Intelligent CIO Middle East Issue 58 | Page 62

CASE STUDY Sadia, this new technology holds unforeseen opportunity to rewrite the way things are being done internally as well as externally.” With technology playing a crucial role in BRF Sadia’s supply chain management, waste management and predictive maintenance, it comes as not surprise that the company has embraced Digital Transformation all in an effort drive efficiencies and value in the supply chain and logistics. Possato pointed out that the extensive digitisation in industrial and manufacturing sectors, which has been brought on by the “Recently, we went live with the Industry 4.0 project in the context of a few of our factories and the immediate production benefits were quite clear: Real-time production monitoring has been streamlined and optimised, higher quality control at the fraction of the waste and manual labour, improved efficiency of operation and cost reduction by IoT applications, diminished production downtime and enhanced productivity and increased output, traceability and general maintenance.” Possato noted that in comparison with the banking or telecoms industry sectors, the fast aspects. From communications, to customer interactions to process optimisation, the onset of Digital Transformation has moulded traditional business components into a streamlined version of itself. This new change will in turn innovate on those legacy systems and replace them with new operational models that will help to reduce costs, develop new products, adapt to market shifts, as well as adapt to new competitors in their markets,” he said. Possato added that as the food industry is quickly learning the importance of tech adoption, it is vital to understand that technologies only play one part of the change and concepts like AI, Big Data, Machine Learning and IoT must be tailored to specific business needs and their requirements. “Additionally, the people culture also plays a huge role in the adoption of these tools and an organisation must train its people to use these systems and adopt a more handson approach.” With IT security high on most organisations in the Middle East as cyberthreats continue to evolve, it is important that enterprise secure their own IT environment. BRF SADIA HAS AN IT INFRASTRUCTURE CENTRALISED AND PARTIALLY OUTSOURCED WITH SPECIALISED SUPPLIERS MANAGING 30,000 USERS AND RUNNING 70% OF ITS APPLICATIONS ON THE CLOUD. Industry 4.0 concept as well as the Internet of Things (IoT) technologies is creating substantial opportunities for efficiencies and value creation. He said the technological concepts are driving solid changes to supply chain and logistics, and a result, BRF Sadia has embraced Digital Transformation as a key pillar, which it has recently been heavily invested in. moving consumer goods (FMCG) businesses have not historically been operated at the vanguard of digital technologies. However, he said the increasingly competitive nature of this market as well as constantly shifting consumer trends have pushed many companies to adopt technological prospects in order to flourish in the market. “TheFourth Industrial Revolution is changing how companies operate, in many different Possato said BRF Sadia has an IT infrastructure centralised and partially outsourced with specialised suppliers managing 30,000 users and running 70% of its applications on the cloud. “This architecture assists in the flexibility and scalability of our operations. Since the COVID-19 pandemic has facilitated an environment in which cyberthreat actors can exploit IT infrastructure, we have followed best practices and shifted efforts to mitigate risk by implementing multi-factor authentication to restrict access and protect enterprise networks, strengthening all layers of IT security and firewalls and initiating training and awareness campaigns about phishing and social engineering. “In addition, we have enhanced Business Continuity and endpoint protection, adapted access control, data loss prevention (DLP) and monitoring procedures, improved the remote access management policy and procedures and ran multiple penetration testing procedures to ensure highest level of security within our IT environment.” • 62 INTELLIGENTCIO www.intelligentcio.com