Link to home
Start Free TrialLog in
Avatar of Techrunner
Techrunner

asked on

Digital Transformation, Whats the network & security Ops role ?

Hello,

I am a Network Operations Manager at a large hospital. The board is looking for a digital transformation transition. So being part of network & security operations, what would be our role that could drive this initiative and what digital transformations can be introduced in our operations specifically.
Avatar of Sreejith Vanjipattu
Sreejith Vanjipattu
Flag of India image

DevOps is now a trending area where development and operations go hand in hand.

Why DevOps ?
This can be explained with a software upgrade like what we do for ios /NXOS update on a cisco switch.
It can be done manually if the number is less but when it comes to 100, 1000 or 10000 what admins would really do and how long it would take to rollout the upgrade. This kind of situation can be addressed by DevOps using scripting or automation framework like ansible.  

The scope can be easily identified by just starting thinking to automate small small tasks then to bigger ones.
Eg: New VLAN deployment , Access polices on multiple devices etc.

​Now days most of the devices support APIs so its easy to connect and get data. 



Avatar of Techrunner
Techrunner

ASKER

I can easily achieve this with Cisco DNAC, as we have Cisco infrastructure, but what else we can do for digital transformation?
The scope can be easily identified by just starting thinking to automate small small tasks then to bigger ones.
Eg: New VLAN deployment , Access polices on multiple devices etc.  
probably you should ask what are the digitialisation in your companies and know the 'new' business. It can IOT smart things, Cloud transformation with redevelopment of apps, use of CI/CD piple for code delivery using SaaS, Data warehousing and analytic with big data for sense making for a digital forefront perspective.

Assuming these then I would say monitoring coverage is extended to IOT, the right skills set and use of correlated rules for these device need a relook.

Cloud is another big thing and CASB or equivalent will come to the mind as gateway with more API driven exchanges so how is networking going to be - meshed with micro-service architecture.

Big time is analytic or ML which typically means be ready for Big Data ingesting or rely on some SaaS to process it so how would the tunnel and pipeline be secure as part of provisioning.

Definitely, one intimate topic to you will be SOAR which you can lay out more coverage to bring on automation and orchestration to reduce human error due to alert fatigue etc. Can be something SecOps and intelligence helps develop sense making and more proactive threat hunting into the digitialised devices..

Frankly, Zero trust will come to the mind as well though it is a loosely used term. Identity centric access based on trust level is something that Cloud provide extensively but not on premise. So this needs some rethink on the infrastructure and if SDN make sense to gatekeep all access like how Google does their BeyondCorp and BeyondProd.

https://digitalisationworld.com/news/58579/recorded-future-introduces-security-operations-and-response-module 
https://datacentre.solutions/blogs/55818/building-digital-transformation-with-security-in-mind 
What is AIOps ? How it can be useful ?
Which vendor provides AIops solutions ?
It is a Gartner term which I would see as to say artificial intelligence technology need to fuse into the operation works. But even we reach that level, automation need to already existing and discovery of data points in the whole operation lifecycle should be readily available before we can say making more intelligence out the big data collected. Below is one which went further on the detail. 

https://resolve.io/what-is-aiops
Thanks btan.

Which kind of operations AIOPs can be introduced ?
I see it more of backend event monitoring which may be human monitoring and escalating to the higher level response  team for analysis. If AIOps can facilitate thru automation and machine learning with new or changed rules generated and orchestrated it in such a way to mitigate any potential security events at the security device with the new insight, it may be considered helpful. Otherwise, it is to draw all the events and build context to what are the risk emerging or weakness that humanely are slow to analyse. I believe the previous link has more use cases.
When it comes to digital transformation,  you need to pay attention to CIA (Confidentiality, Integrity and Availability), data privacy, change management processes, and accountability.

As a Network Security professional in Digital transformation (DT), for example, you need to focus on securely working in a remote environment and communicating remotely as safely as possible.

I would focus on the process. Make sure to acknowledge the parts you struggled with, but more importantly, talk about how you overcame the issues and what you learned from those Digital Transformations (DT) challenges. The process is most of the battle with development work.  That is mostly learned through experience.
This question needs an answer!
Become an EE member today
7 DAY FREE TRIAL
Members can start a 7-Day Free trial then enjoy unlimited access to the platform.
View membership options
or
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.