• About Dr. Alea Fairchild
  • Engaging with Dr. Fairchild
  • Videos

Alea Fairchild – Strategic Views

Alea Fairchild – Strategic Views

Monthly Archives: May 2016

IS COPPER GETTING OUT OF THE CONUNDRUM?

24 Tuesday May 2016

Posted by afairchild in Uncategorized

≈ Leave a comment

Tags

copper, price

Author: Bruno de Vuyst    Follow @b_devuyst on Twitter

While spot prices suffered from the Fed Minutes released yesterday and sank, looking more closely at LME quotes for later delivery may be of interest. The volumes are picking up, albeit slowly. Moreover, there appear to be increasing delta’s between offer and bid as one progresses in time of delivery. This may be interpreted as writing on the wall for a further bear market in 2017, which would be in line with general macroeconomic forecasts of a weakly recovering global economy, with lags in trade

But this might also be interpreted as pointing to results in restructuring by miners and smelters, and the very beginnings of a new, realistic, price setting, which would be less bearish.

Key is now to follow closely progress reports in the sector, so as to see which of the players are first in succeeding in their restructurations. Such progress may not reflect immediately in earnings and may be buried inside a report, but they may be the key indicators of success to come.

Is there hope outside of that town in Arkansas? Rather than investing in a marketing organization and hoping for its further inventiveness in producing gadgets we all want to have, it may be profitable to ride out the bear market and to be ready to pick up on profitably restructured market participants at increasingly interesting p/e ratios.

Advertisement

Webinar on securing IT assets

02 Monday May 2016

Posted by afairchild in Uncategorized

≈ Leave a comment

Tags

assets, enterprise, privacy, security

Having secure IT assets should enhance the overall user experience by ensuring security is more effectively and more seamlessly embedded into everyday IT and IT services provisioning activities. But IT assets have a lifecycle, and they need to be protected differently during this lifecycle. Automation of the protection process allows the core competencies of the staff to be focused on more strategic aspects of asset security than patch management or stolen passwords.

I recently shared a webinar with Dell and Markit on IT asset management and information security, which you can listen to on InfoSecurity Magazine here.

Some of the points I was making in my presentation on IT asset management were:

  • The lifecycle cost of an IT asset begins with planning and design and continues through procurement, adoption, operations, maintenance, rehabilitation/renewal, and disposal/replacement.
  • IT asset management (ITAM) seeks to optimize costs through each stage of this lifecycle, while meeting established levels of service, reliability, and risk. In today’s enterprise, ITAM plays a dual role of asset management and risk protection.
  • Protection levels can be performance-related (critical value to the business), or customer/regulatory related (impacting response times, complaints, information availability, etc.).
  • Risk is the exposure and uncertainty assumed due to the opportunity for significant damages. And data from IDC had previously forecasted that by this year, 25% of large enterprises will make security-related spending decisions based on analytical determinations of risk.

But what kind of IT assets bring the most concern to the enterprise today? Half the world’s population will be on mobile Internet by 2020. And the key drivers behind the growth in the mobile worker population include the increasing affordability of smartphones and tablets combined with the growing acceptance of corporate bring your own device (BYOD) programs. In addition, innovations in mobile technology such as biometric readers, wearables, voice control, near-field communications (NFC), and augmented reality are enabling workers in completely new ways, increasing productivity by enhancing communications and business workflows.  And these devices need to be secured to protect the enterprise.  But it is not just about endpoints, but also the network and the physical assets of the enterprise that are impacted by IT asset management not being automated and hardwired into the organization.

So one of the key points I made was that the key to a successful IT asset management program is the legwork performed before selecting solutions, including evaluating your existing IT environment, gaining executive sponsorship, setting program goals, committing the appropriate human resources, and designing strong processes that support your organization’s business objectives. Before getting started with your asset management security program, it is important to achieve the following milestones to ensure not only that the right solution is selected, but that the processes are formally established, understood, and documented.

One of the discussion points between myself and my fellow presenters was the fact that older IT assets are not as well documented as the newer ones.  I mentioned in the conversation that I had a 10 year old Dell from previous employment that was still able to access that domain. ( I am not sure which was the more startling statement, then 10 year old Dell still worked or that it could still log on to the systems of my previous employer!)   We discussed the concept of good practices (ISF Standard of Good Practice) and the importance, not only from a risk perspective but also from a compliance agenda, to be able to reduce the risk of information security being compromised by weaknesses in hardware / software and protect assets against loss, as well as support development of contracts and meet compliance requirements for licensing.

One other point I made in the presentation was around encryption. It is necessary that an IT department have an encryption plan to provide reasonable assurance that all enterprise owned devices, such as laptops, can be identified and encrypted. Encryption is at the heart of a complete endpoint security solution. When you safeguard the data, you reduce the risk of compromising sensitive customer or employee information, confidential files, and your company’s reputation.  So you need to make it easier to identify and activate new devices as they come on the network for their usage of encryption.  And to find the older devices as they log back in for software updates into the network.

The CISO on our panel from Markit talked about the convergence of IT asset management (ITAM) and security.  His point was the security professional had a very different point of view in the past on what an asset is because their focus is information risk. IT managers focused instead on where physical hardware was at any time; from a software standpoint, the focus was on consolidating license negotiations.  Now this is coming together, not only due to cyber threats but for protection of the rest of the assets (data or otherwise) of the enterprise.  Another point he made was that decisions regarding procurement, deployment and management of technology are not made centrally and then there is a disconnect. There is no point in putting into place sophisticated network forensic tools (from the network team) if there is no basic patch management from the desktop team.

Our main point: There needs to be a holistic view of IT asset management throughout the lifecycle of the object in question, and throughout the entire IT team as to how to address the risk profile of the assets.

Follow me on Twitter

My Tweets

Recent Posts

  • Organizational Resilience:   Compliance risk strategy for 2023
  • Is 2023 the year of maximalism?
  • Two key trends for 2023
  • Innovation in reuse of existing built spaces
  • Creating workplace process orchestration

Archives

  • January 2023
  • December 2022
  • August 2021
  • May 2021
  • February 2021
  • December 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • August 2019
  • July 2019
  • April 2019
  • March 2019
  • February 2018
  • January 2018
  • November 2017
  • January 2017
  • December 2016
  • November 2016
  • August 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • February 2015
  • January 2015
  • December 2014
  • September 2014
  • July 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • August 2013

Categories

  • Uncategorized

Recent Comments

edith32lamar on Why we love the Olympics
Iva Keller on Evolution of business mod…
Yves Van Seters on Apple Automotive? Revamping a…
Prediction check: 20… on Predictions for 2014 – a…

Contact me:

+32 495 228 150
M-F 9-4

Create a free website or blog at WordPress.com.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Alea Fairchild - Strategic Views
    • Already have a WordPress.com account? Log in now.
    • Alea Fairchild - Strategic Views
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar