Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

How Uniting Security and Operations Makes for a Happy, Mission-Benefiting IT “Family”

By Travis Rosiek
family-enews
December 13, 2016

Happy holidays, right everybody?

It’s the time of year, after all, when extended families gather to celebrate the season with warm embraces and holiday cheer – up until the moment when we realize that, while we love each other, we don’t really enjoy being in the same room together for very long.

Because “you can’t pick your family,” intense personal dynamics can lead to tension and even hostilities. Sometimes, a heated argument will emerge during a debate about sports or (especially now) politics. Long-simmering resentments over perceived slights from decades ago play a role, as does an excessive competitive element as we “compare notes” over whose house is bigger, whose car is nicer and whose kids are smarter.

Modern organizations can be like this, particularly when it comes to their IT systems management and security operations teams. Indeed, as they one-up each other as to which performs the most critical functions – and which “does it better” – these two teams often act like estranged siblings.

It doesn’t have to be this way. Instead of perceiving of the two as “at odds,” think of them as we do the human mind: The right side of the brain is the “liberal arts major,” seeking to dazzle the world with its command of creativity and the arts. The left side is “the practical, serious one,” immersed in all things logical, including science and mathematics. If we only had one half, we’d accomplish so much less. But with both sides thriving within a single, brilliantly aligned interface, we are ready to tackle just about anything.

At the moment, IT systems management and security operations remain extremely fragmented – to the point where many businesses which contract out this work will hire two different companies to do it. Even if both functions are staffed in-house, the two teams typically rely upon completely different tools and programs. What’s more, they’re frequently based in different locations. And, alas, they’re focused on different goals and strategies.

The upshot: They can’t benefit from each others’ insights, and their competing priorities clash. If the network suddenly slows to a crawl, for example, security may blame operations, citing buggy software or aging infrastructure. Obviously, this could lead to counter finger-pointing and continued infighting.

If the two were aligned – unified by a “single pane of glass” vision and a set of common tools – they could come to a shared conclusion. In a scenario that’s quite relevant these days, they’d recognize that an ongoing cyber attack was behind the network disruption. Together, they’d raise enterprise-wide visibility and quickly diagnose the issue, to more readily and effectively respond. In the case of an advanced persistent threat which has avoided detection from security, the input of data from operations in real-time can help pinpoint the troubled area(s) and expedite mitigation before the exfiltration of massive amounts of proprietary and/or sensitive information occurs.

That’s just one hypothetical but very real situation. Here are three additional ways that companies build value by bringing together operations and security teams:

 

The teams tackle shadow IT together.

The increase of shadow IT – employees and/or business departments acquiring and deploying tech solutions on their own, without approval from IT – is raising considerable concerns about security, for good reason. Nearly 72 percent of IT managers and executives do not know the number of shadow IT apps in use within their organizations, according to research from the Cloud Security Alliance (CSA). Whether it’s unauthorized software running on official systems or a smartphone plugged into the network, hackers take full advantage by exploiting subsequent vulnerabilities. But when security teams have systems information at their fingertips, they swiftly check and identify introduced programs, devices, etc. as either authorized or shadow – then respond in the best interest of their organization.

 

They combine workstation and server monitoring.

There are solutions that monitor workstations. There are those which monitor servers. Rarely does one monitor the two together. Yet, systems teams are responsible for tracking both. Through security operations-provided tools, systems management integrates workstations and servers for optimal monitoring at all ends of the spectrum, further advancing situational awareness.

 

They alleviate conflict while enhancing collaboration on better best practices.

As the famous 1970s song title asked, “Why Can’t We Be Friends?” Maybe it’s because systems and security pros work pretty darn hard, all the time. So tempers flare when the network goes MIA or a hacker steals data, especially when the two sides don’t perform as a singular unit. Too frazzled and frustrated for niceties, they rush to judgment to foster an “us against them” environment. With total alignment, however, counterproductive conflict gives way to mission-benefiting communications. Operations and security teams collaborate, for instance, upon their daily needs and challenges, and then develop best practices to address them. Then, they combine resources to educate users, helping them understand the consequences of shadow IT and other potentially harmful actions. They illustrate how certain user-introduced technologies create burdens for operations and security – and how that simply hurts business, for everyone.

Like family members, operations and security teams usually can’t “pick” each other. Their respective hiring managers make those calls. But every, single member of the teams have chosen to work for the same company, which means they can come together to support shared organizational strategies. With a unified, fully integrated vision of systems, apps, devices, etc. and common tools to monitor and oversee it all, they’ll get the most out of each others’ strengths. This will inspire much “cheer,” during the holidays – and beyond.

KEYWORDS: Chief Security Officer (CSO) CISO cybersecurity team security convergence security silo

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Travis Rosiek, Chief Technology Officer for Tychon

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data-center

    What Happens When 'Tool Sprawl' Makes IT Security Operations Too Complex

    See More
  • video wall SOC

    How to build a security operations center on a budget

    See More
  • SOC

    Reducing the Chaos: How to Create a Security Operations Center that Helps

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • operations center.jpg

    Security Operations Center Guidebook

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing