Bridging Security and IT Operations feat. Defensible Technology