Executive presentations and panel session discussions here covered the full gamut of BYOE possibilities, including Bring Your Own Device, Bring Your Own Cloud, and even Bring Your Own Infrastructure.
During a panel session on April 1, IT leaders from Dish Network, Coca-Cola Bottling Co. Consolidated, and H.D. Smith shared their experiences in dealing with parts of the business that have "gone rogue" by circumventing IT when implementing products and services.
Rob Dravenstott, VP of IT application development and testing with Dish Network, shared the story of a "shadow IT" project that helped change the way IT operates at Dish Network. According to Dravenstott, a team in marketing used a corporate card to sign up for infrastructure-as-a-service, and stood up a server to take care of some marketing functions. All this was done without IT's knowledge.
Dravenstott noted that, fortunately, the shadow IT project was not used for a core part of the marketing infrastructure and did not have access to customer data because, eventually, it ended up getting hacked.
Susan Nunziata leads the site's content team and contributors to guide topics, direct strategies, and pursue new ideas, all in the interest of sharing practicable insights with our community.Nunziata was most recently Director of Editorial for EnterpriseEfficiency.com, a UBM ... View Full Bio
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.