Problems of building consolidated corporation strategies for corporate information security management in the EMEA region
Abstract
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of corporate IT services and security in different international companies in different industries and countries, are considered. specialists, experts and analysts. The subject of research in the article is the issue of optimal interaction of IT and security services in ensuring a high level of corporate information security in the EMEA region. The goal is to analyze the issues related to the construction and implementation of consolidated strategies for IT and security management in order to eliminate inconsistencies and increase the efficiency of the relevant services to ensure effective information security of organizations on the example of the EMEA region. Objectives: processing and analysis of the results of an online survey on the interaction of IT and security services of companies and organizations in various industries in different countries and regions of the world, including the EMEA region; research of problems and advantages of building a consolidated strategy of IT management and information security in the EMEA region; development of recommendations for solving existing problems in the development and construction of corporate strategies for effective IT management and information security. The general scientific method of systems analysis is used to determine the features of interaction between IT services and security of companies and organizations of different industries in different regions of the world, as well as to study the problems and benefits of a unified consolidated IT management strategy and information security. The following results were obtained: based on quantitative and qualitative assessment, as well as analysis of the results of the survey of IT and security specialists and experts in the EMEA region, the participation of companies in the development and implementation of information security strategies was determined; the main tasks of IT and security services in the organization of their joint work and coordination of actions among themselves are defined; the main obstacles in the organization of joint work of IT services and security services of companies are investigated, among which significant are tensions and conflicts between employees of services, global and regional shortage of qualified personnel, technical difficulties. Conclusions: it is established that the consolidated strategy of IT management and information security based on advances in security and technology can help solve the main problems of effective interaction of relevant company services; developed a number of recommendations to address existing problems of building corporate strategies for effective IT management and information security, designed to help eliminate inconsistencies and improve the efficiency of relevant services to ensure effective information security of organizations in the EMEA in various organizations and companies, regardless of their field of activity.
Downloads
References
/References
Шойдин Ю. ИТ и CБ. Как выстроить партнерство : веб-сайт. URL: https://www.it-world.ru/cionews/security/115731.html (дата обращения: 13.11.2021).
Cindy Zhiling Tu, Yufei Yuan, Norm Archer, Catherine E. Connelly. Strategic value alignment for information security management: a critical success factor analysis. Information and Computer Security. 2018. Vol. 26, № 2. P. 150-170.
Deruma S. Problems and solutions of information security management in Latvia. SHS Web of Conferences. 2014. Vol. 10, № 7. P. 1-7.
Forrester Consulting – Implement modern, effective business strategies : web site. URL: https://www.forrester.com/consulting/ (date of the application: 10.11.2021).
Forrester Consulting – Implement modern, effective business strategies : web site. URL: https://www.forrester.com/consulting/ (date of the application: 10.11.2021).
Shojdin J. (2015) IT i CB. Kak vystroit' partnerstvo [IT and security service. How to build a partnership]. Available at: https://www.it-world.ru/cionews/security/115731.html (accessed 13.11.2021).
Cindy Zhiling Tu, Yufei Yuan, Norm Archer, Catherine E. Connelly (2018) Strategic value alignment for information security management: a critical success factor analysis. Information and Computer Security, vol. 26, no. 2. pp. 150-170.
Deruma S. (2014) Problems and solutions of information security management in Latvia. SHS Web of Conferences, vol. 10, no. 7. pp. 1-7.
Forrester Consulting – Implement modern, effective business strategies. Available at: https://www.forrester.com/consulting/ (accessed 10.11.2021).
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication of this work under the terms of a license Creative Commons Attribution License 4.0 International (CC BY 4.0).
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.