Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

How Teaming Up with IT Protects the Enterprise

By Jill Knesek
IT employee
April 1, 2013

IT employeeOver the last few years, I’ve written several articles and blogs about how critical collaboration is to the success of a security organization. I’ve also worked very hard in my job to practice what I preach. Security will not work in a silo and unless we, as security practitioners, understand our business and its core assets, it will be pretty difficult for us to successfully ensure their security.

For me, it’s all about reaching across departmental lines, learning the business and how each unit adds value to the overall business strategy. If I understand the core function of a department, I will be in a much better position to implement a security program to protect it and help manage risk effectively.

During the last 10 years, IT departments have become the engines that drive our businesses. Technology is at the heart of every company with which I’ve worked. But if IT is the engine, then security is the oil that keeps the engine running smoothly. Now, I’m no mechanic, but I’m sure there are some folks out there who might prefer to compare security to the hood of a vehicle. However, if you’ll bear with me, I’d like to explain my analogy and, in the process, hopefully demonstrate why collaboration is essential to managing risk in your organization.

Security, up until a few years ago, was all about defense in depth and protecting the perimeter. We used the old castle with the drawbridge, moat and circling killer alligators to depict what “good” security looked like. This type of comparison would imply that the hood protecting the engine from external threats was the most critical security feature on a car, but as they say, “we’ve come a long way, baby.”  Today the perimeter no longer exists and things like cloud, BYOD and a mobile workforce have blurred the lines of where one company ends and another begins. So how do we manage risk and protect against threats in a perimeter-less environment? The answer is: We must embed security into our company’s DNA. We need to become the oil that runs throughout the organization, protecting the key working parts seamlessly. But no part of the business is more critical than our IT departments that design, develop, manage and maintain the technologies that run our most critical business functions.

While we were all diligently trying to get up to speed on risk management, cyber terrorism and APTs (Advanced Persistent Threats), something strange happened. Many of the business functions that traditionally resided within Security, Facilities and Human Resources departments were transitioned to IT.  The processes and procedures, which had previously been fairly manual and relied on a particular skill set housed in one of the aforementioned departments, were migrated to a single or multi-purpose appliance and relocated into the data center or server farm. Responsibility for the management, maintenance and ongoing support of those appliances was given to the IT department as they now required a technically adept owner to perform routine updates, patch management and backups.

Functions such as identity and access control now sit within the IT department in most larger organizations. Although you might still have physical identification badges for your employees, they now contain a special chip that allows access to both the company offices as well as the corporate network by inserting the ID badge into the laptop or computer. The software can determine if the person trying to log onto the corporate network from a particular location has actually scanned their badge at the main entry door to that facility to ensure proper access control. The policies, logs and maintenance of these systems now fall to IT. The security has been dramatically improved and risk reduced by using technology in this fashion; but unless security and IT are collaborating on the creation of policies and the monitoring of system alerts and logs, the value of the system is minimal.

Continuing with physical security – most of the security video systems are now IP-based and instead of VHS or DVR devices sitting in the Facilities department’s closet, the video, stored on servers in the data center, can be viewed immediately from anywhere in the world if required by an investigation. But again, the maintenance and support of these systems now belong to the IT department – so without proper agreement and coordination of the backup and deletion policies, the data you need to perform a proper investigation might not be available.

What about our phone systems, which were clearly under the control of Facilities historically? Today many companies are moving to IP telephony where the server and handsets are connected to the corporate network, and voice messages and phone logs are stored on servers. And where are these servers? You guessed it, in the data centers under the watchful eye of the IT department.

There are more examples which I think illustrate how critical the IT department is to the day-to-day business operations. Things such as mobile devices, which are a huge liability to the company, both from a cost basis as well as the protection of corporate data, have now become part of a company’s BYOD (Bring Your Own Device) policy. Access control to corporate data from a personally-owned device as well as the ability to locate a lost device or immediately wipe a suspected stolen device both fall within the management of IT. So creating a good working relationship between IT and security to respond quickly and effectively to the loss of a mobile device is critical to managing risk, as these devices are now able to hold more data than many desktops and laptops did just five to 10 years ago.

And what about social media? Websites like Facebook, LinkedIn and Twitter are all used for sharing and collaborating with peers around the world and across industries to allow an employee’s network of professional contacts to act as an asset in helping them solve technical and business problems more efficiently and effectively. But who controls access to these sites and ensures that sensitive corporate data isn’t leaked to the public? Yes, of course, you guessed it: IT.

Now I’m not saying that IT owns the corporate and security policies that are enforced. That should still fall to the Security, HR and Facilities departments. But unless you are working closely with your colleagues in the IT department who manage those enforcement devices, your ability to manage risk in your company will be tremendously hampered and your responsiveness negatively impacted. Since security’s role is to manage and mitigate risk for the company, it is imperative that you work closely with the IT department to ensure that – when the alarm bells go off and you need to be able to react – you have a process and plan in place to coordinate with your IT colleagues to get access to the systems and data to facilitate a speedy and fruitful investigation.

Collaboration is more than just communication. It ensures you are involved in any new projects from the outset so that security is included in determining the technologies implemented to perform critical business functions and the location and security of the devices installed; defining the policies that will be enforced; agreeing the schedule of system data backups, retention and removal; and most importantly, creating the processes that will be used to respond to incidents when they occur. This could be as basic as shutting off access to corporate facilities and networks via the identification badge of an employee who has gone rogue to accessing the video recordings of a particular location to investigate the theft of a corporate asset. Without plans in place and a good working relationship with the IT department, your ability to properly reduce risk in this new corporate structure will be difficult at best.

So in the end, why should you care about collaborating with your IT colleagues? It’s because as security professionals, our main function is to help the company manage its risks. And in today’s highly connected and technologically advanced society, those assets most critical to our businesses are those managed and maintained by our IT organizations. By collaborating with IT, we can ensure that the business functions most essential to our company’s success have been designed and developed with security embedded to ensure our ability to manage and mitigate risk in a high-risk environment.

KEYWORDS: cloud computing cyber security IT collaboration security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jill Knesek, Global Practice Head – Advise Assure, BT Global Services, is responsible for BT’s professional services security practice globally, ranging from strategy to portfolio to business capacity and demand planning through to investment, growth and enablement. Previously, she served as Chief Security Officer for BT Global Services. Jill has more than 15 years experience directing security programs, including directing security operations for the Cable & Wireless Managed Security Services group. She also served as a Special Agent for the FBI, assigned to the Cyber Crime Squad in the Los Angeles field office, where she was involved in several high-profile cases, including the Kevin Mitnick case. She was also the case agent for the first FBI undercover operation that infiltrated the hacker community. Jill’s credentials include CISSP (Certified Information Systems Security Professional) and CISM (Certified Information Security Manager).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Businesswoman on phone

    Leading through the storm: How CISOs and teams thrive under pressure

    See More
  • Jill Knesek

    Managing the CFO Relationship for Strategic Security Advantage

    See More
  • Jill Knesek

    The Joint Venture and Security’s Role

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!