CIO inverted is OIC or "Oh I See" !
A CIO Blog with a twist; majority of my peer CIOs talk about the challenges they face with vendors, internal customers, Business folks and when things get through the airwaves, the typical response is "Oh I See". Some of you may disagree with my meanderings and that's okay. It's largely experiential and sometimes a lot of questions
Updated every Monday. Views are personal
Monday, April 20, 2015
Create the best policy but exclude me from it …
Monday, November 11, 2013
We have been hacked !
Monday, December 19, 2011
Unraveling BYOD/T
From what I recollect, it all started with the iPhone and then extended to tablets, laptops, and what have you. Not that earlier personal devices did not connect to the corporate network; they did on the wire and then over the air, if you will remember devices with a technology called “activesync”. The early phones offered limited connectivity and as the network improved and so did the technology, browser based apps started appearing. The resident app followed soon enough.
I don’t remember all the devices that I used over the last decade and longer being provided by the company; which would imply that we did have a lenient policy even before the BYOT buzz appeared and started haunting every technology professional. The early PDA which eventually integrated the phone had limited use and was not widely prevalent due to unwieldy size and interface. Except for the early large form factor devices, it was not a statement to make.
Evolution of the device and the network created new possibilities and the scattered raindrops became a flood; apps for everything and power in the hands of the executive with no constraint on time. Business impatience became the hallmark of new technology deployment to swamp all available and unavailable time. The CIO built layers of infrastructure, applications and security to manage the demand. It did not matter who or how many used it; if it was possible, then it had to be available.
The democratization of information worried only the CIO until stories of compromise started spreading. Compromise not always by the external world, but bits of information scattered across slowly fading away with exits, ignorant employees losing devices or passing hands within the family. Enterprise liability driven by law and governance suddenly finds itself at loggerheads with BYOT.
Depending on the country of incorporation and most probably operation, the laws require stringent compliance. BYOT contravenes some with liability creation for not just the CIO but the CEO and even the global HQ. A cyber law expert thrust the fear of the law of the land to listening CIOs who cringed with every clause and interpretation of impact to the executives and the enterprise.
So what are the choices available ? Will the CEO not want the next new device on the block to be connected to the corporate infrastructure ? Does s/he not evaluate the ramifications to the enterprise ? Is ignorance a good excuse ? I believe that the CIO needs to raise the bar with heightened awareness starting with the Board and then cascading downwards. It takes only once incidence to create collective pain. CIOs can address the contingent liability with reasonable due diligence, control and documentation to dampen down the impact.
It is not going away, but what it means to you is up to you. BYOT = Bring Your Own Trouble, or BYOD = Bring Your Own Demise, or BYOD = Bring Your Own Destiny, or BYOT = Bring Your Own Tension, or BYOT = Bring Your Own Threat, or BYOD/T = ? You decide !
Tuesday, August 24, 2010
Mobile computing and security paranoia
A few countries have taken a tough stance banning the service or seeking the key to monitor all traffic. The European Union decided to totally shift away to a popular consumer phone for their state offices with 20K+ users. The phone’s largest users as well as the associated services are worried about whether they will be required to shift away within a short span to another option. They are scared about imagining life without the familiar buzz every few minutes (of another email) and business applications.
Today we cannot think of work life without access to email, corporate applications, sales data and many more on the mobile. These devices have made 24X7 slaves out of their owners. Expectations of instant response to a message (irrespective of the hour) are becoming the norm. This increased productivity is now factored into the workload. Apart from enabling the sales force with planning, reporting and sales data, mobile devices have provided even the typical desk bound executive an ability to stay connected at home. Thus enterprises have seen improvements that were not possible earlier. Suddenly, all this appears to be under threat.
Should the CIO be worried about this looming uncertainty? While a total shutdown is not imminent, restriction in services is a reality. This may extend in the future and cripple the basic functioning of these devices.
To me, the answer is a resounding yes. Country laws and regulations are paramount for every entity operating within the geographical boundaries. There is no circumventing these; so if applications depend on a type of service, they may have to be rewritten or discarded. Alternatives should be explored and options made available, should a switch be required to reduce the adverse impact. This should be discussed with the management and the level of impact (if any), be communicated clearly and explicitly.
With an ever increasing number of mobile devices deployed by the corporate or just connected to the enterprise (employee owned), it’s important to periodically assess and review mobility solutions and options. Work with the service providers to create an insurance policy. No one wants to die, but insurance always makes sense.
Monday, May 03, 2010
Web 2.0 (Social Media) and the CIO
Confusing? Well, that’s the moot point, so let me elaborate.
There are enough consultants, research papers, anecdotal references and general hype—that every business (irrespective of industry, geographical presence, market share and multi-channel presence) should leverage social media by connecting to consumers. This connection is deemed so important that businesses are creating presence across almost every social networking site—trying to gather the consumer around this space. A few have been able to get there with some degree of success, while others are struggling to find the meaning of being there. As organizations understand this social media revolution bit by bit, the general feeling is that it might translate to real money in the bank.
The same enterprises are paranoid, when it comes to opening access to social networking sites for their employees. One extreme is to mandate the CIO to block access to social networking sites (as the management believes that it results in precious time being frittered away). On the other hand, the balancers are defining policy for staff on the dos and don’ts of how to engage on social networking sites. These policies are expected to act as deterrents towards moderating use. However, IT organizations tend to bypass these policies for their own kin, thereby rendering the effectiveness suspect. I have not come across any organization having an open access policy with no restrictions on content, or the way it is used.
The two stances detailed above are divergent from each other. In the first case, the organization seeks to leverage social networking towards creating a business benefit, while on the other hand it restricts its own staff from participating. Every staff member is also a consumer of merchandise and services; companies would like to leverage the insights that can be created by understanding behavior. So if a similar stance is adopted by every business unit, the end result will be akin to companies creating retail stores, but preventing their employees from shopping.
Is the CXO’s disconnect due to the inability to understand the impact or control the behavior of the consumers? Or is it a generation gap between the digital natives (the new workforce) and digital immigrants (the policy makers)?
Under the guise of corporate security, the restrictions constrain natural desire to reach out in the digital world. CIOs should recognize these trends within the enterprise based on demographic undercurrents, and leverage the internal consumer’s voice before reaching out to external consumers using the digital media. These same employees will help you find ways to tap this latent source if aligned to the initiative. Else they are likely to be disruptive, since they want the freedom—because they can!
Tuesday, April 13, 2010
(IT) Security and the CIO
Questions challenging the efficacy of currently deployed solutions were very similar across almost all vendors. Many data points from a multitude of surveys were bandied around in an attempt to make CIOs succumb to the FUD (fear, uncertainty, and doubt) factor.
A typical session begins with “Top 5 technology priorities”, and since the presentation was being made by security vendors, IT security figured prominently in these lists. To the hapless CIO, statistics reveal a scary world full of crackers and nefarious elements (who want to take away customer data, send spam, phish users, attack end computing devices, and sniff network traffic). It did not matter if the audience agrees with these or not. Irrespective of whether the displayed data is from the same geography or industry, the ground is set for discourses on why your enterprise is not secure if it hasn’t deployed the specific vendors’ solutions.
Almost all cases are built upon the premise that data is only stored electronically, and leakage can only happen in electronic forms. The exercise of data classification is touted as the starting point—except that beyond a point, this classification becomes irrelevant, as the imposed controls make conducting business a painful task. Mobile workers appear as the villains who will lose a laptop or connect to unsecured wireless networks compromising valuable data.
Yet another cry is a ban on social media. This does not acknowledge the fact that business also uses these channels for connecting with customers. The mantra is “you cannot trust these gullible ignorant employees, they are the weakest link”.
Yes, people are indeed the weakest link in security compromises; but they can also be the strongest. The biggest tenet of any business operation is trust. If the enterprise cannot trust its employees to be prudent in their usage of various communication modes or protect the data that matters, then I don’t believe that a technology solution is the answer.
Information security can be effective with help of education, continuous reinforcement by the management, a “zero tolerance” policy towards adverse incidents, periodic reviews, and finally the technology stack which is dependent on the business operations. Exception management is fraught with danger, and should be aggressively discouraged. Many mature organizations have found that making an example of truant employees enhances levels of security, and builds trust with customers in the long run. Attempts to hush such cases, or not taking strict action which may already be defined in the policy sends a message of tolerance, which can significantly compromise the enterprise.
Vendors need to listen as they engage (see Irrelevance of vendor presentations) the CIO in discussions on how they can help their customers in sustaining and improving their information security postures. This has to be based on an assessment, and not based on inane survey data that may be far removed from reality for the audience. Else, they face the risk of alienation from their prime customer, the CIO.
Tuesday, February 24, 2009
Top 5 technologies CIOs do not want to hear about
- Virtualization : everyone has done it to the extent possible and nothing new to talk about by any vendor; be it storage or servers, or even desktop. This is a no-brainer, so stop !
- Unified Communication : we have been tying ourselves into knots telling everyone that beyond the IP phones, IM, Chat, Video-conferencing, tele-presence, web-conferencing, audio-conferencing, white-boarding, and combining all of this into one device (if such a device exists and can be deployed across WIFI, CDMA, GSM, WIMAX, 3G at one go), is there a big business benefit ?
- Security : yeah ! we all have UTM, at least in theory, and yes, we patch our servers, desktops, laptops, mobile phones and take backups everyday. So what's new ?
- Green Computing : it's fashionable to talk green; a speaker asks "Do you have green clothing ?". In the past every generation of computers doubled the computing power; in the future every generation will reduce power consumed by 50%. Green is not only about saving power in the data center and your end-computing devices.
- SaaS and Cloud : everyone has an opinion and with the exception of sales force automation, no new offerings worth talking about. Waiting for the cloud to form and the rain, the IT organization cannot be like the Indian farmer. IT has to continue delivering every day as business does not wait.
Every vendor who sponsors an event for CIOs believes that they can continue to offer the same old stale product presentations and numbers that do not make sense to most of us. I believe that if this were to continue, the participation in such events will continue to decline to a level where the opportunity will dry up for the vendors.
Are there other technologies you want to add to the list ?
Monday, February 26, 2007
Security and the CIO
From the word "go" it was kind of obvious that no one is willing to accept that within their enterprise IT security is tactical. Many instances were cited to drive home the point that it is indeed strategic. When I asked around the audience, it was evident that the desire is to get security to a strategic level but the reality is that in most organizations the level of focus is purely tactical.
The proponent of the strategic intent even went on to give a story about how his business leader consulted him on security; little realizing that the example made it quite evident that there was no alignment between the business leader who was primarily ticking off his checklist on clearances sought after the system was ready to deploy.
A few CIOs were prudent in stating that there is a balance between the strategic intent and the tactical implementation. Without the technology and process underlying the operation, the people will rarely see the value of what it really means.
I happened to talk about IT security in another seminar a couple of weeks back which desired to highlight the practical aspects of IT security and how does one manage it. The discussion was not about whether a tactical view should be taken or strategic with discussion and debate on the pros and cons of deployment, but how does one succeed in deploying controls and technology with the help of people to be effective.
The question still remains in my mind whether in the first place we should elevate the question "IT security is strategic or tactical". To me IT security is a must without which IT will probably collapse with significant business impact. Even the best laid plans do fail (the story of TJX is still not cold) and not for want of trying but someone trying harder to break in.
I welcome your thoughts.