Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / The IT and Security Teams: Buddies or Rivals?

The IT and Security Teams: Buddies or Rivals?

March 19, 2020 by cbn Leave a Comment

InformationWeek, Dark Reading, and Interop have partnered to explore the evolving relationship between the general IT team and the security team. We invite you to take our survey.

Image: Gorodenkoff - stock.adobe.com

Image: Gorodenkoff – stock.adobe.com

Once upon a time in a corporate world long forgotten by most, all things technology were governed by a select team of specialists known collectively as “IT”.  Their rule was absolute on matters such as which technologies the company acquired, which applications were built, and who could use such tools, even when they could be used.

These IT gods established security commandments for their systems:

  • Don’t write down your password
  • Don’t leave your terminal or PC logged on when away from your desk
  • Only approved hardware and software can be used for company business
  • Keep the doors to IT and the computer room locked at all times.

That was just about all IT had to worry about when it came to security.

That is until November 2, 1988, when a graduate student named Robert Morris unleashed a worm on the Internet effectively shutting down thousands of Unix-based computers and the Internet itself. From that day on, information security grew from a ho-hum annual reminder to users into a critical business entity. Our access to core business systems, our jobs, and our personal information all had to be defended.

In fact, security or cybersecurity became one of the key functions of IT and a hot career choice, leading to today’s environment where the chief information security officer (CISO) often stands as a peer to the CIO and oversees a dedicated team of professionals with broad responsibilities.

So, how do the traditional IT group of developers and operations people and the security team work together? Do they?

InformationWeek.com and our associates at DarkReading.com and Interop set out to understand the dynamics of the IT and security teams in the enterprise world. We want to understand — and help our readers see — how the relationship between IT and security is working and evolving.

Who calls which shots? How are the two groups staffed? Where does each report? Who gets the budget increases? How do the groups communicate? Where do their responsibilities overlap? Are there separate groups at all?

With that in mind, we invite you to participate in our joint research project, a survey to study how the IT and security teams can best work together and the state of IT and security in today’s enterprise world.

Whether you are an IT professional or a cybersecurity professional — or someone who works on both — we truly appreciate your help with this survey on how the two disciplines work together (or if they don’t).

Key survey facts:
-The survey will only take about 7 minutes of your time.
-You may opt in to receive the forthcoming report once the research is complete.
-You will have an opportunity to enter a drawing where five randomly selected winners will each receive a $50 Amazon gift card from Informa Tech.
Take the survey:

As with all of our surveys, all responses are anonymous and will remain strictly confidential. The data you provide will be reported in aggregate with that of other participants.

Thank you in advance for taking time out of your busy schedule to help with this survey. Feel free to email our research director ([email protected]), if you have any questions.

Jim Connolly is a versatile and experienced technology journalist who has reported on IT trends for more than two decades. As editorial director of InformationWeek and Network Computing, he oversees the day-to-day planning and editing on the site. Most recently he was editor … View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.

More Insights

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: Uncategorized

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • How Azure Cobalt 100 VMs are powering real-world solutions, delivering performance and efficiency results
  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,322)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in