How are you maintaining data and system security as IT decision making becomes increasingly decentralized?

660 views2 Upvotes55 Comments
Sort By:
Oldest
Director of IT in Education2 years ago
The question feels like it could be 2-in1.  IT decision making is not becoming increasingly decentralized, as we work well with our team, but ultimately make the final decisions, regarding pathways & relative implementation.  However, we monitor security as best we can, with a combination of our in-house tools, along with 3rd party resources.
IT Strategist in Government2 years ago
First, we are trying to avoid a true IT decision decentralization by focusing our partners outside of IT on business problems, requirements and outcomes, which allows IT to focus on technology lifecycle and related decision making. Second, security is being implemented as a concerted effort between Architecture, Design and Deployment teams, where everyone has a set of standards and recommendations to follow or comply with. Lastly, all major initiatives or procurements with any IT components need to be reviewed and validated by the IT Security Team.  
1
MSP & IT Director in Services (non-Government)2 years ago
I dont believe IT decision making is becoming increasingly decentralized as stated, however there is more (security) integration and understanding needed between management parties which has broadened the decision making , with IT driving the options that work best with our data systems.
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Vice President / IT Services / Digital Workplace leader in Software2 years ago
Looking at them as a combined item won't always work.  I look at it as three separate items.  One is the data security itself, then the systems security and access as another item, them as a third item where the data is contained on specific systems.   By breaking them up into individual parts as well as combined, it helps ensure you are seeing the big picture.  leveraging core tools to keep that big eye in the sky visibility on each of the systems and data points is mandatory.  We tag data with specific use cases so its easier to understand when something out of the ordinary is happening to data.  This is the same approached used on systems access.   Ensuring you have known use patterns to bounce live data against, helps ensure you are maintaining proper security control of who and what has access to your data and your systems.   Tryin to do this ONLY with human elements is impossible and doing this ONLY with tools is not a good idea.  There needs to be a balance of human element and tech tooling. 
VP, Technology Manager in Education2 years ago
We are actually working very hard to prevent decision making from becoming decentralized. We are squashing shadow IT initiatives, identifying contracts that forget to include Technology, and generally stepping up all areas of IT auditing. In a highly regulated industry the management of our data appropriately is absolutely key to our future success.

Content you might like

Human Factors (fears, mental health, physical spacing)85%

Technical / IT Factors (on-premise tools, pivoting back away from remote)14%

3.7k views3 Upvotes2 Comments
VP of IT in Retail3 days ago
My previous organization implemented a strict one-strike policy for lost or damaged devices. While the first incident was considered an accident, repeat offenders were required to reimburse the company for the lost or damaged ...read more
82 views1 Comment
IT Manager in Constructiona month ago
Hello,
the topic is so broad, what are you focused on?
Read More Comments
4.8k views2 Upvotes5 Comments

Yes - one person46%

Yes - multiple people46%

No7%

View Results
3.1k views