<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

VIDEO: Remote Workforce Roundable

I recently interviewed leaders from a few of our partners and our Chief Information Security Officer (CISO), Jeff Marshall, to talk about the recent COVID-19 quarantine and impact to a newly expanded remote workforce.

 

We spoke about the marketing hype surround the issue and how much has changed (or hasn't) when it comes to cybersecurity risks and IT operations.

Participants in the roundtable include leaders from both RSA and Proofpoint:

Questions I posed to our guests include:

You can read more articles about remote access and cybersecurity risks here.

As always, Datashield strives to be a leader in thought and innovator in the managed cybersecurity space. If you have any questions about how to secure your business during this time, make sure to contact us for a no-cost remote security consultation.

Topics from this Article

RSA NetWitness, Proofpoint, Video, Remote Access, Remote Users

Chris Vincent
Chris Vincent
Chris Heads up Marketing, Demand Generation and Martech at Datashield. He contributes to the Datashield resource library, hosts Datashield's flagship podcast "The Hash-Time Show" and manages Datashield video content.

Related Posts

What is Microsoft Defender for Endpoint and How Does it Work?

Microsoft Defender for Endpoint, formerly known as Microsoft Defender Advanced Threat Protection, provides enterprise-level protection to endpoints to prevent, detect, investigate, and respond to advanced threats.

What is the Zero Trust Framework?

Zero Trust security concept is a model and framework developed by former Forrester analyst John Kindervag in 2010. Since then, the Zero Trust model is widely adopted, with leading researchers at Gartner, Microsoft, and Google all developing and implementing their variations of Zero Trust frameworks while keeping the core concept intact.

Behavioral Indicators of Insider Threat Activity

Contrary to popular beliefs, an insider threat is not always a security risk within an organization's immediate perimeter. Current employees and managers aside, an insider threat could be a former employee who had access to specific information, a third-party consultant, or a business partner.