Skip to content

September 2, 2022

Summer Read Along: A Seat At The Table | Chapter 12 – Shadow IT

By Lucy Softich

Cover of A Seat at the Table: IT Leadership in the Age of Agility by Mark Schwartz, which also discusses the similarities between Shadow IT and open source software.In this series of blog posts, follow along as we revisit Mark Schwartz’s book A Seat at the Table: IT Leadership in the Age of AgilityFive years after its publication, it’s still highly relevant and chock full of tips, tactics, and learnings. Join us as we follow along with Online Marketing Assistant Lucy Softich as she reads through the book for the first time. Make sure you start with the introduction post!

Chapter 12: Shadow IT has an ominous name, but it is surprisingly upbeat.

Working in the Shadows

You are probably familiar with the term “shadow IT,” but I wasn’t, so I will briefly define it: shadow IT occurs when someone from outside the IT department starts using a system that the IT department did not establish.

This description immediately made me think of the “Rebel Alliance” group in The Unicorn Project; a group of engineers and developers that created their own IT systems within Parts Unlimited, eventually turning into the team behind the titular Unicorn Project and assisting in the full DevOps transformation detailed in that book and The Phoenix Project

And yes, that probably is an example of shadow IT, but it can be as simple as a team using a messaging app that’s different from the one used by the company at large or a single employee storing information on a non-work-issue flash drive.

A Red Flag, Not an Act of War

These seemingly small actions can have consequences, but Mark argues that shadow IT is more of a sign that something in IT is not working than an outright insult to IT. For whatever reason, a team has a need that’s not being filled by IT, so they find a way to fill it themselves.

Of course, the concern here is that, without the oversight of the IT department, these rogue users could be opening the company up to security concerns and vulnerabilities. This is a legitimate concern, but Mark argues that the solution isn’t to crack down on shadow IT but embrace it.

Coming into the Light

Mark harkens shadow IT to the open source world. In open source, there is no hierarchy; there are no managers issuing demands. Everyone gets to choose what they work on and how because it is a voluntary process. Similarly, shadow IT is not done because someone commands it; it is done voluntarily to solve a user’s specific needs as part of a community. And Mark says that bears a lot of similarities to the modern IT landscape.

Accompanying our transition to an Agile IT world and subtler in its implications has been the rise of community as a way of practicing IT.

Following this logic, it is not the act of shadow IT that is the problem, it’s the secrecy. If IT departments are open and willing to work with employees outside their departments to help them solve problems themselves, and these things are not being done “in the shadows” but out, visible to all, as with an open source project, then the arguments against shadow IT really just boil down to one: lack of control.

Relinquishing Control

This book circles back to control structures over and over again. The CIO’s desperate plea for that seat at the table is a request for more control. But on the other end, the shift to Agile and DevOps structures is about shifting control from leaders, who are too removed from daily work to be able to effectively dictate it, into the hands of the workers who have the highest knowledge about their job. 

In Mark’s view, a ban on shadow IT is just another attempt from IT to exert control on an entity that makes them feel powerless: the business. This battle for control can only keep us stuck in the same dysfunctional relationship that IT and the business have been in all along. Instead of continuing this battle, we need to learn how to step back and work with the business, not for it (or against it). And part of that is acknowledging that the IT department does not have a monopoly on IT knowledge, especially in this day and age, where more and more people are IT savvy and, increasingly, systems are incredibly user-friendly. It’s time to give up some of that control in order to be an equal partner in the business, instead of just a neglected department in the basement.

And that’s it for Part II! But don’t worry, we’re not done yet. In our next post, we’ll start looking at Part III: Sitting at the Table.

If you’d like to read more about flattened hierarchy structures, akin to the open source world, you should check out Matt K. Parker’s A Radical Enterprise: Pioneering the Future of High-Performing Organizations.

Jump to a Chapter

Introduction & Chapter 1
Chapter 2: Kept from the Table
Chapter 3: A Nimble Approach to the Table
Chapter 4: Planning
Chapter 5: Requirements
Chapter 6: Transformation
Chapter 7: Enterprise Architecture
Chapter 8: Build Versus Buy
Chapter 9: Governance and Oversight
Chapter 10: Risk
Chapter 11: Quality
Chapter 12: Shadow IT
Chapter 13: The CIO’s Place at the Table & Chapter 14: Exhortation and Table Manners 


- About The Authors
Avatar photo

Lucy Softich

Lucy is the Marketing & Social Media Coordinator at IT Revolution. She has a background in writing, marketing, and business.

No comments found

Leave a Comment

Your email address will not be published.

Jump to Section

    More Like This

    Lanyards, Icebergs, and Mario: Lightning Talks from DOES Las Vegas 2022
    By Lucy Softich

    One of our favorite events at DevOps Enterprise Summit is the Lightning Talks. In…

    An Automated Governance Superhighway: A Story of Changing the Game to Achieve Your Goals
    By IT Revolution , Michael Edenzon , John Rzeszotarski

    It's okay not to be a perfect steward of DevOps, especially in highly regulated…

    The Frictionless Dev Experience
    By David Anderson , Mark McCann , Michael O’Reilly

    This post is excerpted from The Value Flywheel Effect: Power the Future and Accelerate…

    Sustainability in Software
    By David Anderson , Mark McCann , Michael O’Reilly

    This post is excerpted from The Value Flywheel Effect: Power the Future and Accelerate…