Published/updated: December 2006
As organisations become ever more dependent on information technology, managing the risks associated with IT systems is seen as increasingly important. But is it possible to consider IT related risk in isolation from more general business risk management?
Organisations are waking up to the broader risk landscape
Over 60% of the 715 senior IT managers participating in a recent study conducted across Europe and the Middle East say risk is considered broadly across their organisation as part of the business planning process. A significant minority are still behind the curve, however, with a third only considering risk in specific areas, and 4% not planning explicitly around risk at all.
Unravelling IT risk from business risk is becoming almost impossible
When asked about the degree to which specific risks are considered, loss of business critical information and operational downtime as a result of key systems failure come top of the list, closely followed by illicit use of confidential information. IT systems resilience, recoverability and security are therefore an integral part of the business risk equation. Furthermore, the prominence of risks in areas such as legal and regulatory compliance highlight the need for traceability and other information management imperatives that can only be dealt with through effective IT.
Managing risk is an important pre-requisite for innovation
While it is normal to consider risk management from a defensive point of view, 80% of organisations say risk related concerns have held them back from taking full advantage of modern technologies and working practices, e.g. in areas such as home working, supply chain automation and advanced communications. This underlines the role of effective risk management as an enabler of business advantage and highlights the opportunity-cost associated with limited or uncertain resilience.
A more coordinated executive led approach is being adopted by forward thinkers
Many organisations have appointed a Chief Risk Officer (CRO) to oversee risk management activity, particularly in financial services where 48% have a CRO in place compared to the overall average of 36%. Organisations are also striving for more coordination at a practical level, e.g. between physical and IT security, and across security and information management.
But there is still a way to go before genuinely cohesive risk management is achieved
While many organisations say their spending on IT risk related investments is escalating, the funding of risk management activity is still fragmented and inconsistent. There is also an under representation of input from both business analysts and IT professionals into the definition of risk requirements at a business level. Given the dependencies on IT systems we have seen, organisations that are serious about taking a genuinely cohesive approach to managing business risk must make IT a much more integral part of the overall process than it currently is.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
email@example.com or call +44 (0)1425 626501 / 620008
By Jack Vile & Dale Vile
As both company and personally owned mobile devices are increasingly used in business, understanding and dealing with the associated risks has become a significant concern for many. In this report we explore some of the trends in mobile technology adoption. ...more
By Dale Vile & Tony Lock
If it has been a while since you thought about your DR measures, or a review has been prompted by a risk assessment, compliance audit, actual disaster or some other scare, it’s worth taking some time to understand what can be achieved in light of important changes that have taken place over the past few years. ...more
By Tony Lock
With the advent of digitisation, all public sector environments generate and capture a significant amount of electronic data. Against this background, this paper explores how to manage costs and risks while meeting these changing needs through ‘active archiving’. ...more
By Dale Vile
In some organisations, the tension between IT and business teams has come to a head around the topic of devices & the so called ‘Bring Your Own Device’ phenomenon.It’s time for IT and business managers to get together & start a proper dialogue about to deal with evolving requirements. ...more
By Dale Vile
By Dale Vile
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts ...more
By Tony Lock
While the importance of business information is almost universally recognised, few organisations have enjoyed either the time or the resources required to ensure that the data they store across an expanding range of computer systems is adequately protected. ...more