Remote Workforce: How to Protect Yourself From Emerging Threats?

  • LANGUAGE: English DATE: Wednesday, September 02, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Remote Workforce: How to Protect Yourself From Emerging Threats? Managing Secure Access in Times of a Pandemic

The outbreak of the COVID-19 pandemic has served as a catalyst for digitization in many companies and led to an increase in remote work and adoption of the bring your own device (BYOD) policy. Every device and digital service that employees use is a potential gateway into company networks and thus poses a security risk. The risks are magnified even more when privileged accounts enter the equation because they enable access to critical data. Given the immediacy and speed with which companies had to shift from office to remote work, security concerns were often neglected leading to an increase in successful cyberattacks.

Facing this situation of increased risks and attack vectors, companies need to have foolproof security in place to keep their data safe and secure. IT teams should start with the very basics such as giving the company staff cybersecurity awareness trainings and monitoring remote access. While it has become a well-known fact that Privileged Access Management (PAM)  is an integral part of cybersecurity in modern companies, Secure Compliance Management (SCM) and User Behaviour Analytics (UBA) perhaps have not been given proper attention in the security world yet.  

Join this webinar and learn

  • About the risks associated with remote workforce as well as the need for better remote access policies
  • About security issues that are inherent in IT consumerization and bring your own device (BYOD)
  • Why you should sensitize remote teams to follow data security protocols
  • Why privileged accounts should be given special care by security teams
  • How Privileged Access Management, Secure Compliance Management (SCM) and User Behaviour Analytics (UBA) can help companies to establish a secure environment

KuppingerCole Senior Analyst Paul Fisher will have a detailed look at the attack vectors that are inherent in remote work and how they increased during the pandemic through the usage of private devices.

In the second part of the webinar, Anil Bhandari, Chief Mentor & Thought Leader at Arcon, will show how companies can secure data which is accessed remotely by employees or third-party vendors taking user behavior and privileged accounts into consideration.

If you cannot attend the live session but are interested in the topic, please register anyway. We will notify you on the availability of the webcast recording.


Mr. Anil Bhandari is the Chief Mentor & Thought Leader at ARCON and provides his invaluable insights for the future growth and development of ARCON. He mentors the product technology roadmap with his insightful knowledge in the areas of Risk Management, Internal Audits, and Regulatory...

Paul Fisher is a Senior Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...

Lead Sponsor

ARCON is a leading Information Risk Management Solutions provider, specializing in Privileged Access Management (PAM) and continuous Risk Assessment solutions such as User Behavior Analytics and Security Compliance Management. ARCON was established to address the emerging enterprise risk issues and provide a systemic solution to various technology risks along with a unified governance framework.
The solution provides seamless access and scalable architecture with real-time monitoring and analytics to predict, protect and prevent insider and cyber threats. More than 500 global enterprises spanning wide-ranging industries have deployed ARCON PAM to secure information assets.


Register now for free!


Remote Workforce: How to Protect Yourself From Emerging Threats?

Contact person:

Ms. Kerstin Bienhaus
+49 211 237077 36
  • Sep 02, 2020 4:00pm CEST, 10:00am EDT, 7:00am PDT

Popular Videos

Next Webinar


The 3 Steps to Secure IAM Modernization

When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges on the way from legacy IAM to a modern IAM infrastructure are manifold and should be considered beforehand.

Next Conference


European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00