Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

How Uniting Security and Operations Makes for a Happy, Mission-Benefiting IT “Family”

By Travis Rosiek
family-enews
December 13, 2016

Happy holidays, right everybody?

It’s the time of year, after all, when extended families gather to celebrate the season with warm embraces and holiday cheer – up until the moment when we realize that, while we love each other, we don’t really enjoy being in the same room together for very long.

Because “you can’t pick your family,” intense personal dynamics can lead to tension and even hostilities. Sometimes, a heated argument will emerge during a debate about sports or (especially now) politics. Long-simmering resentments over perceived slights from decades ago play a role, as does an excessive competitive element as we “compare notes” over whose house is bigger, whose car is nicer and whose kids are smarter.

Modern organizations can be like this, particularly when it comes to their IT systems management and security operations teams. Indeed, as they one-up each other as to which performs the most critical functions – and which “does it better” – these two teams often act like estranged siblings.

It doesn’t have to be this way. Instead of perceiving of the two as “at odds,” think of them as we do the human mind: The right side of the brain is the “liberal arts major,” seeking to dazzle the world with its command of creativity and the arts. The left side is “the practical, serious one,” immersed in all things logical, including science and mathematics. If we only had one half, we’d accomplish so much less. But with both sides thriving within a single, brilliantly aligned interface, we are ready to tackle just about anything.

At the moment, IT systems management and security operations remain extremely fragmented – to the point where many businesses which contract out this work will hire two different companies to do it. Even if both functions are staffed in-house, the two teams typically rely upon completely different tools and programs. What’s more, they’re frequently based in different locations. And, alas, they’re focused on different goals and strategies.

The upshot: They can’t benefit from each others’ insights, and their competing priorities clash. If the network suddenly slows to a crawl, for example, security may blame operations, citing buggy software or aging infrastructure. Obviously, this could lead to counter finger-pointing and continued infighting.

If the two were aligned – unified by a “single pane of glass” vision and a set of common tools – they could come to a shared conclusion. In a scenario that’s quite relevant these days, they’d recognize that an ongoing cyber attack was behind the network disruption. Together, they’d raise enterprise-wide visibility and quickly diagnose the issue, to more readily and effectively respond. In the case of an advanced persistent threat which has avoided detection from security, the input of data from operations in real-time can help pinpoint the troubled area(s) and expedite mitigation before the exfiltration of massive amounts of proprietary and/or sensitive information occurs.

That’s just one hypothetical but very real situation. Here are three additional ways that companies build value by bringing together operations and security teams:

 

The teams tackle shadow IT together.

The increase of shadow IT – employees and/or business departments acquiring and deploying tech solutions on their own, without approval from IT – is raising considerable concerns about security, for good reason. Nearly 72 percent of IT managers and executives do not know the number of shadow IT apps in use within their organizations, according to research from the Cloud Security Alliance (CSA). Whether it’s unauthorized software running on official systems or a smartphone plugged into the network, hackers take full advantage by exploiting subsequent vulnerabilities. But when security teams have systems information at their fingertips, they swiftly check and identify introduced programs, devices, etc. as either authorized or shadow – then respond in the best interest of their organization.

 

They combine workstation and server monitoring.

There are solutions that monitor workstations. There are those which monitor servers. Rarely does one monitor the two together. Yet, systems teams are responsible for tracking both. Through security operations-provided tools, systems management integrates workstations and servers for optimal monitoring at all ends of the spectrum, further advancing situational awareness.

 

They alleviate conflict while enhancing collaboration on better best practices.

As the famous 1970s song title asked, “Why Can’t We Be Friends?” Maybe it’s because systems and security pros work pretty darn hard, all the time. So tempers flare when the network goes MIA or a hacker steals data, especially when the two sides don’t perform as a singular unit. Too frazzled and frustrated for niceties, they rush to judgment to foster an “us against them” environment. With total alignment, however, counterproductive conflict gives way to mission-benefiting communications. Operations and security teams collaborate, for instance, upon their daily needs and challenges, and then develop best practices to address them. Then, they combine resources to educate users, helping them understand the consequences of shadow IT and other potentially harmful actions. They illustrate how certain user-introduced technologies create burdens for operations and security – and how that simply hurts business, for everyone.

Like family members, operations and security teams usually can’t “pick” each other. Their respective hiring managers make those calls. But every, single member of the teams have chosen to work for the same company, which means they can come together to support shared organizational strategies. With a unified, fully integrated vision of systems, apps, devices, etc. and common tools to monitor and oversee it all, they’ll get the most out of each others’ strengths. This will inspire much “cheer,” during the holidays – and beyond.

KEYWORDS: Chief Security Officer (CSO) CISO cybersecurity team security convergence security silo

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Travis Rosiek, Chief Technology Officer for Tychon

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video wall SOC

    How to build a security operations center on a budget

    See More
  • SOC

    Reducing the Chaos: How to Create a Security Operations Center that Helps

    See More
  • COVID-19 impact map for business reopening

    Domestic Operations Impact map shows how difficult it is for companies to reopen according to country

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • operations center.jpg

    Security Operations Center Guidebook

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!