Network Security: Age Is Just a Number
Although there is a lot of negativity surrounding the aging government IT networks, the maturity of these configurations often goes unnoticed. Organizations are on the tip of their toes to replace the legacy systems that supposedly stall their progress. While doing so, it is essential to note that the new infrastructure replacing the older ones needs to factor in the rapidly evolving security requirements along with traditional hurdles and difficulties. In addition to that, IT professionals installing the network should evaluate operations and corresponding policies that enforce the required network security protocols, weighing in the current and future threats that loom around the corner.
There is also the inevitable fact that malicious threats keep evolving with security sophistication, both internal and external to the network. This largely correlates to carelessness, untrained workforce, and internal loopholes. Industry leaders say that security training for all IT professionals associated with an organization plays a vital role in making or breaking a security infrastructure, enlightening them on various infiltration and sandboxed techniques to address possible breaches. Such an initiative can filter out redundancies, network complexities, and potentially screen rogue devices and users. Along with these practices, the ability to recognize and acknowledge the changing trends of IT networks, all the while considering the benefits of traditional practices play a vital role in determining optimal strategies to leverage the adequate performance out of an IT network.
By Tom Farrah, CIO & SVP, Dr Pepper Snapple Group
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Phil Jordan, CIO, Telefonica
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Dennis Hodges, CIO, Inteva Products
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sven Gerjets, SVP-IT, DIRECTV
By Marie Blake, EVP & CCO, BankUnited
By Lowell Gilvin, Chief Process Officer, Jabil
By Walter Carvalho, VP & Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Marc Jones, Distinguished Engineer, IBM Cloud Infrastructure