Thursday, February 25, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Privacy

Secure Remote Working During COVID-19 — Checklist for CISOs

April 7, 2020
in Internet Privacy
Secure Remote Working During COVID-19 — Checklist for CISOs
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Coronavirus crisis introduces a heavy burden on the CISOs with the collective impact of a mass transition to working remotely coupled with a surge of cyberattacks that strive to monetize the general chaos.

Security vendors, unintendedly, contribute to this burden by a relentless generation of noise in the form of attack reports, best practices, tips, and threat landscape analysis.

You might also like

Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique

Experts Warns of Notable Increase in QuickBooks Data Files Theft Attacks

Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now

Here we have a new “CISO Checklist for Secure Remote Working” (download here) that has been built to assist CISOs in navigating through this noise, providing them with a concise and high-level list of the absolute essentials needed to ensure their organization is well protected in these challenging times.

The Coronavirus quarantine forces us to face a new reality. It is critical to acknowledge this new reality in order to understand how to successfully confront these changes.

Make no mistake – these changed apply to any organization, regardless of its former security posture.
For example, an organization with a high maturity level that routinely monitors its user’s behavior to detect anomalies must now alter its policies to adjust to the mass remote workload.

On the other hand, organizations with lesser maturity that could contain the risk of not placing advanced protection on their email systems and endpoints now realize that they have a critical security gap that must be addressed.

5 Pillars of Secure Remote Working

The CISO Checklist for Secure Remote Working breaks down the Coronavirus derived changes in reality and maps them to concrete check-boxes.

It’s important to the point that the checklist does not dive into the actual implementation since it can be carried out in multiple ways with respect to the internal policies and preferences of each organization.

The CISO Checklist for Secure Remote Working is built of five pillars:

  • Security Technology — a recommended list of product categories that should be installed and configured. The guideline in choosing these categories was an aggregated analysis of the Coronavirus related threat landscape gathered from multiple threat intelligence and attack analysis sources.
  • Security Team — every team, regardless of size and dedication level, has a set of procedures to handle ongoing security operations routinely. These procedures must be at the very least refreshed, and in many aspects, updated to address the specific IT and cyberattack changes.
  • General Workforce — CISOs know better than anyone else that a man is a far weaker link than a machine. The built-in uncertainty that the Coronavirus brings makes people significantly more vulnerable to all sorts of social engineering manipulations. Awareness, education, and security drills are essential to arm your workforce against these vastly increasing attacks.
  • 3rd Party Service Providers — whether your organization performs all its security tasks in-house or not, it is definitely a time to consider outsourcing some of the more skill-dependent mission to a domain expert MSSP – or at least make sure that all IR and security management operations are adequately covered.
  • Management Visibility — The organization’s executives must have full visibility both into the CISOs efforts as well as to the actual security posture – is there an increase in attacks, do security teams and products operate as expected, has there been a breach and if so how was it managed and contained, etc. Every CISO must have the infrastructure to effortlessly produce these reports.

You can Download the CISO Checklist for Secure Remote Working here.


Credit: The Hacker News By: noreply@blogger.com (The Hacker News)

Previous Post

Machine Learning in Finance Industry 2020 Market Manufacturers Analysis, Size, Share, Growth, Trends, Applications and Forecast Research Report 2026

Next Post

Microsoft announces IPE, a new code integrity feature for Linux

Related Posts

Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique
Internet Privacy

Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique

February 25, 2021
Experts Warns of Notable Increase in QuickBooks Data Files Theft Attacks
Internet Privacy

Experts Warns of Notable Increase in QuickBooks Data Files Theft Attacks

February 24, 2021
Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now
Internet Privacy

Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now

February 24, 2021
Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFs
Internet Privacy

Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFs

February 24, 2021
Experts Find a Way to Learn What You’re Typing During Video Calls
Internet Privacy

Experts Find a Way to Learn What You’re Typing During Video Calls

February 23, 2021
Next Post
Microsoft announces IPE, a new code integrity feature for Linux

Microsoft announces IPE, a new code integrity feature for Linux

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Google funds Linux kernel developers to work exclusively on security
Internet Security

Google funds Linux kernel developers to work exclusively on security

February 25, 2021
Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique
Internet Privacy

Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique

February 25, 2021
Off-chain reporting: Toward a new general purpose secure compute framework by Chainlink
Big Data

Off-chain reporting: Toward a new general purpose secure compute framework by Chainlink

February 25, 2021
Even Small Companies Use AI, Machine Learning
Machine Learning

Even Small Companies Use AI, Machine Learning

February 25, 2021
How Is Machine Learning Revolutionizing Supply Chain Management | by Gina Shaw | Feb, 2021
Neural Networks

How Is Machine Learning Revolutionizing Supply Chain Management | by Gina Shaw | Feb, 2021

February 25, 2021
Reaching customers at scale without losing their trust: Wednesday’s daily brief
Digital Marketing

Reaching customers at scale without losing their trust: Wednesday’s daily brief

February 25, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Google funds Linux kernel developers to work exclusively on security February 25, 2021
  • Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique February 25, 2021
  • Off-chain reporting: Toward a new general purpose secure compute framework by Chainlink February 25, 2021
  • Even Small Companies Use AI, Machine Learning February 25, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates