Published/updated: December 2006
As organisations become ever more dependent on information technology, managing the risks associated with IT systems is seen as increasingly important. But is it possible to consider IT related risk in isolation from more general business risk management?
Organisations are waking up to the broader risk landscape
Over 60% of the 715 senior IT managers participating in a recent study conducted across Europe and the Middle East say risk is considered broadly across their organisation as part of the business planning process. A significant minority are still behind the curve, however, with a third only considering risk in specific areas, and 4% not planning explicitly around risk at all.
Unravelling IT risk from business risk is becoming almost impossible
When asked about the degree to which specific risks are considered, loss of business critical information and operational downtime as a result of key systems failure come top of the list, closely followed by illicit use of confidential information. IT systems resilience, recoverability and security are therefore an integral part of the business risk equation. Furthermore, the prominence of risks in areas such as legal and regulatory compliance highlight the need for traceability and other information management imperatives that can only be dealt with through effective IT.
Managing risk is an important pre-requisite for innovation
While it is normal to consider risk management from a defensive point of view, 80% of organisations say risk related concerns have held them back from taking full advantage of modern technologies and working practices, e.g. in areas such as home working, supply chain automation and advanced communications. This underlines the role of effective risk management as an enabler of business advantage and highlights the opportunity-cost associated with limited or uncertain resilience.
A more coordinated executive led approach is being adopted by forward thinkers
Many organisations have appointed a Chief Risk Officer (CRO) to oversee risk management activity, particularly in financial services where 48% have a CRO in place compared to the overall average of 36%. Organisations are also striving for more coordination at a practical level, e.g. between physical and IT security, and across security and information management.
But there is still a way to go before genuinely cohesive risk management is achieved
While many organisations say their spending on IT risk related investments is escalating, the funding of risk management activity is still fragmented and inconsistent. There is also an under representation of input from both business analysts and IT professionals into the definition of risk requirements at a business level. Given the dependencies on IT systems we have seen, organisations that are serious about taking a genuinely cohesive approach to managing business risk must make IT a much more integral part of the overall process than it currently is.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
firstname.lastname@example.org or call +44 (0)1425 626501 / 620008
By Dale Vile
Organisations are increasingly turning to multi-tiered shared storage environments to deal with growing data volumes, changing business requirements, and IT delivery models. Managing Quality of Service (QoS) at scale, however, requires a highly automated approach ...more
By Tony Lock
VMware Virtual Volumes (VVOLs) are due to be released in 2015 and have been designed to help streamline deployment, make ongoing administration of VMs more straightforward, and to allow each VM to be managed individually. ...more
By Dale Vile
By Dale Vile
Creating a more customer centric business environment has historically been hard to achieve. In this paper, we will examine how technology and market trends, together with changes in the regulatory landscape, are elevating the status of customer centricity from ‘aspirational ideal’ to ‘business critical imperative’. ...more
By Dale Vile, Tony Lock, Jack Vile
With the phenomenal rise in the adoption of smartphones, tablets and other desirable devices, many pundits predict that the direction of corporate IT will increasingly be defined by end users. But does this make sense? ...more
By Dale Vile & Tony Lock
If it has been a while since you thought about your DR measures, or a review has been prompted by a risk assessment, compliance audit, actual disaster or some other scare, it’s worth taking some time to understand what can be achieved in light of important changes that have taken place over the past few years. ...more
By Tony Lock
With the advent of digitisation, all public sector environments generate and capture a significant amount of electronic data. Against this background, this paper explores how to manage costs and risks while meeting these changing needs through ‘active archiving’. ...more
Manage your internet performance
Take control of your network traffic
11th June, 11am BST
More details and sign up here.