Tips to manage top IT trends

ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology (BYOD) and the growing dominance of mobile devices.

Big Data: Coaxing order out of chaos

“Big Data” describes not only the extremely large volumes of data being collected by enterprises in an increasingly connected world, but also their diverse sources, including social networks, sensor networks, customer chat sessions and more.

“Big Data is going to evolve out of its “shiny new object’ status in 2012. IT leaders will need to figure out how to coax order out of the chaos from all those zeroes and ones, as well as optimize ROI and manage data privacy,” said Ken Vander Wal, CISA, CPA, international president of ISACA.

According to ISACA, enterprises should aim for early success by using analytics across many projects for greater insight, performing ad hoc analysis to support key areas of risk, and defining measures of success along the way.

The invasion of consumer devices

The consumerisation of IT, marked by the invasion of employee-owned smartphones and tablet devices into the workplace, is predicted to be another major trend in 2012. Employees who use their own devices for work functions gain flexibility and can be more productive, but those devices are typically more difficult for IT to secure and manage.

“BYOD is a fast-moving train. IT departments have to jump on it or risk getting left at the station,” said Robert Stroud, vice president, Innovation and Strategy, CA Technologies.

“Organizations that embrace the BYOD trend need to consider a two-pronged approach to security by focusing on both the device and the data it can access. In 2012, we should see an increased focus on the mobile device and its access to information. IT will need to answer questions such as, “Who is accessing corporate information, when and from what device? Is the device trustworthy?'” said Stroud.

IT professionals’ acceptance of this trend is mixed. More ISACA members in Europe, North America and Oceania say their enterprises allow employees to use corporate IT assets and time for personal purposes to promote work-life balance, while those in Asia, Latin America and Africa say their enterprises generally restrict this due to security concerns, according to the recent 2011 ISACA Shopping on the Job Survey: Online Holiday Shopping and BYOD Security.

Growth in mobile equals growth in threats

One of most prominent elements in the 2012 security landscape will be the growth of mobile devices, including everything from smartphones and tablet computers to laptops and Universal Serial Bus (USB) memory sticks.

“2012 will see a sharp increase in attacks targeted at mobile devices, either to exploit them or use them as an access point to corporate networks,” said John Pironti, security advisor, ISACA.

ISACA advises that information security managers need to create an easily understood and executable policy that protects against the data leakage and malware – and then communicate it. In ISACA’s recent BYOD survey of 1,224 US consumers, 16 percent of respondents say their organization does not have a policy prohibiting or limiting personal activities on work devices, and another 20 percent do not know if one exists.