Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 21 January 2011

According to ISACA 40% of Global Executives Block Move to the Cloud

Posted on 10:42 by Unknown

IT Governance Institute Survey Also Reveals Outsourcing, Social Media and GEIT Trends

Rolling Meadows, IL, USA (January 2011)— Forty percent of C-level executives have stated that they are not planning to adopt cloud computing, according to the fourth Global Status Report on the Governance of Enterprise IT (GEIT, conducted by the nonprofit, IT Governance Institute (ITGI), ISACA’s research affiliate.  Respondents who do not plan to use cloud computing at all in the near future list security (47%) and privacy concerns (50%), followed closely by legacy infrastructure investments (35%), as barriers to adoption.  The 2011 study polled 834 executives from 21 countries, divided almost evenly between business executives (CEOs, CFOs and COOs) and IT executives (CIOs and heads of IT).  Of the executives who use or plan to use cloud computing for IT services 60 percent was non-mission critical and 40 percent would also trust the cloud for mission-critical IT services. Organizations are also actively employing outsourcing, with 93 percent fully or partially outsourcing some of their IT activities.

“Emerging technologies such as cloud computing and outsourcing can be managed effectively by integrating good governance over IT. Organizations need to adopt new service delivery models to stay competitive, and this is fueling a strong commitment to enterprise IT governance across the C-suite,” said Ken Vander Wal international vice president.  “Assessing the value of current investments, building consensus among stakeholders and mitigating risk with third-party providers all require a comprehensive governance framework for organizations to be sure they are doing the right things and doing things right.”

The ITGI study and three past editions are available as free downloads from www.isaca.org/ITGI-Global-Survey-Results.  The study analyzes the degree to which the concept of GEIT is accepted by the C-suite and determines GEIT maturity levels, recognized frameworks, required/preferred certifications, and impact of current special-interest, GEIT-related topics.

Of the C-level executives surveyed, 95 percent consider governance of enterprise IT important. This reveals an almost universally shared perception of IT as a critical contributor to overall business strategy, no matter where the organization is on the path of GEIT maturity.

Key findings include:

· Value creation of IT investments is one of the most important dimensions of IT’s contribution to the business (mentioned by more than nine out of 10 respondents). But challenges exist: increasing IT costs and an insufficient number of IT staff are the most common IT-related issues experienced by respondents in the past 12 months.

· There is a correlation between the position of the head of IT in the enterprise’s hierarchy and the pro-active nature of the IT department. Overall, 70 percent of respondents noted that the head of IT is a member of the senior management team, but this figure increases to 80 percent for those enterprises where IT has a proactive role.

· Governance of enterprise IT (GEIT) is a priority with most enterprises—only five percent indicated that they do not consider it important. Two-thirds of respondent enterprises have some GEIT activities in place, the most common being the use of IT policies and standards, followed by the employment of defined and managed IT processes. The main driver for activities related to GEIT is ensuring that IT functionality aligns with business needs, and the most commonly experienced outcomes are improvements in management of IT-related risk and communication and relationships between business and IT.

· Outsourcing is highly prevalent across the board, but especially in larger enterprises and those where IT is considered important or very important to the delivery of the business strategy or vision.

· Sixty percent of respondents use or are planning to use cloud computing for non-mission-critical IT services, and more than 40 percent use or are planning to use it for mission-critical IT services. For companies that do not have plans to use cloud computing the main reasons are data privacy and security concerns.

· The global economic downturn has had an effect on IT activities, the primary response initiatives being: (1) a reduction in contractor staff, (2) a reduction in permanent staff and (3) a consolidation of the infrastructure.

· The use of Facebook or Twitter at work is not highly prized; only one out of five respondents believes that the benefits of employees using social networking outweigh the risks.

More information about these topics will be presented at ISACA’s EuroCACS 2011, to be held on 20-23 March in Manchester.  ISACA’s EuroCACS is the hot-topic event for IT audit/assurance, security, control and governance professionals in the region, covering issues such as: governance concerns for ERP, how to make IT audit more relevant, wireless network security, cloud computing, and security concerns for service-oriented architecture.  Additional information is available at www.isaca.org/EuroCACS.

“The overwhelming consensus about the importance of IT governance is encouraging. As 2011 IT initiatives get underway against an economic backdrop that continues to be volatile, the ability to balance and manage value creation, risk management and optimization of resources will be critical,” said Roger Southgate, Past President ISACA London and Independent Governance and Risk Consultant.

This year’s study shows that top tactics used to battle the economic downturn were a reduction in contractor and permanent staff numbers and infrastructure consolidation. According to the Global Status Report on GEIT, GEIT processes can ensure that this focus is balanced with a view on investments that can generate cost savings and ultimately become self-funding.

Successfully implementing GEIT depends on effective change management, communication, scoping and identification of achievable objectives. The outcomes encompass shorter-term benefits such as reduced cost and longer-term benefits such as enhanced management of IT-related risk, improved relationships between business and IT, and increased business competitiveness. The top outcomes cited in this year’s study are improved management of IT-related risk (mentioned by 42 percent of respondents) and better communication and relationships between business and IT (37percent).

For additional information, visit www.isaca.org/ITGI-Global-Survey-Results.

The IT Governance Institute® (ITGI®) (www.itgi.org) is a nonprofit, independent research entity that provides guidance for the global business community on issues related to the enterprise governance of IT assets. ITGI was established by the nonprofit membership association ISACA (www.isaca.org) in 1998.

Source: Eskenzi PR

This press release is presented without editing for your information only.

Full Disclosure Statement: The ICT REVIEW received no compensation for any component of this article.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ▼  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ▼  January (21)
      • Latest Opera vulnerability proves that all Web bro...
      • Imperva Strengthens Cloud Footprint With PartnerSp...
      • BitDefender survey reveals internet pornography re...
      • Imperva Announces PartnerSphere Technology Alliance
      • Lieberman Software President Calls ‘Lush’ Hack a P...
      • The Italian Job - the first ‘perfect storm’ cyber ...
      • Major European and US government websites Hacked a...
      • A constant patch and review process is essential t...
      • Zeus latest evolution in malware trends - targets...
      • According to ISACA 40% of Global Executives Block ...
      • Trustmarque Solutions Hosts Exclusive Client Council
      • SOURCEFIRE OUTPERFORMS ALL COMPETITORS IN TUNED-DE...
      • BitDefender offers free removal tool for malware t...
      • Avecto Achieves Record-Breaking Growth and Widespr...
      • Trustmarque Solutions Helps The North West Ambulan...
      • Mobile Users Three Times More Vulnerable to Phishi...
      • Healthcare Focus Just What the Doctor Ordered for ...
      • Warning as Vodafone Oz's data security dirty laund...
      • ISACA Selects Imperva’s Web Application Firewall
      • varonis ENableS departments and agencies TO comply...
      • Hackito Ergo Sum announcing HES2011
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile