Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementSecurity Education & Training

Easing the friction between IT and security

By Patrick Hayes
people at work desk high fiving

Image via Unsplash

November 13, 2023

The reputational risks and financial costs of cybercrime are only growing in this interconnected world. “Mega breaches,” costing $1 million or more, are rising — up 36% from 27% in 2022, according to PwC’s 2024 Global Digital Trust Insights survey. Yet, despite the potential liabilities, one-third of companies surveyed admitted to not adhering to standard cybersecurity practices to avoid them. 

Considering how organizations, especially medium to large enterprises, often address security risks, the number flaunting security protocols isn’t so surprising. Instead of operating with a comprehensive strategy to protect their cyber resources, many still rely on a patchwork approach with separate IT operations and security teams, who often are at odds with one another. 

But, in today’s reality, as both technology and cyber threats grow more sophisticated, organizations can reap big rewards when they unify IT operations and IT security. Together, they can do their best work — recognizing, investigating and responding to both IT and security incidents as well as understanding the difference, and growing and protecting the organization at the same time.

Addressing the roadblocks

Plenty of roadblocks keep IT operations and IT security separated. 

Their objectives differ. The operations team’s goal is to ensure an organization’s systems are running smoothly to support its daily work. Security professionals are laser-focused on digital threat assessments, addressing vulnerabilities and reducing risk.

They often fight over limited IT resources. While operations staff may see the need for a new software solution to streamline a business process, their security team colleagues may argue that that same pot of money is better spent to safeguard it. 

And there may be communication challenges. In the eyes of operations staff, security measures may just slow productivity because of poorly integrated tools or false positives that flag a potential security risk. Meanwhile, security teams may be increasingly frustrated that their colleagues on the operations side aren’t following what they consider to be commonsense security protocols.

But the benefits of bringing the two together far outweigh whatever work is required to overcome those engrained objections. When IT operations and IT security are unified, enterprises can reap big rewards like these: 

Greater visibility across the IT enterprise

Enterprises are grappling with any number of IT-related challenges to operate and secure their data. Legacy systems may be difficult to integrate with cybersecurity tools. Organizations may operate with multiple interconnected networks — from cloud environments to remote offices and virtual private networks (VPNs). IT budgets may be limited.

When partnering, IT operations and IT security staff can get on the same page with shared tools and data. With the same information and resources as a foundation, IT teams gain a mutual understanding of each other’s needs and challenges, and that allows them to tackle those issues together.

Improved response and deeper resolution

Whatever the incident, detection, classification and response capabilities all are boosted when security and operations teams collaborate. That’s because each group brings their own expertise to the table.

During a breach, for example, while the security team responds to an attack, operations team members can ensure impacted systems are isolated and prepare for a swift return to normal activity. Once it's resolved, they can work together to update security patches and conduct a forensic analysis of what happened and why. 

Less confusion 

Finally, when their work is aligned, IT teams can start speaking the same language. And that means less confusion as network concerns, security issues and questions about the rate of false positives pop up. With that greater visibility and understanding, each team realizes the importance and interconnectivity of the other’s responsibilities and objectives. Now, they’re working in partnership to ensure that organizations have both the systems and security they need. 

Collaborative, cooperative, coordinated IT

Of course, all of this is easier said than done. Moving away from the traditional siloed approach to IT operations and security management requires deliberate work and a top-down approach. Senior leadership must support the cooperative effort and create governance structures that monitor it.

From there, other tasks include policy and planning changes. A cross-functional team with representatives from both IT operations and IT security teams is a first critical step. Defining the clear roles, common goals and responsibilities of each team and documenting those policies and procedures will bridge gaps. To ensure coordinated responses to incidents, collaborative incident response plans that involve both teams are also crucial. 

Relationships should be forged. Regular meetings and workshops between operations and security staff to discuss questions and concerns will foster open communication. Cross-training opportunities for IT and operations staff support mutual understanding. Shared threat intelligence from IT security teams to IT operations teams can build trust. 

The right tools are vital as well. Integrated solutions that provide visibility into both operational and security concerns, in particular, can help teams more effectively monitor and manage an enterprise’s IT environment. 

Systems and attitudes can be slow to change; this coordinated effort may take time to perfect. But, as the walls between IT security and IT operations come down, enterprises will start building up a collaborative and cooperative culture that supports business goals and safeguards its operations. And that will only pay large dividends into the future. 

KEYWORDS: collaboration with IT IT leader security leaders security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Patrick Hayes is Chief Strategy and Product Officer at Third Wave Innovations.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • two people shaking hands

    Building a stronger bond between IT and physical security

    See More
  • Five hands circled together

    3 tips to help bridge the gap between identity and security teams

    See More
  • passenger-airport-freepik1170.jpg

    The evolution of airport security and the threats that drive it

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Risk Analysis and the Security Survey, 4th Edition

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing