Game of Thrones Offers 8 Lessons for IT Teams

By Samuel Greengard  |  Posted 2015-09-04 Email

Earlier this year, the first four episodes from season 5 of HBO's popular show Game of Thrones were leaked online. Whether this was the result of an inside job or a hacker gaining inappropriate access remains a point of speculation. However, the event highlighted once again that media and entertainment companies are not immune to data breaches. In the corporate arena, employees who abuse access rights and release confidential information may lose their job, and depending on the nature of the leak, possibly face litigation. Of course, if a member of Stannis Baratheon's court in the world of Westeros abuses his or her position, the act could end very badly. In today's world, "To be able to maintain control over IT security, organizations need to have a real-time view into how sensitive information is being accessed and shared by employees," says Chris Sullivan, general manager of Intelligence/Analytics at identity and access management vendor Courion. "This requirement is essential because, much like knighthoods and titles, identity data is constantly changing. Living in the modern world, CISOs and IT managers have far more tools at their disposal to monitor rogue behavior from inside their organization than their Westeros counterparts had. In order to prevent similar betrayals, you need to ensure you have complete visibility of access rights and user privileges." Here are eight key IT lessons from Courion based on the Game of Thrones:

Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters