Publicité
Publicité

Contenu connexe

Présentations pour vous(20)

Similaire à Digital workplace security for gen z(20)

Publicité
Publicité

Digital workplace security for gen z

  1. Future of cyber security www.rasoolirfan.com Digital workplace security for Gen Z
  2. Future of cyber security www.rasoolirfan.com Who are Gen Z • Gen Z or iGen or Centennials have birth years as being 1996 to the present • Gen Z are highly educated; wants to make a difference in the world and more diverse than Millennials • Gen Z are currently over 23 million in the United States. Within the next five years, they will become the fastest- growing generation in both the workplace and the marketplace • Gen Z are not at all concerned or not concerned that companies will use their personal online data in a way that could harm them
  3. Future of cyber security www.rasoolirfan.com Digital workplace for Gen Z • GenZ are mobile first, completely immersed and must be able to work anytime, anywhere, and via any device • Gen Z uses Instagram to follow brands, Snapchat to post or send a video or a selfie, and Facebook to create or check a group event • Key guiding principles to develop modern digital workplace for Gen Z are • Enable flexible workplace • Engage the diverse workforce • Improve collaboration • Enhance productivity • Enrich employee experience
  4. Future of cyber security www.rasoolirfan.com Cyber security technologies are essential to keep digital workplace secure These five step process should help organizations to develop framework for digital workplace security • Define digital workplace security vision and strategy • Design digital workplace security ecosystem • Develop and implement security technology and services • Manage cyber security to enable business • Improve constantly and innovate cyber security operations
  5. Future of cyber security www.rasoolirfan.com Digital workplace security controls & technologies Risk Management, Regulations, Privacy, Breach Response Notifications Security Governance Employees, Partners, Contractors, VIP users IoT Devices & Sensors Remote access, Secure VPN, Software Defined Perimeter User credentials, Service accounts Laptops, Desktops, VDIs, Workstations, Tablets, Smartphones Email, OneDrive, SharePoint, Browsers & other SaaS apps Identities Users End user devices Smart devices Business Apps Access IT Risk Assessment, IT Security Policy Enhancements, Security Monitoring & Incident Response Playbooks Physical access security, Security awareness, Operational security, User behaviors analytics, Fraud Management Circle of Trust for IoT Devices & Sensors, Certificate Mgmt., Service Availability Secure Internet Access, Remote Access, CPE Management Identity management, Privilege management, Multi factor authentication, Single Sign On Antivirus management, Malware defense , Encryption , DLP, Vulnerability management, MDM, Mobile Security Email security & Anti-phishing , Data Loss Prevention, CASB, Secure Private App Access, Application Security Testing
  6. Future of cyber security www.rasoolirfan.com If you’re connected – you’re vulnerable. Hence stay protected
Publicité