How are you maintaining data and system security as IT decision making becomes increasingly decentralized?
Sort By:
Oldest
Director of IT in Education2 years ago
The question feels like it could be 2-in1. IT decision making is not becoming increasingly decentralized, as we work well with our team, but ultimately make the final decisions, regarding pathways & relative implementation. However, we monitor security as best we can, with a combination of our in-house tools, along with 3rd party resources.IT Strategist in Government2 years ago
First, we are trying to avoid a true IT decision decentralization by focusing our partners outside of IT on business problems, requirements and outcomes, which allows IT to focus on technology lifecycle and related decision making. Second, security is being implemented as a concerted effort between Architecture, Design and Deployment teams, where everyone has a set of standards and recommendations to follow or comply with. Lastly, all major initiatives or procurements with any IT components need to be reviewed and validated by the IT Security Team. MSP & IT Director in Services (non-Government)2 years ago
I dont believe IT decision making is becoming increasingly decentralized as stated, however there is more (security) integration and understanding needed between management parties which has broadened the decision making , with IT driving the options that work best with our data systems.Vice President / IT Services / Digital Workplace leader in Software2 years ago
Looking at them as a combined item won't always work. I look at it as three separate items. One is the data security itself, then the systems security and access as another item, them as a third item where the data is contained on specific systems. By breaking them up into individual parts as well as combined, it helps ensure you are seeing the big picture. leveraging core tools to keep that big eye in the sky visibility on each of the systems and data points is mandatory. We tag data with specific use cases so its easier to understand when something out of the ordinary is happening to data. This is the same approached used on systems access. Ensuring you have known use patterns to bounce live data against, helps ensure you are maintaining proper security control of who and what has access to your data and your systems. Tryin to do this ONLY with human elements is impossible and doing this ONLY with tools is not a good idea. There needs to be a balance of human element and tech tooling. VP, Technology Manager in Education2 years ago
We are actually working very hard to prevent decision making from becoming decentralized. We are squashing shadow IT initiatives, identifying contracts that forget to include Technology, and generally stepping up all areas of IT auditing. In a highly regulated industry the management of our data appropriately is absolutely key to our future success.