everythingpossible - Fotolia

#CIOChat: Taking shadow IT into the light

Shadow IT doesn't have to be in the shadows. As the debate over how to handle shadow IT continues, it's often unclear how best to respond. Join #CIOChat on March 25 at 3 p.m. EST to discuss enterprise shadow IT management.

Shadow, rogue, renegade -- all modifiers used to describe unsanctioned, employee-procured IT. But shadow IT, in the form of devices, applications and services, is now so ingrained in the enterprise that perhaps no modifiers are needed at all. Companies have become so accustomed to shadow IT that their presence has more or less become a part of business as usual.

That doesn't mean, however, that they are any less risky. Unchecked shadow IT can create major security risks and business concerns, which is why it's important for organizations not only to be aware of shadow IT use, but also to understand why it's happening and how to move forward.

One reason for extensive shadow IT is that nearly every IT service an organization needs is available from someone else -- and that someone else might just be better-equipped than you. So, how can companies protect themselves and stay in control while still enabling access to applications and services that help employees be more productive?

Join our #CIOChat on Wednesday, March 25, at 3 p.m. EST to discuss shadow IT in the enterprise. Discussion may include effective shadow IT integration, service innovation and delivery; what is considered healthy and unhealthy shadow IT; and the future of shadow IT in the enterprise.

Joining SearchCIO editors and followers as our guest expert will be Derek Lonsdale (@dereklonsdale), IT transformation leader and managing consultant at PA Consulting Group.


Date: Wednesday, March 25, 2015

Time: 3 p.m. EST

Host: @SearchCIO

Hashtag: Use and follow #CIOChat

Tweet chat newbies (and #CIOChat vets, too!), please review this list of tips before participating in the chat:

To follow the conversation, type "#CIOChat" into Twitter's search bar. From this page, select "All" to view tweets in real time.

Your first #CIOChat tweet should be introductory, including your name, title and organization.

@SearchCIO will ask a series of questions related to enterprise shadow IT starting at 3 p.m. EST (Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (Answer 1), A2 and so on, then remember to include "#CIOChat." Include this hashtag in every tweet during the chat.

Please note that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.

Throughout the discussion, retweet (RT) and favorite tweets you concur with and reply to those you disagree with.

Please direct questions, RSVPs or other concerns to our editors. Talk to you on Twitter!

Next Steps

For more on shadow IT management, read about tips for a better IT service model, learn how rogue cloud services are affecting IT and get advice on keeping tabs on shadow IT and handling risk.

Dig Deeper on IT governance

Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

How is your company handling shadow IT?
We try to have a quick turnaround when cataloging and approving cloud services that meet our needs. If a new service is required, it is passed to the IT department where in turn it can get a review and be deployed so users don't get frustrated.