How have you integrated security considerations into routine IT decision-making processes to break down silos and ultimately close security gaps?

745 viewscircle icon3 Comments
Sort by:
Chief Information Security Officera month ago

Security is now embedded in every aspect of our operations, although our culture is still adapting. For example, we have established standards for email access and now send security risk assessments to vendors. Security is a regular topic at board meetings, and recent incidents have led to revamping help desk processes, including implementing MFA and restricting password resets. The institution is increasingly proactive in engaging with security concerns.

VP of Information Technologya month ago

Managing both IT and security makes integration easier. MFA has been crucial in preventing BEC attacks, and we use tools like Cisco Duo and Microsoft Authenticate. With the shift to SaaS solutions, MFA is essential for single sign-on. Every IT change is evaluated for security implications, including new applications and password management. Security is always the top priority.

Sr. Director, Technologya month ago

The pace of threats has increased, and AI has given bad actors access to advanced tools. Most corporate applications are SaaS, requiring verification of vendor security protocols. We obtain SOC reports and, when necessary, enter into business associate agreements. Security reviews now extend beyond IT to marketing, sales, and other departments.

Content you might like

Threat detection & response 51%

Identity & access management 60%

Cloud security 47%

Security awareness training 28%

Other 2%

N/A

View Results
Read More Comments

Agiloft7%

Conga23%

DocuSign CLM (SpringCM)38%

Apttus6%

Ironclad4%

Coupa (Exari)4%

Other (discuss below)16%

View Results