Are leaders underestimating the risk of vendor lock-in as they pursue consolidation? How do you strike the right balance to mitigate that risk?

300 views3 Comments
Sort By:
Oldest
Director of IT in Healthcare and Biotech7 months ago
In my experience, the organizations I've been a part of have been quite aware of the risks associated with vendor lock-in. The CIOs I've interacted with understand the potential risk and are able to balance it against the objectives of the organization. As for striking the right balance, the key is to protect ourselves from any selection or non-selection of vendors.
Director of Information Security in Services (non-Government)7 months ago
From my experience, some of our C-level executives are easily swayed by every new vendor pitch they receive. It's important to remember that just because a product or service is new and shiny, it doesn't mean it's the right fit for our organization. We need to consider the business requirements and the organization's needs before we start looking into new vendors. In my role, I often find myself fighting vendor sprawl instead of encouraging consolidation. My job is to keep the reins tight on our C-level folks to prevent vendor sprawl and ensure we're consolidating into usable and risk-specific toolsets in our environment.
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
CISO in Finance (non-banking)7 months ago
Regarding the second part, I believe it's crucial to regularly review and reevaluate your vendors. This should be done annually or semi-annually, depending on your review timeframe. It's important to reassess whether the decision to work with a particular vendor still makes sense when your contract renewal is due, or even before that. Vendor assessment and tracking are key to this process. Furthermore, it's beneficial to have clauses in your contracts that offer protection and provide an exit strategy to avoid vendor lock-in.

Content you might like

VP of Global IT and Cybersecurity in Manufacturing6 years ago
Have clear business requirements up front, make sure the proposal includes items such as scope, timeline, cost, resources.
Read More Comments
22.1k views3 Upvotes28 Comments

Implementation complete23%

Implementation in progress54%

Planned within the next 12 months12%

Not planned7%

Not enabling O365 on mobile2%

View Results
2.4k views2 Upvotes
Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment

Account deletion19%

Personal data (PII) deletion from a company's own data warehouses.55%

Personal data (PII) deletion from both a company's own data warehouses and connected SaaS tools.18%

Account deletion and PII deletion from both a company's own data warehouses and connected SaaS tools.7%

View Results
1.5k views2 Upvotes