A mismatch between an organisation’s IT-related business culture on the one hand, and the maturity level of its strategy for IT on the other, is likely to result in more pain than gain. I’m just back from a speaking tour of Australia and New Zealand, which included delivering the keynote at the IT Strategy 3.0 Conference, and my two-day seminar. Events such as these are always thought-provoking.For example: how does the generation of IT strategy you are executing determine the way your organisation treats new IT developments? Take Web 2.0 as an example. A company executing a first-generation IT strategy (technology-centric) will simply incorporate Web 2.0 technologies into its IT roadmap. An organisation executing a second-generation IT strategy (efficiency-centric) will also make sure that the Web 2.0 services it uses are reliable, and that the operating costs of those services are optimised. But the creative, value-enhancing energy in developments such as Web 2.0 comes from what people do with them. Harnessing that energy requires at least a third-generation IT strategy (value-centric). However, not every organisation needs a third-generation strategy, nor is every business culture ready to execute one. Each generation of IT strategy has it benefits, and which is most appropriate depends on the organisation. Strategically, the CIO’s work is most challenging when the organisation needs a particular generation of IT strategy but is culturally not ready for it. This is true both ways. An organisation may need a higher generation strategy for IT than its culture is ready for, or indeed a lower one.What’s likely to be true, however, is that the interplay between an organisation’s IT-related business culture, and the maturity level of its IT strategy, will result in more gain than pain only if the CIO keeps them both in step. Related content opinion Android Security Hole of the Week: Researchers ID New, Severe DoS Attack A group of Italian security researchers have discovered a new Android Denial of Service (DoS) attack that can render Google smartphones and tablets useless in a matter of minutes, making it the most severe Android DoS attack ever identified. By Al Sacco Mar 27, 2012 3 mins Small and Medium Business Smartphones Mobile Security opinion Trip to Ethiopia Trip to Ethiopia to meet with couple of microfinance institutions By Jiten Patel Jul 24, 2010 2 mins IT Leadership opinion CGAP - Virtual Conference Recap: Hurdles to Surmount for Microfinance - Capacity Building & Technology Good 2 day conference on challenges faced by Microfinance Institutions (MFIs) on the critical subjects of capacity building and By Jiten Patel Jul 09, 2010 1 min IT Leadership opinion CGAP Virtual Conference - Day 2 Jul 8th: Getting past the technology hurdles faced by MFIs CGAP Forum - Getting past the technology hurdles faced by MFIs By Jiten Patel Jul 08, 2010 1 min IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe