Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagement

4 Cybersecurity Lessons from the Front Lines of Pandemic Preparation

By Gary Symes
May 8, 2020

Ten years ago, I helped create a national pandemic plan outlining how the U.K. would respond to a potential outbreak. While the exercise was largely theoretical, we are now seeing the need for these preparations in real time.

Today, I am helping cybersecurity leaders develop tactics to safeguard their organizations. During my tenure with the UK Pandemic Flu Service, our goal was to create a resilient IT service and support function to operate during a pandemic outbreak. That goal is the same for any organization right now. Instead of helping evaluate vaccines and screen patients, those processes may be applied to keep businesses up and running.

The cybersecurity impact of this pandemic is already apparent. Hackers have started leveraging the crisis for phishing and other forms of attack. For example, in March, a major COVID-19 testing hub suffered a ransomware attack that disrupted operations and caused surgery postponements. There are likely other security implications to come. As a remote work force continues to broaden the attack surface, many corporate networks and IT assets must be secured from afar.

In every case, the best thing you can do is to be prepared. This is true whether it’s a health crisis, a tornado, an earthquake, or a cyber incident. Hopefully organizations had proactively put some of these measures in place, like business continuity and security controls, but it’s not too late to start implementing best practices to protect remote employees and secure your business.

Here’s key lessons from my time preparing for a global pandemic. 

 

1. Scarcity of Resources

Prepping for a potential pandemic outbreak requires planning for the inevitable scarcity of resources – be it healthcare supplies, testing kits, or even qualified people. Understanding what you have available is one of the first steps towards dealing with this challenge. For instance, how many laptops do you have to deliver to newly remote employees? Knowing how many you have to allocate, then efficiently delivering those resources, is difficult but an important part of ensuring productivity.

 

2. Unprecedented Scale

Remote work isn’t new for most companies, but the sheer current scale of it certainly is. For CIOs, that means not only quickly enabling tools that can make that scale possible, like video conferencing and allocating new devices, but also making sure those tools are secure.

VPNs, for instance, can ensure that employees are able to securely connect to the corporate network. But further tools are also needed to ensure the security of the device itself, as well as what corporate systems and applications that user has access to once connected. That means also evaluating tools like antivirus, network segmentation, and Intrusion Detection Systems & Intrusion Prevention Systems. Many of these tools can now be implemented in a cloud-based fashion, which means that CISOs can add them to their existing security portfolios even while remote.

 

3. Don’t Forget the Foundational Elements

Part of managing through crisis is not only addressing the crisis itself, but also ensuring that existing operations are able to continue as smoothly as possible. When you think of that in terms of an IT network, that means not only ensuring your employees are able to do things like work remotely in a secure way, but also that the corporate network is secure while employees are away.

To do that, CISOs can also consider tools like automation to develop and enforce policies to take action based on activity seen on the network. They can also implement tools like network segmentation, which would automatically limit the spread of an attack if it were to hit the network.

 

4. Learn from this Crisis

It is tempting at this extremely busy time to just focus minimizing the impact of the pandemic to your business. However, when things are back to normal, it will be a great time to reflect on what worked well and what didn’t. What wasn’t documented and took unexpected effort to provide?

As IT professionals, we pay good money and dedicate significant time to business continuity exercises, and they are never as realistic as we would like. Don’t miss this opportunity: you have just had a worldwide business continuity test that included your government and all of your supply chain. We all hope this is a once in a lifetime event, but it’s also a great opportunity for continual improvement.

We are certainly in unprecedented times and navigating to a new reality where business is largely being conducted remotely. While I worked on preparing us for this time for more than 10 years, it is still surreal that many of those theoretical implications are now coming true.

The key, in times like this, is to adapt quickly. CISOs should consider what’s working well now, what could be better, and build their plans accordingly. Prioritize triaging what needs to be done now, versus what can wait until later in the year.

 

KEYWORDS: COVID-19 cyber security remote workers risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Gary symes

Gary Symes has more than 35 years of experience in the technology industry, Gary has held roles in IT Delivery, Operations, and Sales Management. He has worked in a variety of industry sectors, including healthcare and finance. In his role as Service Director during the London 2012 Olympics, Gary worked to combat cybersecurity challenges throughout the London Olympics. Following the Games, Gary found a new challenge, taking a role as a Security VP in Denver, Colorado. He joined Forescout in 2019, blending his passions for cybersecurity and customer success as VP Customer Success. He now focuses on helping customers deliver against regulatory obligations as well as acting as thought leader and trusted adviser on all aspects of IT Security including Architecture, Threat Detection, Analytics, Strategy, Process, Cloud, Policy, Governance, Compliance and Risk. In his free time, Gary likes to hone his skills on the ski slopes, as well as hike and cycling.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gaps in Cybersecurity Programs

    War at Home: How U.S. Corporations are on the Front Lines of the Silent War on Privacy

    See More
  • SEC0219-data-Feat-slide1_900px

    Replacing the Front Lines of Cyber Defense with Concentric Circles

    See More
  • shopping mall

    Retail security: Lessons from the front line

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • The Database Hacker's Handboo

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing