Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

6 keys to risk-based assurance for remote workforces and security operations

December 09, 2020

6 keys to risk-based assurance for remote workforces and security operations
 
powered by Sounder


As if implementing and maintaining successful IT security organization-wide wasn’t hard enough, now there’s no boundary to where workers can access the network.
 
The pandemic has piled on workforce challenges and security might just be the #1 concern.
 
In this episode, Murtaza Hafizji, a cybersecurity product marketing manager at RSA Security, talks to Keri about…
 

  • 6 keys security managers need for risk-based assurance of remote workforces and security operations
  • 3 major findings from RSA’s most recent cybersecurity report
  • Which threats will continue challenging security teams in the next year

 
"Today, as organizations are shifting to cloud and remote work, this concept of trust nothing and verify everything resonates." — Murtaza Hafizji
 


6 keys to risk-based assurance of remote workforces and security operations

Murtaza offered six crucial elements needed to achieve risk-based assurance of remote workforces and security operations. They include…
 

  1. Rethink the corporate network. Zero trust is essential here and all resources must be accessed in a secure manner no matter the location of the user. Additionally, access control should be on a need-to-know basis and all network traffic should be inspected and properly logged.
  2. Accelerate cloud adoption. Cloud networking is no longer a luxury for enterprises. Migration to the cloud is necessary, but first, make sure the proper security measures are in place.
  3. Increase focus on behavior and insider risk. Employees are the biggest security vulnerabilities any organization has. Now that they’re working remotely, it’s even harder to detect malicious activity. Consider investing in machine learning and AI to track patterns and find any anomalies in regular user behavior.
  4. Increase threat detection at the endpoint. With no perimeter to keep endpoints centralized, stronger threat detection needs to be implemented.
  5. Invest in automation. The IT team can’t keep track of a dispersed workforce and multiple devices per employee. Investing in automation tools now will save your organization money and reputation tomorrow.
  6. Enhance the governance of security operations. Employees aren’t the only ones that need enhanced security measures. Executives, devices and applications also need help with maintaining their security and privacy.

 



Evolving threats

In addition to tackling current threats to the enterprise, Murtaza advises security managers to prepare for the coming year. Cloud and endpoint security will continue to be concerns, as will managing the risks that come with remote workforces.
 


To learn more about managing security threats, connect with Murtaza on LinkedIn, or visit www.rsa.com.
 
Hear Murtaza in B2B Tech Talk episodes 70 and 96.