Download presentation
Presentation is loading. Please wait.
Published byFranklin Robbins Modified over 9 years ago
1
IT RISK IT Managers Roundtable event – 06/24/15 Presentation by Simon Cousins
2
Some Current Day Risks How do companies remain current with technological advances, attracting the next generations of employees, while mitigating risk associated with emerging and modern tech ? How do companies manage BYOD ? Where should company data be ? Is the Cloud an option ?
3
Use Of A Risk Matrix A very useful tool for heat map risk analysis https://en.wikipedia.org/wiki/Risk_Matrix A useful resource can be found at The Risk Management Guide http://www.ruleworks.co.uk/riskguide/ris k-profile.htm
4
Discussion Point - BYOD iOS-Apple Android-Google Window Phone-Microsoft Are devices in your company… Company owned ? Employee owned ? Mixed ? Unknown ? Considerations What is your risk tolerance ? Where are your biggest risks ?
5
Discussion Point – BYOD – IT Considerations Managing and securing data. While the devices themselves are one concern, the data flowing back and forth between the devices, the corporate network, and the cloud is another major issue. Even if IT has a handle on which devices are accessing the network and their risk postures, controlling what information the device accesses and what happens to that information once it leaves the enterprise network can be very tricky. Consider the following common scenario: An employee opens an email attachment from his/her corporate email box and chooses to save it to a personal cloud storage service, such as iCloud or Dropbox. When employees transfer enterprise data into public cloud services, IT usually loses its ability to manage the data from that point forward. Another potential issue is employees forwarding or sending sensitive information from mobile devices to parties that should not have access to that information. This may happen via email or through a cloud storage and collaboration service. In either case, IT needs some way to manage what employees can and cannot do with content accessed on mobile devices. Managing risks from apps. Apps themselves present a risk. It has been well documented that the prevalence of Android malware has spiked right along with the popularity of the platform. This is less of a problem on iOS devices because of the closed nature of the Apple ecosystem, but it's not a nonexistent issue. When employees download consumer applications to their personal devices, enterprises have no way of knowing the risk profile of that application. An app could be full of malware — which could then corrupt the entire device OS, putting the information on all the other apps at risk — and it could also be asking for information that a company would prefer it didn't have access to, such as contacts. Understanding the risk profile of various applications is an important step to safeguarding the overall health of the device. Source : IDC Market Spotlight – The Evolution of Enterprise Mobility Management: Protection Enables Productivity
6
Discussion Point – Cloud Storage & Services Why The Cloud ? PAAS (Platform As A Service) SAAS (Software As A Service) Consumer grade (Unmanaged) Where is your data and what is your strategy ? Consider industry regulations Protection of intellectual property Transmission and sharing of data
7
Discussion Point – Employees How do companies remain current with technological advances, attracting the next generations of employees, while mitigating risk associated with emerging and modern tech ? Recruiting and retaining employees who maintain existing systems and employees who implement new and future technologies overlaps.
8
Discussion Point – The Next Thing ? The Internet Of Things is happening all around us. Smoke detectors Smart Thermostats Refrigerators that order food Medication reminders More information at http://postscapes.com/internet-of- things-examples http://postscapes.com/internet-of- things-examples The sharing of data, location, environments and other PII is evolving at a rapid pace. The associated risks of managing the surge in the world of IOT needs to be managed.
9
IT RISK Resources NIST PMI.org Has some good articles general risk management from a project mgmt. standpoint Harvard Business Review E&Y http://www.ey.com/GL/en/Services/Advisory/Turning-risk-into-results-Managing-risk-for-better-performance COBIT COSO ISACA ISC2
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.