IT leaders have no shortage of priorities to balance as they position their organizations for resiliency and growth. And one of the hotspots for growth and transformation is the Edge.\nSecurity is top of mind for IT leaders, no matter where the infrastructure sits: data center, branch location or at The Edge. While the details shift depending on location, Lumen\u2019s Beth Kohler says the basic security principles apply: data and applications must be confidential; integrity of data and applications must be maintained; and they must be available.\nAnd she should know: she\u2019s the Senior Director of Product Management for Global Security Products at Lumen. She spoke with IDG\u2019s senior content strategist Jim Malone in Episode 4 of Lumen\u2019s podcast series. Kohler explained why Lumen\u2019s platform approach works, and the importance of policies in building a resilient security strategy at the Edge.\n\u201cAll the same concepts and considerations that IT leaders have been struggling with over the past decade \u2014\u00a0they still apply,\u201d Kohler said. \u201cEdge computing is just changing how enterprises are doing that by introducing new physical environments, new types of devices, and then new consumers of those devices.\u201d\nKohler says a new convergence of IT teams and Operations teams is forging new security practices. While operations historically managed physical devices like forklifts and pumps, many of those machines are now \u201csmart\u201d devices and constitute an Edge component.\n\u201cEdges have always existed, whether it\u2019s a desktop or a laptop or terminal,\u201d she said. \u00a0\u201cThe new element here is just the amount of these operational devices. You really have to be thinking about this and applying the same practices, and if you don\u2019t, you will just open up your environment to more vulnerabilities.\u201d\nListen to this episode below.