Information Security in the Age of the Extended Enterprise*
Tuck School of Business

By M. Eric Johnson
Professor and Director, Center of Digital Strategies

Business integration, once accomplished by physically co-locating legions of employees in large vertically integrated firms, has been unshackled by information technology (IT). The rise of cheap computing linked together via the Internet has so rapidly changed the way work is organized and conducted that executives, management theorists, and policy makers are all struggling to understand the full spectrum of opportunities and consequences. Opportunities, such as outsourcing, are enabling huge cost reductions and the creation of many new business models. Consequences, such as the fight to maintain information private and secure, cost firms billons of dollars and create risks unimagined ten years ago.

For firms like Hewlett-Packard, the changes have been breathtaking. Only a few years ago, HP located product designers, marketers, and manufacturing workers in the same campus. Products on the workbench in R&D could be carried down a single flight of stairs to an assembly line for prototyping and testing. Marketers played volleyball over the lunch hour with design engineers - often exchanging ideas on customer needs or competitive threats. Today, many of those same individuals work within an extended enterprise comprising different companies spread over globe and communicating via the web. Through a web browser, a designer can implement an engineering change for a factory half a world away; a procurement specialist can change a supplier order; a supply chain manager can monitor an outsourced factory's production; or a customer engineer can coordinate a delivery. And every one of those interactions could be potentially observed or disrupted by youthful hackers seeking a thrill or other more malicious individuals pursuing competitive gain.

These changes are certainly not limited to technology firms like HP. The Internet has dramatically improved the ability of firms, of any type or size, to shift work to it most efficient location. For example, Wal-Mart has moved many traditional retail functions back to its suppliers and now requires all of them to use electronic communications for coordinating routine purchasing and supply chain planning. Likewise, auto makers such as GM have pushed product design functions back to their suppliers and now exchange detailed product design information over the web with suppliers around the globe. This increasing dependence on information availability coupled with rising fears of Internet security has led many global companies to make substantial invests in secure enterprise computing platforms. Yet, when recently surveyed by Information World, few CIOs said they felt truly secure. For many smaller firms, information security is a more serious question: routine viruses and worms often have a disproportionate effect on smaller firms.

Now, with the rush towards outsourcing and low cost sourcing, nearly all large firms face risks within their own company and across their supplier base. These risks run the range of supply disruptions and delays to theft of shared intellectual property and customer disappointment. Often these risks stem from a key business enabler - IT integration both within and across firms. Virtual teams with members from different firms mingle corporate and personal data communicated on a wide range of personal devices from laptops to PDAs and cell phones - many of which have security gaps. Seeking to speed every aspect of their business, firms have stitched together many applications from manufacturing and distribution to accounting and human resources. In doing so, they often inadvertently expose new security vulnerabilities. For example, many older manufacturing control applications were developed to run in isolation - with little thought to security. Exposing those systems through integration to other business systems often opens many network vulnerabilities. Likewise, when two firms tie their networks together to speed the free flow of information, imbalances in network security can lead to new vulnerabilities - a virtual animal swing door between the two firms where anything can come and go. Integration between firms creates efficiencies but the resulting interdependencies also create risk. As with airline baggage handling across multiple airlines, the risk of integrated networks is often dictated by the least secure firm.

Simply tracking and managing the flow of work around the globe can be challenging. Once outsourced, work and its associated information quickly flows into the supplier's supplier. The extended enterprise for any product, starting from the customer and reaching back to the smallest supplier can include thousands of firms. Maintaining control over sensitive information in the extended enterprise is daily becoming ever more challenging.

Raytheon learned this lesson last summer when it signed an outsourcing agreement with IBM to manage the development of Raytheon's SAP implementation. When IBM indicated that it planned to use Indian subcontractors to keep costs low, executives at Raytheon quickly realized that they had a problem. Complying with US regulations and ensuring that sensitive aircraft design data was not vulnerable would not be easy. With work of all types being outsourced, from payroll management to patient billing, questions about privacy and data security arise faster then the answers.

You need not be a defense contractor or a hospital to face a multitude of security and privacy issues. Deleting another handful of potentially virus-infected emails from your inbox has become as routine as wiping your feet on the entry mat on your way into the office each morning - all part of the ritual of starting another business day. It is all too easy to see these small security lapses as nothing more than a nuisance of working in the Internet age. Yet, like those who manage worker safety or quality control know, small failures often precede much more devastating outcomes. What might be cuts and bruises today can be a fatality tomorrow. And the analogies between information security and safety/quality management don't end here. Many lessons for improving security can be adapted from playbook of the quality movement.

What Can Be Done?

Those hoping that technology will solve our security problems will be disappointed. Even firms who are in the business of selling technology solutions are quick to admit that technology alone will not provide security. At a recent summit, hosted by Tuck's Center for Digital Strategies and Cisco Systems, CIOs from diverse industries shared successes and frustrations in managing security. Across the group, there was strong agreement that information security is first and foremost a management problem. Key to our discussion on successful security management was culture, education, and effective risk measurement.

It is so tempting to think that IT security is the responsibility of information technology group. Nothing could be further from the truth. During the quality revolution, the firms that found quality breakthroughs were the ones that realized that quality could be not delivered by the quality control department. It had to be part of the organization's culture. Security, like quality, is everyone's responsibility. Business managers cannot be passive, waiting for protection from the information security police. Rather information chiefs must articulate the risks, like any risk faced by the business, and as a team, executives must balance the risks. Brad Boston, Cisco's CIO described how his organization moved from a traffic cop that simply said yes or no to business manager requests to one that helped them make good decisions. "Our job is to identify the risk. The threat of that risk actually occurring, the probability, and tell what the options are to remediate it. Then a business decision is made about what risks are acceptable and which risks are not." This responsibility resides at every level in the organizations - including the board. One CIO complained to me that when he presents updates to his board on new applications their eyes light up. But when he talks about security, he sees them glaze over. Having board members who understand the risks and can help other members see those risks is key to effective information technology governance and to building a culture of security.

Education throughout the organization is an equally important element of building a culture of security. Like organizations suffering sloppy safety management and its resulting injuries, security requires attention to details throughout the organization. But security education must be targeted and relevant to each individual's responsibility. Simply broadcasting fear does little to improve security. Too many security managers have fallen into the Chicken Little role - crying the 'sky is falling' simply to generate awareness. This approach gains some attention at first, but has little long term effect. For CIOs, gaining and maintaining the confidence of the other C-level executives requires articulating the risks and opportunities in the business context - not simply forecasting doom.

Scott Day, Cargill's Global Information Protection Manager described how the agricultural conglomerate segmented its training. "We've identified what the roles are and the business unit leaders that are in those roles. What does the business manager need to know? He doesn't give a rip about TCP/IP but he needs to know how it affects his decision rights... We've taken that on because we think that's something that will help internalize it into the culture. When everybody knows what it is they are responsible for and how they are going to be held accountable, then they can go get what they need and make sure they are up to speed on it."

Finally, achieving security across the extended enterprise requires carefully scrutinizing both suppliers and customers - continuously evaluating the security risk they pose. For example, educating your customers about the risks and nudging them towards better security practices. For many financial firms, practices like forcing customers to use the most recent versions of web browsers, protect both customer and firm. Sometimes protecting the extended enterprise means not working with firms whose risks outweighs the business benefits. Jim MacDonald, CIO of Fidelity Management and Research described how information security issues have affected his firm's partnering practices: "Working with small technology companies' terrific innovative systems is an issue for us in that we tend to like those companies because they can help us get a competitive advantage. [However] when we go in and do security assessments, [we find] it's usually not been an area of focus for the company and may be lacking somewhat. We've gone slower creating partnerships with those types of companies that we're not happy about because we see the technology, and it's terrific, but they just don't have enough [security] emphasis."

Qualifying suppliers on their IT security risk is as important as measuring their financial risk or there quality. As Mark Hillman, a supply chain executive at General Motors, put it "if you do a lot of outsourcing, you need to go poke at everybody." Poking means assessing the risk and then monitoring it like other risks a supplier may generate. It means ensuring that suppliers' access to your internal systems doesn't comprise your network or that their own security is sufficient to protect shared intellectual property. In the new world of the extended enterprise, security can never be taken for granted.