Building and Maintaining an Effective Remote Access Strategy
Brad Causey, SecurIT360 | Nick Edwards, Menlo Security | Becky Bracken, Dark Reading
About this talk
The COVID-19 pandemic transformed enterprises into remote workplaces overnight, forcing IT organizations to revamp their computing and networking strategies on the fly. Some of the changes were intended to be temporary, and some rules were adopted without thinking through all the implications. With businesses moving to permanent work-from-home and hybrid work models, enterprise IT teams need to rebuild their security strategies and switch off temporary rules and controls. In this webinar, experts discuss how to rethink the remote computing architecture and adjust the rules to consider remote networking and access, all the while giving users safe access to corporate systems and data.
Attendees will learn:
• Remote work policies that safeguard identity, access and user data.
• Balancing user convenience against security policies that satisfy the "C" suite.
• Password and account management that are speedy, efficient and secure.
• Handling the increased workload that comes with keeping remote workers’ data and devices secure.