Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

COVID-driven work changes created turbulence for IT security stakeholders

The Long and Winding Road to Cyber Recovery
October 27, 2020

One Identity released commissioned global survey results that reveal IT and security team attitudes regarding their responses to COVID-19-driven work environment changes. The results shed insight into IT best practices that have emerged in recent months, and how organizations rushed to adopt them to maintain a secure and efficient virtual workplace. 

A free executive summary and key findings of the survey results announced today are available online here. Dimensional Research conducted the One Identity-commissioned research, which surveyed 1216 IT security stakeholders between August 20 and September 3, 2020.  

According to the survey, IT security professionals universally (99%) said their organizations transitioned to remote work because of COVID-19, and only a third described that transition as “smooth.” Better than six in ten (62%) respondents indicated that cloud infrastructure is more important now than 12 months ago. Thirty-one percent attributed this shift directly to COVID-19. The cloud has become front and center to the new working reality, creating flexibility for employees. These results demonstrate that the previous level of attention to cloud deployments, while notable, does not appear to have been nearly enough to accommodate the dramatic computing shift across organizations. 

“This research makes it clearly evident that cloud computing has been a lifesaver for many enterprises as IT teams pivoted and supported the massive shift to working away from offices,” said Darrell Long, president and general manager at One Identity. “While we knew the pandemic-driven changes were sudden, what was particularly notable was how strongly the results proved that organizations had to turn their focus on the immediate challenges presented by the aggressive move to cloud computing, chiefly finding solutions that streamlined administering and securing who has access to what and how.”

Shifts in priorities indicate organizations are turning their focus on tackling the security basics. When compared to 12 months ago, 50% of respondents are placing a higher priority on access request technologies, and 31% said this change in prioritization is because of COVID. Identity/access lifecycle management, identity process and workflow, and role management all saw increased priority among at least half of those surveyed.

Todd Peterson, security evangelist at One Identity, says many security professionals overlooked some basic security practices. "At the beginning of the pandemic, many companies implemented new and creative solutions to deal with the shift to remote work. However, many of these solutions were only a bandage and didn’t suffice for the long-term remote work landscape. What’s alarming about how unprepared security professionals were was how poorly many organizations handled the authorization needs required to secure the remote workforce."

Peterson adds, "In the scramble to enable users to work remotely, many security professionals paid little attention to the strength and weaknesses of its network permissions. Their effort to ease the transition resulted in many organizations over-provisioning users. Due to this inefficiency, 50% of IT security professionals stated that they’re now placing a higher priority on access request technologies compared to a year ago. Additionally, over half of security professionals have increased their prioritization of identity/access lifecycle management and identity processes and workflows. These technologies are the key to creating a holistic cybersecurity strategy that not only secures an organization's endpoints but factors in how an employee’s access could allow a cybercriminal to infiltrate the network. "

Perhaps shell shocked, only 45% of IT security professionals indicated they are prepared for the IT changes necessary when their employees move back to organizations’ offices, according to survey results. Yet, two thirds (66%) expressed increased confidence in the effectiveness of their identity management programs post COVID-based changes. 

"According to our research, 55% of security professionals don’t feel fully prepared for the account changes necessary to return to the office. This can be due to a variety of factors, including the challenges that come with securing the distributed workforce that will result from the pandemic. The remote workforce has already created a variety of holes in organizations perimeters, that many are still working to secure. However, a distributed workforce creates an even wider attack surface," Peterson says. "The security professionals that are better positioned for the transition back into the office are the ones that have put identity at the center of its security strategy. Luckily, 56% of security professionals are more confident in their identity management program, meaning they’re already a step ahead of where they were in March. I predict that even after we transition back into the office there’s going to be another disruptive change to the way we work. Knowing this, I recommend that security professionals have a plan in place to deal with another drastic change so it doesn’t have to sacrifice its security to address another unexpected event. "

Peterson explains, "COVID-19 has drastically changed what a perimeter is. With everyone working remotely, firewalls and VPNs can’t defend an organization's corporate network, but employees can. Meaning that companies need to make identity their new perimeter. As a section of the network that remains consistent, no matter where it’s employees are working from, identities are now the root of cybersecurity. To place the concept of identity at the center of organizations’ security strategy they need to make governance an essential element of every task. Governance is focused on the why behind the task versus how the task is done. With a deep understanding of why its security procedures are in place, security professionals are better positioned to maintain security, regardless of the amount of changes in its business strategy." 

An in-depth analysis of the survey study - “And the Survey Says: Insights gained from the annual One Identity Global Survey” presented by Todd Peterson, IAM Evangelist - will be presented during the live session of One Identity’s UNITE virtual user and partner conference, starting at 11 am EST/5 pm CET on November 10, 2020. Registration is free through the online site.

 

KEYWORDS: COVID-19 cyber security remote work

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • election

    Black Hat research predicts significant changes to security operations post COVID-19 and exploit concerns for 2020 U.S. Election

    See More
  • walkie-talkie-2534576_1920

    Communication changes for remote security teams

    See More
  • computer

    IT security professionals demonstrate excessive trust despite concerns with remote work security programs

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing