Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Kory Patrick - How COVID-19 challenged security practices

By Maria Henriquez
5 mins with Patrick
December 9, 2020

Not long ago, most business was conducted within the confines of office walls, that is, until 2020. This year, work as we know it evolved practically overnight, as employees went home with company cell phones, laptops and information, and many have yet to return. Unlike ever before, companies must rely on their people to secure any work-related technology and trust that corporate data and information are safe. But should they? And is their current security strategy adequate?

To find out, we talk to Kory Patrick, Risk & Security Solution Executive at TEKsystems.

 

Security magazine: What is your title and background?

Patrick: I’m an information security solution executive offering more than 20 years of experience in designing, developing and managing global cybersecurity programs in both public and private sectors. I’ve led global counterintelligence and cybersecurity investigations leading to the identification of nation state, financial, terrorist and insider threats. I have provided advisory and consultative services leading to the implementation of identity management solutions, security operations, compliance programs, control frameworks and testing within cloud, on-premise and hybrid environments. My clients range from small businesses to global organizations, including 18 of the Fortune Global 100.

 

Security magazine: How has COVID-19 exposed and challenged companies’ security measures?

Patrick: Early on in the pandemic, a lot of organizations struggled because of what I would call a lack of maturity around identity access management. Many were experiencing hiring freezes because they couldn’t remotely onboard or provision access the way they needed to. Although some of that has alleviated and adapted, the reality is a lot of organizations did not build out infrastructure to support 100% remote. Good plans and strategies were in place but not tested for the load that we’re experiencing today. The other piece—security is about control. What can we wrap our arms around? What can we harden? Now the variable of remote work and devices beyond a company’s control—it can be unnerving.

 

Security magazine: How has 2020 evolved the cybersecurity industry?

Patrick: Security has always had a focus on tools and technology. Sometimes an organization is woefully behind or underfunded, which creates an emphasis on tooling—not the security strategy and what the tool is trying to accomplish. 2020 has evolved our thinking into prioritizing the “process” piece. Figure out how your tools and technology align to your strategy, not the other way around. A lot of times, we walk into an organization that has four or five tools that do the same thing. That’s not simple or sustainable.

This has also shown that security and protecting data is a community effort. We’re only as secure as our partner or who we share our data with. 2020 has put an emphasis on investing in processes, controls and structure to be compliant. Aligning to security control frameworks such as NIST or ISO, investing in enterprise-level certifications, third-party risk programs and ensuring regulatory compliance will be even more of a competitive advantage moving forward.

 

Security magazine: What are your predictions for 2021?

Patrick: Remote is here to stay—identity is your new perimeter. If you relied on your physical perimeter as your security posture, that’s been eliminated. There is no perimeter to protect anymore. You must ensure that at any given moment wherever your data is, the right people or services or partners have access to the information they need—nothing more, nothing less. Organizations have not invested in protecting identities. When you think about some recent breaches, they’ve occurred because someone still had credentials they shouldn’t have and knew exactly where information was. To me, that emphasizes having a well-thought-out identity strategy; investing and implementing has never been more important. If an organization does not have a mature identity access program, that should be an area of focus for 2021.

 

Security magazine: What is your advice for companies striving to secure their greatest asset, and now, potential vulnerability: their people?

Patrick: The good news? It’s been proven that we can do this. From a business perspective, we can work remotely. Is it optimal? No. Is it hard on the psyche? Absolutely. Have we introduced an entirely new vernacular in 2020? “You’re on mute.” Yes.

To me, this all can be positive. We started to embrace and overcome these obstacles. Besides implementing a strong identity access and management program, now we need to think bigger and longer term with our remote workforce. Organizations need to bring more automation and process into how we provision and deprovision access to people. Have more emphasis on how we monitor incidents and logs. Understand that the unthinkable can happen; now become able to quantify impacts and move forward with data-driven business decisions.

KEYWORDS: COVID-19 cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Omri Kletter

    5 minutes with Omri Kletter – COVID-19, cybersecurity, crime, and fraud management

    See More
  • patrick fiel 5 mins with

    5 Minutes with Patrick Fiel on Security Practices during Coronavirus Outbreak

    See More
  • 5 mins with Soroko

    5 minutes with Jason Soroko - The importance of zero trust during COVID-19

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing