Network Security: Age Is Just a Number
Although there is a lot of negativity surrounding the aging government IT networks, the maturity of these configurations often goes unnoticed. Organizations are on the tip of their toes to replace the legacy systems that supposedly stall their progress. While doing so, it is essential to note that the new infrastructure replacing the older ones needs to factor in the rapidly evolving security requirements along with traditional hurdles and difficulties. In addition to that, IT professionals installing the network should evaluate operations and corresponding policies that enforce the required network security protocols, weighing in the current and future threats that loom around the corner.
There is also the inevitable fact that malicious threats keep evolving with security sophistication, both internal and external to the network. This largely correlates to carelessness, untrained workforce, and internal loopholes. Industry leaders say that security training for all IT professionals associated with an organization plays a vital role in making or breaking a security infrastructure, enlightening them on various infiltration and sandboxed techniques to address possible breaches. Such an initiative can filter out redundancies, network complexities, and potentially screen rogue devices and users. Along with these practices, the ability to recognize and acknowledge the changing trends of IT networks, all the while considering the benefits of traditional practices play a vital role in determining optimal strategies to leverage the adequate performance out of an IT network.
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sergey Cherkasov, CIO, PhosAgro
By Pascal Becotte, MD-Global Supply Chain Practice for the...
By Stephen Caulfield, Executive Director, Global Field...
By Shamim Mohammad, SVP & CIO, CarMax
By Ronald Seymore, Managing Director, Enterprise Performance...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
By Jim Whitehurst, CEO, Red Hat
By Clark Golestani, EVP and CIO, Merck
By Scott Craig, Vice President of Product Marketing, Lexmark...
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
By Amit Bahree, Executive, Global Technology and Innovation,...
By Greg Tacchetti, CIO, State Auto Insurance