cybersecurity-and-change-management

Issues in Cybersecurity and Change Management

Posted by in Business & Entrepreneurship, Leadership & Management, Online & Digital, Science & Technology, Social & Psychology

It is true that DevOps and emerging technologies are enabling business opportunities and at the same time demanding fast and frequent change to take advantage of them. Some capabilities are thus required by organizations to facilitate change management for them to enjoy the value that comes with DevOps. It is realized that the implementation of agile has effects on the available interactions of the small stakeholders and the teams that are involved in the discrete development of applications. The use of DevOps requires that a business makes intensive and systematic changes that have the potential of affecting all stakeholders ranging from IT operations staff, software developers, and business owners.

https://www.youtube.com/watch?v=qoEwF4yd_Ps

It is determined that re-orienting IT operations while using a 2-speed IT architecture happens to be a prerequisite that is useful in the implementation of both agile and DevOps approaches. This is an architecture that has stable transaction-oriented systems which are fast changing to accommodate the changes involved. Efforts to adopt a DevOps model in a 2-speed IT environment will require the determination of the best ways and areas where new technologies will be introduced. This will be based on the selection of particular areas that are hoped to benefit a lot when a DevOps model is adopted. Good examples of such technologies are cloud platforms and automated processes. It will also be required that new production and governance processes be explored to enable the IT operations being used across the company to work effectively regardless of whether they run at the same speed or not.

The security issues that are related to supply chain management will require that rigorous quality check is introduced during software delivery by implementing a continuous testing strategy. Insider attacks will effectively be addressed by making sure that the developmental infrastructure is well secured where detection and alerting system are included. Efficient anti-viruses will be a good way to prevent data loss and destruction by malicious malware.

Recommended Reading
  1. Beyond agile: Reorganizing IT for faster software delivery. (2016). McKinsey & Company. Retrieved 23 August 2016.