Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagement

4 Cybersecurity Lessons from the Front Lines of Pandemic Preparation

By Gary Symes
Cyber Security default
May 8, 2020

Ten years ago, I helped create a national pandemic plan outlining how the U.K. would respond to a potential outbreak. While the exercise was largely theoretical, we are now seeing the need for these preparations in real time.

Today, I am helping cybersecurity leaders develop tactics to safeguard their organizations. During my tenure with the UK Pandemic Flu Service, our goal was to create a resilient IT service and support function to operate during a pandemic outbreak. That goal is the same for any organization right now. Instead of helping evaluate vaccines and screen patients, those processes may be applied to keep businesses up and running.

The cybersecurity impact of this pandemic is already apparent. Hackers have started leveraging the crisis for phishing and other forms of attack. For example, in March, a major COVID-19 testing hub suffered a ransomware attack that disrupted operations and caused surgery postponements. There are likely other security implications to come. As a remote work force continues to broaden the attack surface, many corporate networks and IT assets must be secured from afar.

In every case, the best thing you can do is to be prepared. This is true whether it’s a health crisis, a tornado, an earthquake, or a cyber incident. Hopefully organizations had proactively put some of these measures in place, like business continuity and security controls, but it’s not too late to start implementing best practices to protect remote employees and secure your business.

Here’s key lessons from my time preparing for a global pandemic. 

 

1. Scarcity of Resources

Prepping for a potential pandemic outbreak requires planning for the inevitable scarcity of resources – be it healthcare supplies, testing kits, or even qualified people. Understanding what you have available is one of the first steps towards dealing with this challenge. For instance, how many laptops do you have to deliver to newly remote employees? Knowing how many you have to allocate, then efficiently delivering those resources, is difficult but an important part of ensuring productivity.

 

2. Unprecedented Scale

Remote work isn’t new for most companies, but the sheer current scale of it certainly is. For CIOs, that means not only quickly enabling tools that can make that scale possible, like video conferencing and allocating new devices, but also making sure those tools are secure.

VPNs, for instance, can ensure that employees are able to securely connect to the corporate network. But further tools are also needed to ensure the security of the device itself, as well as what corporate systems and applications that user has access to once connected. That means also evaluating tools like antivirus, network segmentation, and Intrusion Detection Systems & Intrusion Prevention Systems. Many of these tools can now be implemented in a cloud-based fashion, which means that CISOs can add them to their existing security portfolios even while remote.

 

3. Don’t Forget the Foundational Elements

Part of managing through crisis is not only addressing the crisis itself, but also ensuring that existing operations are able to continue as smoothly as possible. When you think of that in terms of an IT network, that means not only ensuring your employees are able to do things like work remotely in a secure way, but also that the corporate network is secure while employees are away.

To do that, CISOs can also consider tools like automation to develop and enforce policies to take action based on activity seen on the network. They can also implement tools like network segmentation, which would automatically limit the spread of an attack if it were to hit the network.

 

4. Learn from this Crisis

It is tempting at this extremely busy time to just focus minimizing the impact of the pandemic to your business. However, when things are back to normal, it will be a great time to reflect on what worked well and what didn’t. What wasn’t documented and took unexpected effort to provide?

As IT professionals, we pay good money and dedicate significant time to business continuity exercises, and they are never as realistic as we would like. Don’t miss this opportunity: you have just had a worldwide business continuity test that included your government and all of your supply chain. We all hope this is a once in a lifetime event, but it’s also a great opportunity for continual improvement.

We are certainly in unprecedented times and navigating to a new reality where business is largely being conducted remotely. While I worked on preparing us for this time for more than 10 years, it is still surreal that many of those theoretical implications are now coming true.

The key, in times like this, is to adapt quickly. CISOs should consider what’s working well now, what could be better, and build their plans accordingly. Prioritize triaging what needs to be done now, versus what can wait until later in the year.

 

KEYWORDS: COVID-19 cyber security remote workers risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Gary symes

Gary Symes has more than 35 years of experience in the technology industry, Gary has held roles in IT Delivery, Operations, and Sales Management. He has worked in a variety of industry sectors, including healthcare and finance. In his role as Service Director during the London 2012 Olympics, Gary worked to combat cybersecurity challenges throughout the London Olympics. Following the Games, Gary found a new challenge, taking a role as a Security VP in Denver, Colorado. He joined Forescout in 2019, blending his passions for cybersecurity and customer success as VP Customer Success. He now focuses on helping customers deliver against regulatory obligations as well as acting as thought leader and trusted adviser on all aspects of IT Security including Architecture, Threat Detection, Analytics, Strategy, Process, Cloud, Policy, Governance, Compliance and Risk. In his free time, Gary likes to hone his skills on the ski slopes, as well as hike and cycling.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gaps in Cybersecurity Programs

    War at Home: How U.S. Corporations are on the Front Lines of the Silent War on Privacy

    See More
  • SEC0219-data-Feat-slide1_900px

    Replacing the Front Lines of Cyber Defense with Concentric Circles

    See More
  • cyber laptop freepik

    The pandemonium of the pandemic: How working from home has changed the cybersecurity formula

    See More

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!