- Forrester Councils
- Councils Overview
- log in
Posted by Chenxi Wang on November 8, 2010
I am very excited to introduce a new report — hot off the press — “Securing An Empowered Enterprise." If you haven’t read “Empowered," I highly recommend that you go here for a summary of this fantastic book by Josh Bernoff and Ted Schadler.
CISOs across the country are telling us that their jobs are becoming increasingly more difficult (as their power to veto is becoming increasingly diminished) when faced with the business’ needs to support consumer technologies, such as social, video, mobile, and cloud. This is the groundswell movement depicted in Bernoff and Schadler’s “Empowered." Bernoff and Schadler described that businesses are empowering their employees with these new technologies to optimize operations or better serve customers. In this era of empowerment, corporate data are going into the cloud. Mobile devices are edging out traditional PCs; social technologies are enabling ad hoc collaborations anytime, from anywhere. As a result, the enterprise risk landscape has changed and will change further.
My report, “Securing An Empowered Enterprise," co-authored with Ted Schadler, takes a look at the consumerization phenomenon from the eyes of an IT security professional. We interviewed many security and business folks; two things stood out from all the interviews:
We believe that an empowered organization can actually be safer and more secure than a traditional enterprise. There are a number of reasons why this might be the case:
This is indeed an opportunity to not only redesign your security architecture to mitigate risks, but also usher in fundamental changes that will make the environment a safer and more secure place for enterprise computing.
The report goes into detail about a new way to design your security architecture for an empowered enterprise. I won’t go into details here. But at a conceptual level, you need to follow these directions:
The report is especially meaningful, timing wise, as I am about to travel to DC for a World Economic Forum workshop where industry thought leaders are gathered to make recommendations to the WEF organizers for the 2011 forum agenda. I will be participating in the cloud computing workshop. As cloud is one of the “empowered” technologies, the report could not have come at a more opportune time.
I would love to hear what you think of the report and in particular, your experience with securing an enterprise that has empowered its employees with the consumer technologies.
Lead BT Transformation
Develop customer-obsessed strategies to drive growth »
Forrester's CX Index
Predict how actions to improve CX will affect revenue performance.
Measure the customer experiences that matter most »