dcsimg
 
 
 
 
 
 

Game of Thrones Offers 8 Lessons for IT Teams

 
 
By Samuel Greengard  |  Posted 2015-09-04 Email
 
 
 
 
 
 
 
  • Previous
    Game of Thrones Offers 8 Lessons for IT Teams
    Next

    Game of Thrones Offers 8 Lessons for IT Teams

    CISOs and IT managers have far more tools at their disposal to monitor rogue behavior from inside their organization than their Game of Thrones counterparts had.
 

Earlier this year, the first four episodes from season 5 of HBO's popular show Game of Thrones were leaked online. Whether this was the result of an inside job or a hacker gaining inappropriate access remains a point of speculation. However, the event highlighted once again that media and entertainment companies are not immune to data breaches. In the corporate arena, employees who abuse access rights and release confidential information may lose their job, and depending on the nature of the leak, possibly face litigation. Of course, if a member of Stannis Baratheon's court in the world of Westeros abuses his or her position, the act could end very badly. In today's world, "To be able to maintain control over IT security, organizations need to have a real-time view into how sensitive information is being accessed and shared by employees," says Chris Sullivan, general manager of Intelligence/Analytics at identity and access management vendor Courion. "This requirement is essential because, much like knighthoods and titles, identity data is constantly changing. Living in the modern world, CISOs and IT managers have far more tools at their disposal to monitor rogue behavior from inside their organization than their Westeros counterparts had. In order to prevent similar betrayals, you need to ensure you have complete visibility of access rights and user privileges." Here are eight key IT lessons from Courion based on the Game of Thrones:

 
 
 
 
 
Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that baselinemag.com may send you Baselinemag offers via email, phone and text message, as well as email offers about other products and services that Baselinemag believes may be of interest to you. Baselinemag will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit