Wired for Battle: How Cross-Training Could End the Cybersecurity Turf War
New research reveals that bridging the gap between networking and cybersecurity teams is key to fighting costly cyber threats - and could reshape the entire industry.
Fast Facts
- 75% of IT professionals see networking and cybersecurity as deeply intertwined, yet most teams still operate in silos.
- Organizations with complex, unintegrated teams pay $1.2 million more per breach on average.
- Only 33% of professionals feel fully prepared to handle both networking and security challenges.
- Downtime costs can hit $5,600 per minute during incidents.
- Cross-training is identified as the top strategy to reduce operational friction and security risk.
Tangled Wires: The Hidden Costs of Team Silos
Picture a busy control room where two teams - networking and cybersecurity - speak different technical dialects, each guarding their own turf. As digital threats multiply and networks grow more complex, these teams are forced to work together, but too often they trip over each other, leading to costly errors and slow responses. According to INE Security’s landmark report, “Wired Together,” this organizational friction isn’t just an inconvenience - it’s draining millions from company coffers worldwide.
The report, which surveyed nearly 1,000 IT and security professionals globally, paints a stark picture: while three-quarters recognize the need for integration, only a third feel truly equipped for it. The result? Projects hit roadblocks, emergency rollbacks spike, and the infamous “implement-break-fix” cycle burns time and money.
Why the Divide Exists - and Why It Matters
The split between networking and cybersecurity teams is a legacy of the past. Historically, networking teams built and maintained the digital highways, while security teams patrolled for threats. But as cloud adoption, remote work, and the explosion of Internet of Things (IoT) devices blur the boundaries, these roles overlap more than ever. If attackers exploit a weak spot in the network, it’s not enough for just one team to respond - they must act in concert, or risk letting threats slip through the cracks.
This convergence isn’t unique to today. The infamous Target data breach in 2013, for example, was partly blamed on poor communication between networking and security teams, resulting in missed warning signs and a $162 million cleanup bill. Modern attackers move fast, and every minute of confusion can cost thousands.
Cross-Training: A Blueprint for Cyber Resilience
INE Security’s report argues that cross-training - educating professionals to understand both networking and cybersecurity - is the missing link. Cross-trained staff can spot threats sooner, fix problems before they escalate, and deploy new systems without costly do-overs. The report highlights six critical overlap areas, including network monitoring, firewalls, and access control, where dual expertise pays immediate dividends.
Implementing this isn’t just about more training sessions. The report recommends a four-step approach: assess current skills, offer diverse training methods, measure real-world impact, and scale what works. The payoff? Fewer failed deployments, faster incident response, and a culture where teams speak a shared language - making them more agile in the face of ever-evolving cyber threats.
Looking Ahead: Breaking Down the Digital Walls
As cyber threats become more sophisticated, the days of isolated IT teams are numbered. The organizations that thrive will be those that break down silos, invest in cross-training, and foster a culture of collaboration. Not only will this cut costs and reduce risk, it may be the industry’s best shot at staying one step ahead of the next big attack.
WIKICROOK
- Cross: Cross-Site Scripting (XSS) is a cyberattack where hackers inject malicious code into websites to steal user data or hijack sessions.
- Operational Friction: Operational friction is the slowdown and errors caused by poor communication or misunderstandings between teams, often leading to inefficiency and risk.
- Incident Response: Incident response is the structured process organizations use to detect, contain, and recover from cyberattacks or security breaches, minimizing damage and downtime.
- Network Monitoring: Network monitoring involves continuously checking data flow across networks to quickly spot unusual activity, performance issues, or signs of cyberattacks.
- Access Control: Access control sets rules and uses tools to decide who can view, use, or change sensitive computer systems and data, protecting them from unauthorized access.