Facing The Realities of Total IT Dependence


11-9-2017

Unit 5 Discussion 1 Response 2 Keating

Response by: Miss Bayo Elizabeth Cary, AA, BA, MLIS

Communicating technology to executives has been a challenge since the early 1990s when technology started to become a part of the business world. At first, technology, was seen as an expense that necessary, but not used to improve overall operation. As information technology become a division in a company, security of the technology and information become a critical component of the overall well-being of the company.

Translating between “techies” and executives has been the main challenge in today’s world. The role of the Chief Information Officer (CIO), and more recently, the Chief Information Security Officer (CISO) has needed to become a translator between “techies” and the board room. Board members are ultimately responsible to understand the security issues through an organization. It is critical that the CISO communicate to the board the identified gaps in an organization. Board members have become more aware of cybersecurity, and in some industries, an information security board member is required.

Cybersecurity has no boundaries resulting in cybersecurity being an issue for any company, globally. Countries have try to address this problem, and it is important that global organizations have an understanding of the threat landscape and what tools they have at their disposal. The amount of resources that are needed will need to be determined by management, but the board will ultimately approve the budget for cybersecurity.

It is the responsibility of the CISO to have the skill set to communicate how the company protects itself, how it identifies issues, and how it will respond if an incident occurs. Throughout the entire lifecycle of cybersecurity, the CISO will need to have clear communication with executive management and the board of directors.

References

Veltsos, C. (2015, June 03). How to Converse Effectively as an Information Security Professional. Retrieved November 08, 2017, from https://securityintelligence.com/as-an-information-security-professional-are-you-having-the-right-conversations/



Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



Information management and computer systems are driving dramatic change inside companies. Since Time Magazine named ‘‘The Computer’’ as its person of the year in 1983, ‘corporations’ reliance on information systems has increased significantly, as have the capabilities of those systems.

                                                                                (Matwyshyn, 2010, p. 579).



        “CIOs feel more connected to colleagues thanks to the prevalence of smartphones, instant messaging, and other new technologies, according to the results of a poll from Robert half Technology” (Schurr, 2008, p. 1). The ideas you shared, regarding the development, of the: CIO an CISO, positions, at every major US and Intl corporation, was informative, and interesting-although brief. “Information is ‘the new corporate currency,’ and its management is the new corporate challenge” (Matwyshyn, 2010, p. 579). The main focus, of IT department, at any major corporation, is keep, the IT department, in functioning compliance-through communications, with the remainder of: staff, and management.



       I agree with your statements, about the new, and complete dependence, that every business everywhere, now has on IT, and on the Internet in general. It is impossible, to operate successfully, within the US, or overseas, without a dominating dependence, on an IT department.

I think, that it is imperative, that duties, at any given corporation, are well-divided. It becomes a serious problem, when everyone, at a company, wants to partake, in any decision.

       The IT department, is a specialized function, and requires years, of focused training, certifications, diplomas, and experiential learning. IT departments, always have-to-deal with: serious and persistent threats. Security risks, for IT-never diminish. There are certain: rules, laws, statutes, and regulations-associated with IT-local, state, and Federal laws, that must be abided:

Although law is still nascent in the area of corporate information security regulation, strong ethical arguments exist for aggressive improvements incorporate data control practices, even in advance of regulation.

                                                              (Matwyshyn, 2010, p. 579)



It should be the main-focus, of the IT department, to keep track, of any-and-all: rules, laws, statues, and regulations-attendant, to IT. IT is responsible, for deciding, how best to protect: data, and how to manage various security risks:

‘Companies that make difficult decisions in response to a more challenging business climate must communicate proactively and diplomatically with staff,’ says Lee. ‘It's not just the content of the message, but the manner in which it's delivered that has an effect on employees and how they, in turn, communicate with each other.’ (Schurr, 2008, p. 1)



If IT, are not able to do their job, because other departments, want to constantly interject, their “un-professional” opinion-then, people have-to-be seriously concerned, about liability, and, who is willing to take blame.

References

Matwyshyn, Andrea, M. (2010). CSR and the Corporate Cyborg: Corporate Information Security. Journal of Business Ethics. Vol. 88. p. 579-594. DOI 10.1007/s10551-009-0312-9



Schurr, Amy. (2008). IT Leaders Tap Many Communication Channels. Network World (Online). Retrieved from www.http://library.capella.edu/login?url=https://search.proquest.com/docview/22374271

7?accountid=27965




Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2