Managing Risk Requires New Levels of Visibility
- The essential problems of risk management do not change. The key is expanding these methodologies to cover the new and changing IT landscape.
- Consolidating security functions into higher-power solutions enables greater flexibility and a deeper inspection of network traffic that is necessary for context-based security strategies in complex IT environments.
“You’re balancing probabilities of something happening against the impact of that thing. That’s the core of any risk-management plan.”
In the seven years that Lester Godsey has been involved in IT security at the City of Mesa, he has seen continual growth and expansion of the network perimeter. “One of the overarching themes from my cybersecurity program is that our network perimeter is constantly expanding in ways that are not always visible to us,” he says, adding that traditional cybersecurity tools and methodologies do a great job in identifying and protecting assets within the network environment.