Facing The Realities of Total IT Dependence
11-9-2017
Unit 5 Discussion 1 Response 2 Keating
Response by: Miss Bayo Elizabeth Cary, AA, BA, MLIS
Communicating technology to executives has been a challenge
since the early 1990s when technology started to become a part of the business
world. At first, technology, was seen as an expense that necessary, but not
used to improve overall operation. As information technology become a division
in a company, security of the technology and information become a critical
component of the overall well-being of the company.
Translating
between “techies” and executives has been the main challenge in today’s world. The
role of the Chief Information Officer (CIO), and more recently, the Chief
Information Security Officer (CISO) has needed to become a translator between
“techies” and the board room. Board members are ultimately responsible to
understand the security issues through an organization. It is critical that the
CISO communicate to the board the identified gaps in an organization. Board
members have become more aware of cybersecurity, and in some industries, an
information security board member is required.
Cybersecurity
has no boundaries resulting in cybersecurity being an issue for any company,
globally. Countries have try to address this problem, and it is important that
global organizations have an understanding of the threat landscape and what
tools they have at their disposal. The amount of resources that are needed will
need to be determined by management, but the board will ultimately approve the
budget for cybersecurity.
It
is the responsibility of the CISO to have the skill set to communicate how the
company protects itself, how it identifies issues, and how it will respond if
an incident occurs. Throughout the entire lifecycle of cybersecurity, the CISO
will need to have clear communication with executive management and the board
of directors.
References
Veltsos, C. (2015, June 03). How to Converse Effectively as
an Information Security Professional. Retrieved November 08, 2017, from
https://securityintelligence.com/as-an-information-security-professional-are-you-having-the-right-conversations/
Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
Information
management and computer systems are driving dramatic change inside companies.
Since Time Magazine named ‘‘The Computer’’ as its person of the year in 1983, ‘corporations’
reliance on information systems has increased significantly, as have the
capabilities of those systems.
(Matwyshyn, 2010, p. 579).
“CIOs feel more connected to colleagues
thanks to the prevalence of smartphones, instant messaging, and other new
technologies, according to the results of a poll from Robert half Technology” (Schurr,
2008, p. 1). The
ideas you shared, regarding the development, of the: CIO an CISO, positions, at
every major US and Intl corporation, was informative, and interesting-although
brief. “Information is ‘the new corporate currency,’ and its management is the
new corporate challenge” (Matwyshyn, 2010, p. 579). The main focus, of IT
department, at any major corporation, is keep, the IT department, in
functioning compliance-through communications, with the remainder of: staff,
and management.
I agree with your statements, about the
new, and complete dependence, that every business everywhere, now has on IT,
and on the Internet in general. It is impossible, to operate successfully,
within the US, or overseas, without a dominating dependence, on an IT
department.
I think, that it is imperative, that duties, at any
given corporation, are well-divided. It becomes a serious problem, when
everyone, at a company, wants to partake, in any decision.
The IT
department, is a specialized function, and requires years, of focused training,
certifications, diplomas, and experiential learning. IT departments, always
have-to-deal with: serious and persistent threats. Security risks, for IT-never
diminish. There are certain: rules, laws, statutes, and regulations-associated
with IT-local, state, and Federal laws, that must be abided:
Although
law is still nascent in the area of corporate information security regulation,
strong ethical arguments exist for aggressive improvements incorporate data
control practices, even in advance of regulation.
(Matwyshyn, 2010, p. 579)
It should be the main-focus, of the IT department, to
keep track, of any-and-all: rules, laws, statues, and regulations-attendant, to
IT. IT is responsible, for deciding, how best to protect: data, and how to
manage various security risks:
‘Companies
that make difficult decisions in response to a more challenging business
climate must communicate proactively and diplomatically with staff,’ says Lee.
‘It's not just the content of the message, but the manner in which it's
delivered that has an effect on employees and how they, in turn, communicate
with each other.’ (Schurr, 2008, p. 1)
If IT, are not able to do their job, because other
departments, want to constantly interject, their “un-professional” opinion-then,
people have-to-be seriously concerned, about liability, and, who is willing to
take blame.
References
Matwyshyn, Andrea, M. (2010). CSR and the Corporate
Cyborg: Corporate Information Security. Journal of Business Ethics. Vol. 88. p.
579-594. DOI 10.1007/s10551-009-0312-9
Schurr, Amy. (2008). IT Leaders Tap
Many Communication Channels. Network World (Online). Retrieved from www.http://library.capella.edu/login?url=https://search.proquest.com/docview/22374271
7?accountid=27965
Comments
Post a Comment