ÀÌ IDC Perspective¿¡¼´Â Å©°Ô º¯ÈÇϰí ÀÖ´Â IT ȯ°æ¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù. µðÁöÅÐ Çõ½ÅÀ¸·Î ÀÎÇØ »õ·Î¿î °ø±Þ¾÷ü°¡ µîÀåÇϰí, ·¹°Å½Ã ½Ã½ºÅÛÀ» Æó±âÇÒ ¼ö ¾ø¾î ±â¼ú ºÎä°¡ Áõ°¡Çϰí ÀÖÀ¸¸ç, ITÀÇ ¹ÎÁÖÈ¿Í °©ÀÛ½º·¯¿î AIÀÇ Æø¹ßÀûÀÎ Áõ°¡·Î ÀÎÇØ °Å¹ö³Í½º¿Í °¨µ¶ÀÌ °ÅÀÇ ¾ø´Â »óÅ¿¡¼ ±â¼ú ¹ßÀÚ±¹ÀÌ È®ÀåµÇ°í ÀÖ½À´Ï´Ù. ÀÌ ¸ðµç °ÍÀÌ Á¶Á÷À» Áö¿øÇÏ´Â ±â¼ú ½ºÅÃÀÇ º¹À⼺À» °¡Áß½Ã۰í ÀÖ½À´Ï´Ù. º¹À⼺ÀÌ Áõ°¡ÇÏ¸é ½Ã½ºÅÛ ¸®½ºÅ©°¡ Áõ°¡ÇÕ´Ï´Ù. ±â¾÷ ³»¿¡¼ »õ·Î¿î ´ÜÀÏ Àå¾Ö ÁöÁ¡ÀÌ Áõ°¡ÇÏ°í °ø°Ý º¤ÅͰ¡ »çÀ̹ö À§ÇèÀ» Áõ°¡½Ãŵ´Ï´Ù. ±â¼ú ½ºÅà ³» ´ÜÀÏ ÁöÁ¡ÀÇ Àå¾Ö´Â »çÀ̹ö °ø°ÝÀ¸·Î ÀÎÇÑ °ÍÀ̵ç, ±â¼ú ºÎä¿¡ ½Ã´Þ¸®´Â ½Ã½ºÅÛÀÇ Àå¾Öµç, »ç¶÷ÀÇ ½Ç¼öµç »ó°ü¾øÀÌ Á¶Á÷ ¿î¿µ¿¡ ¸·´ëÇÑ ¿µÇâÀ» ¹ÌÄ¥ ¼ö ÀÖ½À´Ï´Ù. ½Ã½ºÅÛÀû À§ÇèÀº ¿À´Ã³¯ ¸ðµç Á¶Á÷ÀÇ Áß¿äÇÑ °ü½É»çÀ̸ç CIO, CISO, IT ÆÀ Àü¹Ý¿¡¼ ¼±Á¦ÀûÀ¸·Î ÇØ°áÇØ¾ß ÇÕ´Ï´Ù. Á¶Á÷Àº IT ¹× ¿£ÅÍÇÁ¶óÀÌÁî ½Ã½ºÅÛÀÇ ½Ã½ºÅÛÀû À§ÇèÀ» ÀνÄÇϰí ÇØ°áÇÔÀ¸·Î½á ÁÖ¿ä Áß´ÜÀÇ °¡´É¼º°ú ¿µÇâÀ» ¿ÏÈÇÏ°í ¿î¿µ º¹¿ø·ÂÀ» À¯ÁöÇÒ ¼ö ÀÖ½À´Ï´Ù. "µðÁöÅÐ Çõ½Å, ·¹°Å½Ã ½Ã½ºÅÛ ¹®Á¦, AIÀÇ È®»êÀ¸·Î Ư¡Áö¾îÁö´Â ºü¸£°Ô ÁøÈÇÏ´Â IT ȯ°æÀ¸·Î ÀÎÇØ Á¶Á÷ÀÇ ±â¼ú ½ºÅà ³» º¹À⼺ÀÌ Å©°Ô Áõ°¡Çϰí ÀÖ½À´Ï´Ù."¶ó°í IDCÀÇ IT ÀÓ¿ø ÇÁ·Î±×·¥(IEP) ºÎ¿¬±¸ °í¹®ÀÎ Ken Knapton ¹Ú»ç´Â ¸»ÇÕ´Ï´Ù. "ÀÌ·¯ÇÑ º¹À⼺Àº ½Ã½ºÅÛ ¸®½ºÅ©¸¦ ÁõÆø½ÃÄÑ »õ·Î¿î ´ÜÀÏ Àå¾Ö ÁöÁ¡À» »ý¼ºÇÏ°í °ø°Ý º¤Å͸¦ È®ÀåÇÏ¿© ¿øÀο¡ °ü°è¾øÀÌ ¿î¿µ¿¡ ¸·´ëÇÑ ¿µÇâÀ» ¹ÌÄ¥ ¼ö ÀÖ½À´Ï´Ù. ¿À´Ã³¯°ú °°ÀÌ »óÈ£ ¿¬°áµÈ ¿£ÅÍÇÁ¶óÀÌÁî ȯ°æ¿¡¼ ¿î¿µ º¹¿ø·ÂÀ» À¯ÁöÇÏ°í ±¤¹üÀ§ÇÑ Áß´Ü °¡´É¼ºÀ» ¿ÏÈÇÏ·Á¸é CIO, CISO, IT ÆÀÀÌ ½Ã½ºÅÛ ¸®½ºÅ©¸¦ »çÀü¿¡ °ü¸®ÇÏ´Â °ÍÀÌ Áß¿äÇÕ´Ï´Ù."
This IDC Perspective discusses the IT landscape that is shifting in significant ways. Digital transformations are introducing new vendors, the inability to retire legacy systems is increasing tech debt, and the democratization of IT and sudden explosion of AI is expanding tech footprints with little governance and oversight. All of this adds to the complexity within the tech stack supporting the organization. Increased complexity leads to increased systemic risk. New single points of failure multiply within the enterprise, and attack vectors increase the cyber-risk. The failure of any single point within the tech stack can have an outsized impact on the operations of an organization; whether that failure is due to a cyberattack, failure of tech debt-ridden system, or human error ultimately doesn't matter. Systemic risk is a significant concern for all organizations today and must be addressed by proactive CIOs, CISOs, and IT teams in general.Acknowledging and addressing systemic risk in IT and enterprise systems enable organizations to mitigate the likelihood and impact of major disruptions and maintain their operational resilience."The rapidly evolving IT landscape, characterized by digital transformations, legacy system challenges, and the proliferation of AI, is significantly increasing complexity within organizational tech stacks," says Dr. Ken Knapton, adjunct research advisor for IDC's IT Executive Programs (IEP). "This complexity amplifies systemic risk, creating new single points of failure and expanding attack vectors, which can lead to outsized impacts on operations regardless of the cause. Proactive management of systemic risk by CIOs, CISOs, and IT teams is crucial for maintaining operational resilience and mitigating the potential for widespread disruptions in today's interconnected enterprise environments."