Global

Details

  • Industry: Energy & Natural Resources
  • Type: Business and industry issue, Publication series, White paper
  • Date: 2/7/2014

IT strategy: realizing the value of technology 

IT strategy
IT is integral to strategic decision-making, enabling management to access a rich seam of data to raise operating efficiency.

IT in mining tends to fall into two main categories. At an operational level, software and hardware (collectively referred to as process control and instrumentation systems) underpins the various processes that drive the mine, from extraction, through crushing and conveying to processing and refining. Traditionally, these systems tend to be separate from the corporate systems and networks and are typically run by the process or plant engineers.


As a result of the upgraded technology available, more sophisticated, larger organizations are starting to integrate corporate networks and systems with the process control and instrumentation systems to provide more control and visibility over the production process for managers. Companies are also investing in using business intelligence applications, which can also work on mobile devices, to track production progress and highlight any bottlenecks that could cause delays or shutdowns.


Cyber threats

The more connected the system, the more susceptible it is to malicious invasion by hackers that could potentially interfere with critical operations. Cyber threats could come from a number of sources:


  • Environmental activists that disapprove of mining
  • Disaffected former employees
  • Competitors
  • Governments.

Regulators are also cracking down on organizations that fail to demonstrate appropriate anti-fraud safeguards or do not adequately protect confidential health, financial and other employee records.


Getting the most out of IT

“IT security should be ingrained in corporate culture, with access restrictions to financial, operational and personal data, which should preserve the integrity of financial reports and minimize the prospects of fraud.”


Any outsourced third party that manages IT infrastructure, servers, desktops, mobile devices or confidential data, should be systematically monitored – and audited for compliance – with client procedures and external regulations. These organizations also need to provide documented (and preferably independent audit), that they are meeting appropriate standards.


Learn more about IT strategy and key IT issues (PDF 1.7 MB)

 

Share this

Share this

Download full PDF report

Graham Teare

Graham Teare

Partner, IT Advisory, KPMG in South Africa

+ 27 83 447 6702