Problems of building consolidated corporation strategies for corporate information security management in the EMEA region
Abstract
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of corporate IT services and security in different international companies in different industries and countries, are considered. specialists, experts and analysts. The subject of research in the article is the issue of optimal interaction of IT and security services in ensuring a high level of corporate information security in the EMEA region. The goal is to analyze the issues related to the construction and implementation of consolidated strategies for IT and security management in order to eliminate inconsistencies and increase the efficiency of the relevant services to ensure effective information security of organizations on the example of the EMEA region. Objectives: processing and analysis of the results of an online survey on the interaction of IT and security services of companies and organizations in various industries in different countries and regions of the world, including the EMEA region; research of problems and advantages of building a consolidated strategy of IT management and information security in the EMEA region; development of recommendations for solving existing problems in the development and construction of corporate strategies for effective IT management and information security. The general scientific method of systems analysis is used to determine the features of interaction between IT services and security of companies and organizations of different industries in different regions of the world, as well as to study the problems and benefits of a unified consolidated IT management strategy and information security. The following results were obtained: based on quantitative and qualitative assessment, as well as analysis of the results of the survey of IT and security specialists and experts in the EMEA region, the participation of companies in the development and implementation of information security strategies was determined; the main tasks of IT and security services in the organization of their joint work and coordination of actions among themselves are defined; the main obstacles in the organization of joint work of IT services and security services of companies are investigated, among which significant are tensions and conflicts between employees of services, global and regional shortage of qualified personnel, technical difficulties. Conclusions: it is established that the consolidated strategy of IT management and information security based on advances in security and technology can help solve the main problems of effective interaction of relevant company services; developed a number of recommendations to address existing problems of building corporate strategies for effective IT management and information security, designed to help eliminate inconsistencies and improve the efficiency of relevant services to ensure effective information security of organizations in the EMEA in various organizations and companies, regardless of their field of activity.
Downloads
References
/References
Шойдин Ю. ИТ и CБ. Как выстроить партнерство : веб-сайт. URL: https://www.it-world.ru/cionews/security/115731.html (дата обращения: 13.11.2021).
Cindy Zhiling Tu, Yufei Yuan, Norm Archer, Catherine E. Connelly. Strategic value alignment for information security management: a critical success factor analysis. Information and Computer Security. 2018. Vol. 26, № 2. P. 150-170.
Deruma S. Problems and solutions of information security management in Latvia. SHS Web of Conferences. 2014. Vol. 10, № 7. P. 1-7.
Forrester Consulting – Implement modern, effective business strategies : web site. URL: https://www.forrester.com/consulting/ (date of the application: 10.11.2021).
Forrester Consulting – Implement modern, effective business strategies : web site. URL: https://www.forrester.com/consulting/ (date of the application: 10.11.2021).
Shojdin J. (2015) IT i CB. Kak vystroit' partnerstvo [IT and security service. How to build a partnership]. Available at: https://www.it-world.ru/cionews/security/115731.html (accessed 13.11.2021).
Cindy Zhiling Tu, Yufei Yuan, Norm Archer, Catherine E. Connelly (2018) Strategic value alignment for information security management: a critical success factor analysis. Information and Computer Security, vol. 26, no. 2. pp. 150-170.
Deruma S. (2014) Problems and solutions of information security management in Latvia. SHS Web of Conferences, vol. 10, no. 7. pp. 1-7.
Forrester Consulting – Implement modern, effective business strategies. Available at: https://www.forrester.com/consulting/ (accessed 10.11.2021).
Citations
Directions for improving the efficiency of digital information security in the island countries of Southeast Asia
Lubenets Serhii, Shelestova Anna & Chernyshova Larysa (2025) The Journal of V N Karazin Kharkiv National University Series International Relations Economics Country Studies Tourism
Crossref
Trends, challenges and solutions of digital information security in Central and Eastern Europe
Lubenets Serhii, Harchenko Igor & Shediakova Tetiana (2024) Journal of Economics and International Relations
Crossref
Authors submitting publications for this edition agree to the following terms:
- The authors retain the copyright to their publications and grant the journal “The Journal of V. N. Karazin Kharkiv National University. Series: International Relations. Economics. Country Studies. Tourism” for the right of first publication.
- Submission and acceptance of a publication to the journal means that the authors grant the journal a non-exclusive license to publish, distribute, and archive the material in print and electronic form and to include it in international abstracting and bibliographic databases.
- Authors may:
- deposit the published version of their work in institutional or disciplinary repositories,
- distribute it on personal or professional web pages,
- use the material for educational or research purposes,
provided that:
- the publication is not altered,
- it is not used for commercial purposes,
- a complete bibliographic reference for the publication in the journal is provided.
Authors' Responsibility
- The authors guarantee that the submitted publication is an original work and does not infringe on the copyrights or intellectual property of third parties.
- The authors confirm that this manuscript has not been published previously and is not under consideration by another publisher.
- If the publication uses materials (figures, tables, data, etc.) belonging to third parties, the authors are responsible for obtaining the necessary permissions and for correctly citing the sources.
Publisher's Responsibility
- This publication ensures a transparent and ethical publication process, as well as open access to all materials in accordance with the terms of the CC BY 4.0 license.
- The publication guarantees long-term digital preservation of content by archiving it in internal and external repositories.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication of this work under the terms of a license Creative Commons Attribution License 4.0 International (CC BY 4.0).
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.