Securing the New World of Distributed Work: What We've Learnt and How To Apply It

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Today, organizations face more distributed workforces than ever, spanning not just internal teams but also contractors and freelancers. Securing work between these different kinds of employees across numerous locations introduces security challenges. Teams must stay productive while grappling with security measures such as site whitelisting, performance issues with remote virtual desktop access, and requirements like VPN solutions to access company resources.

This webinar will explore the challenges facing these companies, including the need to balance security and productivity. How can organizations make work seamless and productive while locking down sensitive data and applications from intruders?

 Talking points will include:

  • The biggest challenges facing companies supporting long-term distributed working practices
  • What assets are most at risk in a remote working environment, why and how to protect them?
  • What kinds of security mistakes did companies make when rushing to support remote work at the start of the pandemic, and what can we learn from them?
  • What functionality do teams need in the long term to be truly productive?
  • Ways to achieve both productivity and security in distributed work
  • Security management techniques that can help mitigate those challenges

>> Log in or complete this short form to register >>

Speakers

Photo of Danny Bradbury

Danny Bradbury

Contributing Writer & North America Webinar Moderator

Photo of Robert Clyde

Robert Clyde

Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

Photo of Ranulf Green

Ranulf Green

Senior Manager, Accenture Advanced Attack and Readiness Operations

Photo of Tal Zamir

Tal Zamir

Founder, CTO & Board Member, Hysolate

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.