Welcome!

News Feed Item

IHS Names Rich Walker Executive Vice President-Global Finance and Todd Hyatt Senior Vice President, Chief Financial and IT Officer

IHS Inc. (NYSE: IHS), the leading global source of information and analytics, today announced that Rich Walker has been named Executive Vice President-Global Finance and Todd Hyatt Senior Vice President, Chief Financial and IT Officer.

Walker continues to lead the IHS global finance organization, corporate development and acquisition integration efforts. Hyatt will manage the IHS global accounting and financial planning and analysis (FP&A) teams, and continue his responsibilities leading the company's worldwide IT operations.

“We are organizing our global finance team to deliver on our strategy and our investments and to take advantage of the enhancements that the nearing completion of our Vanguard program is bringing to IHS,” said IHS Chairman and Chief Executive Officer Jerre Stead. “With approximately 70 percent of our business now being processed through Vanguard - our single financial, sales and order-to-cash system - and the remaining scheduled for completion this year, this is an appropriate time to realign our global finance and IT operations in support of our continued growth.

“Todd's extensive experience in finance, where he has spent a significant portion of his career, in combination with his experience leading both our IT organization and our Vanguard program will help us maximize the effectiveness of our new platform.”

Hyatt will report to Walker and continue as a member of the IHS executive leadership team. Walker continues to report to Stead.

Walker was named Executive Vice President & Chief Financial Officer in August 2011. He joined IHS in December 2006 and had served as Senior Vice President and Chief Strategy Officer since March 2011, with prior leadership responsibility in strategy, marketing, corporate development and alliances.

Hyatt was named Senior Vice President and Chief Information Officer in October 2011 leading the company's worldwide IT operations. He served as Senior Vice President of the Vanguard program starting in 2010 and was Senior Vice President-Financial Planning & Analysis from 2007-2010. He also served as Chief Financial Officer for the company's engineering segment from 2005-2007. Prior to joining IHS, Hyatt held leadership roles in public accounting, corporate finance and private equity across a variety of industries.

About IHS (www.ihs.com)
IHS (NYSE: IHS) is the leading source of information, insight and analytics in critical areas that shape today's business landscape. Businesses and governments in more than 165 countries around the globe rely on the comprehensive content, expert independent analysis and flexible delivery methods of IHS to make high-impact decisions and develop strategies with speed and confidence. IHS has been in business since 1959 and became a publicly traded company on the New York Stock Exchange in 2005. Headquartered in Englewood, Colorado, USA, IHS is committed to sustainable, profitable growth and employs more than 6,000 people in 31 countries around the world.

IHS is a registered trademark of IHS Inc. All other company and product names may be trademarks of their respective owners. Copyright © 2013 IHS Inc. All rights reserved.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring and assigning risk. Security requires a multi-defense approach, and an in-house team may only be able to cherry pick from the essential components. In his session at 19th Cloud Expo, Vlad Friedman, CEO/Founder o...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.