Webinar: Minimize Threats, Modify Security and Optimize Safety

As part of our ongoing Enterprise Resilience Webinar Series, our recent webinar Minimize Threats, Modify Security and Optimize Safety is now available for on demand viewing. 

 During this session, our five panelists spent an hour reviewing how organizations dealing with the impact of the COVID-19 crisis can address cybersecurity threats to their remote workforces, how to grapple with technology, capacity and policy challenges and what the potential lasting impacts of this pandemic may be on corporate security programs.  

Here are just some of the highlights: 

Immediate Impact of COVID-19 

  • Active phishing websites have increased by 350 percent, to 522,000 since the pandemic began. This has impacted both organizations and individuals, who have been hacked or have fallen for phony pleas for medical supplies, donations and other scams. Implementing systematic controls is more crucial now than ever to help avoid falling victim; companies must have phishing and spam filters in place
  • Over 70 percent of the webinar audience said they are managing COVID-19’s impact on their IT teams’ ability to support and enable the business; six percent said they are stretched beyond capacity
  • Fixes to any technology shortcomings could range from complex security solutions to a “back to basics” approach
  • Furloughs and job losses increase insider threat concerns 

 Quick to Pivot Characteristics 

Organizations that feel they’ve done well in coping with the crisis so far, have been quick to pivot to remote working (where possible) while retaining cyber controlWhat are common characteristics these organizations? Among other things, they already supported remote workforces, leveraged cloud-based technologies, doubled down on traditional remote capabilities, went back to the basics and actively educated employees about security concerns.

A crisis like COVID-19 calls for a quick review of policy exceptions, where immediate changes may need to be madeA few policies that organizations should re-evaluate include 

  • Remote work policy 
  • Data loss prevention and endpoint-related security policies 
  • Vulnerability management and patching management polices 
  • Business continuity and disaster recovery program
  • Incident response policy, procedures and plans
  • Cloud security strategies 

When “Normalcy” Returns 

Once the crisis passes, an organization should focus on reviewing all existing security policies, creating new policies where needed and reviewing (or putting in place) the risk management program. 

It is likely that the impact of this pandemic will have a long-term, permanent impact on businesses, who will likely ramp up their ecommerce and mobile presence, more fully develop their direct-to-customer capacity and strengthen the supply chain. All of these changes will impact risk management practices. 

Finally, organizations should expect an explosion of new technology and the retirement of old technology once the COVID-19 pandemic is behind us. 

To hear the full discussion and much more, the Minimize Threats, Modify Security and Optimize Safety webinar is available on demand. You may also want to download Protiviti’s Work From Home Cybersecurity Practices.

Chip Wolford

Managing Director
Security and Privacy

Nick Puetz

Managing Director
Security and Privacy

Subscribe to Topics

The use of #technology platforms to support #remote and #hybrid work has accelerated. But as businesses put their long-term plans into action, what’s going to happen to phone systems? Protiviti's Corey Harrison and Jez Haisman reveal more. http://ow.ly/E36K50Gzoey

#SIEM monitoring can fail to ensure the #security of the SAP system because the specific #SAP logs can’t be interpreted. Here, we discuss what companies can do to integrate SAP in their monitoring and how this safeguarding can deliver benefits. Read more: http://ow.ly/O72A50GyWfu

#SAPInsider’s November Executive Research Report survey, The #CIO #Transformation Report Card sponsored by Protiviti, is live. Help us uncover insights about the #SAP community today by completing the #survey. http://ow.ly/RrUi50GytQl

In this interview with @helpnetsecurity, Protiviti's David Taylor explains why #ransomwareattacks are so effective, what makes organizations vulnerable to attacks and what they can do to better protect themselves. http://ow.ly/su1m50GwBSt

#ProtivitiTech #ransomware #cybersecurity

As businesses compete for #quantum compute time, things can get complicated. @Strangeworks provides shorter queue times and cost and access control for customers. Join @KonstantHacker as he chats on this with Cesar Rodriguez from @Strangeworks. http://ow.ly/jERF50Gvo0W

Load More...