Discussion CIO should develop reasoned responses that are driven by the company objectives.

1 page answer to

Please respond to the following:
Take a position on whether or not the CIO should develop reasoned responses that are driven by the company objectives. Explain your position.

Explain how IT strategy facilitates organizational decisions that are related to the forces that shape the role of IT within an organization (consider domestic and global environments).

plus please provide a paragraph response to the following answer from another student.

I believe they should develop reasoned responses that come from the company objectives.  This is just another way that the IT department can show that “value” all companies are looking for.  By making sure the team is in line with current/future objectives, shows that they are working towards helping to drive that change in a company instead of just trying to maintain the norm.  This is how IT increases their budget and improve their equipment by showing the company that they are onboard for this new objective but this is the way we do it right so we maximize the potential of the company (Express, 2021).
The best way to start with trying to facilitate the decisions of your company is to keep security in mind.  There are several reports that can be referenced to aid in this security stance.  Security has become a huge talking point for several companies, both local and abroad, and it mainly comes from the different types of internet laws that reside around the world (Williams, 2019).  Several of our current attacks are coming from state-sponsored entities which needs to be addressed.  The only way a company can do that is to listen to their IT team on what is needed to prevent such attacks/espionage.  The IT department can even go back to the cause of the Target breach which involved the attackers going after the third-party HVAC company that remotely monitored Target’s A/C systems for their buildings.  The attackers could not breach Target head on, so they used a weaker associate to gain access to the system (Vijayan, 2014).  By presenting this type of information to the company, it can influence the future decisions they make and ensure that security is thought of in the beginning instead of as an afterthought.