“Security in a Distributed Workforce.”

We recently ran a Singapore & Malaysia CISO Virtual Roundtable for SkyBox Security. Our moderator Damien Scalzo – CIO – Mercedes-Benz Financial Services started the conversations on the below.

At the onset of the pandemic, organizations deployed new technology and services to enable distributed workforces. As a result, the attack surface rapidly expanded. The distributed workforce, combined with the need to modernize and improve operational efficiency, has reframed digital transformation priorities. Investing in technology that will automate decisions and actions, provide them with a competitive edge, and improve security has become more important than ever.  And, in light of ongoing macroeconomic pressures that IT Leaders are facing increasing pressure to deliver value.

During the chaos, many security teams made quick investments in multiple technology strategies and solutions such as cloud and VPNs, as well as increased outsourcing. Rightly so, but these short-term solutions aren’t sustainable – both from operational and economic perspectives. If organizations fail to establish new digital transformation strategies to secure their distributed workforce, they could increase the chance of successful attacks, fall into non-compliance, and suffer financial and reputational losses. And if they don’t right-size resources and make smart investments to enable and secure their distributed workforces, they may create financially unviable security programs, limit the best use of talent, and lack the capacity and capability needed to support ongoing transformation initiatives & and secure outsourcing, opening door to new risk. 

In this virtual roundtable, we explored how organizations are unifying and right-sizing their infrastructure and asset security investments to improve decision-making capabilities, better protect the business and create the visibility that is paramount in this new normal.

We discussed:

  1. Introducing automation that unshackles talent while reducing error, creating efficiencies, and limiting compliance violations
  2. Evaluating the risk profile of critical assets by exposure
  3. Strengthening access controls and reducing risks associated with the expanded attack surface
  4. Developing a mature and tightly-connected security framework that enables the reduction of risk and improves security capabilities

Share this post with your friends