Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, SSCP, ISO 27001 LA
We invite you to send your information systems audit, control and security questions to:
HelpSource Q&AISACA Journal3701 Algonquin Road, Suite 1010Rolling Meadows, IL 60008 USAEmail: firstname.lastname@example.org
I recently read a wonderful book, 8 Things We Hate About IT: How to Move Beyond the Frustrations to Form a New Partnership with IT. It made for an interesting read, listing out disconnects between the business and the IT function. The author gave a good deal of practical examples. The charm of the book was that the author, Susan Cramm, gave clear solutions to the illustrated problems.
I was wondering whether you can list out, in a similar manner, the ‘things we hate’ about IT security or information security. Please list them from your point of view (no compulsion to list eight). You may also wish to add what IT security must do in terms of making amends.
Very interesting question. I made it a point to buy that book (published by Harvard Business School Press) after reading your question and became an instant fan of it. It is extremely well written with a lot of practical examples and not just bookish theory, frightening the reader with jargon.
I do not have the luxury of writing a book on the subject and have the constraint of limiting my thoughts to this column, though your question is a good idea for a theme that could be developed into a book.
Let me try to extrapolate the same concept from an IT security point of view. I will tell you the other side of the story as well.
All said, what is required to bridge the gap, because in both scenarios the sufferers are the key stakeholders in the business—be it customers or shareholders? My illustrative list—as always non-exhaustive—is as follows:
Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, ISO 27001 LA, SSCPis the global IT security lead for a management consulting, technology services and outsourcing company’s global delivery network. Previously, he served as head of IT security group compliance and monitoring at a Big 4 professional services firm. With more than 16 years of experience in IT development, IS audit and information security, Subramaniam’s previous work includes heading the information security and risk functions at a top UK-based business process owner (BPO). His previous employers include Ernst & Young, UK; Thomas Cook (India); and Hindustan Petroleum Corp., India. As an international conference speaker, he has chaired and spoken at a number of conferences around the world.
Enjoying this article? To read the most current ISACA® Journal articles, become a member or subscribe to the Journal.
The ISACA Journal is published by ISACA. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscription to the ISACA Journal.
Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors’ employers, or the editors of this Journal. ISACA Journal does not attest to the originality of authors’ content.
© 2010 ISACA. All rights reserved.
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, MA 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited.