1
Ensuring Business Continuity Scope of IT Knowledge Managing Security and Privacy The most critical IT functions to consider for 2013 include mobile commerce, big data classification and management, and social media. How confident are IT executives and professionals in their ability to address these priorities in 2013? Protiviti reveals and analyzes these and other top concerns of nearly 200 CIOs, CTOs, CSOs, IT vice presidents and IT directors across a variety of industries. Risk management compliance requirements and cybersecurity are also key priorities Social media security Mobile commerce security Mobile commerce policy Mobile commerce integration Social media integration Managing and classifying big data is at the forefront of security and privacy management priorities IT departments are also focused on incident response and event monitoring capabilities as well as managing vendors Managing and classifying enterprise data 3.2 3.2 3.4 3.4 3.3 3.3 A variety of disasters, both natural (Hurricane Sandy) and organized (security breaches), have recently raised fears about business continuity in the wake of unforeseen crises IT functions are placing a priority on developing and maintaining business resumption plans Developing and maintaining business resumption plans 3.1 3.2 3.2 3.4 3.4 3.4 Does your IT function maintain and update clear mobile commerce and social media policies with detailed security requirements? How are these policies monitored and audited? How robust are your information security measures? Are these measures applied differently depending on the sensitivity or importance of the data? What is your IT function and your management team’s understanding of what comprises “sensitive” organizational data and information? “Excellent,” “good” or “limited”? Are third-party vendors and contractors managed via a process that ensures they are in compliance with your organization’s data security and privacy policies, and in compliance with current relevant laws and regulations? Does your company have a formal overarching business continuity management strategy and continuity plan in place (and do these contain IT considerations among the key priorities)? Has your company undertaken a pandemic risk management assessment? IMPROVEMENT RANK OVERALL IT KNOWLEDGE AREAS 1 2 3 4 5 1 2 3 4 5 LEVEL OF COMPETENCY NEED TO IMPROVE LEVEL OF COMPETENCY NEED TO IMPROVE 2.9 2.8 2.9 2.8 2.8 IT SECURITY AND PRIVACY AREAS 1 2 3 4 5 1 2 3 4 5 1 COMPETENCY (5PT SCALE) COMPETENCY (5PT SCALE) (TIE) IMPROVEMENT RANK BUSINESS CONTINUITY AREAS 1 2 4 2 3 4 5 COMPETENCY (5PT SCALE) (TIE) (TIE) (TIE) Survey: Top IT Priorities for 2013 Key Questions for Your Business Key Questions for Your Business Key Questions for Your Business IMPROVEMENT RANK LEVEL OF COMPETENCY NEED TO IMPROVE Source: Protiviti 2013 IT Priorities Survey. Respondents were asked to assess, on a scale of one to five, their competency in different areas of IT, with one being the lowest level of competency and five being the highest. For each area, they were then asked to indicate whether they believe their level of knowledge is adequate or requires improvement, taking into account the circumstances of their organization and industry. For more information or to obtain a free copy of the survey report, visit protiviti.com/ITsurvey. If these priorities ring true for your company – and chances are, they’re all too familiar – contact Protiviti to learn how we can help. Social media and mobile commerce are of primary importance to IT execs and professionals IT functions are scrambling to deliver information, products and services via more platforms and devices in a secure, compliant and cost-effective manner Incident response Monitoring security events Managing third-party vendors Implementing security/privacy solutions and strategies Managing user identities and access Developing and maintaining IT disaster and recovery plans Developing and maintaining crisis management plans Developing and maintaining risk assessment/business impact analysis Ensuring executive management support and sponsorship Ensuring business alignment

IT Priorities Infographic 2013

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: IT Priorities Infographic 2013

Ensuring Business Continuity

Scope of IT Knowledge

Managing Security and Privacy

The most critical IT functions to consider for 2013 include mobile commerce, big data classi�cation andmanagement, and social media. How con�dent are IT executives and professionals in their ability to address these priorities in 2013? Protiviti reveals and analyzes these and other top concerns of nearly 200 CIOs, CTOs, CSOs, IT vice presidents and IT directors across a variety of industries.

Risk management compliance requirements and cybersecurity are also key priorities

Social media security

Mobile commerce security

Mobile commerce policy

Mobile commerce integration

Social media integration

Managing and classifying big data is at the forefront of security and privacymanagement priorities

IT departments are also focused on incident response and event monitoringcapabilities as well as managing vendors

Managing and classifying enterprise data 3.2

3.2

3.4

3.4

3.3

3.3

A variety of disasters, both natural (Hurricane Sandy) and organized (security breaches), haverecently raised fears about business continuity in the wake of unforeseen crisesIT functions are placing a priority on developing and maintaining business resumption plans

Developing and maintaining business resumption plans 3.1

3.2

3.2

3.4

3.4

3.4

Does your IT function maintain and update clear mobile commerce and social media policies with detailed security requirements? How are these policies monitored and audited?How robust are your information security measures? Are these measures applied differently depending on the sensitivity or importance of the data?

What is your IT function and your management team’s understanding of what comprises “sensitive”organizational data and information? “Excellent,” “good” or “limited”?

Are third-party vendors and contractors managed via a process that ensures they are in compliance with your organization’s data security and privacy policies, and in compliance with current relevant laws and regulations?

Does your company have a formal overarching business continuity management strategy and continuity plan in place (and do these contain IT considerations among the key priorities)?

Has your company undertaken a pandemic risk management assessment?

IMPROVEMENT RANK OVERALL IT KNOWLEDGE AREAS

1

2

3

4

5

123

4

5

LEVE

L O

F CO

MPE

TEN

CY

NEED TO IMPROVE

LEVE

L O

F CO

MPE

TEN

CY

NEED TO IMPROVE

2.9

2.8

2.9

2.8

2.8

IT SECURITY AND PRIVACY AREAS

1

2

3

4

5

1

23

45

1

COMPETENCY (5PT SCALE)

COMPETENCY (5PT SCALE)

(TIE)

IMPROVEMENT RANK BUSINESS CONTINUITY AREAS

1

2

4

23

4

5

COMPETENCY (5PT SCALE)

(TIE)

(TIE)

(TIE)

Survey: Top IT Priorities for 2013

Key Questions for Your Business

Key Questions for Your Business

Key Questions for Your Business

IMPROVEMENT RANK

LEVE

L O

F CO

MPE

TEN

CY

NEED TO IMPROVE

Source: Protiviti 2013 IT Priorities Survey. Respondents were asked to assess, on a scale of one to five, their competency in different areas of IT, with one being the lowest level of competency

and five being the highest. For each area, they were then asked to indicate whether they believe their level of knowledge is adequate or requires improvement, taking into account the

circumstances of their organization and industry. For more information or to obtain a free copy of the survey report, visit protiviti.com/ITsurvey.

If these priorities ring true for your company – and chances are, they’re all too familiar – contact Protiviti to learn how we can help.

Social media and mobile commerce are of primary importance toIT execs and professionals

IT functions are scrambling to deliver information, products and servicesvia more platforms and devices in a secure, compliant and cost-effective manner

Incident response

Monitoring security events

Managing third-party vendors

Implementing security/privacysolutions and strategies

Managing user identities and access

Developing and maintaining IT disaster and recovery plans

Developing and maintaining crisis management plans

Developing and maintaining riskassessment/business impact analysisEnsuring executive management support and sponsorship

Ensuring business alignment