Network Security: Age Is Just a Number
Although there is a lot of negativity surrounding the aging government IT networks, the maturity of these configurations often goes unnoticed. Organizations are on the tip of their toes to replace the legacy systems that supposedly stall their progress. While doing so, it is essential to note that the new infrastructure replacing the older ones needs to factor in the rapidly evolving security requirements along with traditional hurdles and difficulties. In addition to that, IT professionals installing the network should evaluate operations and corresponding policies that enforce the required network security protocols, weighing in the current and future threats that loom around the corner.
There is also the inevitable fact that malicious threats keep evolving with security sophistication, both internal and external to the network. This largely correlates to carelessness, untrained workforce, and internal loopholes. Industry leaders say that security training for all IT professionals associated with an organization plays a vital role in making or breaking a security infrastructure, enlightening them on various infiltration and sandboxed techniques to address possible breaches. Such an initiative can filter out redundancies, network complexities, and potentially screen rogue devices and users. Along with these practices, the ability to recognize and acknowledge the changing trends of IT networks, all the while considering the benefits of traditional practices play a vital role in determining optimal strategies to leverage the adequate performance out of an IT network.
By Chris Tjotjos, VP, Cisco Solutions Practice, Black Box...
By Laura Jackson, Sr. Manager-Risk Management, ABS Consulting
By Jason Cradit, VP of Information Systems, Willbros Group
By Steve Garske, Ph.D., Senior Vice President & Chief...
By Roman Trakhtenberg, CEO, Luxoft
By Renee P Wynn, CIO, NASA
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Andrew Macaulay, CTO, Topgolf Entertainment Group
By Dominic Casserley, President and Deputy CEO, Willis...
By Dave Nelson, SVP-Portfolio Lead, Avanade, Inc.
By Michael Cross, SVP & CIO, CommScope Holding Company Inc.
By Pauly Comtois, VP DevOps, Hearst Business Media
By Dan Adam, CIO, Extreme Networks
By Matt Schlabig, CIO, Worthington Industries
By David Tamayo, CIO, DCS Corporation
By Scott Cardenas, CIO, City and County of Denver
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment