Want to Really Add Value? Move IT Closer to the Business! Part 1: External Relationships

Move IT Closer to Business External RelationshipsBy David Philippou

Years ago I was at a company leadership development day. When we got to the touchy-feely part at the end where everyone is asked to thank someone else in the room, I did so and then…nothing. While everyone else got thanked for the smallest of things, I sat there thinking, “Hey! What about me? My team and I have worked tirelessly to ensure the IT systems work, day in and day out, and tickets no longer disappear into a black hole. Don’t I deserve some thanks, too?”

Evidently not.

Read more: Want to Really Add Value? Move IT Closer to the Business! Part 1: External Relationships

Getting Cyber Security in Place On a Tight Budget

Getting cybersecurity in place on a tight budgetBy Zeeshan Kazmi
Cyber Security Practice Head

News stories are full of evidence of what CIOPS has been witnessing in the field: cyber security attacks are on the rise. In fact, the global cost of damages from cybercrime, which stood at over $600 billion in 2017 , is projected to skyrocket to $6 trillion by 2021 .

The frequency of cyberattacks, as well as the number of methods used by these criminals, is increasing exponentially. Cyber criminals are investing heavily into tools and automation to find any type of unaddressed vulnerability—especially for small- and medium-sized businesses.

The danger is real and can cause a great deal of anxiety, especially if your ability to combat cyberthreats is hampered by a limited budget. What are your options when your cyber security budget is tight, but you know an attack can be catastrophic?

Read more: Getting Cyber Security in Place On a Tight Budget

Addressing SecOps When Getting a Cyber Security Plan in Place

Getting a Cyber Security Plan in PlaceBy Zeeshan Kazmi
Cyber Security Practice Head

I recently wrote about the reasons why your cyber security plan must address SecOps , which is a collaborative effort that ensures that your IT security and IT Operations teams are all on the same page. Today I’d like to take a look at how to make this happen. Here are the initial steps we recommend:

Assess your risks

It is absolutely critical to understand what your assets are and where they reside. You can then prioritize these assets based on the likely negative impact on your business if these assets were to be compromised.

Start by taking a complete inventory of your data assets, wherever they may reside. For example, what data resides in shadow IT? How about email archives, mobile devices, apps, etc.? It doesn’t hurt to reach out to key business stakeholders to ask them where they think their data is! Remember, if you don’t know where a data asset is located (or even if it exists), that lack of knowledge is a security risk in and of itself.

Read more: Addressing SecOps When Getting a Cyber Security Plan in Place

CIO Professional Services LLC is a top-rated IT consulting firm, based in the San Francisco Bay Area, specializing in strategic IT consulting and business / IT alignment. Companies come to us seeking assistance with their information technology strategy as well as to source interim CIO / CTO employees or fractional CIO / CTO's. Our IT experts can assist with integrating IT into your business processes - better - up to and including 'project rescue' in areas such as ITSM / ITIL, IT service strategy, and IT outsourcing. Business / IT strategy projects we have worked on include upgrading ERP systems, cybersecurity and IT consulting, IT assessment and organizational change. Cloud computing and business IT remain critical in today's business systems, and beyond that to the migration to the cloud of business IT. Our IT consultants can assist with all aspects of business / information technology alignment. Contact us today for a free phone consultation - we service clients not only in San Francisco or San Jose, but throughout the United States.

Copyright 2022. CIO Professional Services, LLC. All Rights Reserved. View our Privacy Policy.