Matakuliah Tahun Versi :A0334/Pengendalian Lingkungan Online : 2005 : 1/1 Pertemuan 20 Organisational Back Up 1 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : • Mahasiswa dapat menunjukkan Organisational back up 2 Outline Materi • Beyond ‘Off The Shelf’ – Breaking with The Past – Outsourcing in IT Security – Why The Change? – Identifying Gaps – Making The Business Case – Here To Say 3 Beyond ‘Off The Shelf’ • • • • • • Breaking with The Past Outsourcing in IT Security Why The Change? Identifying Gaps Making The Business Case Here To Say 4 Breaking with The Past • Security has traditionally been something that organisations have kept close to their chests – an internal issue not to be entrusted to outsiders. In terms of physical security this instinct has softened over recent decades as contract guards, commercial alarm monitoring stations and secure couriers have taken the place of internal security services. Information and IT security, however, only began to embrace outsourcing very recently but its take-up is accelerating rapidly. 5 Outsourcing in IT Security • Whilst general IT spend is under extreme pressure, security spend in widely predicted to maintain growth, with the outsourcing of services leading the way. 6 Why The Change? • This growth reflects changing attitudes as well as a need to control cost. In the background is an increasing awareness of security issues and the potential business impact of incidents – most significantly amongst senior and executive management. • Underlying this growing awareness is a real increase in the level on incidents. 7 Identifying Gaps • In a climate of sharply increasing risk an effective response is critical. Quite apart from questions over funding, organisations must assess the level and suitability of internal resources and whether existing staff can cope with the technical and operational demands of a growing and increasingly complex threat. 8 Making The Business Case • Maintaining effective security requires very specialised skills, dedicated effort and, ideally, round-the-clock vigilance. • This involves significant cost (hardware and software, ongoing software subscriptions, hardware maintenance, supplier technical support, staff training, monitoring operations support) across a range of equipment (firewalls, virus scanners, content filters, reporting tools, intrusion detection systems etc). 9 • Sadly, costs don’t scale linearly with the size of company – so the choice for smaller companies is either to pay heavily for comprehensive security or to accept compromises. • Outsourcing can offer the economies of scale enjoyed by the largest companies in a package that is priced for the smaller organisation. 10 Here To Say • The world has moved on – information technology now pervades businesses of all sizes, so security has become a business rather than a technical issue. The complexity of both threat and response is leading companies to look outside for solutions. All the signs are that the outsource security market is here to stay and that its growth is set to continue over the coming years. The challenge for businesses is becoming one of supplier selection and management – something they ought to be more comfortable with. 11 The End 12