Wal-Mart CIO Karenann Terrell: Data Analysis Key To Customer Insights - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
Wal-Mart CIO Karenann Terrell: Data Analysis Key To Customer Insights
Threaded  |  Newest First  |  Oldest First
shamika
50%
50%
shamika,
User Rank: Ninja
4/29/2015 | 12:32:03 PM
Knowledge in to profit
Data Analysis plays a major role in customer insight.  It helps in understanding customer behavior and act on their request. Simply it will help to know about customers and transfer that knowledge in to profit.
Ashu001
50%
50%
Ashu001,
User Rank: Ninja
4/29/2015 | 12:52:35 PM
Re: Knowledge in to profit
Shamika,

Walmart has been a leader in this space from a Long-Long time.

Their Customer-Service Loyalty Programs have been very-very good at picking the right Data points from the Huge Data they collect from their Consumers today.

See all the emails/letters that Sam's Club Users get which are extremely accurate and to the point as well as encourage Users to upgrade very quickly.

It shows the success of their programs.

 

 
Bob124
50%
50%
Bob124,
User Rank: Apprentice
5/11/2015 | 1:14:55 AM
Re: Knowledge in to profit
This article titled "Data Analysis Key to Customer Insights" - Had no mention of Data Analysis and Customer Insights from a business intelligence perspective - at all.  #Fail
batye
50%
50%
batye,
User Rank: Ninja
7/2/2015 | 12:31:32 AM
Re: Knowledge in to profit
@Bob124, I would have to disagree... I learned something new...   
Ashu001
50%
50%
Ashu001,
User Rank: Ninja
4/29/2015 | 12:49:13 PM
Malicious Insiders are the most dangerous Threat Vector.
I really liked what the CIO Terrell had to say regarding Insider Threats.

I am constantly amazed how much leeway/freedom most enterprises give to employees in the name of flexibility or work-time balance today.

Even this whole BYOD/BYOA wave boggles the mind constantly.

Given how many more threat vectors this introduces into the Enteprise today I am amazed there are'nt more such Breaches getting reported on a daily basis today.

Still her interview was most-most insightful,especially HERE

Despite its size, Terrell insists Wal-Mart IT be able to implement systems rapidly and fix them quickly if things go wrong. It's part of how such a big chain survives smaller and lighter-footed competition. "The one protection that we really focus on at Wal-Mart is speed ... That means you're willing to try things. I know I'm looking at a lot of skeptical faces," she said from a stage that allowed her to view 150 of her peers.

By speed, Terrell was referring to IT's ability to implement new software quickly without disrupting production systems or implement new code in production systems themselves. "Imagine trying to roll out a point of sale change. If we were not expert at rolling it out and pulling it back, or rolling it out and fix, we would be releasing once or twice a year against our 100,000 of point of sale systems," she said.

Beyond Fascinating!

 
shamika
50%
50%
shamika,
User Rank: Ninja
4/29/2015 | 12:52:51 PM
Re: Malicious Insiders are the most dangerous Threat Vector.
@Ashu I agree with you. A company like Wal-Mart should have quick fixes for issues. Otherwise it will affect the whole supply chain.
Ashu001
50%
50%
Ashu001,
User Rank: Ninja
4/29/2015 | 12:58:21 PM
Re: Malicious Insiders are the most dangerous Threat Vector.
Shamika,

Absolutely right!

The Supply-Chain at a Goliath like Walmart is very-Very important in the whole scheme of things that the run this Goliath of a Business today.

If ever someone loses control of this critical issue that is a massive-massive recipe for Disaster going ahead.

Not Unsurprisingly it has never happened before.
Stratustician
50%
50%
Stratustician,
User Rank: Ninja
4/29/2015 | 3:27:41 PM
Re: Malicious Insiders are the most dangerous Threat Vector.
Absolutely.  It's not just the POS and security risks that we saw hit Target that could affect Wal-Mart.  Back end systems like those that handle logistics (procurement, shipping, inventory etc) could cause significant damage if they went down.  And managing that risk across all their locations, an even bigger challenge.

Working with a widely distributed network of systems, such as ensuring all the connectivity from the stores to the back end systems at head offices require almost an army of IT folks. 
tzubair
50%
50%
tzubair,
User Rank: Ninja
4/29/2015 | 8:06:39 PM
Re: Malicious Insiders are the most dangerous Threat Vector.
 

"It's not just the POS and security risks that we saw hit Target that could affect Wal-Mart.  Back end systems like those that handle logistics (procurement, shipping, inventory etc) could cause significant damage if they went down.  And managing that risk across all their locations, an even bigger challenge"

@Stratustician: I think companies can no longer afford to only think of securing their front end systems and ignoring the back-end ones. If anything, it's a highly integrated network these days whereby every component in the system has a role to play. If something happens at the back-end, the impact is trickled down to other areas instantly. For instance, while your inventory planning may not be something on the front, a security incident related to that system can actually bring your whole operations to a hault.
Ashu001
50%
50%
Ashu001,
User Rank: Ninja
5/3/2015 | 12:21:07 PM
Re: Malicious Insiders are the most dangerous Threat Vector.
Stratustician,

What you have suggested here-

Back end systems like those that handle logistics (procurement, shipping, inventory etc) could cause significant damage if they went down.

That is so true!

Its also a really,really good sign that Most Large Retailers are now taking the Supply Chain Back-end Seriously after the Target Breach.

The harder it becomes for malicious attackers to access such systems the better it is for all of us concerned.

For that if you need an Army of IT Folks to police everything so be it.

The cost is worth the loss in Reputation if something goes very wrong.

 

 

 
batye
50%
50%
batye,
User Rank: Ninja
5/5/2015 | 2:00:23 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
@Ashu001, from my IT security point of view... - it like never ending game... with only temporary solutions...
Ashu001
50%
50%
Ashu001,
User Rank: Ninja
5/11/2015 | 11:48:41 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
Bateye,

That is a very-very good and rational statement you make here.

We often see that what looks like a super-failsafe option (like Automating everything for instance) is anything but that.

I guess that's why we IT Security Folks still have jobs Don't we?

 
batye
50%
50%
batye,
User Rank: Ninja
7/2/2015 | 12:30:11 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
@Ashu001... thank you :) it never ending... as with security it always trying to catch up...
Li Tan
50%
50%
Li Tan,
User Rank: Ninja
5/4/2015 | 9:07:22 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
There is possibility that things can go wrong, then it will go wrong - this is very true. Every IT professional is trying hard to figure out more automated way of doing things and more robust system. But in the end we still need a strong IT army to keep the light on. I think that's life, though.
batye
50%
50%
batye,
User Rank: Ninja
5/5/2015 | 1:58:53 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
@Li Tan, I would say even with good insurance... nothing 100%... safe...
batye
50%
50%
batye,
User Rank: Ninja
5/5/2015 | 2:03:58 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
@Stratustician, yes, as end result in Canada everyone is changing POS to Chip and Pin technology... but it always like catch 22 process...
Charlie Babcock
50%
50%
Charlie Babcock,
User Rank: Author
4/29/2015 | 1:54:29 PM
Shows impact of the Target breach
CIO Terrell's remarks show how deeply even those retailers with a good handle on security were smitten by the damage of the Target breach. They don't want the same thing to happen to their companies, even though they think they've got all the bases covered. It take's just one, unpredictable, successful attack vector, as Terrell is clearly aware. 
tzubair
50%
50%
tzubair,
User Rank: Ninja
4/29/2015 | 8:02:58 PM
Re: Shows impact of the Target breach
"They don't want the same thing to happen to their companies, even though they think they've got all the bases covered. It take's just one, unpredictable, successful attack vector, as Terrell is clearly aware."

@Charlie: I think in order to make that happen, it takes more than just a secure infrastructure. You also need people who are aware of security and who wouldn't do anything stupid to compromise on it. Everyone knows the number of security breaches that happen each year because of employeed being fooled or taken advantage of.
batye
50%
50%
batye,
User Rank: Ninja
5/5/2015 | 2:01:52 AM
Re: Shows impact of the Target breach
@tzubair, I would say security education of the corporate user should never stops... as with security Humans is a weakest links...


State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll