Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

5 practical ways to drive security and IT team alignment

By CIO Dive by By CIO Dive
May 12, 2025
Home Enterprise IT
Share on FacebookShare on Twitter


For IT leaders, aligning security and IT isn’t just a tactical win – it’s a strategic advantage. But while both teams share overlapping goals, miscommunication and siloed priorities often get in the way. The solution? Build stronger relationships, communicate frequently, and create shared accountability.

We asked experienced IT and security leaders how they’ve fostered better collaboration between these two critical functions. Here’s what they said.

1. Build relationships first, then processes

Joe McCallister, Senior Manager of Cybersecurity Operations, The Trade Desk

Better alignment starts with simple, informal conversations, Joe McCallister shared on a recent episode of Tines’ Future of Security Operations podcast. “Take someone out to lunch or go for a walk, ask what projects they’re excited about – you might find ways to help.”

“Our IT guys might be really jazzed about phish-resistant MFA, for example, but it’s been deprioritized. We could help unblock that – and it makes everyone more secure.”

Joe adds that his security team meets with IT monthly to align their roadmaps. “You can’t coordinate if you’re not communicating.”

2. Bring a “no surprises” mindset to your check-ins

Mark Settle, 7x CIO and author of Truth from the Trenches: A Practical Guide to the Art of IT Management

“IT and security can trip over each other’s shoelaces,” says Mark Settle, especially when one team makes changes or purchases tools without informing the other.

To avoid this, he recommends adopting a “no surprises” approach to regular operational check-ins. These can be used to surface infrastructure changes, upcoming tool deployments, or policy updates early.

“When surprises occur, feelings get hurt, issues get escalated to higher management, and trust is eroded at multiple management levels,” Mark says. “But when teams stay in sync, there’s less friction, fewer escalations, and better outcomes.”

3. Use unified messaging to drive shared priorities

Matt Muller, Field CISO, Tines, and formerly, security leader at Coinbase

When IT and security teams present a consistent message to the rest of the organization, the benefits go far beyond reducing risk – it builds credibility and trust, and makes it easier to get employee buy-in for major initiatives.

Procurement is just one example. “It’s an underrated lever for reducing attack surface,” Matt Muller explains, pointing to the issue of shadow IT. “IT procurement doesn’t want to be the bad guy. They want to help end users get the tools they need, and security can reinforce that message by explaining why certain guardrails are in place.”

“It’s about unifying that communication so security and IT become a joint voice in the organization,” Matt adds. That unified voice is especially valuable during major organization-wide changes like an MFA rollout or a tool migration. A strong internal brand, backed by consistent messaging, makes it far more likely that employees will engage and adopt new IT and security practices.

4. Collaborate on automation use cases

Thomas Kinsella, Co-founder and CCO, Tines, formerly a security leader at DocuSign and eBay

Too often, security and IT teams build automations in parallel, solving similar problems with separate tools.

“Both teams are trying to reduce manual work, reduce risk, increase consistency, and move faster,” Thomas Kinsella says. “If both teams are automating use cases like identity and access management, or related ones like vulnerability management and patch management, why not solve those problems together? The best security and IT teams we work with don’t just collaborate on goals, they collaborate on specific workflows.”

By working with the same vendor-agnostic automation platform, these teams gain visibility into each other’s priorities, reduce duplication, and avoid tool sprawl.

5. Make the end-user experience a joint responsibility

Matt Muller, Field CISO, Tines, and formerly, security leader at Coinbase

“In an ideal world, security creates zero friction for end users – but we’ll never hit that,” says Matt Muller. “One thing I’d love to see more security teams do is run a friction survey of the employee population. Ask them, ‘How often does security annoy you?’ and make a commitment to IT to improve on the results.”

Some of the most painful end-user experiences are owned by IT but governed by security policies, Matt adds. “Take login systems, for example. They’re often maintained by IT, and then security says, ‘Sorry, you have to reauthenticate every 35 seconds.’ That’s miserable for the end user – and it means IT can’t provide the experience it wants to the organization.”

“Security teams need to think about how to measure that friction,” Matt adds, “and work with IT to drive joint metrics around the end-user experience.”

Learn how IT teams use Tines to scale their operations.



Source link

By CIO Dive

By CIO Dive

Next Post
Italian bank signs 10-year deal with Google Cloud | Computer Weekly

Italian bank signs 10-year deal with Google Cloud | Computer Weekly

Recommended.

HPE Unleashes New Triple Platinum Plus Tier To Drive Sales Growth

HPE Unleashes New Triple Platinum Plus Tier To Drive Sales Growth

June 24, 2025
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks

Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks

June 4, 2025

Trending.

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

June 28, 2025
Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

June 27, 2025
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

June 27, 2025
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

June 23, 2025
Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

June 27, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio