SlideShare a Scribd company logo

How IT Security Teams Do More With Less When Economies Rapidly Change

Transcript of a discussion on how a large, distributed workforce can be best supported by IT -- even as conditions change, and budget requirements lead to consolidation.

1 of 8
Download to read offline
Page 1 of 8
How IT Security Teams Do More With
Less When Economies Rapidly Change
Transcript of a discussion on how a large, distributed workforce can be best supported by IT -- even as conditions
change, and budget requirements lead to consolidation.
Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: Bitdefender.
Dana Gardner: Welcome to the next edition of the BriefingsDirect podcast series. I’m Dana
Gardner, Principal Analyst at Interarbor Solutions, your host and moderator.
Today’s BriefingsDirect IT security best practices discussion examines how a leading German
home builder has adjusted to a major economic market disruption. While not long ago surging,
Germany’s home building demand has recently reversed, putting pressure on builders to reduce
IT costs while remaining secure.
Stay with us now as we learn how a large, distributed workforce can be best supported by IT
even as conditions change, and budget requirements lead to consolidation.
Here to share his story of how an efficient security team rapidly
shifts from managing surging growth to optimizing around
necessary contraction is our guest, Johannes Hammen,
Information Security Officer at DFH Gruppe in Simmern,
Rheinland-Pfalz, Germany. Welcome Johannes.
Johannes Hammen: Hello, thanks for having me here.
Gardner: DFH Gruppe is a major maker of prefab homes. How
has the market contraction in the real estate construction
business there changed your business?
Hammen: DFH Gruppe is the largest maker of prefab houses in
Germany. In 2021, we created more than 3,200 houses. We have more than 1,300 employees
in Germany and the Czech Republic who help us build houses.
We had quite a high level of throughput. But as you may have learned from the news, there
were changes in the past months that triggered changes inside our company. From our
customers’ perspective, to get a mortgage for a house, there’s an increase in the requirements,
such as higher equity, higher interest rates, and fewer subsidies by the state. On the other
hand, material costs were rising, and the politics were shifting toward multi-family housing.
So, this changed a lot for us. We had to react. We had many years of with very high growth, up
to a rate of 3,200 houses per year. But we needed to consolidate and adapt to the new
situation. Of course, this also affects IT and security spending.
Gardner: How has your business and IT adjusted to the need for doing more with less?
Hammen
Page 2 of 8
Take advantage of downturns to adjust processes
Hammen: During a period of very high growth, there were other priorities than security and
structuring processes in such a way that they are very efficient and very stable. You have to
keep pace with the throughput in the company and you have to implement systems and fix
issues so that new houses can be constructed.
Now, we have an opportunity to do
consolidation, to breathe again, and take a
step back. We can look at our processes,
increase the efficiency, and implement new
tools, which we did not have time to do before.
Gardner: Many times, in the past when we’ve had disruptions either from growth or rapid
changes or interaction, we try to work smart and use some technology to its best advantage.
How have you been able to do that, given you have a large, distributed workforce in the field.
You work with many partners, and you have a large supply chain?
Hammen: As you said, we have quite a distributed workforce. We are focused on the German
market, but that doesn’t mean that we are doing everything in-house. You can imagine that to
design and construct a house is quite a large process that needs to involve a lot of experts.
For example, we have more than 650 sales contractors spread across Germany, who are
working independently. They guide our customers in the process of buying and building a home.
We also have many different types of skilled handymen who construct houses. We have more
than 260 partners of all sizes, from small companies, with two or three handymen and someone
in the back office, to very large companies with 500 to 1,000 employees who support us on
different steps in the house-building process -- such as heating, electricity, and so on.
We need to coordinate and manage all of these contract partners across the whole process.
Every external partner has different rules, different policies, a different mindset, and a different
background. So, it’s really hard to keep everyone on the same page, especially with respect to
security.
Gardner: It sounds as though there’s a great diversity, particularly among the types of IT, as
well as the workforce style and culture. That means that you’re the hub on a multi-spoked
wheel. How can you impose security without alienating or slowing people down? That must be a
difficult balance.
Hammen: It is. We try to consider everyone’s needs and requirements in the whole process.
Also, we see it more as an opportunity for everyone, not as a slow-down mechanism as some
people view it.
Security is a door opener for so much process optimization and so many innovative ideas. If, for
example, you try to implement security in part of a process, you have the chance to remodel the
process to be more efficient in general -- or to create a new business model out of it.
We can look at our processes,
increase the efficiency, and
implement new tools, which we did
not have time to do before.
Page 3 of 8
This is the story that we want to tell everyone. We try to not spend too much time on the
complicated things, and to hide those things from our users and our partners. We want to build
a platform, a solution that everyone can use.
Why should a sales expert, for example, have to think about IT security topics? We in IT just
implement a solution and provide it as a service to our internal customers and to our employees.
It’s a good tradeoff between having a high level of security and also not slowing down the
business.
Gardner: You are re-engineering processes by taking advantage of technology. What was it
about the technology you were using before that made it difficult to achieve your goals?
Hammen: Everyone knows that there have been lot of huge technology advancements in the
past months and years regarding artificial intelligence (AI) and all that. But even before that, our
focus during our high-growth phase was not on security; not on getting the latest, most
innovative technology. We had just enough security and IT infrastructure that was working fine
and was fulfilling the needs of the business.
But in the last one to two years, we looked to the IT and security vendors for new concepts.
There were a lot of transformations, especially with respect to security, such as getting to zero
trust, for example. This is quite a new concept and we needed to rethink a lot of our past
decisions.
Gardner: Part of the ability to control security means getting more data about systems, which
you can also use to then be more productive. Is your IT organization using security
improvements as an accelerator to better productivity overall?
Collecting data on security systems is good business
Hammen: We are currently working on this and on getting transparency for this larger aspect
of security. What we have achieved already is that security is a good vehicle to transport the key
performance indicator (KPI) approach into other departments and areas of the company.
In security, and also in IT, we try to measure everything.
We try to measure up-time, we try to measure incidents,
and so on. You can transform or adapt these concepts to
more business-related processes.
I think this is a huge advantage that we are currently trying to transport and market to our
colleagues. We have seen this in software development, but in IT in general, some concepts
such as how to do projects, how to achieve high quality in very complex environments -- these
are very good concepts in IT that we can adapt to business.
Gardner: Yes. The productivity isn’t just about technology and IT productivity, but overall
business productivity, which is so important when you’re trying to do more with less.
By being more data-driven and KPI-oriented, by measuring, testing, and verifying the results,
what do you need to put in place to do that? How do you get the information and also protect it?
In security, and also in IT, we
try to measure everything.
Page 4 of 8
Hammen: It’s very important. We are implementing an information security management
system (ISMS). The main concept of this system is that everything should be risk-oriented. And
to measure for risk accurately, you need the data.
You need the performance indicators so that you can determine whether one risk is higher than
another, or to know the trends and direction of risks. Let’s say 1,000 incidents happened, but in
the other one, only 20 have happened. This is why we need the data.
We have used a lot of tools that were doing the job quite well, but they came from an earlier age
of IT. This performance indicator or KPI-driven approach had not been implemented. So, it was
very hard to get any data out of it in an aggregated way.
Currently, for all new solutions and concepts that we are implementing, we are also considering
what data can we get out of it and how can we use this data to drive further decisions.
Gardner: To make those prioritizations, you also need to become more predictive and be able
to get out in front of these trends.
Have you been able to, in a sense, reduce the amount of time that it takes to react so that
you’re not doing a backward-looking analysis, but doing forward-looking implementation of fixes
and improvements?
Hammen: Yes. It is part of ISMS to also consolidate and streamline these processes. For
example, in the past we were spending a lot of time on day-to-day activities, such as rolling out
an endpoint security solution or rolling out an update of an endpoint security solution to a client.
This was using up a lot of our time in IT. After
streamlining all of these very basic tasks, it
shouldn’t require an investment of more than
a few minutes, in my opinion. Streamlining all
of these tasks creates a lot of new time in the
budget that we can implement in looking for
new solutions, looking for optimizations for
already-existing products, looking for integrations between products that we already have, and
between processes that we already have. Currently, this is our main focus.
Gardner: When you have a limited budget for new hiring -- and skills are hard to come by in the
best of times -- you want to look to the technology to take the repetitive tasks away from the
people so that they can focus more on the analytics, on the innovation, on the business-level
productivity.
Do you see in the use of security technology now that capability to offload some tasks and free
up human capital to do what it does best?
Hammen: Yes. Based on AI, there are a lot of tasks that we can shift toward automation or to
automate in some way. Another example is if you take an average endpoint security solution
from today, every solution has a cloud sandbox or something like it, with automatic execution
and analysis of a suspicious file.
Streamlining all of these tasks creates a
lot of new time in the budget that we can
implement in looking for new solutions
and looking for optimizations for already
existing products ... and processes.
Page 5 of 8
In the past, one expert from our company or from a contractor had to invest the time to analyze
this suspicious file to be sure that it is not harmful. Now it’s just happening in the background. At
some time you get the feedback on how it’s malicious or not and that’s all.
But you save a lot of time and money by automating this stuff now and even more in the future.
There are a lot of other topics, such as network detection response and so on, which is just
building. It’s only the start of what we can do with security automation. Also, it’s not only that we
do not have the personnel anymore, but also, we want to have high quality results at the end.
Gardner: Going back to the fact that you have a large, distributed workforce, they’re out at
these sites putting these homes together. They’re organizing with many contractors from many
different destinations. If you can make their jobs easier, they’re of course going to be happy to
work with you and adopt your approaches. Security can be seen not as, “Oh, we have to go
through these arduous tasks in order to be secure,” but that in fact you’re helping them.
Do you find that the user buy-in is shifting? Are you getting a sense that when you do this well,
when security becomes an accelerator to productivity, and that you get people’s cooperation
and even eagerness to adopt your tools and processes?
Security is so much more than just a password
Hammen: Yes. We have one advantage now that we didn’t have, maybe three or five years
ago, because a lot of people are used to some security measures, such as multifactor
authentication. Everyone knows this from their personal accounts at online shops, at different
vendors and so on.
So, there is some base work that has already been done in the consumer market. I think a lot of
companies were affected by cyberattacks that caused business disruptions. A lot of people were
also feeling the result of not investing in security, not collaborating with security.
That’s a good starting point. Also, we have to get this distributed workforce, with very different
levels of understanding and backgrounds regarding IT and security, invested in this topic and
also have them participate. But on the other hand, my colleagues and I also have to make sure
that we take their opinions and their special needs into consideration in all of our decisions.
We cannot consider every requirement, of
course. Some people just want to make it easy,
easy, so no password, nothing. We still have to
try to consider that different people use different
mechanics or have different working habits.
Gardner: We’ve been putting this just through the lens of security, but there’s also requirements
for compliance, privacy, documentation, auditing, etc. General Data Protection Regulation
(GDPR), of course, comes to mind.
We all have to do things that we might think are difficult or put more of a burden on people.
Have you able to bring this sense of productivity, automation, and intelligence to your
requirements around compliance as well?
We still have to try to consider that
different people use different
mechanics or have different working
habits [when it comes to security].
Page 6 of 8
Hammen: On the one hand, it’s easier to show others that you are being compliant if you get all
the metrics out of the software. If you have transparency in the technical and business
processes, then you can easily show everyone who is interested.
We can show what we are doing. With respect to this documentation, every worker understands
what we are doing and whether it’s compliant or not. I think in the past, it was more like a black
box. So, I think this is a very good thing in the end.
Gardner: It sounds like there’s a multiplier effect. If you do the due diligence for security, then
you get the means to adhere to the compliance requirements, which then leads you to be able
to further automate and take the load off of the humans, which then leads back to more
technology.
Is there an adoption virtuous cycle? Is that something you’re already seeing?
Hammen: Yes, and this is also what we try to enforce. If this positive cycle is started, it’s easy
to keep it alive and keep it running. This is what we try to achieve.
Gardner: In order to get that cycle ramped up, you want to have proof points and metrics. So,
are there any ways that you measure how you’re improving security and therefore also
improving business productivity that will cut costs and improve and optimize the business
results? Any measurements or examples that you can provide how this is helping your
organization?
The proof is in the productivity
Hammen: We do not have absolute numbers that we can share. But there are a lot of what I
call soft metrics, gathered from different conversations with colleagues.
For example, we are doing the total risk management process being part of an ISMS and, in this
whole process, there are a lot of results coming out that at least have the possibility to help the
business to run more efficiently, the chance to do more with less.
Currently, we are trying to measure it and also
build up a KPI framework for measuring all of
these things. But it’s very, very complex,
especially when you have a distributed company
and workforce.
Gardner: Are there any what we would call low-lying fruit indicators, perhaps a number of calls
to your help desk, trouble tickets, less time on security administration, anything like that that you
can point to and say, “Aha, we are getting payback on our investments, and we are achieving
higher productivity while remaining secure”?
Hammen: Yes, there’s two KPIs I can share. One is our endpoint security solution that we
switched to at the beginning of last year. With the new solution, we estimated that about 40
percent less time was spent on the security administration tasks such as this roll out, the patch
management of this solution and so on.
[Measurement is] very, very complex,
especially when you have a distributed
company and workforce.

Recommended

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 

More Related Content

Recently uploaded

Curtain Module Manual Zigbee Neo CS01-1C.pdf
Curtain Module Manual Zigbee Neo CS01-1C.pdfCurtain Module Manual Zigbee Neo CS01-1C.pdf
Curtain Module Manual Zigbee Neo CS01-1C.pdfDomotica daVinci
 
Breaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI TechnologyBreaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI TechnologySafe Software
 
"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys Vasyliev"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys VasylievFwdays
 
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?GleecusTechlabs1
 
Bit N Build Poland
Bit N Build PolandBit N Build Poland
Bit N Build PolandGDSC PJATK
 
Importance of magazines in education ppt
Importance of magazines in education pptImportance of magazines in education ppt
Importance of magazines in education pptsafnarafeek2002
 
Confoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data scienceConfoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data scienceSusan Ibach
 
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, GoogleISPMAIndia
 
LF Energy Webinar: Introduction to TROLIE
LF Energy Webinar: Introduction to TROLIELF Energy Webinar: Introduction to TROLIE
LF Energy Webinar: Introduction to TROLIEDanBrown980551
 
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Adrian Sanabria
 
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdfIntroducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdfSafe Software
 
Zi-Stick UBS Dongle ZIgbee from Aeotec manual
Zi-Stick UBS Dongle ZIgbee from  Aeotec manualZi-Stick UBS Dongle ZIgbee from  Aeotec manual
Zi-Stick UBS Dongle ZIgbee from Aeotec manualDomotica daVinci
 
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...DianaGray10
 
H3 Platform CXL Solution_Memory Fabric Forum.pptx
H3 Platform CXL Solution_Memory Fabric Forum.pptxH3 Platform CXL Solution_Memory Fabric Forum.pptx
H3 Platform CXL Solution_Memory Fabric Forum.pptxMemory Fabric Forum
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions..."How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...Fwdays
 
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...UiPathCommunity
 
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24Umar Saif
 
Traffic Signboard Classification with Voice alert to the driver.pptx
Traffic Signboard Classification with Voice alert to the driver.pptxTraffic Signboard Classification with Voice alert to the driver.pptx
Traffic Signboard Classification with Voice alert to the driver.pptxharimaxwell0712
 

Recently uploaded (20)

Curtain Module Manual Zigbee Neo CS01-1C.pdf
Curtain Module Manual Zigbee Neo CS01-1C.pdfCurtain Module Manual Zigbee Neo CS01-1C.pdf
Curtain Module Manual Zigbee Neo CS01-1C.pdf
 
Breaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI TechnologyBreaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI Technology
 
"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys Vasyliev"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys Vasyliev
 
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
 
Bit N Build Poland
Bit N Build PolandBit N Build Poland
Bit N Build Poland
 
Importance of magazines in education ppt
Importance of magazines in education pptImportance of magazines in education ppt
Importance of magazines in education ppt
 
Confoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data scienceConfoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data science
 
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
 
LF Energy Webinar: Introduction to TROLIE
LF Energy Webinar: Introduction to TROLIELF Energy Webinar: Introduction to TROLIE
LF Energy Webinar: Introduction to TROLIE
 
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
 
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdfIntroducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
 
Zi-Stick UBS Dongle ZIgbee from Aeotec manual
Zi-Stick UBS Dongle ZIgbee from  Aeotec manualZi-Stick UBS Dongle ZIgbee from  Aeotec manual
Zi-Stick UBS Dongle ZIgbee from Aeotec manual
 
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
 
5 Tech Trend to Notice in ESG Landscape- 47Billion
5 Tech Trend to Notice in ESG Landscape- 47Billion5 Tech Trend to Notice in ESG Landscape- 47Billion
5 Tech Trend to Notice in ESG Landscape- 47Billion
 
H3 Platform CXL Solution_Memory Fabric Forum.pptx
H3 Platform CXL Solution_Memory Fabric Forum.pptxH3 Platform CXL Solution_Memory Fabric Forum.pptx
H3 Platform CXL Solution_Memory Fabric Forum.pptx
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions..."How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
 
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
 
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
 
Traffic Signboard Classification with Voice alert to the driver.pptx
Traffic Signboard Classification with Voice alert to the driver.pptxTraffic Signboard Classification with Voice alert to the driver.pptx
Traffic Signboard Classification with Voice alert to the driver.pptx
 

Featured

Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...Palo Alto Software
 
9 Tips for a Work-free Vacation
9 Tips for a Work-free Vacation9 Tips for a Work-free Vacation
9 Tips for a Work-free VacationWeekdone.com
 
I Rock Therefore I Am. 20 Legendary Quotes from Prince
I Rock Therefore I Am. 20 Legendary Quotes from PrinceI Rock Therefore I Am. 20 Legendary Quotes from Prince
I Rock Therefore I Am. 20 Legendary Quotes from PrinceEmpowered Presentations
 
How to Map Your Future
How to Map Your FutureHow to Map Your Future
How to Map Your FutureSlideShop.com
 
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...AccuraCast
 
Read with Pride | LGBTQ+ Reads
Read with Pride | LGBTQ+ ReadsRead with Pride | LGBTQ+ Reads
Read with Pride | LGBTQ+ ReadsKayla Martin-Gant
 
Exploring ChatGPT for Effective Teaching and Learning.pptx
Exploring ChatGPT for Effective Teaching and Learning.pptxExploring ChatGPT for Effective Teaching and Learning.pptx
Exploring ChatGPT for Effective Teaching and Learning.pptxStan Skrabut, Ed.D.
 
How to train your robot (with Deep Reinforcement Learning)
How to train your robot (with Deep Reinforcement Learning)How to train your robot (with Deep Reinforcement Learning)
How to train your robot (with Deep Reinforcement Learning)Lucas García, PhD
 

Featured (20)

Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
 
9 Tips for a Work-free Vacation
9 Tips for a Work-free Vacation9 Tips for a Work-free Vacation
9 Tips for a Work-free Vacation
 
I Rock Therefore I Am. 20 Legendary Quotes from Prince
I Rock Therefore I Am. 20 Legendary Quotes from PrinceI Rock Therefore I Am. 20 Legendary Quotes from Prince
I Rock Therefore I Am. 20 Legendary Quotes from Prince
 
How to Map Your Future
How to Map Your FutureHow to Map Your Future
How to Map Your Future
 
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...
 
Read with Pride | LGBTQ+ Reads
Read with Pride | LGBTQ+ ReadsRead with Pride | LGBTQ+ Reads
Read with Pride | LGBTQ+ Reads
 
Exploring ChatGPT for Effective Teaching and Learning.pptx
Exploring ChatGPT for Effective Teaching and Learning.pptxExploring ChatGPT for Effective Teaching and Learning.pptx
Exploring ChatGPT for Effective Teaching and Learning.pptx
 
How to train your robot (with Deep Reinforcement Learning)
How to train your robot (with Deep Reinforcement Learning)How to train your robot (with Deep Reinforcement Learning)
How to train your robot (with Deep Reinforcement Learning)
 

How IT Security Teams Do More With Less When Economies Rapidly Change

  • 1. Page 1 of 8 How IT Security Teams Do More With Less When Economies Rapidly Change Transcript of a discussion on how a large, distributed workforce can be best supported by IT -- even as conditions change, and budget requirements lead to consolidation. Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: Bitdefender. Dana Gardner: Welcome to the next edition of the BriefingsDirect podcast series. I’m Dana Gardner, Principal Analyst at Interarbor Solutions, your host and moderator. Today’s BriefingsDirect IT security best practices discussion examines how a leading German home builder has adjusted to a major economic market disruption. While not long ago surging, Germany’s home building demand has recently reversed, putting pressure on builders to reduce IT costs while remaining secure. Stay with us now as we learn how a large, distributed workforce can be best supported by IT even as conditions change, and budget requirements lead to consolidation. Here to share his story of how an efficient security team rapidly shifts from managing surging growth to optimizing around necessary contraction is our guest, Johannes Hammen, Information Security Officer at DFH Gruppe in Simmern, Rheinland-Pfalz, Germany. Welcome Johannes. Johannes Hammen: Hello, thanks for having me here. Gardner: DFH Gruppe is a major maker of prefab homes. How has the market contraction in the real estate construction business there changed your business? Hammen: DFH Gruppe is the largest maker of prefab houses in Germany. In 2021, we created more than 3,200 houses. We have more than 1,300 employees in Germany and the Czech Republic who help us build houses. We had quite a high level of throughput. But as you may have learned from the news, there were changes in the past months that triggered changes inside our company. From our customers’ perspective, to get a mortgage for a house, there’s an increase in the requirements, such as higher equity, higher interest rates, and fewer subsidies by the state. On the other hand, material costs were rising, and the politics were shifting toward multi-family housing. So, this changed a lot for us. We had to react. We had many years of with very high growth, up to a rate of 3,200 houses per year. But we needed to consolidate and adapt to the new situation. Of course, this also affects IT and security spending. Gardner: How has your business and IT adjusted to the need for doing more with less? Hammen
  • 2. Page 2 of 8 Take advantage of downturns to adjust processes Hammen: During a period of very high growth, there were other priorities than security and structuring processes in such a way that they are very efficient and very stable. You have to keep pace with the throughput in the company and you have to implement systems and fix issues so that new houses can be constructed. Now, we have an opportunity to do consolidation, to breathe again, and take a step back. We can look at our processes, increase the efficiency, and implement new tools, which we did not have time to do before. Gardner: Many times, in the past when we’ve had disruptions either from growth or rapid changes or interaction, we try to work smart and use some technology to its best advantage. How have you been able to do that, given you have a large, distributed workforce in the field. You work with many partners, and you have a large supply chain? Hammen: As you said, we have quite a distributed workforce. We are focused on the German market, but that doesn’t mean that we are doing everything in-house. You can imagine that to design and construct a house is quite a large process that needs to involve a lot of experts. For example, we have more than 650 sales contractors spread across Germany, who are working independently. They guide our customers in the process of buying and building a home. We also have many different types of skilled handymen who construct houses. We have more than 260 partners of all sizes, from small companies, with two or three handymen and someone in the back office, to very large companies with 500 to 1,000 employees who support us on different steps in the house-building process -- such as heating, electricity, and so on. We need to coordinate and manage all of these contract partners across the whole process. Every external partner has different rules, different policies, a different mindset, and a different background. So, it’s really hard to keep everyone on the same page, especially with respect to security. Gardner: It sounds as though there’s a great diversity, particularly among the types of IT, as well as the workforce style and culture. That means that you’re the hub on a multi-spoked wheel. How can you impose security without alienating or slowing people down? That must be a difficult balance. Hammen: It is. We try to consider everyone’s needs and requirements in the whole process. Also, we see it more as an opportunity for everyone, not as a slow-down mechanism as some people view it. Security is a door opener for so much process optimization and so many innovative ideas. If, for example, you try to implement security in part of a process, you have the chance to remodel the process to be more efficient in general -- or to create a new business model out of it. We can look at our processes, increase the efficiency, and implement new tools, which we did not have time to do before.
  • 3. Page 3 of 8 This is the story that we want to tell everyone. We try to not spend too much time on the complicated things, and to hide those things from our users and our partners. We want to build a platform, a solution that everyone can use. Why should a sales expert, for example, have to think about IT security topics? We in IT just implement a solution and provide it as a service to our internal customers and to our employees. It’s a good tradeoff between having a high level of security and also not slowing down the business. Gardner: You are re-engineering processes by taking advantage of technology. What was it about the technology you were using before that made it difficult to achieve your goals? Hammen: Everyone knows that there have been lot of huge technology advancements in the past months and years regarding artificial intelligence (AI) and all that. But even before that, our focus during our high-growth phase was not on security; not on getting the latest, most innovative technology. We had just enough security and IT infrastructure that was working fine and was fulfilling the needs of the business. But in the last one to two years, we looked to the IT and security vendors for new concepts. There were a lot of transformations, especially with respect to security, such as getting to zero trust, for example. This is quite a new concept and we needed to rethink a lot of our past decisions. Gardner: Part of the ability to control security means getting more data about systems, which you can also use to then be more productive. Is your IT organization using security improvements as an accelerator to better productivity overall? Collecting data on security systems is good business Hammen: We are currently working on this and on getting transparency for this larger aspect of security. What we have achieved already is that security is a good vehicle to transport the key performance indicator (KPI) approach into other departments and areas of the company. In security, and also in IT, we try to measure everything. We try to measure up-time, we try to measure incidents, and so on. You can transform or adapt these concepts to more business-related processes. I think this is a huge advantage that we are currently trying to transport and market to our colleagues. We have seen this in software development, but in IT in general, some concepts such as how to do projects, how to achieve high quality in very complex environments -- these are very good concepts in IT that we can adapt to business. Gardner: Yes. The productivity isn’t just about technology and IT productivity, but overall business productivity, which is so important when you’re trying to do more with less. By being more data-driven and KPI-oriented, by measuring, testing, and verifying the results, what do you need to put in place to do that? How do you get the information and also protect it? In security, and also in IT, we try to measure everything.
  • 4. Page 4 of 8 Hammen: It’s very important. We are implementing an information security management system (ISMS). The main concept of this system is that everything should be risk-oriented. And to measure for risk accurately, you need the data. You need the performance indicators so that you can determine whether one risk is higher than another, or to know the trends and direction of risks. Let’s say 1,000 incidents happened, but in the other one, only 20 have happened. This is why we need the data. We have used a lot of tools that were doing the job quite well, but they came from an earlier age of IT. This performance indicator or KPI-driven approach had not been implemented. So, it was very hard to get any data out of it in an aggregated way. Currently, for all new solutions and concepts that we are implementing, we are also considering what data can we get out of it and how can we use this data to drive further decisions. Gardner: To make those prioritizations, you also need to become more predictive and be able to get out in front of these trends. Have you been able to, in a sense, reduce the amount of time that it takes to react so that you’re not doing a backward-looking analysis, but doing forward-looking implementation of fixes and improvements? Hammen: Yes. It is part of ISMS to also consolidate and streamline these processes. For example, in the past we were spending a lot of time on day-to-day activities, such as rolling out an endpoint security solution or rolling out an update of an endpoint security solution to a client. This was using up a lot of our time in IT. After streamlining all of these very basic tasks, it shouldn’t require an investment of more than a few minutes, in my opinion. Streamlining all of these tasks creates a lot of new time in the budget that we can implement in looking for new solutions, looking for optimizations for already-existing products, looking for integrations between products that we already have, and between processes that we already have. Currently, this is our main focus. Gardner: When you have a limited budget for new hiring -- and skills are hard to come by in the best of times -- you want to look to the technology to take the repetitive tasks away from the people so that they can focus more on the analytics, on the innovation, on the business-level productivity. Do you see in the use of security technology now that capability to offload some tasks and free up human capital to do what it does best? Hammen: Yes. Based on AI, there are a lot of tasks that we can shift toward automation or to automate in some way. Another example is if you take an average endpoint security solution from today, every solution has a cloud sandbox or something like it, with automatic execution and analysis of a suspicious file. Streamlining all of these tasks creates a lot of new time in the budget that we can implement in looking for new solutions and looking for optimizations for already existing products ... and processes.
  • 5. Page 5 of 8 In the past, one expert from our company or from a contractor had to invest the time to analyze this suspicious file to be sure that it is not harmful. Now it’s just happening in the background. At some time you get the feedback on how it’s malicious or not and that’s all. But you save a lot of time and money by automating this stuff now and even more in the future. There are a lot of other topics, such as network detection response and so on, which is just building. It’s only the start of what we can do with security automation. Also, it’s not only that we do not have the personnel anymore, but also, we want to have high quality results at the end. Gardner: Going back to the fact that you have a large, distributed workforce, they’re out at these sites putting these homes together. They’re organizing with many contractors from many different destinations. If you can make their jobs easier, they’re of course going to be happy to work with you and adopt your approaches. Security can be seen not as, “Oh, we have to go through these arduous tasks in order to be secure,” but that in fact you’re helping them. Do you find that the user buy-in is shifting? Are you getting a sense that when you do this well, when security becomes an accelerator to productivity, and that you get people’s cooperation and even eagerness to adopt your tools and processes? Security is so much more than just a password Hammen: Yes. We have one advantage now that we didn’t have, maybe three or five years ago, because a lot of people are used to some security measures, such as multifactor authentication. Everyone knows this from their personal accounts at online shops, at different vendors and so on. So, there is some base work that has already been done in the consumer market. I think a lot of companies were affected by cyberattacks that caused business disruptions. A lot of people were also feeling the result of not investing in security, not collaborating with security. That’s a good starting point. Also, we have to get this distributed workforce, with very different levels of understanding and backgrounds regarding IT and security, invested in this topic and also have them participate. But on the other hand, my colleagues and I also have to make sure that we take their opinions and their special needs into consideration in all of our decisions. We cannot consider every requirement, of course. Some people just want to make it easy, easy, so no password, nothing. We still have to try to consider that different people use different mechanics or have different working habits. Gardner: We’ve been putting this just through the lens of security, but there’s also requirements for compliance, privacy, documentation, auditing, etc. General Data Protection Regulation (GDPR), of course, comes to mind. We all have to do things that we might think are difficult or put more of a burden on people. Have you able to bring this sense of productivity, automation, and intelligence to your requirements around compliance as well? We still have to try to consider that different people use different mechanics or have different working habits [when it comes to security].
  • 6. Page 6 of 8 Hammen: On the one hand, it’s easier to show others that you are being compliant if you get all the metrics out of the software. If you have transparency in the technical and business processes, then you can easily show everyone who is interested. We can show what we are doing. With respect to this documentation, every worker understands what we are doing and whether it’s compliant or not. I think in the past, it was more like a black box. So, I think this is a very good thing in the end. Gardner: It sounds like there’s a multiplier effect. If you do the due diligence for security, then you get the means to adhere to the compliance requirements, which then leads you to be able to further automate and take the load off of the humans, which then leads back to more technology. Is there an adoption virtuous cycle? Is that something you’re already seeing? Hammen: Yes, and this is also what we try to enforce. If this positive cycle is started, it’s easy to keep it alive and keep it running. This is what we try to achieve. Gardner: In order to get that cycle ramped up, you want to have proof points and metrics. So, are there any ways that you measure how you’re improving security and therefore also improving business productivity that will cut costs and improve and optimize the business results? Any measurements or examples that you can provide how this is helping your organization? The proof is in the productivity Hammen: We do not have absolute numbers that we can share. But there are a lot of what I call soft metrics, gathered from different conversations with colleagues. For example, we are doing the total risk management process being part of an ISMS and, in this whole process, there are a lot of results coming out that at least have the possibility to help the business to run more efficiently, the chance to do more with less. Currently, we are trying to measure it and also build up a KPI framework for measuring all of these things. But it’s very, very complex, especially when you have a distributed company and workforce. Gardner: Are there any what we would call low-lying fruit indicators, perhaps a number of calls to your help desk, trouble tickets, less time on security administration, anything like that that you can point to and say, “Aha, we are getting payback on our investments, and we are achieving higher productivity while remaining secure”? Hammen: Yes, there’s two KPIs I can share. One is our endpoint security solution that we switched to at the beginning of last year. With the new solution, we estimated that about 40 percent less time was spent on the security administration tasks such as this roll out, the patch management of this solution and so on. [Measurement is] very, very complex, especially when you have a distributed company and workforce.
  • 7. Page 7 of 8 Two, there’s been around 90 percent fewer security-related trouble inquiries since we have implemented this solution, because now we have one dashboard. It’s very easy for us to react to false positives if there are any and drag them down and do the follow-up steps to clean them up and not trigger them again in the future. Gardner: Johannes, how in the future do you expect to be able to further this analysis, this positive feedback improvement cycle? Do you think that having more analytics in the cloud, and using outside suppliers as a security operations center (SOC), is in the works? What do you foresee in the next three to five years regarding how security can continue to be an accelerant to productivity? Hammen: One thing that we need to consider is it’s still quite hard to get skilled IT and security personnel. If you are a security expert, you probably want to work for the very large companies with large SOCs, and maybe not for a construction company. There is very high level of competition in the job market. In the next years, in order to achieve a higher-level of security while also maintaining this current level of security, we need to focus on what we can do with the workforce that we have, with our partner network, and with our internal colleagues. We need to get the best out of what we can do from the inside and also from well-thought-through outsourcing. As you mentioned, for example, using a managed detection and response (MDR) service or a managed SOC. So, everything that you can’t do perfectly in-house because you don’t have the resources, or the workforce, you can outsource, but control it well and have good visibility into it. This is something a lot of companies still need to adapt to. Yet some of the companies we work with have been very, let’s say, on-premises and very protective. But they have to open up. A lot of vendors are driving toward cloud and cloud-only, of course. As a company, you need to open up to these new concepts, for new collaboration between your internal workforce or internal experts, and also to the external experts for specific topics, such as the SOC. Gardner: That changes the nature of your supplier from vendor to services partner, right? Hammen: Correct, long-term partner. Gardner: I’m afraid we’ll have to leave it there. You’ve been listening to a sponsored BriefingsDirect discussion on how a leading German homebuilder has adjusted to a major economic market disruption. And we’ve learned how an efficient IT security team can rapidly shift for managing surging growth to optimizing around necessary contraction, but at higher productivity. Everything that you can’t do perfectly in-house because you don’t have the resources or the workforce, you can outsource, but control it well and have good visibility into it.
  • 8. Page 8 of 8 So, please join me now in thanking our guest, Johannes Hammen, Information Security Officer at DFH Gruppe in Simmern, Rheinland-Pfalz, Germany. Thank you so much. Hammen: Thank you. Gardner: I’m Dana Gardner, Principal Analyst at Interarbor Solutions. Your host and moderator for this ongoing series of BriefingsDirect discussions. A big thank you to our sponsor, Bitdefender, for supporting these presentations. And a big thank you as well to our audience for joining. Pass this on to your IT and security communities, and do come back next time. Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: Bitdefender. Transcript of a discussion on how a large, distributed workforce can be best supported by IT -- even as conditions change, and budget requirements lead to consolidation. Copyright Interarbor Solutions, LLC, 2005-2023. All rights reserved. You may also be interested in: • How dashboard analytics bolster security and risk management insights across IT supply chains • For UK MSP, optimizing customer experience is key to successful security posture and productivity • Why today’s hybrid IT complexity makes 'as a service' security essential • Defending the perimeter evolves into securing the user experience bubble for UK cancer services provider • How A-Core Concrete sets a solid foundation for preemptive security • How an MSP brings comprehensive security services to diverse clients • Better IT security comes with ease in overhead for rural Virginia county government • SambaSafety’s mission to reduce risk begins in its own datacenter security partnerships • How MSP StoredTech brings comprehensive security services to diverse clients using Bitdefender