Security

Balancing Cybersecurity and IT Operations

Lessons from the Field

For 15 years at BE Group—the largest steel trading and service company in the Nordics—I found myself navigating the critical intersection of IT operations and cybersecurity. Over the last four years as the leader of a multinational IT operations team managing suppliers across five countries and supporting nearly 700 employees, my primary mission was to ensure uninterrupted business operations and a resilient infrastructure—all while production ran 24 hours a day, six days a week.

However, as we expanded into cloud services and hybrid environments, I witnessed firsthand how the demands for operational speed and reliability can sometimes clash with the need for rigorous security controls. While the business demanded rapid responsiveness and uptime, security protocols required stringent oversight, risk management, and control—often pulling in opposite directions.

The Complexity of Hybrid Environments

Hybrid environments combining cloud services with on-premises systems offer unparalleled flexibility. Yet, this integration introduces new risks, as evidenced by the fact that misconfigurations are responsible for 65% of cloud security incidents. A simple oversight, such as exposed database, API or a misconfigured firewall, can escalate into a major security breach.

At the same time, overly aggressive security measures can impede operational stability. Production systems cannot tolerate frequent disruptions, and excessive controls often lead to workarounds that inadvertently create new vulnerabilities.

Translating Security intoBusiness Priorities

One of the biggest challenges in IT security is bridging the gap between technical teams and executive leadership. While security engineers zero in on protecting systems and mitigating threats, executives are more focused on business continuity, cost implications, and regulatory compliance. Questions like, “Will this impact production?”, “Does this add to our operational costs?”, and “Are we compliant with industry standards?” take precedence.

For instance, when deploying an Intrusion Detection System (IDS) in a hybrid environment, a phased rollout can mitigate the risk of disruptions—start with a pilot group, closely monitor system performance, and then expand gradually to critical systems. This approach not only upholds our security posture but also ensures that business operations remain largely unaffected. It is an application of risk management principles aligned with business impact analysis and compliance requirements.

Real-World Security: Enabling Operations Without Roadblocks

A common misconception is that stronger security measures always hinder productivity.

This isn’t necessarily true.

Consider legacy systems: while many security professionals advocate for complete replacement, the reality is that these systems are deeply embedded in production processes.

Replacing them may not be feasible due to high costs or operational risks.

Instead, techniques such as network segmentation can isolate high-risk legacy systems, reducing vulnerabilities without halting operations.

This balanced approach embodies the principle of defense in depth and respects the operational realities of complex IT environments.

Security as an Enabler

Today, as avCISO at Sofectlabs and while working toward my CISSP certification, I leverage my experience to help organizations build security strategies that are both robust and business-friendly.

Effective security is not viewed as a barrier, it's the foundation that empowers safe and efficient business operations.

An optimized security strategy integrates risk management, compliance, and operational continuity into one holistic approach, acting as a true enabler for enterprise success.

Cookie Consent

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
Manage Cookies