IT has probably never been more complex and demanding than today: even as approaches such as convergence, myriad clouds, containers and software-definition (etc.) seek to make operations simpler, so to a degree such elements can also obfuscate some of the underlying subtleties and opportunities of the foundational components. After all, while it’s great to focus on purchasing - for instance - application service levels or business outcomes, some understanding of the IT elements (and considerations or choices) that contribute to those is also often useful. That is the purpose of this video discussion series: it offers ESG’s subject matter experts discussing some of the key trends, drivers, and considerations across various IT areas. We aim to do it succinctly and to deliver it in engaging, plain English - while also tying each technology area back to its eventual potential to positively impact both IT and business results.
We hope you find this video discussion useful. We will expand - and update - the series regularly.
In this conversation, Jon Oltsik discusses some of the key things going on in one of the most crucial areas of contemporary IT: cybersecurity. The discussion covers the shift from protecting IT itself (which was traditionally about networks and raw storage) to protecting the business (typically more via identity management and data flow). Jon explains how even in a world with clouds, mobility, and heavy regulation - such as GDPR - conducting cybersecurity optimally can actually help open businesses up rather than cause them to shrink behind virtual walls.
Be sure to watch the other discussions in this series:
- Talking Networking, Part 1
- Talking Networking, Part 2
- Talking IT Evolution
- Talking Converged Architectures
- Talking Cloud Cybersecurity
- Talking Data Analytics
- Talking Cybersecurity Threat Landscape
- Talking Data Protection
- Talking Mobility
- Talking Validation
- Talking Storage
- Talking GDPR
- Talking Channel