere o guarde una copia o se mande un resumen, directamente, a la Agencia Tributaria. Ademรกs, se deberรก incluir un QR en la factura para poder verificarla con la administraciรณn. Negro sobre blanco, el cambio en la regulaciรณn implica que ya no se podrรก enviar las facturas en un PDF ni hacer los libros de contabilidad sobre un Excel, sino que habrรก que emplear un sistema de facturaciรณn homologado. Para controlar que el modelo sobre el que se haga cumple los necesarios requisitos se ha desarrollado el sistema del mismo nombre, que se puede incorporar a softwares de facturaciรณn ya existentes y que estรก tambiรฉn integrado en la aplicaciรณn informรกtica gratuita desarrollada por la AEAT.

La nueva normativa, dice Estefanรญa Gambin, โ€œimplica un cambio tรฉcnico relevante para los equipos de TIโ€

Es decir: si bien este nuevo modelo va hacia la facturaciรณn electrรณnica, no se refiere a esta normativa, sino a la integraciรณn de un sistema antifraude. โ€œVerifactu no es factura electrรณnica, y este matiz es importanteโ€, desarrolla รlvaro Villa, director general de Alegra Espaรฑa. โ€œEs un sistema antifraude que obliga a que el software de facturaciรณn cumpla criterios muy estrictos de integridad, trazabilidad e inalterabilidad del datoโ€, resume. A nivel de TI tiene un impacto significativo: โ€œNo cambia la interfaz, pero sรญ cambia la arquitectura del sistemaโ€, explica. Coincide Estefanรญa Gambin Altare, country success manager en Pleo. โ€œEsta normativa implica un cambio tรฉcnico relevante para los equipos de TIโ€, defiende. โ€œLos sistemas deben ser capaces de trabajar con formatos estructurados, integrarse con los sistemas contables y asegurar la transmisiรณn segura y puntual de los datos a Haciendaโ€. Gambin lo define como โ€œun reto tรฉcnicoโ€, que โ€œcon el apoyo adecuado no tiene por quรฉ ser una cargaโ€.

Entre los trabajos en TI a los que obligarรก el reglamento Verifactu, continรบa Villa, estรก la auditorรญa y adaptaciรณn de ERP, CRM, TPV y desarrollos propios a los nuevos requisitos, pero tambiรฉn la integraciรณn de hash encadenado y QR y el compromiso de trazabilidad completa y exportaciรณn en el formato exigido por la AEAT. Habrรก que realizar integraciones vรญa API y definir si la empresa operarรก en modo VeriFactu o no VeriFactu; y asegurar operaciones sin interrupciones, โ€œporque cualquier incidencia ahora tiene tambiรฉn un impacto en cumplimientoโ€. Lejos de tratarse de una acciรณn puntual, este cambio requerirรก de un seguimiento continuo, explica. โ€œLo mรกs prรกctico es tratar Verifactu como un programa permanente de cumplimiento digital, no como un proyecto puntual. Esto implica gobernanza de datos, revisiones periรณdicas y formaciรณn continua para que Finanzas, TI y asesores estรฉn alineadosโ€. Gambin lo afronta de forma similar. โ€œNo es un cambio puntual que se resuelve una vez y listo. Es un proceso vivo que requerirรก actualizaciones continuas y capacidad de adaptaciรณnโ€.

โ€œLo mรกs prรกctico es tratar Verifactu como un programa permanente de cumplimiento digital, no como un proyecto puntualโ€, seรฑala รlvaro Villa

En cuanto a su impacto en la relaciรณn entre los departamentos de TI y finanzas, la directiva de Pleo avanza que el equipo financiero se verรก relegado de tareas repetitivas para enfocarse en aportar valor real al negocio. Villa lo desarrolla. โ€œVeriFactu nace como una iniciativa fiscal, pero se implementa a travรฉs de tecnologรญa. Eso obliga a TI y Finanzas a trabajar de forma mรกs coordinada que nuncaโ€. Entre otros, augura un impulso a las decisiones compartidas sobre software, integraciones y polรญticas de registro; la fluidez en el lenguaje comรบn en torno a la trazabilidad, integridad y auditorรญa de los datos; y una menor carga manual en finanzas y mรกs control preventivo gracias a la automatizaciรณn. โ€œEn la prรกctica, TI y finanzas pasan de colaborar a copilotar el cumplimiento antifraude dentro de la organizaciรณnโ€.

Conviene tambiรฉn repasar el calendario de implementaciรณn. A partir del 1 de enero de 2026, todas las personas jurรญdicas deberรกn usar sistemas de facturaciรณn adaptados, mientras que el resto de profesionales y personas autรณnomas tienen hasta el 1 de julio del prรณximo aรฑo para integrar estas herramientas.

Facturaciรณn electrรณnica

Aunque Verifactu podrรญa considerarse como un primer paso hacia la factura electrรณnica โ€”especialmente para aquellos negocios que no estaban aรบn utilizando sistemas de este tipoโ€”, este modelo de facturaciรณn es obligatoria para el trabajo con la administraciรณn desde 2013. En los prรณximos aรฑos estรก previsto que se extienda, gracias a la conocida como Ley Crea y Crece. Esta normativa de 2022 โ€œestablece la obligaciรณn de emitir, remitir y recibir facturas electrรณnicas en las operaciones entre empresarios y profesionalesโ€, recuerdan Yus y Pรฉrez, aunque aรบn estรก pendiente de desarrollo reglamentario. โ€œA fecha de hoy, por lo tanto, todavรญa no estรก definido con detalle el alcance de esta medida y su fecha de entrada en vigorโ€.

La normativa trabaja en una lรญnea semejante a la de la Ley Antifraude, buscando โ€œcombatir la morosidad comercial, reforzar la transparencia en los pagos y acelerar la digitalizaciรณn de las relaciones empresariales, promoviendo procesos mรกs eficientes, trazables y automatizablesโ€, destacan las abogadas de Cuatrecasas. Por el momento, en el รบltimo borrador publicado, se contempla que la factura en operaciones B2B deberรก ser un mensaje electrรณnico estructurado conforme a determinados requerimientos. โ€œEl envรญo de un PDF no resultarรก suficiente, pues se exigen datos estructurados interoperables procesables automรกticamente por los sistemasโ€, resumen. Estรก ademรกs prevista una soluciรณn pรบblica de facturaciรณn de la propia AEAT, que actuarรก como repositorio de las facturas electrรณnicas y coexistirรก con plataformas privadas de intercambio de datos. โ€œEstas plataformas deberรกn garantizar la interconexiรณn e interoperabilidad gratuitas entre ellasโ€.

โ€œEl envรญo de un PDF no resultarรก suficiente, pues se exigen datos estructurados interoperables procesables automรกticamente por los sistemasโ€, indican Lucรญa Pรฉrez y Meritxell Yus

Aunque al no haberse publicado el desarrollo normativo no se puede hablar de un calendario completo, se estima que las grandes empresas, con un volumen de operaciones superior a 8 millones de euros, tendrรกn 12 meses desde su publicaciรณn para adaptarse, mientras que para el resto este plazo se extenderรก hasta los 24 o incluso 36 meses.

์นผ๋Ÿผ | AI ROI๋ฅผ ๊ณ„์‚ฐํ•  ๋•Œ ๊ธฐ๋Œ€์น˜๋ฅผ ๋” ๋‚ฎ์ถฐ์•ผ ํ•˜๋Š” ์ด์œ 

23 November 2025 at 22:20

์ž๋™์ฐจ๋ฅผ ๊ตฌ๋งคํ•  ๋•Œ๋Š” ์ฐฝ๋ฌธ ์Šคํ‹ฐ์ปค์— ์ ํžŒ ๊ณต์ธ ์—ฐ๋น„๋ฅผ ๋จผ์ € ๋ณด๊ธฐ ๋งˆ๋ จ์ด๋‹ค. 1๋ฆฌํ„ฐ๋กœ 18km๋ฅผ ๋‹ฌ๋ฆฐ๋‹ค๋Š” ์ˆ˜์น˜๋ฅผ ๋ณด๋ฉด ๊ธฐ๋Œ€๊ฐ€ ์ปค์ง€์ง€๋งŒ, ๋ง‰์ƒ ์ฐจ๋ฅผ ์ง‘๊นŒ์ง€ ๋ชฐ๊ณ  ์˜ค๋ฉด ์‹ค์ฃผํ–‰ ์—ฐ๋น„๋Š” ๊ทธ๋ณด๋‹ค ํ›จ์”ฌ ๋‚ฎ๊ฒŒ ๋‚˜์˜จ๋‹ค๋Š” ์ ์„ ๊นจ๋‹ซ๋Š”๋‹ค. ์ œ์กฐ์‚ฌ๊ฐ€ ํ‰์ง€๋‚˜ ๋‚ด๋ฆฌ๋ง‰๊ธธ, ์ตœ์ ์˜ ์กฐ๊ฑด๋งŒ ๊ฐ€์ •ํ•ด ์ธก์ •ํ•œ ๊ฒฐ๊ณผ๊ฐ€ ์•„๋‹Œ๊ฐ€ ํ•˜๋Š” ์ƒ๊ฐ์ด ๋“ค ๋•Œ๊ฐ€ ๋งŽ๋‹ค.

AI ์ƒ์‚ฐ์„ฑ์„ ๋‘˜๋Ÿฌ์‹ผ ๋…ผ์˜๋„ ์ด์™€ ํฌ๊ฒŒ ๋‹ค๋ฅด์ง€ ์•Š๋‹ค. ๊ธ€๋กœ๋ฒŒ ์ปจ์„คํŒ…์‚ฌ์˜ ๋ณด๊ณ ์„œ๋“ , ์ตœ์‹  AI ํ”Œ๋žซํผ์„ ์•ž์„ธ์šด ๋ฒค๋”์˜ ์„ค๋ช…์ด๋“ , ํ˜น์€ CEO๊ฐ€ ์š”์ฒญํ•œ ROI ์ „๋ง์ด๋“  ๋Œ€๋ถ€๋ถ„์˜ ์˜ˆ์ธก์€ ์ง€๋‚˜์น˜๊ฒŒ ๋‚™๊ด€์ ์ด๋‹ค. ๋ฌธ์„œ๋กœ๋งŒ ๋ณด๋ฉด ๊ทธ๋Ÿด๋“ฏํ•ด ๋ณด์ด์ง€๋งŒ ์‹ค์ œ ์—…๋ฌด ํ™˜๊ฒฝ์—์„œ๋Š” ๊ธฐ๋Œ€์น˜์— ๋ฏธ์น˜์ง€ ๋ชปํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹ค. ๊ณผ์žฅ๋œ ์ „๋ง์„ ์ „์ œ๋กœ ์ „๋žต์„ ์„ธ์šฐ๋ฉด, ์กฐ์ง์€ ๋ชฉํ‘œ์—์„œ ๋ฒ—์–ด๋‚˜๊ธฐ ์‰ฌ์šด ๊ธฐ๋ฐ˜์„ ์Šค์Šค๋กœ ๋งŒ๋“ค๊ฒŒ ๋œ๋‹ค.

๋””์ง€ํ„ธ ์ „๋žต ์ปจ์„คํ„ดํŠธ๋กœ ์ผํ•˜๋ฉด์„œ, ์ž ์žฌ๋ ฅ์ด ์ฃผ๋Š” ๊ธฐ๋Œ€๊ฐ๊ณผ ์‹ค์ œ ์‹คํ–‰ ๊ณผ์ •์˜ ํ˜„์‹ค์„ฑ์„ ๊ท ํ˜• ์žˆ๊ฒŒ ๋ฐ˜์˜ํ•˜๋Š” ์ƒˆ๋กœ์šด ๊ธฐ์ค€์ด ํ•„์š”ํ•˜๋‹ค๋Š” ์ ์„ ์—ฌ๋Ÿฌ ์ฐจ๋ก€ ํ™•์ธํ•ด ์™”๋‹ค. ํฅ๋ฏธ๋กœ์šด ์ ์€ ์ด๋Ÿฐ ์ ‘๊ทผ๋ฒ•์˜ ์ถœ๋ฐœ์ ์ด ๊ธฐ์ˆ ์ด ์•„๋‹ˆ๋ผ ๊ธˆ์œต ๋ถ„์•ผ์—์„œ ๋‚˜์™”๋‹ค๋Š” ์‚ฌ์‹ค์ด๋‹ค.

โ€˜ํ• ์ธ์œจโ€™์„ ์ ์šฉํ•  ํ•„์š”์„ฑ

๊ธˆ์œต ๋ถ„์•ผ์˜ ๊ธฐ์ดˆ ์žฌ๋ฌด ๊ณผ์ •์—์„œ ๊ฐ€๋ฅด์น˜๋Š” ํ˜„๊ธˆํ๋ฆ„ ํ• ์ธ๋ฒ•(DCF)์„ ์ฐธ์กฐํ•  ๋งŒํ•˜๋‹ค. ์ด๋Š” ํˆฌ์ž๋ฅผ ํ‰๊ฐ€ํ•  ๋•Œ ๋ฏธ๋ž˜์— ๋ฐœ์ƒํ•  ํ˜„๊ธˆํ๋ฆ„์„ ๋ชจ๋‘ ํ•ฉ์‚ฐํ•˜๋Š” ๋Œ€์‹ , ์‹œ๊ฐ„๊ณผ ์œ„ํ—˜์„ ๊ณ ๋ คํ•ด ๊ทธ ๊ฐ€์น˜๋ฅผ ํ• ์ธํ•˜๋Š” ๋ฐฉ์‹์ด๋‹ค. ๋‚ด์ผ ๋ฐ›์„ 1๋‹ฌ๋Ÿฌ๋Š” ์˜ค๋Š˜์˜ 1๋‹ฌ๋Ÿฌ๋ณด๋‹ค ๊ฐ€์น˜๊ฐ€ ๋‚ฎ๊ณ , ๊ทธ 1๋‹ฌ๋Ÿฌ๊ฐ€ ์‹ค์ œ๋กœ ๋“ค์–ด์˜ฌ์ง€ ๋ถˆํ™•์‹คํ•˜๋‹ค๋ฉด ๊ฐ€์น˜๋Š” ๋” ๋–จ์–ด์ง„๋‹ค.

AI ์ƒ์‚ฐ์„ฑ์„ ํ‰๊ฐ€ํ•  ๋•Œ๋„ ์ด์™€ ๊ฐ™์€ ์‚ฌ๊ณ ๋ฐฉ์‹์ด ๋„์›€์ด ๋œ๋‹ค. โ€œ์ฝ”ํŒŒ์ผ๋Ÿฟ์ด ๊ฐœ๋ฐœ์ž ์ƒ์‚ฐ์„ฑ์„ 2๋ฐฐ๋กœ ๋†’์ธ๋‹คโ€์™€ ๊ฐ™์€ ํ‘œ๋ฉด์  ์ˆ˜์น˜๋Š” ์ž ์žฌ๋ ฅ์„ ์ตœ๋Œ€์น˜๋กœ ๊ฐ€์ •ํ•œ ๊ฐ’์ผ ๋ฟ์ด๋‹ค. ์‹ค์ œ ๊ณ„ํš์— ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ํ˜„์‹ค์ ์ธ ์ˆ˜์น˜๋ฅผ ์–ป์œผ๋ ค๋ฉด 3๊ฐ€์ง€ ์š”์†Œ๋ฅผ ๊ฐ์•ˆํ•ด โ€˜ํ• ์ธโ€™ํ•ด์•ผ ํ•œ๋‹ค. ์ด๋Š” ๋ชฉํ‘œ์— ๋„๋‹ฌํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ๋žŒ์ด ํˆฌ์ž…ํ•ด์•ผ ํ•˜๋Š” ๋…ธ๋ ฅ, ์กฐ์ง์ด AI๋ฅผ ๋ฐ›์•„๋“ค์ด๋Š” ๋ฐ ๊ฑธ๋ฆฌ๋Š” ์‹œ๊ฐ„, ๊ทธ๋ฆฌ๊ณ  AI์˜ ๋ถˆ์™„์ „์„ฑ์—์„œ ๋น„๋กฏ๋˜๋Š” ์œ„ํ—˜์„ ์˜๋ฏธํ•œ๋‹ค.

์‚ฌ๋žŒ์˜ ๋…ธ๋ ฅ: ์‚ฌ๋žŒ๊ณผ ๊ธฐ๊ณ„๊ฐ€ ๋งž๋ฌผ๋ฆฌ๋Š” ํ˜„์‹ค

์ƒ์„ฑํ˜• AI๋Š” ์ผ์„ ๋Œ€์‹ ํ•ด์ฃผ๋Š” โ€˜์ž๋™ ์กฐ์ข… ์žฅ์น˜โ€™๊ฐ€ ์•„๋‹ˆ๋ผ ์†๋„๋ฅผ ๋†’์—ฌ์ฃผ๋Š” โ€˜๊ฐ€์†๊ธฐโ€™์— ๊ฐ€๊น๋‹ค. ๋ฌธ์ œ๋ฅผ ์ •์˜ํ•˜๊ณ , ๋ชจ๋ธ์ด ์˜ฌ๋ฐ”๋ฅด๊ฒŒ ์ž‘๋™ํ•˜๋„๋ก ์•ˆ๋‚ดํ•˜๋ฉฐ, ์ตœ์ข… ๊ฒฐ๊ณผ๋ฅผ ๊ฒ€์ฆํ•˜๋Š” ๊ณผ์ •์€ ์—ฌ์ „ํžˆ ์‚ฌ๋žŒ์ด ๋งก์•„์•ผ ํ•œ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ์†Œํ”„ํŠธ์›จ์–ด ์—”์ง€๋‹ˆ์–ด๋ง์—์„œ๋Š” ๊นƒํ—ˆ๋ธŒ ์ฝ”ํŒŒ์ผ๋Ÿฟ(GitHub Copilot) ๊ฐ™์€ ๋„๊ตฌ๊ฐ€ ์ฆ‰์‹œ ์‹คํ–‰ ๊ฐ€๋Šฅํ•œ ์ฝ”๋“œ๋ฅผ ๋งŒ๋“ค์–ด์ฃผ์ง€๋งŒ, ๊ทธ ์ฝ”๋“œ ์ƒ๋‹น์ˆ˜๋Š” ์—ฌ์ „ํžˆ ๋””๋ฒ„๊น…๊ณผ ํ…Œ์ŠคํŠธ, ์ˆ˜์ •์ด ํ•„์š”ํ•˜๋‹ค.

ํ•œ ๊ณ ๊ฐ์‚ฌ์˜ ํŒŒ์ผ๋Ÿฟ ํ”„๋กœ์ ํŠธ์—์„œ ์—”์ง€๋‹ˆ์–ด๋“ค์€ ์—…๋ฌด ์‹œ๊ฐ„์˜ ์•ฝ 4๋ถ„์˜ 1์„ AI๊ฐ€ ์ƒ์„ฑํ•œ ์ฝ”๋“œ๋ฅผ ๊ฒ€ํ† ํ•˜๊ฑฐ๋‚˜ ๋‹ค์‹œ ์ž‘์„ฑํ•˜๋Š” ๋ฐ ์‚ฌ์šฉํ–ˆ๋‹ค. ์ƒ์‚ฐ์„ฑ์€ ๋ถ„๋ช… ์˜๋ฏธ ์žˆ๋Š” ์ˆ˜์ค€์œผ๋กœ ์˜ฌ๋ž์ง€๋งŒ, ๋ฒค๋”๊ฐ€ ํ”ํžˆ ์ฃผ์žฅํ•˜๋Š” โ€˜์ƒ์‚ฐ์„ฑ 2๋ฐฐโ€™์™€๋Š” ๊ฑฐ๋ฆฌ๊ฐ€ ์žˆ์—ˆ๋‹ค. ์‹ค์ œ ์ˆ˜์น˜๋Š” ์•ฝ 40% ํ–ฅ์ƒ์— ๊ฐ€๊นŒ์› ๊ณ , ์ด๋Š” ํ›จ์”ฌ ํ˜„์‹ค์ ์ด๋ฉด์„œ๋„ ์ง€์† ๊ฐ€๋Šฅํ•œ ์ˆ˜์ค€์ด์—ˆ๋‹ค. ๊ฒฐ๋ก ์€ ๋ช…ํ™•ํ–ˆ๋‹ค. AI๋Š” ์—ญ๋Ÿ‰์„ ์ฆํญ์‹œํ‚ค์ง€๋งŒ ์‚ฌ๋žŒ์˜ ํŒ๋‹จ์„ ๋Œ€์‹ ํ•˜์ง€๋Š” ๋ชปํ•œ๋‹ค. ์ด๋ฅผ ์ƒ์‚ฐ์„ฑ ์ „๋ง์— ๋ฐ˜์˜ํ•ด์•ผ ๋ชจ๋ธ์€ ๋” ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๊ณ  ๊ณ„ํš์€ ๋” ํ˜„์‹ค์ ์ด ๋œ๋‹ค.

๋„์ž… ์†๋„์™€ ํ™•์‚ฐ ๊ณก์„ 

๋˜ ๋‹ค๋ฅธ ์ค‘์š”ํ•œ ์š”์†Œ๋Š” ๊ธฐ์ˆ  ๋„์ž… ์†๋„๋‹ค. AI๋กœ ์ธํ•œ ์ƒ์‚ฐ์„ฑ ํ–ฅ์ƒ์€ ํ•œ๊บผ๋ฒˆ์— ๋‚˜ํƒ€๋‚˜์ง€ ์•Š๋Š”๋‹ค. ๋‹ค๋ฅธ ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ๊ธฐ์ˆ ๊ณผ ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ, ๋„์ž… ๊ณผ์ •์€ ํ•™์Šต๊ณผ ์‹คํ—˜, ํ™•์‚ฐ์„ ๊ฑฐ์น˜๋ฉฐ ์ ์ง„์ ์ธ ๊ณก์„ ์„ ๊ทธ๋ฆฐ๋‹ค.

ํฌ์ถ˜ 500๋Œ€ ์ œ์กฐ ๊ธฐ์—…์˜ ํ•œ ์‚ฌ๋ก€๋ฅผ ์‚ดํŽด๋ณผ ๋งŒํ•˜๋‹ค. ์ด ํšŒ์‚ฌ๋Š” ์ฝ”๋“œ ๊ฐœ๋ฐœ์šฉ ์ฝ”ํŒŒ์ผ๋Ÿฟ ๋„์ž…์„ ์ถ”์ง„ํ•˜๋ฉด์„œ ์ด๋Ÿฌํ•œ ๋„์ž… ๊ณก์„ ์„ ์ง์ ‘ ๋ชจ๋ธ๋งํ–ˆ๋‹ค. ์ฒซํ•ด์—๋Š” ์ „์ฒด ๊ฐœ๋ฐœ์ž์˜ ์•ฝ 4๋ถ„์˜ 1๋งŒ ํ™œ๋ฐœํžˆ ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ–ˆ๋‹ค. ์‹œ๊ฐ„์ด ์ง€๋‚˜๋ฉด์„œ ๋„์ž…๋ฅ ์€ ๊พธ์ค€ํžˆ ์ฆ๊ฐ€ํ–ˆ๊ณ , ๋น„์šฉ๊ณผ ํšจ๊ณผ๋„ ์ผ์ƒ์ ์ธ ๊ฐœ๋ฐœ ํ๋ฆ„ ์†์—์„œ ์ž์—ฐ์Šค๋Ÿฝ๊ฒŒ ํ™•๋Œ€๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋๋‹ค. ์ด๋“ค์€ 4๋…„์— ๊ฑธ์นœ ๋„์ž… ๊ธฐ๊ฐ„์„ ๊ธฐ์ค€์œผ๋กœ ROI๋ฅผ ์‚ฐ์ •ํ•ด ์กฐ์ง์ด ๋ณ€ํ™”์— ์ ์‘ํ•  ์ˆ˜ ์žˆ๋Š” ์†๋„์™€ ๋งž๋Š” ์˜ˆ์ธก์น˜๋ฅผ ์ œ์‹œํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๊ฒฐ๊ณผ์ ์œผ๋กœ ๊ฐ€ํŒŒ๋ฅด๊ณ  ๋น„ํ˜„์‹ค์ ์ธ ์ƒ์Šน ๊ณก์„ ์ด ์•„๋‹Œ, ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ์ „๋ง์„ ํ™•๋ณดํ–ˆ๋‹ค.

๊ฐ•๋ ฅํ•œ ๋น„์ฆˆ๋‹ˆ์Šค ์‚ฌ๋ก€๊ฐ€ ์žˆ์–ด๋„ ์ƒ์‚ฐ์„ฑ์€ ์ €์ ˆ๋กœ ๋ฐœ์ƒํ•˜์ง€ ์•Š๋Š”๋‹ค. ๋„์ž…์—๋Š” ์‹œ๊ฐ„, ๊ต์œก, ๊ทธ๋ฆฌ๊ณ  ๋ฐ˜๋ณต์ ์ธ ์‚ฌ์šฉ ๊ฒฝํ—˜์ด ํ•„์š”ํ•˜๋‹ค. ์ด๋Ÿฐ ํ˜„์‹ค์  ์กฐ๊ฑด์„ ์ถ”์ •์น˜์— ํฌํ•จํ•ด์•ผ ๊ณ„ํš์€ ๋ฐฉ์–ด ๊ฐ€๋Šฅํ•˜๋ฉด์„œ๋„ ์‹ค์ œ ์‹คํ–‰์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค.

์œ„ํ—˜ ์กฐ์ •: AI ํ™˜๊ฐ์„ ๋ฐ˜์˜

๋ชจ๋“  ์ƒ์‚ฐ์„ฑ ๋ชจ๋ธ์€ ์œ„ํ—˜ ์š”์†Œ๋„ ๊ณ ๋ ค๋ผ์•ผ ํ•œ๋‹ค. ๊ฐ€์žฅ ์„ฑ๋Šฅ์ด ๋›ฐ์–ด๋‚œ ์‹œ์Šคํ…œ๋„ ์˜ค๋ฅ˜๋ฅผ ๋‚ผ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ทธ๋กœ ์ธํ•œ ์šด์˜ยทํ‰ํŒ ์ธก๋ฉด์˜ ๋น„์šฉ์€ ์ƒ๋‹นํ•  ์ˆ˜ ์žˆ๋‹ค.

์ด๋Ÿฐ ์‚ฌ๋ก€๋Š” ๋‰ด์Šค์—์„œ๋„ ์–ด๋ ต์ง€ ์•Š๊ฒŒ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ์˜ฌํ•ด ํ•œ ๊ธ€๋กœ๋ฒŒ ๊ธฐ์ˆ  ๊ธฐ์—…์€ AI ์ด๋ฏธ์ง€ ์ƒ์„ฑ๊ธฐ๊ฐ€ ๋ถ€์ ์ ˆํ•œ ๊ฒฐ๊ณผ๋ฅผ ๋งŒ๋“ค์–ด๋‚ด์ž ๋งˆ์ผ€ํŒ… ์บ ํŽ˜์ธ์„ ์ „๋ฉด ์ฒ ํšŒํ–ˆ๋‹ค. ๋ฌธ์ œ๋Š” ๊ด€๋ฆฌ ๋ถ€์žฌ๊ฐ€ ์•„๋‹ˆ๋ผ ์œ„ํ—˜์„ ๊ณผ์†Œํ‰๊ฐ€ํ•œ ๊ฒƒ์ด์—ˆ๋‹ค. ๊ธฐ์—…์€ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ  ๊ณต์ง€ยท์กฐ์œจ ์ž‘์—…์„ ์ง„ํ–‰ํ•˜๋ฉฐ ์‹ ๋ขฐ๋ฅผ ํšŒ๋ณตํ•˜๋Š” ๋ฐ ์ˆ˜ ์ฃผ๋ฅผ ํˆฌ์ž…ํ•ด์•ผ ํ–ˆ๋‹ค. ์ด ํšŒ๋ณต ๊ธฐ๊ฐ„ ๋™์•ˆ ํˆฌ์ž…๋œ ์‹œ๊ฐ„๊ณผ ์ž์›์€ ๋ณธ๋ž˜ ์ƒ์‚ฐ ์—…๋ฌด์— ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ์—ˆ๋‹ค.

CIO๊ฐ€ ์ƒ์‚ฐ์„ฑ์„ ์ถ”์ •ํ•  ๋•Œ๋Š” ์ด๋Ÿฐ ๋ถˆ๊ฐ€ํ”ผํ•œ ์‹œํ–‰์ฐฉ์˜ค๋ฅผ ๊ฐ์•ˆํ•ด์•ผ ํ•œ๋‹ค. ๊ฒฐ๊ณผ๋ฌผ ๊ฒ€์ฆ, ์˜ค๋ฅ˜ ์ˆ˜์ •, ํ›„์† ์กฐ์น˜์— ํ•„์š”ํ•œ ์‹œ๊ฐ„๊ณผ ๋…ธ๋ ฅ์ด ๋ถ„์„์— ํฌํ•จ๋ผ์•ผ ํ•œ๋‹ค. ํˆฌ์ž์ž๊ฐ€ ์œ„ํ—˜์ด ํฐ ์ž์‚ฐ์— ๋” ๋†’์€ ์ˆ˜์ต๋ฅ ์„ ์š”๊ตฌํ•˜๋Š” ๊ฒƒ์ฒ˜๋Ÿผ, ๊ธฐ์ˆ  ๋ฆฌ๋”๋„ ์œ„ํ—˜์„ฑ์ด ๋†’์€ AI ํ™œ์šฉ์— ๋Œ€ํ•ด์„œ๋Š” ์ƒ์‚ฐ์„ฑ ๊ธฐ๋Œ€์น˜๋ฅผ ์กฐ์ •ํ•ด์•ผ ํ•œ๋‹ค.

๊ฐœ๋…์—์„œ ์‹ค์ฒœ์œผ๋กœ

โ€˜ํ• ์ธ๋œ ์ƒ์‚ฐ์„ฑโ€™ ๊ฐœ๋…์€ ์‹ค์ œ ํ˜„์žฅ์— ์ ์šฉํ•  ๋•Œ ๋น„๋กœ์†Œ ํž˜์„ ๋ฐœํœ˜ํ•œ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ํ•œ ์†Œํ”„ํŠธ์›จ์–ด ์—”์ง€๋‹ˆ์–ด๊ฐ€ ์ฝ”ํŒŒ์ผ๋Ÿฟ์„ ์‚ฌ์šฉํ•œ๋‹ค๊ณ  ๊ฐ€์ •ํ•ด๋ณด๋ฉด, ์ด๋ก ์ƒ ์ƒ์‚ฐ์„ฑ์€ 2๋ฐฐ๊นŒ์ง€ ๋Š˜์–ด๋‚  ์ˆ˜ ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ์‚ฌ๋žŒ ๊ฒ€์ฆ ๊ณผ์ •, ์ ์ง„์ ์ธ ๋„์ž… ์†๋„, ์œ„ํ—˜ ์š”์†Œ๋ฅผ ๋ฐ˜์˜ํ•˜๋ฉด ํ˜„์‹ค์ ์ธ ์ƒ์‚ฐ์„ฑ ์ฆ๊ฐ€๋Š” 30~40% ์ˆ˜์ค€์— ๊ฐ€๊นŒ์›Œ์ง„๋‹ค.

์ด๋ฅผ ์‹œ๊ฐํ™”ํ•˜๋ฉด ํญํฌ์ˆ˜(waterfall) ์ฐจํŠธ ํ˜•ํƒœ๊ฐ€ ๋œ๋‹ค. ์ „์ฒด AI ๊ธฐํšŒ ๊ทœ๋ชจ๋ฅผ ์ถœ๋ฐœ์ ์œผ๋กœ ๋‘๊ณ , ์‚ฌ๋žŒ์˜ ๋…ธ๋ ฅ, ๋„์ž… ์†๋„, ์œ„ํ—˜ ์š”์ธ์„ ๊ณ ๋ คํ•ด ํ•˜๋‚˜์”ฉ ์ฐจ๊ฐํ•ด ๋‚˜๊ฐ„๋‹ค. ๊ทธ๋ ‡๊ฒŒ ๋‚จ๋Š” ์ˆ˜์น˜๊ฐ€ ์‹ค์ œ๋กœ ๋‹ฌ์„ฑ ๊ฐ€๋Šฅํ•œ ์ƒ์‚ฐ์„ฑ ํ–ฅ์ƒ์ด๋ฉฐ, ํŒ€์˜ ์‹ค์ œ ์—…๋ฌด ๋ฐฉ์‹์„ ๋ฐ˜์˜ํ•œ ๊ฐ’์ด๊ธฐ ๋•Œ๋ฌธ์— CFO๋‚˜ CEO์—๊ฒŒ๋„ ์ž์‹  ์žˆ๊ฒŒ ์ œ์‹œํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ฒฝํ—˜์ด ์Œ“์ด๋ฉด ์ด ์ˆ˜์น˜๋ฅผ ๋„˜์–ด์„ค ๊ฐ€๋Šฅ์„ฑ๋„ ์ถฉ๋ถ„ํžˆ ์žˆ๋‹ค.

์„œ๋กœ ๋‹ค๋ฅธ AI์˜ โ€˜์—ฐ๋น„โ€™

AI๋Š” ์—…๋ฌด ๋ฐฉ์‹์„ ๋น ๋ฅด๊ฒŒ ๋ฐ”๊พธ๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ์ƒˆ ์ฐจ์˜ ๊ณต์ธ ์—ฐ๋น„๊ฐ€ ์‹ค์ œ ์ฃผํ–‰ ํ™˜๊ฒฝ์— ๋”ฐ๋ผ ๋‹ฌ๋ผ์ง€๋“ฏ, AI ์„ฑ๊ณผ ์—ญ์‹œ ์กฐ์ง์˜ ํ™˜๊ฒฝ, ๊ตฌ์„ฑ์›์˜ ํ™œ์šฉ ๋ฐฉ์‹, ์‹คํ–‰๋ ฅ์— ๋”ฐ๋ผ ํฌ๊ฒŒ ๋‹ฌ๋ผ์ง„๋‹ค. ์ƒ์‚ฐ์„ฑ์— โ€˜ํ• ์ธ์œจโ€™์„ ์ ์šฉํ•ด ๋ฐ”๋ผ๋ณด๋Š” ๊ด€์ ์€ CIO์™€ ๊ธฐ์ˆ  ๋ฆฌ๋”๊ฐ€ AI ๊ธฐ์ˆ ์˜ ์ž ์žฌ๋ ฅ๊ณผ ์‹ค์ œ ์„ฑ๊ณผ ์‚ฌ์ด์˜ ๊ฐ„๊ทน์„ ์ขํžˆ๊ณ , ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๊ณ  ๋ฐฉ์–ด ๊ฐ€๋Šฅํ•˜๋ฉฐ ์‹คํ˜„ ๊ฐ€๋Šฅํ•œ ๊ธฐ๋Œ€์น˜๋ฅผ ์„ธ์šฐ๋„๋ก ๋•๋Š”๋‹ค.

AI ์—ญ์‹œ ์šด์ „๊ณผ ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ, โ€˜์—ฐ๋น„โ€™๋Š” ์ƒํ™ฉ์— ๋”ฐ๋ผ ๋‹ฌ๋ผ์งˆ ์ˆ˜๋ฐ–์— ์—†๋‹ค.
dl-ciokorea@foundryco.com

โŒ
โŒ