The whole notion of "shadow IT" and mobile computing suggest that the IT department will have less control in the future. This is a new reality, and CISOs have to learn how to support rather than fight these changes. As IT control dissipates, CISOs must gain greater oversight over the assets they DO control - data, applications, user identities, and IT infrastructure like servers and networks. Ironically, the avalanche of mobile computing security challenges may have ultimately served as a catalyst that guides cybersecurity policies, processes, and controls in the right direction.
Source: Network World
Sign up for Computerworld eNewsletters.