IT VENDOR MANAGEMENT
“ While almost every platform offers some level of security these days , the key is finding the right mix of features that will ensure the highest levels of protection . Some “ must-have ” cyber security features that your organisation should be looking for include encrypted audio and video , meeting and user authentication which includes one-time passcodes , biometrics , twofactor , multi-factor , and / or out-of-band authentication , as well as endpoint protection of the camera , microphone , speakers , keyboard and clipboard ,” said Waller .
As high-profile cyber attacks become the new norm , Waller insists it is imperative for all organisations to take a closer look at the virtual communications tools being used to ensure total organisational safety and security .
Aaron Baillo , CISO at the University of Oklahoma , suggests that centralising reduces complexity , duplication , and the amount that has to be monitored : “ If it was up to CISOs of the world , we ' d lock everything down and there ' d only be one option for everything ! That would be our zen environment . But that doesn ' t help the business . That ' s where it starts to become an art form . How much risk is the organisation willing to carry ? That ' s where you model your baselines ,” he said .
Ash Finnegan suggests that with any transformation programme , there is some level of risk involved , as most companies aspire to be disrupters . Leaders pick a
technology and implement it at speed , with no real idea of how it will improve their services or operations , or unify their systems .
“ Leaders need to identify clear business goals and review their current operational
“ MOST CLIENTS WE WORK WITH RARELY HAVE A COMPLETELY CENTRALISED OR DECENTRALISED MODEL ”
MARTIN MOLLOY PARTNER , CIO ADVISORY , CONSULTANCY KPMG UK technologymagazine . com 93