Published/updated: December 2006
As organisations become ever more dependent on information technology, managing the risks associated with IT systems is seen as increasingly important. But is it possible to consider IT related risk in isolation from more general business risk management?
Organisations are waking up to the broader risk landscape
Over 60% of the 715 senior IT managers participating in a recent study conducted across Europe and the Middle East say risk is considered broadly across their organisation as part of the business planning process. A significant minority are still behind the curve, however, with a third only considering risk in specific areas, and 4% not planning explicitly around risk at all.
Unravelling IT risk from business risk is becoming almost impossible
When asked about the degree to which specific risks are considered, loss of business critical information and operational downtime as a result of key systems failure come top of the list, closely followed by illicit use of confidential information. IT systems resilience, recoverability and security are therefore an integral part of the business risk equation. Furthermore, the prominence of risks in areas such as legal and regulatory compliance highlight the need for traceability and other information management imperatives that can only be dealt with through effective IT.
Managing risk is an important pre-requisite for innovation
While it is normal to consider risk management from a defensive point of view, 80% of organisations say risk related concerns have held them back from taking full advantage of modern technologies and working practices, e.g. in areas such as home working, supply chain automation and advanced communications. This underlines the role of effective risk management as an enabler of business advantage and highlights the opportunity-cost associated with limited or uncertain resilience.
A more coordinated executive led approach is being adopted by forward thinkers
Many organisations have appointed a Chief Risk Officer (CRO) to oversee risk management activity, particularly in financial services where 48% have a CRO in place compared to the overall average of 36%. Organisations are also striving for more coordination at a practical level, e.g. between physical and IT security, and across security and information management.
But there is still a way to go before genuinely cohesive risk management is achieved
While many organisations say their spending on IT risk related investments is escalating, the funding of risk management activity is still fragmented and inconsistent. There is also an under representation of input from both business analysts and IT professionals into the definition of risk requirements at a business level. Given the dependencies on IT systems we have seen, organisations that are serious about taking a genuinely cohesive approach to managing business risk must make IT a much more integral part of the overall process than it currently is.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
email@example.com or call +44 (0)1425 626501 / 620008
By Dale Vile and Tony Lock
It’s easy to be caught out by a cyber attack or internal mistake that leads to your customers’ data or important intellectual property ending up on the black market. Making sure your business is adequately protected and is able to respond effectively to a security incident ...more
By Dale Vile Tony Lock & Jack Vile
Application programming interfaces (APIs) have been around for decades. In the early days of IT they were primarily used to give programmers convenient access to libraries of prebuilt functions. As systems became more distributed, APIs found their place ...more
By Dale Vile & Jack Vile
The world we live in is increasingly digital. As the smart use of technology leads to markets speeding up and becoming ever more unpredictable, a strong set of established offerings and execution capabilities only gets you so far. Feedback from 1,442 IT ...more
By Dale Vile
Advances in digital technology create significant opportunities to transform both customer engagement and business operations. As the trends in these areas continue, feedback from 1,442 respondents in a recent survey highlight 10 key traits of the highest achievers. ...more
By Dale Vile
IT infrastructures are often coping pretty well with current business requirements, but many IT professionals are aware that new and changing needs will lead to future capability gaps. They also know that more of the same is not the answer ...more
By Dale Vile
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever. Relying on manual processes and scripts, or ad hoc piecemeal automation, is not sustainable ...more
By Dale Vile
A perennial problem with storage is how to deal with escalating requirements in a smooth, manageable and non-disruptive manner. By removing many of the traditional limits on system expansion, Ceph based configurations ...more
By Dale Vile
Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define the future of end user computing. Most organisations today, however, see a role for both company and employee owned equipment to meet the wide and varied range of needs ...more