SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
Close the Security Gaps
of a Remote Workforce
The steps companies should take to ensure secure
access when enabling employees to work from home
Dan Lohrmann
Chief Strategist &
Chief Security Officer
at Security Mentor
Jonathan Lieberman
CEO and Co-founder,
itopia
Richard Stiennon
Author of ‘Security
Yearbook 2020: A
History and Directory
of the IT Security
Industry’
Scott Schober
Author of ‘Hacked
Again’ & ‘Cybersecurity
is Everybody’s
Business’
Tim Crawford
CIO Strategic Adviser,
AVOA
Tyler Carbone
Chief Strategy Officer
of Terbium Labs
Jamie Zajac
VP of Product
Management,
Carbonite + Webroot,
OpenText Companies
The Covid-19 pandemic has rearranged life
and business as we know it. Companies
across the globe have had to quickly stand
up remote work environments.
How can organizations tighten the security
gaps of new and existing remote workers?
Experts share their insights:
Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
“Preparing for remote work provides an
excellent opportunity to train employees
on proper security hygiene, and it benefits
them as well as their companies.”
- Tyler Carbone, Chief Strategy Officer
of Terbium Labs
“Guidelines should be developed
and shared with all workers before
anyone begins to work remotely.”
- Scott Schober, Author of ‘Hacked Again’ &
‘Cybersecurity is Everybody’s Business’
“Management needs to begin by clearly
defining which employees have access
from a remote location and what specific
network protocols are to be used.”
- Scott Schober, Author of ‘Hacked Again’ &
‘Cybersecurity is Everybody’s Business’
Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
“By equipping the workforce with secure, remote
desktops in the cloud organizations ensure that
the workforce remains secure and productive.”
- Jonathan Lieberman, CEO and Co-founder, itopia
“Get identity right.
Deploy a cloud directory service.”
- Richard Stiennon, Author of ‘Security Yearbook 2020:
A History and Directory of the IT Security Industry’
“Replace VPNs with SASE, a cloud proxy
that replicates the data center security stack
for web filtering, malware defense, and DLP.”
- Richard Stiennon, Author of ‘Security Yearbook 2020:
A History and Directory of the IT Security Industry’
Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
“Use a VPN to connect back to the
corporate network for corporate-specific
data. Do not backhaul Internet traffic across
the VPN to avoid performance issues.”
- Tim Crawford, CIO Strategic Adviser, AVOA
“Support remote workers
with reliable internet access.”
- Richard Stiennon, Author of ‘Security Yearbook 2020:
A History and Directory of the IT Security Industry’
“Make sure that their home network
is setup with a good router and it has
its firewall enabled and the default
password has been changed.”
- Tim Crawford, CIO Strategic Adviser, AVOA
“Routers should be hardened for
security including using the strongest
WiFi encryption available.”
- Dan Lohrmann, Chief Strategist &
Chief Security Officer at Security Mentor
“Make sure that the computer they
are using is fully patched with virus
protection and firewall enabled.”
- Tim Crawford, CIO Strategic Adviser, AVOA
Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
“A lot of focus is put on the predict, prevent, detect
and respond buckets. But don’t forget about recover.
Have a data protection strategy in place that helps
ensure compliance and reduces downtime no
matter where your employees are working.”
- Jamie Zajac, VP of Product Management,
Carbonite + Webroot, OpenText Companies
“Identify packet sniffers to detect potential
root compromises. Cybercriminals will often
use packet sniffers to collect login credentials
and metadata from a company.”
- Scott Schober, Author of ‘Hacked Again’ &
‘Cybersecurity is Everybody’s Business’
“Require all employees to use 2FA
(Two-factor Authentication) as this added layer
of security can increase security ten-fold.”
- Scott Schober, Author of ‘Hacked Again’ &
‘Cybersecurity is Everybody’s Business’
“Enable full device encryption, if sensitive data
or communications will be on the device.”
- Dan Lohrmann, Chief Strategist &
Chief Security Officer at Security Mentor
“Disable unnecessary or risky services and do
not connect unknown devices to the system.”
- Dan Lohrmann, Chief Strategist &
Chief Security Officer at Security Mentor
Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
“Businesses must automate every aspect
of their remote worker environments
including the enforcement of security
policies and file share permissions.”
- Jonathan Lieberman, CEO and Co-founder, itopia
“Automatically update operating system
software and application software (e.g. anti-
malware software, office productivity).”
- Dan Lohrmann, Chief Strategist &
Chief Security Officer at Security Mentor
Learn more about setting up and securing
your remote workforce at itopia.com

Más contenido relacionado

La actualidad más candente

2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
Nicholas Chia
 

La actualidad más candente (20)

Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionAdvantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security Solution
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval Protection
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 

Similar a Close the Security Gaps of a Remote Workforce

Similar a Close the Security Gaps of a Remote Workforce (20)

Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
expert tips
expert tipsexpert tips
expert tips
 
CCA study group
CCA study groupCCA study group
CCA study group
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Close the Security Gaps of a Remote Workforce

  • 1. Close the Security Gaps of a Remote Workforce The steps companies should take to ensure secure access when enabling employees to work from home
  • 2. Dan Lohrmann Chief Strategist & Chief Security Officer at Security Mentor Jonathan Lieberman CEO and Co-founder, itopia Richard Stiennon Author of ‘Security Yearbook 2020: A History and Directory of the IT Security Industry’ Scott Schober Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’ Tim Crawford CIO Strategic Adviser, AVOA Tyler Carbone Chief Strategy Officer of Terbium Labs Jamie Zajac VP of Product Management, Carbonite + Webroot, OpenText Companies
  • 3. The Covid-19 pandemic has rearranged life and business as we know it. Companies across the globe have had to quickly stand up remote work environments.
  • 4. How can organizations tighten the security gaps of new and existing remote workers? Experts share their insights:
  • 5. Establish Processes Utilize a Secure Cloud Secure Devices & Technology Protect Against Cyber Threats Automate Automate Automate
  • 6. “Preparing for remote work provides an excellent opportunity to train employees on proper security hygiene, and it benefits them as well as their companies.” - Tyler Carbone, Chief Strategy Officer of Terbium Labs
  • 7. “Guidelines should be developed and shared with all workers before anyone begins to work remotely.” - Scott Schober, Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’
  • 8. “Management needs to begin by clearly defining which employees have access from a remote location and what specific network protocols are to be used.” - Scott Schober, Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’
  • 9. Establish Processes Utilize a Secure Cloud Secure Devices & Technology Protect Against Cyber Threats Automate Automate Automate
  • 10. “By equipping the workforce with secure, remote desktops in the cloud organizations ensure that the workforce remains secure and productive.” - Jonathan Lieberman, CEO and Co-founder, itopia
  • 11. “Get identity right. Deploy a cloud directory service.” - Richard Stiennon, Author of ‘Security Yearbook 2020: A History and Directory of the IT Security Industry’
  • 12. “Replace VPNs with SASE, a cloud proxy that replicates the data center security stack for web filtering, malware defense, and DLP.” - Richard Stiennon, Author of ‘Security Yearbook 2020: A History and Directory of the IT Security Industry’
  • 13. Establish Processes Utilize a Secure Cloud Secure Devices & Technology Protect Against Cyber Threats Automate Automate Automate
  • 14. “Use a VPN to connect back to the corporate network for corporate-specific data. Do not backhaul Internet traffic across the VPN to avoid performance issues.” - Tim Crawford, CIO Strategic Adviser, AVOA
  • 15. “Support remote workers with reliable internet access.” - Richard Stiennon, Author of ‘Security Yearbook 2020: A History and Directory of the IT Security Industry’
  • 16. “Make sure that their home network is setup with a good router and it has its firewall enabled and the default password has been changed.” - Tim Crawford, CIO Strategic Adviser, AVOA
  • 17. “Routers should be hardened for security including using the strongest WiFi encryption available.” - Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor
  • 18. “Make sure that the computer they are using is fully patched with virus protection and firewall enabled.” - Tim Crawford, CIO Strategic Adviser, AVOA
  • 19. Establish Processes Utilize a Secure Cloud Secure Devices & Technology Protect Against Cyber Threats Automate Automate Automate
  • 20. “A lot of focus is put on the predict, prevent, detect and respond buckets. But don’t forget about recover. Have a data protection strategy in place that helps ensure compliance and reduces downtime no matter where your employees are working.” - Jamie Zajac, VP of Product Management, Carbonite + Webroot, OpenText Companies
  • 21. “Identify packet sniffers to detect potential root compromises. Cybercriminals will often use packet sniffers to collect login credentials and metadata from a company.” - Scott Schober, Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’
  • 22. “Require all employees to use 2FA (Two-factor Authentication) as this added layer of security can increase security ten-fold.” - Scott Schober, Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’
  • 23. “Enable full device encryption, if sensitive data or communications will be on the device.” - Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor
  • 24. “Disable unnecessary or risky services and do not connect unknown devices to the system.” - Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor
  • 25. Establish Processes Utilize a Secure Cloud Secure Devices & Technology Protect Against Cyber Threats Automate Automate Automate
  • 26. “Businesses must automate every aspect of their remote worker environments including the enforcement of security policies and file share permissions.” - Jonathan Lieberman, CEO and Co-founder, itopia
  • 27. “Automatically update operating system software and application software (e.g. anti- malware software, office productivity).” - Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor
  • 28. Learn more about setting up and securing your remote workforce at itopia.com