Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Bridging the IT-Security Gap with Jane Frankland

Commvault
02/22/2026
19
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • CIOs and CISOs have opposing mandates—innovation versus risk reduction—creating organizational friction that leaves security concerns filtered or dismissed, particularly when CISOs report to CIOs.
  • Critical workflows like system patching, cyber recovery planning, and M&A due diligence fail when IT and security teams don't collaborate, as each holds essential knowledge the other lacks.
  • Technology-first approaches to bridging the gap actually widen it by reinforcing silos; effective solutions require leadership alignment on risk tolerance, cultural change, and cross-functional project work.
  • Simulated crisis exercises like 'Minutes to Meltdown' provide practical first steps by forcing stakeholders to collaborate under pressure and recognize their interdependencies.

The Structural Divide Between IT and Security

This episode examines the persistent organizational gap between CIOs focused on innovation and digital transformation and CISOs tasked with risk reduction and compliance. Jane Frankland, a 28-year cybersecurity veteran and MBE recipient, explains how these opposing mandates create friction: CIOs are incentivized on cost efficiency and operational uptime, while CISOs are measured on resilience and risk mitigation. The conversation reveals how reporting structures compound this problem, with many CISOs reporting to CIOs—a dynamic that can lead to security concerns being filtered or dismissed before reaching board level. Frankland notes she has witnessed CISOs removed for being 'too good at their job' when security requirements conflicted with IT delivery timelines.

Real-World Consequences and Use Cases

The discussion moves to practical scenarios where IT-security misalignment creates tangible risk. System patching emerges as a critical example: infrastructure teams traditionally deploy patches, but security teams possess the vulnerability intelligence needed to prioritize them effectively. Without collaboration, organizations patch inefficiently or miss critical vulnerabilities. Cyber recovery planning presents another case where both domains must converge—infrastructure teams manage backup and recovery operations, but security teams provide the forensic analysis to identify clean restore points. Frankland adds merger and acquisition due diligence as a third scenario, where failure to include security can result in acquiring companies with undisclosed breaches.

Solutions: Culture, Process, Then Technology

Frankland advocates for a layered approach to bridging the gap, starting with leadership alignment and risk tolerance definition at board level. She emphasizes that technology solutions deployed without addressing people and process first actually widen the divide, as security tools remain siloed in the SOC while infrastructure teams operate independently. The conversation highlights Commvault's 'Minutes to Meltdown' workshops as an effective first step—simulated ransomware exercises that force cross-functional stakeholders to collaborate under pressure. Frankland's prescription for security professionals: become evangelists who serve the business rather than enforcers who block it. For non-security stakeholders: increase cyber literacy and build relationships with security teams, who she insists are 'the department that now likes to say yes.'

Chapters

0:00 - Introduction and Episode Format
1:07 - Jane Frankland's Background
4:01 - MBE Recognition and Women in Cyber
5:24 - The IT-Security Gap Explained
9:06 - CISO Vulnerability and Reporting Structures
12:09 - Risk Tolerance and Organizational Culture
13:50 - Real-World Use Cases: Patching and Recovery
16:06 - M&A Due Diligence and Testing Scenarios
17:45 - Solutions: Leadership, Culture, and Process
19:08 - Technology as Enabler, Not Solution
21:02 - Working on Real Projects Together
22:03 - Final Advice and Closing

Key Quotes

1:50 "I started my own penetration testing company back in the late 1990s. It was the first female owned penetration testing company in the UK."
7:09 "The CISO is seen as the disabler to business. They don't like change because change introduces risk."
8:53 "I've seen CISOs alert the CIO to certain risks and that CIO will be taking it to the board. But because that doesn't align with his or her objectives, their agenda, they're removing those risks. So the board is unaware."
8:58 "I've also seen CIOs actually, at the first opportunity remove the CISO because they are too good at their job. They're slowing things down."
19:08 "We talk a lot about people, process and technology, the golden triangle in security and how those three are required, but we tend to be solving the issues that we have mostly with technology."
22:09 "Security people go out there and be evangelists. Go out there and serve the business. Find out about what they are doing. Build your influence so that you can do a better job."
Categories:
  • » Webinar Library » Commvault
  • » Data Protection » Backup & Recovery
  • » Data Protection
  • » Cybersecurity » Compliance & GRC
Channels:
News:
Events:
Tags:
  • Security Operations
  • Best Practices
  • Executive Briefing
  • Data Protection
  • Compliance & Governance
  • IT-Security Alignment
  • CIO-CISO Dynamics
  • Organizational Risk Management
  • Cyber Recovery Planning
  • Security Culture
  • Cross-Functional Collaboration
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Bridging the IT-Security Gap with Jane Frankland

              Upcoming Webinar Calendar

              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/16/2026
                11:00 AM
                04/16/2026
                Beyond the Alert – Building the Human Centric Agentic SOC
                https://www.truthinit.com/index.php/channel/1372/beyond-the-alert-–-building-the-human-centric-agentic-soc/
              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                15

                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                04/15/202601:00 PM ET
                • Apr
                  16

                  Beyond the Alert – Building the Human Centric Agentic SOC

                  04/16/202611:00 AM ET
                  • Apr
                    21

                    How Purpose Brands scales IT with Zendesk ITAM

                    04/21/202602:00 PM ET
                    • Apr
                      30

                      Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                      04/30/202610:00 AM ET
                      • Apr
                        30

                        The New Economics of VMware Exit

                        04/30/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version