everythingpossible - Fotolia
Shadow, rogue, renegade -- all modifiers used to describe unsanctioned, employee-procured IT. But shadow IT, in the form of devices, applications and services, is now so ingrained in the enterprise that perhaps no modifiers are needed at all. Companies have become so accustomed to shadow IT that their presence has more or less become a part of business as usual.
That doesn't mean, however, that they are any less risky. Unchecked shadow IT can create major security risks and business concerns, which is why it's important for organizations not only to be aware of shadow IT use, but also to understand why it's happening and how to move forward.
One reason for extensive shadow IT is that nearly every IT service an organization needs is available from someone else -- and that someone else might just be better-equipped than you. So, how can companies protect themselves and stay in control while still enabling access to applications and services that help employees be more productive?
Join our #CIOChat on Wednesday, March 25, at 3 p.m. EST to discuss shadow IT in the enterprise. Discussion may include effective shadow IT integration, service innovation and delivery; what is considered healthy and unhealthy shadow IT; and the future of shadow IT in the enterprise.
Joining SearchCIO editors and followers as our guest expert will be Derek Lonsdale (@dereklonsdale), IT transformation leader and managing consultant at PA Consulting Group.
Date: Wednesday, March 25, 2015
Time: 3 p.m. EST
Hashtag: Use and follow #CIOChat
Tweet chat newbies (and #CIOChat vets, too!), please review this list of tips before participating in the chat:
To follow the conversation, type "#CIOChat" into Twitter's search bar. From this page, select "All" to view tweets in real time.
Your first #CIOChat tweet should be introductory, including your name, title and organization.
@SearchCIO will ask a series of questions related to enterprise shadow IT starting at 3 p.m. EST (Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (Answer 1), A2 and so on, then remember to include "#CIOChat." Include this hashtag in every tweet during the chat.
Please note that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.
Throughout the discussion, retweet (RT) and favorite tweets you concur with and reply to those you disagree with.
Please direct questions, RSVPs or other concerns to our editors. Talk to you on Twitter!