SlideShare a Scribd company logo
1 of 1
Download to read offline
Is the IT role and the InfoSec role good to be combined into a single responsibility?
Solution
In an organization IT responsibilities and Information Security responsibility are two of the most
important roles in todays connected organizations. IT is mainly responsible for setting up the
software and hardware systems of an organization and then maintaining the infrastrcture
installed. They are involved in choosing the hardware configurations which can adequately and
most economically fulfil the service requirements without any hiccups. On top of the hardware
requirements the IT also plays role in selecting the software which will help in carrying out all
the work. Once these systems are setup they take care of the the routine tasks like
troubleshooting updating the IT systems as and when required etc.
Information security on the other hand is the role which involves keeping the integrity of the
information system intact, install measures which will prevent data theft, manipulation or any
sort of data compromise. Data compromise can lead to theft of sensitive information which could
land an organization into legal, financial trouble. This could lead to loss of brand equity and long
term loss of business as well.
So while designing the IT systems for an organization it is very important to keep a view of the
information security so that compatible systems can be installed. If IT and infosec roles are
different the requirements for each might be different and later on deviations can arise leading to
loss of time and money. Thus it is best to combine the two roles into one to save time and money
and have better system integrity and robustness.

More Related Content

Similar to Is the IT role and the InfoSec role good to be combined into a singl.pdf

GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
IT Solutions and Infrastructure Management Services.pdf
IT Solutions and Infrastructure Management Services.pdfIT Solutions and Infrastructure Management Services.pdf
IT Solutions and Infrastructure Management Services.pdfXlogia Tech
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information systemtayyab3052
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
 
How MIS & IT depend on each other
 How MIS & IT depend on each other How MIS & IT depend on each other
How MIS & IT depend on each otherSultan Ahmed
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...IJNSA Journal
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxsherni1
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxdeanmtaylor1545
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001Hiran Kanishka
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
Information Technology(IT)
Information Technology(IT)Information Technology(IT)
Information Technology(IT)charlie835
 
Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Redspin, Inc.
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?Cigniti Technologies Ltd
 

Similar to Is the IT role and the InfoSec role good to be combined into a singl.pdf (20)

GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
IT Solutions and Infrastructure Management Services.pdf
IT Solutions and Infrastructure Management Services.pdfIT Solutions and Infrastructure Management Services.pdf
IT Solutions and Infrastructure Management Services.pdf
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information system
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
infosec-it
infosec-itinfosec-it
infosec-it
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
How MIS & IT depend on each other
 How MIS & IT depend on each other How MIS & IT depend on each other
How MIS & IT depend on each other
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Ai in compliance
Ai in compliance Ai in compliance
Ai in compliance
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Information Technology(IT)
Information Technology(IT)Information Technology(IT)
Information Technology(IT)
 
Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?
 

More from shankaranilahuja

It is important for managers to combine intuition with the syste.pdf
It is important for managers to combine intuition with the syste.pdfIt is important for managers to combine intuition with the syste.pdf
It is important for managers to combine intuition with the syste.pdfshankaranilahuja
 
It is during the design step of the Appreciative Inquiry process tha.pdf
It is during the design step of the Appreciative Inquiry process tha.pdfIt is during the design step of the Appreciative Inquiry process tha.pdf
It is during the design step of the Appreciative Inquiry process tha.pdfshankaranilahuja
 
It is believed that 4 of children have a gene linked to juvenile di.pdf
It is believed that 4 of children have a gene linked to juvenile di.pdfIt is believed that 4 of children have a gene linked to juvenile di.pdf
It is believed that 4 of children have a gene linked to juvenile di.pdfshankaranilahuja
 
It is assumed that the probability of a success, p, is constant over.pdf
It is assumed that the probability of a success, p, is constant over.pdfIt is assumed that the probability of a success, p, is constant over.pdf
It is assumed that the probability of a success, p, is constant over.pdfshankaranilahuja
 
It has been stated that 40 of the general population donate their t.pdf
It has been stated that 40 of the general population donate their t.pdfIt has been stated that 40 of the general population donate their t.pdf
It has been stated that 40 of the general population donate their t.pdfshankaranilahuja
 
It has been over 2 hours and I still have not received an answer. I .pdf
It has been over 2 hours and I still have not received an answer. I .pdfIt has been over 2 hours and I still have not received an answer. I .pdf
It has been over 2 hours and I still have not received an answer. I .pdfshankaranilahuja
 
It does not take much observation for one to realize that the people.pdf
It does not take much observation for one to realize that the people.pdfIt does not take much observation for one to realize that the people.pdf
It does not take much observation for one to realize that the people.pdfshankaranilahuja
 
It came a big suprise when Apples touchscrren Iphone 4 was found t.pdf
It came a big suprise when Apples touchscrren Iphone 4 was found t.pdfIt came a big suprise when Apples touchscrren Iphone 4 was found t.pdf
It came a big suprise when Apples touchscrren Iphone 4 was found t.pdfshankaranilahuja
 
It happened one Sunday morning. PoliceSolution1. Ethical conce.pdf
It happened one Sunday morning. PoliceSolution1. Ethical conce.pdfIt happened one Sunday morning. PoliceSolution1. Ethical conce.pdf
It happened one Sunday morning. PoliceSolution1. Ethical conce.pdfshankaranilahuja
 
Is turbidity a direct measurement of particle concentrations or is i.pdf
Is turbidity a direct measurement of particle concentrations or is i.pdfIs turbidity a direct measurement of particle concentrations or is i.pdf
Is turbidity a direct measurement of particle concentrations or is i.pdfshankaranilahuja
 
Is there room for error while measuring the distances between the sa.pdf
Is there room for error while measuring the distances between the sa.pdfIs there room for error while measuring the distances between the sa.pdf
Is there room for error while measuring the distances between the sa.pdfshankaranilahuja
 
Is there an integral domain containing exactly 10 elementsAs alwa.pdf
Is there an integral domain containing exactly 10 elementsAs alwa.pdfIs there an integral domain containing exactly 10 elementsAs alwa.pdf
Is there an integral domain containing exactly 10 elementsAs alwa.pdfshankaranilahuja
 
Is there a list of banks that got state aid bailed out since 2008 .pdf
Is there a list of banks that got state aid  bailed out since 2008 .pdfIs there a list of banks that got state aid  bailed out since 2008 .pdf
Is there a list of banks that got state aid bailed out since 2008 .pdfshankaranilahuja
 
Is there a difference in mean hours slept for students in various ye.pdf
Is there a difference in mean hours slept for students in various ye.pdfIs there a difference in mean hours slept for students in various ye.pdf
Is there a difference in mean hours slept for students in various ye.pdfshankaranilahuja
 
Is the tail on the left or right side it is left, a believeThe pr.pdf
Is the tail on the left or right side it is left, a believeThe pr.pdfIs the tail on the left or right side it is left, a believeThe pr.pdf
Is the tail on the left or right side it is left, a believeThe pr.pdfshankaranilahuja
 
Is the statement Hom=11 a valid null hypothesis Yes, this is a s.pdf
Is the statement Hom=11 a valid null hypothesis Yes, this is a s.pdfIs the statement Hom=11 a valid null hypothesis Yes, this is a s.pdf
Is the statement Hom=11 a valid null hypothesis Yes, this is a s.pdfshankaranilahuja
 
Is the following an observational study or an experiment (Explain y.pdf
Is the following an observational study or an experiment (Explain y.pdfIs the following an observational study or an experiment (Explain y.pdf
Is the following an observational study or an experiment (Explain y.pdfshankaranilahuja
 
Is the Federal Reserve an independent institution Explain.Solut.pdf
Is the Federal Reserve an independent institution Explain.Solut.pdfIs the Federal Reserve an independent institution Explain.Solut.pdf
Is the Federal Reserve an independent institution Explain.Solut.pdfshankaranilahuja
 
Is the agency problem unique to for-profit organizations or does it .pdf
Is the agency problem unique to for-profit organizations or does it .pdfIs the agency problem unique to for-profit organizations or does it .pdf
Is the agency problem unique to for-profit organizations or does it .pdfshankaranilahuja
 
Is the Fed currently pursuing an expansionary, neutral, or contracti.pdf
Is the Fed currently pursuing an expansionary, neutral, or contracti.pdfIs the Fed currently pursuing an expansionary, neutral, or contracti.pdf
Is the Fed currently pursuing an expansionary, neutral, or contracti.pdfshankaranilahuja
 

More from shankaranilahuja (20)

It is important for managers to combine intuition with the syste.pdf
It is important for managers to combine intuition with the syste.pdfIt is important for managers to combine intuition with the syste.pdf
It is important for managers to combine intuition with the syste.pdf
 
It is during the design step of the Appreciative Inquiry process tha.pdf
It is during the design step of the Appreciative Inquiry process tha.pdfIt is during the design step of the Appreciative Inquiry process tha.pdf
It is during the design step of the Appreciative Inquiry process tha.pdf
 
It is believed that 4 of children have a gene linked to juvenile di.pdf
It is believed that 4 of children have a gene linked to juvenile di.pdfIt is believed that 4 of children have a gene linked to juvenile di.pdf
It is believed that 4 of children have a gene linked to juvenile di.pdf
 
It is assumed that the probability of a success, p, is constant over.pdf
It is assumed that the probability of a success, p, is constant over.pdfIt is assumed that the probability of a success, p, is constant over.pdf
It is assumed that the probability of a success, p, is constant over.pdf
 
It has been stated that 40 of the general population donate their t.pdf
It has been stated that 40 of the general population donate their t.pdfIt has been stated that 40 of the general population donate their t.pdf
It has been stated that 40 of the general population donate their t.pdf
 
It has been over 2 hours and I still have not received an answer. I .pdf
It has been over 2 hours and I still have not received an answer. I .pdfIt has been over 2 hours and I still have not received an answer. I .pdf
It has been over 2 hours and I still have not received an answer. I .pdf
 
It does not take much observation for one to realize that the people.pdf
It does not take much observation for one to realize that the people.pdfIt does not take much observation for one to realize that the people.pdf
It does not take much observation for one to realize that the people.pdf
 
It came a big suprise when Apples touchscrren Iphone 4 was found t.pdf
It came a big suprise when Apples touchscrren Iphone 4 was found t.pdfIt came a big suprise when Apples touchscrren Iphone 4 was found t.pdf
It came a big suprise when Apples touchscrren Iphone 4 was found t.pdf
 
It happened one Sunday morning. PoliceSolution1. Ethical conce.pdf
It happened one Sunday morning. PoliceSolution1. Ethical conce.pdfIt happened one Sunday morning. PoliceSolution1. Ethical conce.pdf
It happened one Sunday morning. PoliceSolution1. Ethical conce.pdf
 
Is turbidity a direct measurement of particle concentrations or is i.pdf
Is turbidity a direct measurement of particle concentrations or is i.pdfIs turbidity a direct measurement of particle concentrations or is i.pdf
Is turbidity a direct measurement of particle concentrations or is i.pdf
 
Is there room for error while measuring the distances between the sa.pdf
Is there room for error while measuring the distances between the sa.pdfIs there room for error while measuring the distances between the sa.pdf
Is there room for error while measuring the distances between the sa.pdf
 
Is there an integral domain containing exactly 10 elementsAs alwa.pdf
Is there an integral domain containing exactly 10 elementsAs alwa.pdfIs there an integral domain containing exactly 10 elementsAs alwa.pdf
Is there an integral domain containing exactly 10 elementsAs alwa.pdf
 
Is there a list of banks that got state aid bailed out since 2008 .pdf
Is there a list of banks that got state aid  bailed out since 2008 .pdfIs there a list of banks that got state aid  bailed out since 2008 .pdf
Is there a list of banks that got state aid bailed out since 2008 .pdf
 
Is there a difference in mean hours slept for students in various ye.pdf
Is there a difference in mean hours slept for students in various ye.pdfIs there a difference in mean hours slept for students in various ye.pdf
Is there a difference in mean hours slept for students in various ye.pdf
 
Is the tail on the left or right side it is left, a believeThe pr.pdf
Is the tail on the left or right side it is left, a believeThe pr.pdfIs the tail on the left or right side it is left, a believeThe pr.pdf
Is the tail on the left or right side it is left, a believeThe pr.pdf
 
Is the statement Hom=11 a valid null hypothesis Yes, this is a s.pdf
Is the statement Hom=11 a valid null hypothesis Yes, this is a s.pdfIs the statement Hom=11 a valid null hypothesis Yes, this is a s.pdf
Is the statement Hom=11 a valid null hypothesis Yes, this is a s.pdf
 
Is the following an observational study or an experiment (Explain y.pdf
Is the following an observational study or an experiment (Explain y.pdfIs the following an observational study or an experiment (Explain y.pdf
Is the following an observational study or an experiment (Explain y.pdf
 
Is the Federal Reserve an independent institution Explain.Solut.pdf
Is the Federal Reserve an independent institution Explain.Solut.pdfIs the Federal Reserve an independent institution Explain.Solut.pdf
Is the Federal Reserve an independent institution Explain.Solut.pdf
 
Is the agency problem unique to for-profit organizations or does it .pdf
Is the agency problem unique to for-profit organizations or does it .pdfIs the agency problem unique to for-profit organizations or does it .pdf
Is the agency problem unique to for-profit organizations or does it .pdf
 
Is the Fed currently pursuing an expansionary, neutral, or contracti.pdf
Is the Fed currently pursuing an expansionary, neutral, or contracti.pdfIs the Fed currently pursuing an expansionary, neutral, or contracti.pdf
Is the Fed currently pursuing an expansionary, neutral, or contracti.pdf
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Is the IT role and the InfoSec role good to be combined into a singl.pdf

  • 1. Is the IT role and the InfoSec role good to be combined into a single responsibility? Solution In an organization IT responsibilities and Information Security responsibility are two of the most important roles in todays connected organizations. IT is mainly responsible for setting up the software and hardware systems of an organization and then maintaining the infrastrcture installed. They are involved in choosing the hardware configurations which can adequately and most economically fulfil the service requirements without any hiccups. On top of the hardware requirements the IT also plays role in selecting the software which will help in carrying out all the work. Once these systems are setup they take care of the the routine tasks like troubleshooting updating the IT systems as and when required etc. Information security on the other hand is the role which involves keeping the integrity of the information system intact, install measures which will prevent data theft, manipulation or any sort of data compromise. Data compromise can lead to theft of sensitive information which could land an organization into legal, financial trouble. This could lead to loss of brand equity and long term loss of business as well. So while designing the IT systems for an organization it is very important to keep a view of the information security so that compatible systems can be installed. If IT and infosec roles are different the requirements for each might be different and later on deviations can arise leading to loss of time and money. Thus it is best to combine the two roles into one to save time and money and have better system integrity and robustness.