{"id":290,"date":"2025-09-28T21:41:15","date_gmt":"2025-09-28T21:41:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaronhermans\/?p=290"},"modified":"2025-09-28T21:41:15","modified_gmt":"2025-09-28T21:41:15","slug":"placement-of-the-cybersecurity-department","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aaronhermans\/2025\/09\/28\/placement-of-the-cybersecurity-department\/","title":{"rendered":"Placement of the Cybersecurity Department"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><\/h1>\n\n\n\n<p><strong>BLUF:<\/strong>&nbsp;Based on my experience, I personally recommend that the new Cybersecurity Department be placed under the Information Technology department.&nbsp;<\/p>\n\n\n\n<p><strong>Integration<\/strong><\/p>\n\n\n\n<p>Pros:<\/p>\n\n\n\n<ul>\n<li>Cybersecurity is often paired with Information Technology within the industry primarily due to specific infrastructure such as networks, servers, and endpoints<\/li>\n\n\n\n<li>With it being located within such a similar department, providing real-time patches and solutions will be made significantly easier to communicate<\/li>\n\n\n\n<li>When deciding on managerial and system changes, having integrated both departments will help both departments plan something that\u2019ll benefit each of them<\/li>\n<\/ul>\n\n\n\n<p>Cons:<\/p>\n\n\n\n<ul>\n<li>Sacrificing IT\u2019s primary goal of prioritizing speed and availability<\/li>\n\n\n\n<li>Due to the similarity within the departments, it\u2019s possible that they won\u2019t see the Cybersecurity Department as its own<\/li>\n<\/ul>\n\n\n\n<p><strong>Efficiency<\/strong><\/p>\n\n\n\n<p>Pros:<\/p>\n\n\n\n<ul>\n<li>Allocating them within IT reduces the risk of basic mistakes and delays when installing technical controls<\/li>\n\n\n\n<li>The Cybersecurity Department can take advantage of pre-existing IT tools and tools to both save money and time<\/li>\n\n\n\n<li>Incident detection and response can occur quickly due to IT overseeing the hardware that detects incidents<\/li>\n<\/ul>\n\n\n\n<p>Cons<\/p>\n\n\n\n<ul>\n<li>There are other aspects of Cybersecurity that don\u2019t directly involve Information Technology(Supply Chain for example), which may ultimately distract both departments<\/li>\n\n\n\n<li>Being directly under IT may mean that operational optimization additions could be prioritized over security concerns<\/li>\n<\/ul>\n\n\n\n<p><strong>Relation to Business Needs<\/strong><\/p>\n\n\n\n<p>Pros:<\/p>\n\n\n\n<ul>\n<li>IT is typically widespread across a business, giving Cybersecurity the platform to also support company-wide operations alongside it<\/li>\n\n\n\n<li>Digital projects are both managed and secured better when both departments work together<\/li>\n\n\n\n<li>Having both departments coexist makes reporting technological issues and threats much easier<\/li>\n<\/ul>\n\n\n\n<p>Cons<\/p>\n\n\n\n<ul>\n<li>Again, it\u2019s certainly possible that a higher-up may need to properly allocate the Cybersecurity Department a way to vote\/have an opinion within the organization<\/li>\n\n\n\n<li>Prioritizing risks and issues may be a common conflict if only looking at them from a technological basis<\/li>\n<\/ul>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>While inserting the Cybersecurity Department within one of the other departments may work, placing it within the IT Department is the most well-rounded choice for our organization. This decision ensures technical integration, operational efficiency, and alignment with business needs, whilst maintaining a fair platform to be governed the same as other departments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF:&nbsp;Based on my experience, I personally recommend that the new Cybersecurity Department be placed under the Information Technology department.&nbsp; Integration Pros: Cons: Efficiency Pros: Cons Relation to Business Needs Pros: Cons Conclusion While inserting the Cybersecurity Department within one of the other departments may work, placing it within the IT Department is the most well-rounded&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aaronhermans\/2025\/09\/28\/placement-of-the-cybersecurity-department\/\">Read More<\/a><\/div>\n","protected":false},"author":31366,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/users\/31366"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/posts\/290\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronhermans\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}