CISO Checklist for Secure Remote Working

CISO Checklist for Secure Remote Working

The Coronavirus quarantine forces us to face a new reality. It is critical to acknowledge this new reality in order to understand how to successfully confront these changes.

Organizations with lesser maturity that could contain the risk of not placing advanced protection on their email systems and endpoints now realize that they have a critical security gap that must be addressed.

The CISO Checklist for Secure Remote Working is built of five pillars:

  1. Security Technology (a recommended list of product categories that should be installed and configured.)
  2. Security Team (every team, regardless of size and dedication level, has a set of procedures to handle ongoing security operations routinely.) 
  3. General Workforce (CISOs know better than anyone else that a man is a far weaker link than a machine.)
  4. 3rd Party Service Providers (whether your organization performs all its security tasks in-house or not, it is definitely a time to consider outsourcing some of the more skill-dependent mission to a domain expert MSSP – or at least make sure that all IR and security management operations are adequately covered.) 
  5. Management Visibility (The organization's executives must have full visibility both into the CISOs efforts as well as to the actual security posture – is there an increase in attacks, do security teams and products operate as expected, has there been a breach and if so how was it managed and contained, etc)

Source: https://bit.ly/2RHD9Lp

To view or add a comment, sign in

More articles by Seyedmostafa Safavi, PhD

Insights from the community

Others also viewed

Explore topics