Business risks fuse with IT risksThe IT megatrends The IT Risk Universe The business environment and ITRM
The business environment and ITRM | Megatrends | Business benefit | Business/IT risks | Categories of IT Risk Universe affected | Emerging consumerization | - Mobile computing: Anytime and anywhere connectivity/high volume portable data
storage capability. - Social media: New and advanced information
sharing capabilities such as crowdsourcing. | - Increased vulnerability due to anytime, anywhere accessibility.
- Risk of unintended sharing, amplifi cation of casual remarks, and disclosure of personal and company data. The availability of this data on the web facilitates cyber attacks.
- Employees may violate company policies in terms of data leakage
| - Security and privacy
- Data
- Legal and regulatory
- Infrastructure
| The rise of cloud computing | - Lower total cost of ownership.
- Focus on core activities and reduction of effort spent on managing IT infrastructure and applications.
- Contribute to reduction of global carbon footprint
| - Lack of governance and oversight over IT infrastructure,
applications and databases. - Vendor lock-in
- Privacy and security
- Availability of IT to be impacted by the use of
the cloud - Increased risk to regulatory non-compliance (SOX, PCI etc.).
The cloud also brings about challenges in auditing compliance. - The cloud may impact the agility of IT and organizations; the
platform dictated by the provider may not align with software development and strategic needs of the user | - Security and privacy
- Data
- Third-party suppliers and outsourciing
- Applications and databases
- Infrastructure
- Legal and regulatory
| The increased importance of business continuity | - 24/7/365 availibility of IT systems to enable continuous consumer support, operations,
e-commerce, etc. | - Failure of the business continuity and disaster recovery plans
causing fi nancial or reputational loss | - Infrastructure
- Applications and databases
- Staffing
- Operations
- Physical environment
| Enhanced persistence of cybercrime | | - Spread of malicious code in company systems causing system
outages - The risk of theft of personal, fi nancial, and health information
- Loss of confi dential data due to external vulnerabilities
- Financial loss due to unauthorized wire transfers
| - Security and privacy
- Data
| Increased exposure to internal threats | | - Assigning access rights that are beyond what is required for
the role by employees or contractors - Failure to remove access rights for employees or contractors
on leaving the organization | - Data
- Applications and databases
| The accelerating change agenda | - Fast adoption of new business models or reducing costs provides organizations with competitive advantage
| - Failure to deliver IT projects and programs within budget, timing,
quality and scope causing value leakage | - Programs and change management
| We've identified six megatrends that can help you manage an ITRM approach. To effectively manage IT risks, organizations need to get a broad and complete view of the entire IT risk landscape. Our IT Risk Universe framework can help. Business risks and the IT risk universeThe IT Risk Universe highlights the need for an aligned strategy to manage the 11 broad risk categories. These categories are relatively stable but the risks within these categories will vary company by company and will evolve over time. The IT Risk Universe 
Different business environments impact the IT risk universeKeep in mind that IT risks vary by the different business environments. Businesses can learn more about how this affects them by following these steps. Step 1:Ask yourself: - How much does the company rely on cost-effective, uninterrupted and secure IT systems (defensive IT)?
- How much does the company rely on achieving competitive advantage through IT (offensive IT) or both?
Step 2:In addition to the answers above, you can learn more about your company's IT priority by plotting it on the grid below. The IT strategic impact grid 
Step 3:Once an organization is aware what mode they are in, they can focus on what is important for their specific circumstances and implement customized performance and controls as necessary. IT megatrends help identify the IT risks that matterWe've identified six megatrends that can help you manage an ITRM approach. - Emerging consumerization: This is when new information technology emerges first in the consumer market and then spreads into business organizations. Mobile computing and social media are examples of consumerization that are increasingly being adopted by a wide audience and across many demographic groups.
- The rise of cloud computing: This is a means of using the internet to access data, using a third party's software running on yet another party's hardware, potentially in yet another party's data center.
- Resiliency: Many businesses are increasingly dependent on their IT systems for 24-hour availability for their sales and customer support, or other core company operations. Business continuality has a more prominent position in the IT Risk Universe than ever before. This is evidenced by the results of the Ernst & Young Global Information Security Survey 2010 which showed that the availability of IT resources is identified as the number one risk.
- Enhanced persistence of cybercrime: Companies have increasingly been victims of cybercrime. These activities are typically not focused on short term gains; the goal is to stay uncovered and to collect as much vital company information as possible (IP, rates, proposals, new product design, strategic plans, etc).
IT Megatrends help identify the IT risks that matter 
- Increased exposure to internal threats: The recent exposure of Wikileaks-related incidents have shown that internal security is at least as important as external threats. In practice, many firms are struggling with the management of providing the right access to information to the right people in their organizations. Experience tells us that:
(1) companies are not able to articulate what their most valuable and important data elements are, (2) where these data elements are and (3) where these data elements are sent to. - The accelerating change agenda: Change remains a "constant' in IT. To increase the success rate in IT projects and programs, organizations may take additional measures such as implementing Quality Assurance programs on major strategic programs.
<< Previous | Next >> |
|
|