Integrating security into IT operations
In the traditional model of IT management, dedicated security teams focused on defending the organisation's 'perimeter', while IT operations managed systems and devices behind the firewall. But that perimeter is no more. Core business applications are hosted in the cloud, and workers are connecting to the business from their home networks, often with their own devices.
This calls for more integrated IT and security operations. When every system, device or network connection is a potential entry point for cybercriminals, security checks and protocols must be embedded into all IT operations.
But how can organisations achieve this most effectively?
In a roundtable supported by Intel vPro, Tech Monitor will convene IT operations managers and decision makers to share their insight and experience. Topics for discussion include:
- Securing hybrid work
- Device selection and management
- IT operations tools, platforms, and processes
- Skills and collaboration