FEATURE
Advice for CISOs
The best advice for CISOs that need to
secure the remote workforce involves
an open mind and acceptance of
new technologies, methodologies and
workflows to accomplish cybersecurity
best practices. This includes using
MDM solutions, leveraging the cloud
and monitoring data and workflows to
prevent a breach.
CISOs need to think out of the box
regarding connectivity. We live in the
age of cellular, broadband and will see a
bandwidth evolution with 5G. The theft of
large quantities of data can occur within
minutes using wireless technology and
new techniques are needed to defend
against these threats.
This is not only from a remote employee
copying the data from corporate
resources but also threat actors
breaching a remote employee and
leveraging them as a beach head.
Therefore, CISOs need to understand
their business models, the roles remote
employees play and the data and system
risks they represent. Then, a defensive
strategy can be built using modern
security technology and practices.
many organisations but the security
challenges never get old. BYOD
moves, or even eliminates, the security
perimeter. It used to be that you could
not do work unless you were in the
building at your desk. The desktop
environment could be locked down.
But with BYOD, malware can walk in
through the front door on a personal
device and then gain access to the
corporate network. And what’s
more, business data and personal
information are both being sent across
the same networks. Driven by the demands of enterprise
mobility, BYOD, cloud and IoT, Aruba
saw the need for a different design
approach to connecting and securing
networks. Aruba is now changing the
paradigm with the Aruba 360 Secure
Fabric, an enterprise security framework
that gives security and IT teams an
integrated way to gain back visibility and
control.
Second, many enterprise applications
are consumed directly from the cloud.
These direct-to-the-Internet pathways
don’t pass through the traditional
enterprise network protections and
create new risks that old tools can’t
address. Most security technologies It allows you to detect gestating attacks
with machine-learned intelligence and
proactively respond to these advanced
cyberattacks across any infrastructure
– with the enterprise scale to protect
millions of users and devices and secure
vast amounts of distributed data. u
Today’s collaborative digital workplaces
have resulted in a vanishing perimeter.
In addition, many of today’s mobile
workers are using their own personal
devices. BYOD is well established in
www.intelligentciso.com
|
Issue 12
deployed today are perimeter-based and
not designed for cloud-oriented threats.
Third, the advent of the Internet of
Things (IoT) is bringing thousands of
often inherently insecure sensors and
other devices into corporate networks.
These devices may be on movable
equipment, attached to a company’s
building, or given to employees.
RABIH
RABIH ITANI,
ITANI, REGIONAL
REGIONAL
BUSINESS
BUSINESS DEVELOPMENT
DEVELOPMENT
MANAGER
MANAGER – – SECURITY,
SECURITY, MIDDLE
EAST
AND EAST
TURKEY
ARUBA, AT A
MIDDLE
AND AT
TURKEY
HEWLETT
ARUBA, A PACKARD
HEWLETT ENTERPRISE
PACKARD
COMPANY
ENTERPRISE COMPANY
First, Wi-Fi networks have moved the
network perimeter beyond the building
perimeter. In the past, employees and
visitors had to pass through security to
enter a building and use its network. But
Wi-Fi extends the network perimeter into
parking lots, across streets and even
into other buildings.
Today’s collaborative
digital workplaces
have resulted in a
vanishing perimeter.
39