Intelligent CISO Issue 12 | Page 39

FEATURE Advice for CISOs The best advice for CISOs that need to secure the remote workforce involves an open mind and acceptance of new technologies, methodologies and workflows to accomplish cybersecurity best practices. This includes using MDM solutions, leveraging the cloud and monitoring data and workflows to prevent a breach. CISOs need to think out of the box regarding connectivity. We live in the age of cellular, broadband and will see a bandwidth evolution with 5G. The theft of large quantities of data can occur within minutes using wireless technology and new techniques are needed to defend against these threats. This is not only from a remote employee copying the data from corporate resources but also threat actors breaching a remote employee and leveraging them as a beach head. Therefore, CISOs need to understand their business models, the roles remote employees play and the data and system risks they represent. Then, a defensive strategy can be built using modern security technology and practices. many organisations but the security challenges never get old. BYOD moves, or even eliminates, the security perimeter. It used to be that you could not do work unless you were in the building at your desk. The desktop environment could be locked down. But with BYOD, malware can walk in through the front door on a personal device and then gain access to the corporate network. And what’s more, business data and personal information are both being sent across the same networks. Driven by the demands of enterprise mobility, BYOD, cloud and IoT, Aruba saw the need for a different design approach to connecting and securing networks. Aruba is now changing the paradigm with the Aruba 360 Secure Fabric, an enterprise security framework that gives security and IT teams an integrated way to gain back visibility and control. Second, many enterprise applications are consumed directly from the cloud. These direct-to-the-Internet pathways don’t pass through the traditional enterprise network protections and create new risks that old tools can’t address. Most security technologies It allows you to detect gestating attacks with machine-learned intelligence and proactively respond to these advanced cyberattacks across any infrastructure – with the enterprise scale to protect millions of users and devices and secure vast amounts of distributed data. u Today’s collaborative digital workplaces have resulted in a vanishing perimeter. In addition, many of today’s mobile workers are using their own personal devices. BYOD is well established in www.intelligentciso.com | Issue 12 deployed today are perimeter-based and not designed for cloud-oriented threats. Third, the advent of the Internet of Things (IoT) is bringing thousands of often inherently insecure sensors and other devices into corporate networks. These devices may be on movable equipment, attached to a company’s building, or given to employees. RABIH RABIH ITANI, ITANI, REGIONAL REGIONAL BUSINESS BUSINESS DEVELOPMENT DEVELOPMENT MANAGER MANAGER – – SECURITY, SECURITY, MIDDLE EAST AND EAST TURKEY ARUBA, AT A MIDDLE AND AT TURKEY HEWLETT ARUBA, A PACKARD HEWLETT ENTERPRISE PACKARD COMPANY ENTERPRISE COMPANY First, Wi-Fi networks have moved the network perimeter beyond the building perimeter. In the past, employees and visitors had to pass through security to enter a building and use its network. But Wi-Fi extends the network perimeter into parking lots, across streets and even into other buildings. Today’s collaborative digital workplaces have resulted in a vanishing perimeter. 39