In the past year, half of organizations (54%) have experienced a cybersecurity incident, and in the next 12 to 24 months, three-quarters (73%) of all organizations believe they are likely to be disrupted by a cybersecurity incident. Building cyber resilience so that you can persistently prevent, withstand, and recover from disruptions to your network infrastructure is becoming increasingly important. So, what is standing in the way? The answer lies in the disconnect between ITOps and SecOps.
Traditionally, ITOps has been mandated to build, support, maintain and keep available network infrastructure across various scenarios, in data centers and the cloud, and to support employees in offices and remote workers. In this hybrid world, the ability to keep networks up and running 24/7 becomes a top priority. IT and network teams build competence around network devices, and their success depends on their ability to protect network availability.
Meanwhile, SecOps has a mandate to detect and prevent breaches. Focused on threats to the organization, they discourage using technologies and processes that expand the attack surface. Because SecOps operates largely outside the network, they rely on ITOps to keep network infrastructure hardened against attacks and have little visibility into recovery when an attack happens.
Different mandates put ITOps and SecOps on different sides of the fence, working independently and with a limited understanding of their complementary roles in protecting the organization.
Now that SecOps is aligned with auditing and compliance, the disconnect is exacerbated. CISOs are reporting to Boards as the responsibility for business risk within the context of cyber now falls within SecOps.
Security spending is growing at double-digit rates as the cost and impact of breaches have increased, the importance of protecting data and systems and keeping networks running is well understood, concern over compliance and audits grows and fear of AI-enabled threat actors spreads.
But in this world, the trick isn’t to invest more in security monitoring and detection. A full 58% of the time, organizations learn of a security breach from external sources – either benign third parties (34%) or attackers themselves (24%). Instead, the trick is to mitigate risk faster than it can be exploited and withstand and recover quickly when disruptions happen. In other words, we must build cyber resilience and collaboration between ITOps and SecOps, which is fundamental to this effort.
The largest organizations say that the highest barrier to cyber resilience is transforming legacy technology and processes. When only 29% of ITOps teams fully understand SecOps and only 30% of SecOps teams understand the role of ITOps, it’s time to transform how these teams work together and eliminate a major barrier to cyber resilience.
If strengthening cyber resilience is a priority for your organization, here’s a checklist for ITOps/SecOps collaboration.
Organizations will continue to suffer disruptions from cyberattacks. Strengthening cyber resilience is the best way to mitigate the impact and keep your business moving forward. With a checklist that helps ITOps and SecOps teams find common ground, you can coordinate efforts that meet their core mandates of network availability and incident prevention and build a more cyber-resilient organization in the process.