The CTO from the Sesame Workshop found that getting legal buy-in opened up a slew of new technologies for IT and its customers. Security concerns, like those that lead to insider fraud, are real, but you still need to have the trust of your users. As the CTO of the Sesame Workshop (Big Bird and Elmo are part of his user base), Noah Broadwater was one of the most popular speakers at IDG Enterprise’s recent Consumerization of IT in the Enterprise conference. (IDG Enterprise is the parent company of CIO magazine.)But it wasn’t just his duffel bag—packed with giveaways such as Grover dolls and Oscar the Grouch lunch boxes—that gave him such a natural advantage on stage. It was his frank advice to IT organizations scrambling to cope with the onslaught of consumer technologies, social media and mobility demands.“Go talk to legal before you do anything,” Broadwater said. “Once you have legal on your side…you can embrace tons of new technologies.” He further urged IT groups to “stop treating users like idiots” in the realms of security and data protection. “Users understand security better than you think. Explain to them what you’re doing and why,” he added. “IT is there to protect and to serve.” That sentiment resonated deeply with me and reminded me of the concerns I’ve heard so many CIOs express in recent months. What’s the best way to serve the escalating demands of uber-mobile, consumer-IT-crazed businesses while still protecting the company’s data and intellectual property? Our cover story in this issue (“How CIOs Can Learn to Catch Insider Crime“) explores another aspect of the protect-and-serve duties that are inherent in the CIO’s role: preventing and detecting insider crime. This is a tough subject to write about because few CIOs will speak on the record about it. Senior Editor Kim S. Nash found that basic technology safeguards are all too often missing in fraud cases. In more than 1,800 cases of insider financial crimes, she notes, “IT controls came in dead last” among the 11 methods of fraud detection identified by investigators. As consumer technologies pour into the enterprise—and as unprecedented amounts of data are being accessed from mobile devices—now is the perfect time to raise these issues in your own company. (Go talk to legal.)As we talked to various experts for this story, it became clear that no single executive or department can carry the full weight of anti-fraud activities. But the CIO emerges as a potentially powerful voice in making this everyone’s business. Maryfran Johnson is the editor in chief of CIO Magazine & Events. Email her at mfjohnson@cio.com. Related content brandpost Sponsored by Palo Alto Networks Operational technology systems require a robust Zero Trust strategy in 2024 Zero Trust provides a foundation for creating a stronger security posture in 2024. By Navneet Singh, vice president of marketing, network security, Palo Alto Networks Dec 05, 2023 6 mins Security brandpost Sponsored by AWS in collaboration with IBM How digital twin technology is changing complex industrial processes forever As the use cases for digital twins proliferate, it is becoming clear that data-driven enterprises with a track record of innovation stand the best chance of success. By Laura McEwan Dec 05, 2023 4 mins Digital Transformation brandpost Sponsored by AWS in collaboration with IBM Why modernising applications needs to be a ‘must’ for businesses seeking growth Around one-third of enterprises are spending heavily on application modernisation and aiming for cloud native status. The implications for corporate culture, structure and priorities will be profound. By Laura McEwan Dec 05, 2023 5 mins Digital Transformation opinion 11 ways to reduce your IT costs now Reorienting IT’s budget toward future opportunities is a big reason why CIOs should review their IT portfolios with an eye toward curbing unnecessary spending and realizing maximum value from every IT investment. By Stephanie Overby Dec 05, 2023 11 mins Budget Cloud Management IT Governance Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe