How have you integrated security considerations into routine IT decision-making processes to break down silos and ultimately close security gaps?

59 viewscircle icon3 Comments
Sort by:
Chief Information Security Officer8 hours ago

Security is now embedded in every aspect of our operations, although our culture is still adapting. For example, we have established standards for email access and now send security risk assessments to vendors. Security is a regular topic at board meetings, and recent incidents have led to revamping help desk processes, including implementing MFA and restricting password resets. The institution is increasingly proactive in engaging with security concerns.

VP of Information Technology8 hours ago

Managing both IT and security makes integration easier. MFA has been crucial in preventing BEC attacks, and we use tools like Cisco Duo and Microsoft Authenticate. With the shift to SaaS solutions, MFA is essential for single sign-on. Every IT change is evaluated for security implications, including new applications and password management. Security is always the top priority.

Sr. Director, Technology8 hours ago

The pace of threats has increased, and AI has given bad actors access to advanced tools. Most corporate applications are SaaS, requiring verification of vendor security protocols. We obtain SOC reports and, when necessary, enter into business associate agreements. Security reviews now extend beyond IT to marketing, sales, and other departments.

Content you might like

Yes, always54%

Yes, in most cases46%

It depends (comment to explain deciding factors)

No

View Results

Lack of mature vendor solutions54%

Trust in AI accuracy68%

Budget constraints18%

Skills to operate the tools29%

View Results
How have you integrated security considerations into routine IT decision-making processes to break down silos and ultimately close security gaps? | Gartner Peer Community