Skip to main navigation

Business risks fuse with IT risks - The IT megatrends - Ernst & Young - Global

Business risks fuse with IT risks

The IT megatrends

  • Share

The IT Risk Universe

The business environment and ITRM

Defensive

 

Offensive

Factory mode

  • If a system fails for more than one minute, there is
    an immediate loss of business
  • Decrease in response time beyond one second has
    serious consequences for internal and external users
  • Most core business activities are online
  • Systems work is mostly maintenance
  • Systems work provides little strategic differentiation
    or dramatic cost reduction

Strategic mode

  • If a system fails for more than one minute, there is
    an immediate loss of business
  • Decrease in response time beyond one second has
    serious consequences for internal and external users
  • New systems promise major process and service
    Transformations
  • New systems promise major cost reductions
  • New systems will close signifi cant cost, service and/
    or process performance gaps with competitors

   
   

Support mode

  • Even with repeated service interruptions up to 12
    hours, there are no serious consequences
  • User response time can take up to 5 seconds with
    online transactions
  • Internal systems are mostly invisible to suppliers and
    customers. There is little need for extranet capability.
  • Companies can quickly revert to manual procedures
    for 80% of value transactions
  • Systems work is mostly maintenance

Turnaround mode

  • New systems promise major process and service
    transformations
  • New systems promise major cost reductions
  • New systems will close significant cost, service and/or
    process performance gaps with competitors
  • IT constitutes more than 50% of capital spending
  • IT makes up more than 15% of corporate expenses

The business environment and ITRM

Megatrends Business benefit Business/IT risks Categories of IT Risk Universe affected
Emerging
consumerization
  • Mobile computing: Anytime and anywhere connectivity/high volume portable data
    storage capability.
  • Social media: New and advanced information
    sharing capabilities such as crowdsourcing.
  • Increased vulnerability due to anytime, anywhere accessibility.
  • Risk of unintended sharing, amplifi cation of casual remarks, and disclosure of personal and company data. The availability of this data on the web facilitates cyber attacks.
  • Employees may violate company policies in terms of data leakage
  • Security and privacy
  • Data
  • Legal and regulatory
  • Infrastructure
The rise of cloud
computing
  • Lower total cost of ownership.
  • Focus on core activities and reduction of effort spent on managing IT infrastructure and applications.
  • Contribute to reduction of global carbon footprint
  • Lack of governance and oversight over IT infrastructure,
    applications and databases.
  • Vendor lock-in
  • Privacy and security
  • Availability of IT to be impacted by the use of
    the cloud
  • Increased risk to regulatory non-compliance (SOX, PCI etc.).
    The cloud also brings about challenges in auditing compliance.
  • The cloud may impact the agility of IT and organizations; the
    platform dictated by the provider may not align with software
    development and strategic needs of the user
  • Security and privacy
  • Data
  • Third-party suppliers and outsourciing
  • Applications and databases
  • Infrastructure
  • Legal and regulatory
The increased importance of
business continuity
  • 24/7/365 availibility of IT systems to enable continuous consumer support, operations,
    e-commerce, etc.
  • Failure of the business continuity and disaster recovery plans
    causing fi nancial or reputational loss
  • Infrastructure
  • Applications and databases
  • Staffing
  • Operations
  • Physical environment
Enhanced persistence
of cybercrime
  • N/A
  • Spread of malicious code in company systems causing system
    outages
  • The risk of theft of personal, fi nancial, and health information
  • Loss of confi dential data due to external vulnerabilities
  • Financial loss due to unauthorized wire transfers
  • Security and privacy
  • Data
Increased exposure
to internal threats
  • N/A
  • Assigning access rights that are beyond what is required for
    the role by employees or contractors
  • Failure to remove access rights for employees or contractors
    on leaving the organization
  • Data
  • Applications and databases
The accelerating
change agenda
  • Fast adoption of new business models or reducing costs provides organizations with competitive advantage
  • Failure to deliver IT projects and programs within budget, timing,
    quality and scope causing value leakage
  • Programs and change management



We've identified six megatrends that can help you manage an ITRM approach.

To effectively manage IT risks, organizations need to get a broad and complete view of the entire IT risk landscape. Our IT Risk Universe framework can help.

Business risks and the IT risk universe

The IT Risk Universe highlights the need for an aligned strategy to manage the 11 broad risk categories. These categories are relatively stable but the risks within these categories will vary company by company and will evolve over time.

The IT
Risk Universe

The business environment and ITRM

Different business environments impact the IT risk universe

Keep in mind that IT risks vary by the different business environments. Businesses can learn more about how this affects them by following these steps.

Step 1:

Ask yourself:

  • How much does the company rely on cost-effective, uninterrupted and secure IT systems (defensive IT)?
  • How much does the company rely on achieving competitive advantage through IT (offensive IT) or both?

Step 2:

In addition to the answers above, you can learn more about your company's IT priority by plotting it on the grid below.

The IT strategic
impact grid

The IT strategic impact

Step 3:

Once an organization is aware what mode they are in, they can focus on what is important for their specific circumstances and implement customized performance and controls as necessary.

IT megatrends help identify the IT risks that matter

We've identified six megatrends that can help you manage an ITRM approach.

  1. Emerging consumerization: This is when new information technology emerges first in the consumer market and then spreads into business organizations. Mobile computing and social media are examples of consumerization that are increasingly being adopted by a wide audience and across many demographic groups.
  2. The rise of cloud computing: This is a means of using the internet to access data, using a third party's software running on yet another party's hardware, potentially in yet another party's data center.
  3. Resiliency: Many businesses are increasingly dependent on their IT systems for 24-hour availability for their sales and customer support, or other core company operations. Business continuality has a more prominent position in the IT Risk Universe than ever before. This is evidenced by the results of the Ernst & Young Global Information Security Survey 2010 which showed that the availability of IT resources is identified as the number one risk.
  4. Enhanced persistence of cybercrime: Companies have increasingly been victims of cybercrime. These activities are typically not focused on short term gains; the goal is to stay uncovered and to collect as much vital company information as possible (IP, rates, proposals, new product design, strategic plans, etc).
  5. IT Megatrends help identify
    the IT risks that matter

    IT Megatrends help identify the IT risks that matter

  6. Increased exposure to internal threats: The recent exposure of Wikileaks-related incidents have shown that internal security is at least as important as external threats. In practice, many firms are struggling with the management of providing the right access to information to the right people in their organizations. Experience tells us that:
    (1) companies are not able to articulate what their most valuable and important data elements are,
    (2) where these data elements are and
    (3) where these data elements are sent to.
  7. The accelerating change agenda: Change remains a "constant' in IT. To increase the success rate in IT projects and programs, organizations may take additional measures such as implementing Quality Assurance programs on major strategic programs.

<< Previous | Next >>

Content

Back to top