CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home News

Securing the Expanded Attack Surface Created by a Remote Workforce

admin by admin
July 15, 2022
in News


The best security professionals have always focused on empowering rather than restricting. However, securing today’s work-from-anywhere workforce is putting that noble goal to the test. That’s because working from home (or anywhere other than locations owned by the organization) opens up a can of security worms and questions, such as are folks more susceptible to ransomware and BEC social engineering attacks because the comfort of their own homes naturally lowers their guard? Can, for example, running downstairs to change out the laundry mean your 10 year old will jump on your laptop and click away? Of course, the implications of that happening vary based on whether the end point in question is a work laptop or personal device, and how it’s secured. In this important webinar, we’ll talk to IT leaders about how they balance the need to empower with the need to secure in today’s post-pandemic environment.

Speakers:

  • Chuck Christian, CTO, Franciscan Health
  • Christopher Frenz, CISO, AVP of IT Security, Mount Sinai South Nassau
  • Chris Feeney, Healthcare Workflow Specialist, IGEL Technology

Podcast: Play in new window | Download (Duration: 57:14 — 39.3MB)

Subscribe: Apple Podcasts | Google Podcasts | Spotify | Android | Pandora | iHeartRadio | Stitcher | Podchaser | Podcast Index | Email | TuneIn | RSS



Source link

Previous Post

Initiatenegotiation

Next Post

Ever Wondered What Cloud Computing Is? Let’s Dive Into It

Related Posts

News

Q&A with CIO Dustin Hufford, Part 2: How Engagement, Flexibility & Transparency Can Help Retain Talent

by admin
August 14, 2022
News

Initiateinnovativeleadership ~ Future of CIO

by admin
August 14, 2022
News

Q&A with Stacey Johnston, Part 1: “We have to help each other cross the finish line.”

by admin
August 13, 2022
News

Initiateriskunderstanding ~ Future of CIO

by admin
August 13, 2022
News

Does the Future Belong to Mad Max or Star Trek?

by admin
August 12, 2022
Next Post

Ever Wondered What Cloud Computing Is? Let's Dive Into It

Recommended

Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer

August 14, 2022

Fake Elon Musk TeslaCoin investment scam costs victims at least $250

August 14, 2022

Q&A with CIO Dustin Hufford, Part 2: How Engagement, Flexibility & Transparency Can Help Retain Talent

August 14, 2022

Initiateinnovativeleadership ~ Future of CIO

August 14, 2022

Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users

August 13, 2022

Pay with just your palm at Whole Foods

August 13, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.