SlideShare a Scribd company logo
1 of 18
Jeff Stokes
Microsoft Field Engineer, GBS

Crouching Tiger, Hidden User
Thoughts on the IT process and the
human impact of same.
The lock down vs the smack down
Why corporate users sometimes resent their IT departments
How the IT Department sees itself
How the IT User Feels
The Case for Controls
• Security

• Audit
• WikiLeaks
Security
• Digital Rights Management
• Anti-Virus
• Mobile Device Management
• Email Discovery
• Remote Access Controls
• Patching and Updates
• Desktop Lockdowns/Branding
Audit
• Compliance

• Change Control
• Enforcement
Wikileaks/Breaches
• Public Image/Reputation

• Legal Liability
• Theft of IP/Monetary Assets
The Results of Extreme Controls
• BYOD

• Reduced Productivity
• Lower Morale/Trust Issues
BYOD
• In some ways, BYOD is the loss of respect and faith in the IT
organization by its user base. Users feel they can be productive with
own equipment rather than corporate assets.
• Long Boot Times/Slow Performance
• Frequent Crashes
• Tight System Controls

• In other ways, BYOD is an empowerment of the user to ‘get things
done’. In these cases, the “BYOD” could better be coined “PYOD” (pick
your own device).
Reduced Productivity
• Usage of overly managed systems impede users from getting their
work done.
• Change control and heavy audit processes slow innovation, creativity
and organizational agility.
• Siloing creates team resentment and poor communication channels
Lower Morale/Trust Issues
• What is the cost of to the institution for an employee to walk?
• To go to a competitor?
• For both of these, one must consider the cost of training a replacement, the cost of loss
of institutional knowledge (why was a system setup a certain way 10 years ago?)

• What is the cost to an organization when teams break away and do
their own thing because of operational inefficiencies or overbearing
rules?
What to do?
Control but Trust
• Remember employees, from all divisions and teams, are in it to win it.

• Control lightly, trust heavily.
• Give people the opportunity to do the right thing.
• Trust their judgment, listen before reacting!
Data Protection, not User Restriction
• Use native OS capabilities to protect the ‘good stuff’
• Digital Rights Management appropriately
• Classify Data according to Impact and Importance

• Mobile Device Management for BYOD is Paramount here
• Patch/Secure the end point devices
• Complex Passwords and Security Enforcement that is Reasonable

• Extranet Access, what is needed to do the job, control the floodgate
of information here.
Empower and Enable
• The primary task of IT is to use changing technology to improve
business productivity. Do not lose sight of this.
• Give the users good tools to achieve results. Take feedback on what
their view of ‘good tools’ means vs what IT’s view is. Invest in training.
• Remove blockers to employees and teams, make sure they can get
their job done. Remove barriers between orgs. Why reinvent the
wheel?
Adapt and Change
• Create feedback loops in the environment. System monitoring,
alerting for performance, SLA breach, etc. But more importantly,
survey the business heavily. And Listen to the results.
• Be ready to be wrong. Be comfortable to admit mistakes. Nothing
stymie's innovation and action more than fear.
• Readiness and training are paramount. Change with the times, more
so, innovate with the times.
And more importantly
• Have fun. More time in life is spent working than anything else. Do
what you love. Love what you do.
• Remember, “if nothing ever breaks, IT isn’t innovating to improve
business productivity”
• A system that worked great 10 years ago, does not a great system
today make.

More Related Content

What's hot

CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)Michael King
 
Fast-teks Remote Managed Services
Fast-teks Remote Managed ServicesFast-teks Remote Managed Services
Fast-teks Remote Managed ServicesJoe Hanold
 
Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basicsguest13df88e8
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - finalAndrew White
 
Beat your competition to the punch
Beat your competition to the punchBeat your competition to the punch
Beat your competition to the punchPivotal CRM
 
Business Continuation - The basics according to John Small 2014-02-21
Business Continuation - The basics according to John Small 2014-02-21Business Continuation - The basics according to John Small 2014-02-21
Business Continuation - The basics according to John Small 2014-02-21Business As Usual, Inc.
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationSafetyChain Software
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
IBM Decision Server Insights
IBM Decision Server InsightsIBM Decision Server Insights
IBM Decision Server InsightsAlain Neyroud
 
Impact of it on individual behaviour
Impact of it on individual behaviourImpact of it on individual behaviour
Impact of it on individual behaviourMuntaha Mukhtar
 
Top 5 Tech Tips for School Principals
Top 5 Tech Tips for School PrincipalsTop 5 Tech Tips for School Principals
Top 5 Tech Tips for School PrincipalsDan Kammeyer
 
Operational Decisions Management 101
Operational Decisions Management 101Operational Decisions Management 101
Operational Decisions Management 101Alain Neyroud
 
Top 6 reasons to choose IBM Connections and Verse for Collaboration Solutions
Top 6 reasons to choose IBM Connections and Verse for Collaboration SolutionsTop 6 reasons to choose IBM Connections and Verse for Collaboration Solutions
Top 6 reasons to choose IBM Connections and Verse for Collaboration SolutionsPinaki Sen
 

What's hot (19)

CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)
 
Fast-teks Remote Managed Services
Fast-teks Remote Managed ServicesFast-teks Remote Managed Services
Fast-teks Remote Managed Services
 
Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basics
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - final
 
Beat your competition to the punch
Beat your competition to the punchBeat your competition to the punch
Beat your competition to the punch
 
Business Continuation - The basics according to John Small 2014-02-21
Business Continuation - The basics according to John Small 2014-02-21Business Continuation - The basics according to John Small 2014-02-21
Business Continuation - The basics according to John Small 2014-02-21
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Ecm Basics
Ecm BasicsEcm Basics
Ecm Basics
 
IBM Decision Server Insights
IBM Decision Server InsightsIBM Decision Server Insights
IBM Decision Server Insights
 
Security challenges in 2017
Security challenges in 2017Security challenges in 2017
Security challenges in 2017
 
Impact of it on individual behaviour
Impact of it on individual behaviourImpact of it on individual behaviour
Impact of it on individual behaviour
 
Top 5 Tech Tips for School Principals
Top 5 Tech Tips for School PrincipalsTop 5 Tech Tips for School Principals
Top 5 Tech Tips for School Principals
 
Intra Cor
Intra CorIntra Cor
Intra Cor
 
Methods used in scaling Scrum: An experience report
Methods used in scaling Scrum: An experience reportMethods used in scaling Scrum: An experience report
Methods used in scaling Scrum: An experience report
 
Operational Decisions Management 101
Operational Decisions Management 101Operational Decisions Management 101
Operational Decisions Management 101
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
Top 6 reasons to choose IBM Connections and Verse for Collaboration Solutions
Top 6 reasons to choose IBM Connections and Verse for Collaboration SolutionsTop 6 reasons to choose IBM Connections and Verse for Collaboration Solutions
Top 6 reasons to choose IBM Connections and Verse for Collaboration Solutions
 

Viewers also liked

From Like to Loyalty SheSpeaks at M2W Conference
From Like to Loyalty   SheSpeaks at M2W ConferenceFrom Like to Loyalty   SheSpeaks at M2W Conference
From Like to Loyalty SheSpeaks at M2W ConferenceSheSpeaksInc
 
Dチーム_佐藤、浜野、三井、矢島、山根
Dチーム_佐藤、浜野、三井、矢島、山根Dチーム_佐藤、浜野、三井、矢島、山根
Dチーム_佐藤、浜野、三井、矢島、山根Jumpei Yamane
 
2014年10月3日 まにまにフェスタレジュメだよん
2014年10月3日 まにまにフェスタレジュメだよん2014年10月3日 まにまにフェスタレジュメだよん
2014年10月3日 まにまにフェスタレジュメだよんTakayoshi Todo
 

Viewers also liked (6)

Galaxy note
Galaxy noteGalaxy note
Galaxy note
 
GREAT
GREATGREAT
GREAT
 
guia docentte tvd
guia docentte tvdguia docentte tvd
guia docentte tvd
 
From Like to Loyalty SheSpeaks at M2W Conference
From Like to Loyalty   SheSpeaks at M2W ConferenceFrom Like to Loyalty   SheSpeaks at M2W Conference
From Like to Loyalty SheSpeaks at M2W Conference
 
Dチーム_佐藤、浜野、三井、矢島、山根
Dチーム_佐藤、浜野、三井、矢島、山根Dチーム_佐藤、浜野、三井、矢島、山根
Dチーム_佐藤、浜野、三井、矢島、山根
 
2014年10月3日 まにまにフェスタレジュメだよん
2014年10月3日 まにまにフェスタレジュメだよん2014年10月3日 まにまにフェスタレジュメだよん
2014年10月3日 まにまにフェスタレジュメだよん
 

Similar to Crouching Admin, Hidden User

Shadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolveShadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolveFreshservice
 
Ten rules for CIOs
Ten rules for CIOsTen rules for CIOs
Ten rules for CIOsTerry White
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownIvanti
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir FancySaskSummit
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIORaffa Learning Community
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Femke Goedhart
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board MembersBill Clark
 
FGP Tech - APPA Conference - September 2015
FGP Tech - APPA Conference - September 2015FGP Tech - APPA Conference - September 2015
FGP Tech - APPA Conference - September 2015Blake Coleman
 
Santoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.pptSantoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.pptNir Nia
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyPaul McQuillan
 
Building relationships between IT and the business - it is not that hard!!!
Building relationships between IT and the business - it is not that hard!!!Building relationships between IT and the business - it is not that hard!!!
Building relationships between IT and the business - it is not that hard!!!Steve Mitchinson
 
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
20 Minutes on Desktop Analytics:  Top Uses in the Contact Center 20 Minutes on Desktop Analytics:  Top Uses in the Contact Center
20 Minutes on Desktop Analytics: Top Uses in the Contact Center Cicero, Inc.
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 

Similar to Crouching Admin, Hidden User (20)

Shadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolveShadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolve
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
Ten rules for CIOs
Ten rules for CIOsTen rules for CIOs
Ten rules for CIOs
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
 
2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO
 
Getting good value from IT
Getting good value from ITGetting good value from IT
Getting good value from IT
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
 
SmartERP PeopleSoft Security
SmartERP PeopleSoft  Security SmartERP PeopleSoft  Security
SmartERP PeopleSoft Security
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
 
2018 2-6 The Changing Role of Today's CIO
2018 2-6 The Changing Role of Today's CIO2018 2-6 The Changing Role of Today's CIO
2018 2-6 The Changing Role of Today's CIO
 
FGP Tech - APPA Conference - September 2015
FGP Tech - APPA Conference - September 2015FGP Tech - APPA Conference - September 2015
FGP Tech - APPA Conference - September 2015
 
Santoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.pptSantoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.ppt
 
CDO_public
CDO_publicCDO_public
CDO_public
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
 
Building relationships between IT and the business - it is not that hard!!!
Building relationships between IT and the business - it is not that hard!!!Building relationships between IT and the business - it is not that hard!!!
Building relationships between IT and the business - it is not that hard!!!
 
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
20 Minutes on Desktop Analytics:  Top Uses in the Contact Center 20 Minutes on Desktop Analytics:  Top Uses in the Contact Center
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 

More from Jeff Stokes

Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff StokesWindows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff StokesJeff Stokes
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesJeff Stokes
 
Keynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff StokesKeynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff StokesJeff Stokes
 
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesTmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesJeff Stokes
 
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff StokesTmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff StokesJeff Stokes
 
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff StokesTips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff StokesJeff Stokes
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesJeff Stokes
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesJeff Stokes
 
Advanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff StokesAdvanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff StokesJeff Stokes
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesJeff Stokes
 
Sustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesSustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesJeff Stokes
 

More from Jeff Stokes (12)

Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff StokesWindows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff Stokes
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff Stokes
 
Keynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff StokesKeynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff Stokes
 
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesTmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
 
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff StokesTmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
 
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff StokesTips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
Advanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff StokesAdvanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff Stokes
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
 
Sustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesSustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff Stokes
 
Walking deck
Walking deckWalking deck
Walking deck
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Crouching Admin, Hidden User

  • 1. Jeff Stokes Microsoft Field Engineer, GBS Crouching Tiger, Hidden User Thoughts on the IT process and the human impact of same.
  • 2. The lock down vs the smack down Why corporate users sometimes resent their IT departments
  • 3. How the IT Department sees itself
  • 4. How the IT User Feels
  • 5. The Case for Controls • Security • Audit • WikiLeaks
  • 6. Security • Digital Rights Management • Anti-Virus • Mobile Device Management • Email Discovery • Remote Access Controls • Patching and Updates • Desktop Lockdowns/Branding
  • 7. Audit • Compliance • Change Control • Enforcement
  • 8. Wikileaks/Breaches • Public Image/Reputation • Legal Liability • Theft of IP/Monetary Assets
  • 9. The Results of Extreme Controls • BYOD • Reduced Productivity • Lower Morale/Trust Issues
  • 10. BYOD • In some ways, BYOD is the loss of respect and faith in the IT organization by its user base. Users feel they can be productive with own equipment rather than corporate assets. • Long Boot Times/Slow Performance • Frequent Crashes • Tight System Controls • In other ways, BYOD is an empowerment of the user to ‘get things done’. In these cases, the “BYOD” could better be coined “PYOD” (pick your own device).
  • 11. Reduced Productivity • Usage of overly managed systems impede users from getting their work done. • Change control and heavy audit processes slow innovation, creativity and organizational agility. • Siloing creates team resentment and poor communication channels
  • 12. Lower Morale/Trust Issues • What is the cost of to the institution for an employee to walk? • To go to a competitor? • For both of these, one must consider the cost of training a replacement, the cost of loss of institutional knowledge (why was a system setup a certain way 10 years ago?) • What is the cost to an organization when teams break away and do their own thing because of operational inefficiencies or overbearing rules?
  • 14. Control but Trust • Remember employees, from all divisions and teams, are in it to win it. • Control lightly, trust heavily. • Give people the opportunity to do the right thing. • Trust their judgment, listen before reacting!
  • 15. Data Protection, not User Restriction • Use native OS capabilities to protect the ‘good stuff’ • Digital Rights Management appropriately • Classify Data according to Impact and Importance • Mobile Device Management for BYOD is Paramount here • Patch/Secure the end point devices • Complex Passwords and Security Enforcement that is Reasonable • Extranet Access, what is needed to do the job, control the floodgate of information here.
  • 16. Empower and Enable • The primary task of IT is to use changing technology to improve business productivity. Do not lose sight of this. • Give the users good tools to achieve results. Take feedback on what their view of ‘good tools’ means vs what IT’s view is. Invest in training. • Remove blockers to employees and teams, make sure they can get their job done. Remove barriers between orgs. Why reinvent the wheel?
  • 17. Adapt and Change • Create feedback loops in the environment. System monitoring, alerting for performance, SLA breach, etc. But more importantly, survey the business heavily. And Listen to the results. • Be ready to be wrong. Be comfortable to admit mistakes. Nothing stymie's innovation and action more than fear. • Readiness and training are paramount. Change with the times, more so, innovate with the times.
  • 18. And more importantly • Have fun. More time in life is spent working than anything else. Do what you love. Love what you do. • Remember, “if nothing ever breaks, IT isn’t innovating to improve business productivity” • A system that worked great 10 years ago, does not a great system today make.

Editor's Notes

  1. The well meaning IT and Security department tries to protect the user base from malware, spyware, industrial espionage, viruses, worms, software bugs and defective hardware whilst increasing user productivity and managing corporate assets (physical and intellectual property).
  2. The IT user is not a child, though often they are treated as such by the departments that manage and provide services to them. Most often users are college educated, mature, professional individuals. Some are quite tech-savvy themselves in fact.
  3. Now this dichotomy of IT administratorvs corporate user exists in almost all companies. IT administrators often have the attitude that their users akin to wayward children almost.Now there are reasons for implementing controls and impeding users from achieving some tasks without checks and balances.These can generally be broken down into Security, need for internal and external Audit, and preventing the corporate assets and communications from ending up on Wikileaks.