Digitizing Security: Whose Job Is Enterprise Mobility?

EnterpriseMobilityExchange.com

The world of information technology is packed with the need for security, but can often confuse enterprise executives when discussing who’s in charge of what. So, who’s responsible for mobile, information, and cybersecurity protocols in the company food chain?

It begins with understanding the differences between the security sectors. Let’s take a look at the similarities discrepancies of cybersecurity, information security, and mobile security.

What is cybersecurity?
Cybersecurity is the new information security. Since the world went online 20 years ago (some industries were quicker to adopt than others), information moved from the filing cabinet to the computer’s motherboard, and recently migrated to the cloud. Securing all the data associated with a single enterprise, no matter the size, is an enormous task, especially considering industry-specific compliance and regulation standards. So if information is digital, it belongs to the cybersecurity team.

What is information security?
Think of InfoSec as the physical, hard copy version of the aforementioned digital data. While some data remains in paper form (yes, this is true of many companies across all industries), much of it has moved to digital. That doesn’t mean information security goes bye-bye, but changes the scope of responsibility. Where filing cabinets and storage rooms packed with sensitive paperwork once required padlocks and security guards, those some physical tools are now required to keep server rooms and storage devices locked down.

What is mobile security?
The enterprise has gone mobile, and if it hasn’t, it needs to. Anyhow, now businesses are implementing devices to improve productivity and allow employees to work on the go and from remote locations. There is no paper copy associated with mobile devices, as mobile transformation is the next step in the journey of full-on digital transformation. That makes mobile security fall under the digital data umbrella, therefore becoming a subset responsibility of the cyber security team.

So where does it all fit in together? Easy: sensitive, corporate information is the lifeblood of any business. If it’s stolen, breached, moved without authority or compromised in any way, the enterprise has a massive problem on its hands. In a recent study conducted by Enterprise Mobility Exchange, cyber security ranked as the second most pressing issue for IT executives in 2017, while mobile security specifically was fifth on the list. Learn more about that study here.

Take for example the case of a laptop or other business-critical mobile device being stolen. That hardware falls into the mobile security bracket, of course. But since it’s a tangible piece of equipment, the InfoSec folks also need to be aware. Combine the two and a breach of that device’s data funnels up to the cyber security folks who need to clamp down on all things digital.

As is the case with all technology efforts, data is the decision maker. The common denominator for all three spaces within the enterprise is protecting data in one form or another. While the CISO, Head of InfoSec, and Manager of Mobility all have responsibilities within their own space, collaboration between the chiefs is a must to ensure enterprises aren’t losing or compromising data in any shape or form.

Want to discuss what’s going on in the world of Enterprise Mobility? Visit our discussion board to speak with others in the IT community, ask questions, and network with peers by clicking here