Industry Research : ISACA Recommends Ways to Manage Three Top Trends in 2012
Global nonprofit IT association ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerization of information technology (BYOD) and the growing dominance of mobile devices.
2018 Top Ranking Performers Present:
Big Data--Coaxing Order Out of Chaos
"Big Data" describes not only the extremely large volumes of data being collected by enterprises in an increasingly connected world, but also their diverse sources, including social networks, sensor networks, customer chat sessions and more.
"Big Data is going to evolve out of its ‘shiny new object’ status in 2012. IT leaders will need to figure out how to coax order out of the chaos from all those zeroes and ones, as well as optimize ROI and manage data privacy," said Ken Vander Wal, CISA, CPA, international president of ISACA.
The Invasion of Consumer Devices
The consumerization of IT, marked by the invasion of employee-owned smartphones and tablet devices into the workplace, is predicted to be another major trend in 2012. Employees who use their own devices for work functions gain flexibility and can be more productive, but those devices are typically more difficult for IT to secure and manage.
"BYOD—or Bring Your Own Device—is a fast-moving train. IT departments have to jump on it or risk getting left at the station," said Robert Stroud, CGEIT, CRISC, past international vice president of ISACA and vice president, Innovation and Strategy, CA Technologies.
"Organizations that embrace the BYOD trend need to consider a two-pronged approach to security by focusing on both the device and the data it can access. In 2012, we should see an increased focus on the mobile device and its access to information. IT will need to answer questions such as, ‘Who is accessing corporate information, when and from what device? Is the device trustworthy?’" said Stroud.
IT professionals’ acceptance of this trend is mixed. More ISACA members in Europe, North America and Oceania say their enterprises allow employees to use corporate IT assets and time for personal purposes to promote work-life balance, while those in Asia, Latin America and Africa say their enterprises generally restrict this due to security concerns, according to the recent 2011 ISACA Shopping on the Job Survey: Online Holiday Shopping and BYOD Security.
Growth in Mobile Equals Growth in Threats
One of most prominent elements in the 2012 security landscape will be the growth of mobile devices, including everything from smartphones and tablet computers to laptops and Universal Serial Bus (USB) memory sticks.
"2012 will see a sharp increase in attacks targeted at mobile devices, either to exploit them or use them as an access point to corporate networks," said John Pironti, CISM, CRISC, CISSP,security advisor, ISACA, and president, IP Architects.
CONTACT CENTER & CUSTOMER ENGAGEMENT
BERLIN - ORLANDO - MACAO
FIND OUT MORE!
ISACA advises that information security managers need to create an easily understood and executable policy that protects against the data leakage and malware – and then communicate it. In ISACA’s recent BYOD survey of 1,224 US consumers, 16 percent of respondents say their organization does not have a policy prohibiting or limiting personal activities on work devices, and another 20 percent do not know if one exists.
Setting and communicating policies are central to effective governance of enterprise IT (GEIT), which is a priority with most enterprises, according to the fourth Global Status Report on the Governance of Enterprise IT (GEIT)—2011by ISACA’s research affiliate, the IT Governance Institute (ITGI). Only 5 percent of business executives and heads of information technology surveyed indicated that they do not consider it important, and two-thirds of enterprises have some GEIT activities in place. However, the survey uncovered opportunity for IT leaders to be more proactive, especially in striking a balance between innovation projects and "run the business" tasks.
2018 Top Ranking Performers Present:
Today's Tip of the Day - Know Yourself Before You Look At Your Competitors
More Editorial From ISACA
Published: Monday, January 16, 2012
Genesys® powers 25 billion of the world’s best customer experiences each year. Our success comes from connecting employee and customer conversations on any channel, every day. Over 10,000 companies in...
Aspect Software contact center and workforce optimization solutions engage consumers, empower agents, improve quality, and lower the cost of delivering remarkable experiences. Our cloud, private cloud...
Avaya is a recognized innovator, leading business communications for the digital age. Avaya delivers smart global solutions and technologies for customer and team engagement, unified communications an...
eGain customer engagement solutions power digital transformation for leading brands. Our top-rated cloud applications for social, mobile, web, and contact centers help clients deliver connected custom...