More from our chat about rogue IT
Benefits and pitfalls of rogue IT
Rethinking the definition of 'rogue'
Much to CIOs' dismay, the security threats associated with rogue technology haven't stopped employees from choosing quick, over-the-counter products to complete work tasks. These rogue technology decisions include choosing mobile phones based on personal preference, selecting cloud solutions that work on both company-issued and private devices, and using applications not formally approved or monitored by the organization's IT department.
So-called rogue IT -- also referred to as shadow IT -- has become more prevalent due to the consumerization of technology. That led SearchCIO Executive Editor Linda Tucci to ask our March rogue-themed tweet jam participants about the implications of rogue IT:
@LTucci Horror stories are when products are brought in that require integration to other systems, data silos, security holes. Seen them— Stuart Appley (@sappley) March 26, 2014
We built off Tucci's inquiry by asking participants to identify the difference between healthy and unhealthy rogue IT. SearchCompliance Site Editor Ben Cole suggested the following in making the distinction:
A2 Try to reduce red tape when deploying IT resources, if speed the service procurement, users may not bypass the IT department #CIOChat— SearchCompliance.com (@ITCompliance) March 26, 2014
A2 Also leverage existing risk evaluation and reporting processes to evaluate risk and potential areas of noncompliance #CIOChat— SearchCompliance.com (@ITCompliance) March 26, 2014
#CIOChat A2 by assessing if any customer or internal data is exposed ouside a controlled enviroment.— William Rabie (@WilliamRabie) March 26, 2014
A2. healthy (rogue) IT is about meeting the user needs...only issue is making sure its done securely #CIOchat— Brian Katz (@bmkatz) March 26, 2014
A2 #CIOChat Healthy IT is when communication happens and the groups work together with forcing a centralized process if it's not needed— Stuart Appley (@sappley) March 26, 2014
Our tweet jam expert, Bart Murphy, CIO and chief technology officer at the CareWorks Family of Companies, was hesitant to pronounce any aspect of rogue IT healthy:
No matter your stance, an emerging focus on rogue and shadow IT is likely to influence the decision making processes at your organization from both an IT and a business standpoint. We queried:
As with most relationships, effective communication in IT and across the organization is essential in taming rogue technology. IT departments must be prepared to initiate discussions about the technologies users really use:
#CIOChat If your business is having strategic innovation conversations with everyone but corporate IT, you don't have their trust.— Bart Murphy (@bartmurphy) March 26, 2014
#ciochat A3 Embracing just means ensuring there is communication and being a consultant. Having the conversation.— Stuart Appley (@sappley) March 26, 2014
A3 #CIOChat by clearly communicating an overall business strategy and encouraging user community engagement to reach business goals.— William Rabie (@WilliamRabie) March 26, 2014
With an emphasis on improved communication around IT -- and, perhaps more importantly, examining what people actually use -- technology leaders are more likely to discover previously unidentified rogue deployments:
More frequent communication about IT usage can lead to a mutual understanding of technology decision making and limit the damage done by rogue IT. As participant Brian Katz says, when CIOs focus on user needs, rogue IT is just IT.
A3. When the CIO's focus on meeting the user needs and following the biz requirements rogue IT is just IT , and it enables #ciochat— Brian Katz (@bmkatz) March 26, 2014
So, is rogue IT a healthy or an unhealthy development? It depends what you make of it:
Follow @SearchCIO on Twitter to learn about our next #CIOChat on Wednesday, April 30, at 3 p.m. EDT (topic TBA).
Take this CIO quiz on managing renegade IT to see you're properly handling shadow IT