Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Ian Pratt - Designing enterprise-level security for the work from anywhere world, from the hardware up

By Maria Henriquez
5 mins with Ian Pratt
November 4, 2020

COVID-19 massively accelerated cyber risk, with new vulnerabilities cropping up every day in both known and novel forms. Several factors are driving this trend, including how businesses are managing IT in remote environments as well as the significant increase in threats posed by bad actors looking to take advantage of widespread corporate confusion and more vulnerable home networks.

There are not many constants in the world we’re currently living in. But one thing is certain: the need for enterprise-grade security, embedded in device hardware, is greater than ever before.

Ian Pratt, HP’s Global Head of Security for Personal Systems, believes hardware-embedded security paired with a robust cybersecurity education and cyber hygiene protocols for remote employees is core to any organization’s operational resiliency. Formerly the co-founder of the cybersecurity company Bromium, acquired by HP in 2019, Pratt has spent his career spanning industry and academia, inventing new technology and bringing it to market. Now, he works to design and commercialize next-gen security technologies for HP — all of which are core to the business’ mission to engineer the world’s most secure devices, technologies and services.

Below, we speak with Pratt about the long-term security implications of the pandemic, what CISOs should be doing now to prepare for an increasingly uncertain future and where he believes cybersecurity is headed next.

 

Security Magazine: What are the long-term security impacts of the pandemic, global lockdowns and the rapid mass shift to remote work?

Pratt: What we’re seeing due to COVID-19 and the rapid shift toward remote work is an acceleration of trends that were already underway. But even simple IT work practices have changed immensely in the span of six months. Now, organizations have to figure out how to get PCs to employees with all the correct compliance protocols, credentials and certificates in place without dropping it off at an IT practitioners’ desk first. This can be a major challenge given our current circumstances.

Organizations should understand this. At HP, for instance, we are now enabling organizations to order machines not only imaged but also provisioned with security credentials straight from the factory so employees can use them securely straight out of the box. This is important because we are at a point where endpoints must be able to look after themselves at every stage, in every environment, on every network.

This points to another emerging trend: the centralized role of the PC in remote and hybrid working environments. PCs must protect everyday users and their wider networks to ensure business continuity and protect against emerging threats. As mentioned, this can be done through zero-touch support and zero-touch onboarding, but additionally, through elevating the security culture throughout an organization — delivering regular cyber security trainings to employees and establishing measures that incentivize the practice of good cyber hygiene.

From a broader perspective, I predict that as the year comes to a close, we’ll start to gain a fuller picture of the residual effects of insufficient enterprise cybersecurity in the era of COVID-19. Then, once business leaders recognize these major implications, cybersecurity will begin to be seen as an operational requirement, rather than a cost-sink or innovation inhibitor.

 

Security Magazine: What’s been the biggest shift you’ve observed from the criminal element and where do you think adversaries will turn next?

Pratt: It’s important that we recognize the maturity of the criminal supply chain, the commodification of criminal activity and the implications of criminal focus on yield management. Understanding these trends will help us predict where bad actors plan to turn next.

For instance, what would have previously been regarded as a high-level, nation-state attack, is now regularly being perpetrated by cybercriminal organizations. These organizations have reached a level of sophistication that we’ve never before seen — forming complex operational structures and contributing specialist skills to find vulnerabilities, build exploits and payloads and craft cyber lures. Yield management has become much more sophisticated, too. In the event of monetary-motivated attacks, criminals play the long game to ensure they extract as much money as possible from a victim.

I believe a few factors contribute to the rising risk that we’re witnessing. Remote work is certainly one — people simply aren’t as vigilant about their cybersecurity protocol in home environments as they are in offices. In fact, 51% of end-users feel they’re not set up adequately for remote work, according to research by HP, and widely used network security solutions, like VPNs, are not always suitable for mass use.

For this reason, 77% of IT Managers believe more remote work means more security vulnerability, according to HP’s research. Meanwhile, IoT continues to be a weak link and route for extortion. This attack surface is only broadening as more enterprise devices are brought onto home networks, where often work and personal networks remain un-bifurcated.

 

Security Magazine: How can businesses ensure their employees are safe as they return to the office by using technology and innovation?

Pratt: The rush to facilitate remote work over the past months will have inevitably led to vulnerabilities, omissions or trade-offs that left CISOs gritting their teeth. Now, security pros are facing a new risk profile. One that will not roll back as the infection rate subsides. Many workforces are not willing to give up flexibility, so even as some offices begin to open up and workers look to return to these spaces (even if only on part-time basis with health guidelines in place), businesses really need to consider how they manage that process from a security as well as a safety point of view. Alongside temperature screening on the door, devices should also be screened.

As businesses and institutions look to the future to prepare for either partial or permanent returns to the office, they need to review their tools and technology choices, along with their policies and procedures. Before offices reopen, security professionals should ensure they’ve bulk patched for off or idle in-office machines before a user sits down in front of them. A lot can change in months of remote working, so it’s critical to get patches installed before they become a weakness in the corporate network. Devices that employees bring from their homes back into the corporate network should be fully scanned for presence of any malware unbeknownst to the user. They should also be patched and brought up to date on all software (including firmware) to ensure they can stay safe.

Initially, many businesses are taking a phased approach to return their employees to work, by starting off a select set of employees to be inside their corporate offices for a select few days in a week. As these early returning employees are frequently in and out of corporate networks, they can cause an increase of the attack surface. However, this also presents a great opportunity to incorporate new security protection and tools on their machines. Most devices aren’t equipped to autonomously recover or defend themselves. Security solutions should take a zero-trust endpoint architecture approach where we have engineered ways for the endpoint to protect itself autonomously without having to rely on detection. By incorporating such tools into your workforce, organizations should be able to address most of their risks from returning employees.

 

Security Magazine: Where do you believe cybersecurity is going next?

Pratt: Even though we’re seeing more maturity from cybercriminals, the fundamental models and modes of attack have not changed. Cybercriminals are still getting in through endpoints. Users are still being duped and inviting the attackers in.

Therefore, I believe cybersecurity is headed toward a cultural and technological shift where endpoints must be able to look after themselves — autonomously and in every environment. This should be table stakes for any CISO or procurement officer going forward in every tech purchasing decision they make. Why is this critical? Because most security is detection based. Bad actors have done very well at evading detection, using machine learning and automation to mutate malware to evade detection. It’s a large part of their malware development process. In fact, that’s one of the specialized functions in the kill chain — to do quality assurance.

Organizations should use isolation technology, virtual machines that can spin up and contain these risks, building in resilience in addition to detection capabilities. An organization’s strategy should be to focus on innovation and research, ensuring that they’re developing prescient technology that helps customers address the challenges of the future. Technology has now become even more critical components of secure and productive remote work. These autonomous and self-healing technologies — I believe — will be fundamental for the future of cyber security.

This crisis has made it clear that businesses need to be able to manage remote endpoints in a way that provides real intelligence back to the business about how they are being used and the risks they are facing. They need to understand how existing security protocols may be helping or hindering the business and employees. Changes should be made to reflect new workflows and ensure security procedures support productivity.

 

Security Magazine: How will CISOs, the industry, and businesses plan for future “black swan” events?

Pratt: First and foremost, CISOs need to ensure quick fixes do not become long-term crutches. Point solutions aren’t sufficient to manage the level of risk businesses are now dealing with. Multi-layered defence must be in place to prevent attacks, detect those that do make it through and get organizations back to productivity, quickly, in the event of a breach.

To prepare for a black swan event, again, it’s more important than ever that devices are equipped to protect, detect and recover from whatever is thrown at them. That is the very first line of defence.

For example, if there was an incident like the NotPetya attacks in our present-day situation — when people are locked down and social distancing is being enforced — recovery and remediation would be next-to-impossible. Thus, organizations must not only equip themselves with the proper devices that autonomously detect and prevent attacks, but they also must completely reframe their approach to onboarding and recovery. This will become difficult with “forever remote” workforces, but certainly possible if CISOs are up to the task.

Successful CISOs know it is critical to maintain operational integrity in a compromised state. They cannot afford to trade off on security and resilience for short term gains. They must remember that every security risk is also a reputational one. The cost of a breach is simply too high.

Criminals are only getting smarter. To keep up with the pace of change, I believe that we must work together and help CISOs rise to this moment and turn this crisis into an opportunity.

KEYWORDS: cyber security enterprise security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC_Web_5Minutes-Tavakoli-0222_1170x658.jpg

    5 minutes with Oliver Tavakoli: Remote and hybrid work strategies for increased enterprise security

    See More
  • 5 minutes with

    5 minutes with Satya Gupta: The surge of remote work and its impact on critical infrastructure organizations

    See More
  • 5 m with Shneider

    5 minutes with Tehila Shneider - Authorization policy management in the enterprise

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!