Softtek Softtek
  • Our experience
  • Overview
  • Insights
  • Blog
  • Newsroom
  • Careers
  • Contact us
softtek Language Selector
ENGLISH
EUROPE / EN
ESPAÑOL
EUROPA / ES
PORTUGUÊS
中文(简体)
Search button
AI
APPROACH
INDUSTRIES
SERVICES & SOLUTIONS
TRANSCEND
Softtek GenAI
FRIDA AI for Software Engineering
Service Transformation
Portfolio Transformation
Digital Acceleration
Our Work
Agribusiness
Airlines
Automotive
Banking & Financial Services
Consumer Packaged Goods
Energy & Utilities
Fitness & Wellness
Gaming
Government & Public Sector
Higher Education
Healthcare
Industrial
Insurance
Media & Entertainment
Oil & Gas
Pharma & Beauty
Professional Sports
Restaurant & Hospitality
Retail
Technology
Telecommunications
Transportation & Logistics
Digital Solutions
Digital Optimization
Digital Sales
Data Masking Solution
IT Cost Optimization
Fan Engagement Ecosystem
Softtek Digital Enablers
DIEGO
blauLabs
Business OnDemand
Click2Sync Omnichannel
Automotive Digital Assistant
Guest Engagement
Socializer
Collaborative Commuting
Workplace Management
Application Services
Software Development
Quality Engineering
Application Management
Application Services
Cloud & DevOps
Cloud Services
IT Infrastructure
Digital Security
DevOps
Data & Automation
Data and AI
Intelligent Automation
Services Transformation
Core Modernization
Next-Gen IT Operations
Platform Services
AWS
SAP
Microsoft
Salesforce
ServiceNow
Atlassian
BlueYonder
Sustainability by Softtek
Softtek
Language selector
search button
AI
Softtek GenAI
FRIDA AI for Software Engineering
APPROACH
Service Transformation
Portfolio Transformation
Digital Acceleration
Our Work
INDUSTRIES
Agribusiness
Airlines
Automotive
Banking & Financial Services
Consumer Packaged Goods
Energy & Utilities
Fitness & Wellness
Gaming
Government & Public Sector
Higher Education
Healthcare
Industrial
Insurance
Media & Entertainment
Oil & Gas
Pharma & Beauty
Professional Sports
Restaurant & Hospitality
Retail
Technology
Telecommunications
Transportation & Logistics
SERVICES & SOLUTIONS
Digital Solutions
Digital Optimization
Digital Sales
Data Masking Solution
IT Cost Optimization
Fan Engagement Ecosystem
Softtek Digital Enablers
DIEGO
blauLabs
Business OnDemand
Click2Sync Omnichannel
Automotive Digital Assistant
Guest Engagement
Socializer
Collaborative Commuting
Workplace Management
Application Services
Software Development
Quality Engineering
Application Management
Application Services
Cloud & DevOps
Cloud Services
IT Infrastructure
Digital Security
DevOps
Data & Automation
Data and AI
Intelligent Automation
Services Transformation
Core Modernization
Next-Gen IT Operations
Platform Services
AWS
SAP
Microsoft
Salesforce
ServiceNow
Atlassian
BlueYonder
TRANSCEND
Sustainability by Softtek
Our experience
Overview
Insights
Blog
Newsroom
Careers
Contact us
ENGLISH
EUROPE / EN
ESPAÑOL
EUROPA / ES
PORTUGUÊS
中文(简体)
Softtek Blog

Security in the Age of Disruption: Who’s In Control?

Author:
Author Fernando Labastida
Published on:
Jul 25, 2014
Reading time:
Jul 2014
|
SHARE
Share on LinkedIn
Share on X
Share on Facebook
SHARE
Share on LinkedIn
Share on X
Share on Facebook

The speed at which technology is changing – and disrupting – the corporate IT environment can sometimes be a little mind-boggling.

The ‘Age of Disruption,’ as described by Clayton Christensen in his book  The Innovator’s Dilemma , the phenomenon by which well-funded established technologies are rendered obsolete by “cheaper, simpler, smaller, and, frequently, more convenient to use” upstarts, is creating a sometimes unwelcome revolution in the IT department.


This recent  Information Age article illustrates the disruptive effects for today’s hapless CIO:

“There are a number of disruptive forces attacking IT management today, not just the movement to the cloud, which is primarily an infrastructure play. Other forces include big data and analytics, the Internet of Things, mobility, IT service management and cyber security. All of these have created a perfect storm of disruption for current CIOs and IT managers to contend with.”

Risk Diversification, a primer on Global Sourcing This is especially true for security.  The 2014 Global Top of Mind Survey of 500 C-suite and senior executives globally found that 47% of the respondents cited data security as being very or critically important to their business, and 29% said it will be one of their biggest challenges over the next 12 months.

In my  last post I cited two harrowing examples of messy security breaches that became mainstream news – a stark reminder of the consequences of disruptive innovation running roughshod over IT security processes.

It seems as though IT managers are on the defensive – and increasingly losing control.

How To Regain Control of Your IT Security Processes

The solution to today’s industrial strength security problems often seems to be to institute czar-like control over the IT environment. However, extreme measures like these often have the unfortunate side-effective of stifling innovation in the data center.

What can you do to regain control while also keeping on the cutting edge?

blank

Organizations need to:

  1. Identify IT systems that support the core of their business processes
  2. Identify top risks based on security threats
  3. Prioritize the top risks based on impact
  4. Identify security controls that mitigate risks
  5. Evaluate if security controls are mitigating risk

The Pareto Principle, or the 80/20 rule, can help you discern which security risks to focus on, a type of “lean analysis” on your IT organization that keeps a balance between security and innovation.

As you probably already know, you should look at these risks in at least the following three areas so you can make a security plan for each of them:

1.    Identity and Access Management

Focus first on the people side of things. How do you manage identities and HPA utilized in your organizational systems and applications? In role changes how do you assure that digital permissions will be updated? How do you speed up the provisioning process to increase productivity and reduce risks?

2.    Vulnerabilities and Application Infrastructure

How do you assure that the source code your team develops and/or the code you purchase from third parties is risk-free? How do you include security controls throughout your Software Development Lifecycle? How do you ensure that security vulnerabilities found in your code and/or systems are fixed?

3.    Supply Chain and Vendor Security

How do you ensure your third party integrations are secure? What type of personnel and security controls can you verify with your vendors? What type of service level agreements are in place with third party software currently in use?

These are the three core security processes in any organization you at least should focus on.

So Who Is Really In Control of Security?

Despite the scary scenarios illustrated by recent examples of catastrophic security breaches, organizations can still maintain control over their IT security without having to resort to drastic top-down measures.

By focusing on the most important risks using the 80/20 rule, and applying them to the above three core security processes of focus, you can regain control of your IT environment – and your peace of mind.

Related posts

Jul 11, 2015
The Evolution of Customer Experience: Insights from Forrester Analyst
Procurement as a service components, in multilayered circle diagram
Mar 4, 2015
What is Global Procurement as a Service?
Jul 20, 2014
6 Proven Practices for Organizations to Avoid a Security Breach

Let’s stay in touch!

Get Insights from our experts delivered right to your inbox!

Follow us:
Softtek LinkedIn
Softtek Twitter
Softtek Facebook
Softtek Instagram
Softtek Instagram
Follow us:
Softtek LinkedIn
Softtek Twitter
Softtek Facebook
Softtek Instagram
Softtek Instagram

© Valores Corporativos Softtek S.A. de C.V. 2025.
privacy notice
legal disclaimer
code of ethics
our policies
webmaster@softtek.com