12:25 PM Robotic Process Automation in Critical Infrastructure: Next Generation Ope-RA-tions – What IT Security gear-up to?
Year 2016, was called the year of the Robots. More than 60% of the organizations are still in the planning stage of Robotic Process Automation (RPA) adoption. 2017 will see a significant proliferation and more formal adoption of RPA in the automation of the mainstream business processes. In January 2017 this year, McKinsey Global Institute’s report stated that “almost half the activities people are paid almost $16 trillion in wages. The global economy has the potential to be automated by adapting currently demonstrated technology, according to an analysis of more than 2,000 work activities across 800 occupations. While less than 5 percent of all occupations can be automated entirely using demonstrated technologies, about 60 percent of all occupations have at least 30 percent of constituent activities that could be automated. More occupations will change than will be automated away”.
Globally organizations are increasingly gravitating towards “digital labor arbitrage” from “outsourcing labor arbitrage”, much of which is being driven by advances in software robotics, artificial intelligence, and machine learning, ushering the new age of automation, as machines match or outperform human performance in a range of work activities, including ones requiring cognitive capabilities. Energy service companies are no exceptions to these advancements. With ever increasing pressure to cut costs, to increase productivity and focus on customer centricity, Robotic Process Automation (RPA) can prove to be an important ally in achieving the business goals. However, this also brings a new dimension to the way we have looked at the enterprise IT security. Imagine creating a virtual identity for a virtual robot!
Key takeaways form this session are:
1.Get an overview of what RPA is and how it is evolving
2.Understand the technology landscape and its impact on the traditional IT
3.Explore typical use cases for retail energy service providers
4.Best practices in RPA adoption
5.Role of IT in RPA adoption
6.IT security implications