CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home News

Cybersecurity is just one aspect to enterprise technology risk

admin by admin
April 5, 2022
in News
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Companies across the globe are focused on cybersecurity threats yet another major threat is looming in the shadows.

While companies and boards of directors focus on cybersecurity threats from hackers, breaches, ransomware and internal compromise, there is another significant risk that is not widely discussed. That risk is technology operational risk.

Looking at risk holistically

Before we talk about technology operational risk, let’s take a step back. Cybersecurity often gets the headlines based on a cloak and dagger scenario where there is the villain and the victim. Cybersecurity is also a regular boardroom discussion topic. But should it be the only one?

If you look at risk, it generally comes in three types: Legal, financial and reputational. Each of these encompass different aspects and a single threat could impact multiple forms of risk to the enterprise. There are also sub-components to each of these.

Cybersecurity, for example, often spans all three risk types. However, there are other risks that can be just as significant and span all three risk types. Those are technology operational risks.

Technology operational risk

The technology estate covers hardware, software, services, processes, architecture, expertise, culture, third parties and more. Over time, the technology estate has become incredibly complicated, intertwined and spans beyond our own control to third party organizations.

The degree of complication and interconnectedness of the technology estate has created a collective ball of yarn where the inherent nature of the complications create risk on to themselves. Beyond that, the complications create systemic risk to the overall company should a component fail. Hence the systemic risk from even small components. These risk, in many ways, have the potential to outweigh cybersecurity risk.

When a server fails, a process goes haywire, a connection is down, the company and customers are directly impacted. 

Having worked across many different organizations, it is common that most organizations do not fully understand nor appreciate technology operational risk. Or if they do, the mitigation activities are often unevenly applied. Worse yet, as we go through time, new innovative technology is bringing greater complication to the equation, not less.

De-risking the problem

One way to combat the complication is to de-risk the environment. There are many ways the enterprise can work to de-risk their technology operations. Those efforts fit into one of two categories: Preventative and reactive.

Some of the common ways technology organizations de-risk their environment includes business continuity (BC) planning, disaster recovery (DR), redundancy or failover processes.

BC/DR is the most common way for enterprises to create a backstop in case of failure. BC/DR is a reactive action that is put into play when a failure occurs. While most enterprises have BC/DR plans, they are often not comprehensive nor actively tested. To be fair, exercising BC/DR is time consuming, costly and can be incredibly disruptive. This often leads to an exercise of balance between intent, impact and actual action.

Historically, redundancy in infrastructure was one of the leading preventative ways to de-risk technology operations. The downside is that it can get costly and as the environment gets more complicated, the complexity from redundancy grows exponentially. Today, there are many questions on where redundancy is still feasible.

One of the other ways enterprises may have de-risked technology options in the past was with manual processing. Unfortunately, we have long since passed the point where this is still possible. Think processing a credit card, making a phone call or getting in touch with a customer.

Where to go from here

Leadership teams need to take a systemic approach to considering risk. Technology operational risks need consideration right up there with cybersecurity risk. Using a technology risk rubric to map the risks across both cybersecurity and technology operations provides a more holistic view of technology risk for the board of directors.

Putting funding toward addressing cybersecurity risks while neglecting technology operational risk creates an imbalance in effectively stemming risk from a holistic perspective. It is like fortifying the back door while leaving the front door untouched.

Enterprises that use a rubric to measure, monitor and discuss overall technological risk provide a more comprehensive and transparent view for boards of directors to act on. In addition, it ensures a more stable and protected operation for the benefits of all stakeholders.

Further reading:

3 ways enterprises can reduce their cybersecurity risk profile

Can cloud finally help enterprises with DR/BC?

Outages happen. How prepared are you for the next one?

CIOs ill equipped to manage the growing security threats

Like this:

Like Loading…



Source link

Previous Post

Avoid VM latency issues with VMware NUMA Observer

Next Post

Innateagility ~ Future of CIO

Related Posts

News

Q&A with CIO Tanya Townsend: “We Need to Learn From Each Other and Lean on Each Other.”

by admin
May 22, 2022
News

Isnthistoryinvaluablething? ~ Future of CIO

by admin
May 22, 2022
News

Amazon Web Services significantly escalates their enterprise game

by admin
May 22, 2022
News

“A Tale of Two Americas”: Dr. Patrick Woodard on Rural Health Challenges

by admin
May 21, 2022
News

Innerrchitectingglobalcompany ~ Future of CIO

by admin
May 21, 2022
Next Post

Innateagility ~ Future of CIO

Leave Comment

Recommended

Reimagining the cities of the future in Finland

May 23, 2022

The longlist of the UK’s influential tech leaders

May 23, 2022

Did the Conti ransomware crew orchestrate its own demise?

May 23, 2022

Understanding attack paths is a question of training

May 23, 2022

How large companies can be ‘sharks’ that devour startups in their way – I-CIO

May 23, 2022

Cisco Issues Patch for New IOS XR Zero-Day Vulnerability Exploited in the Wild

May 23, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.