Business Continuity Management / Disaster Recovery , COVID-19 , Critical Infrastructure Security

COVID-19 and the Need for 'Digital Distancing'

Tom Kellermann of VMware Carbon Black on Threats to Remote Workforce
ISMG's Tom Field (left) and Tom Kellermann of VMware Carbon Black

With the declaration of COVID-19 as a pandemic, and the global shift to work from home, Tom Kellermann of VMware Carbon Black sees a corresponding increase in hacking and espionage attempts against U.S. agencies, businesses and citizens. He says add "digital distancing" to your precautions.

See Also: Live Webinar | More Data, More Problems: Applying the Right Automation to Propel Security Operations

In a video interview with Information Security Media Group, Kellermann discusses threats and threat actors, including:

  • The broadened attack surface;
  • How to practice digital distancing;
  • Attack trends to monitor in the weeks ahead.

Kellermann, head of cybersecurity strategy at VMware Carbon Black, is the former CEO at Strategic Cyber Ventures. He's a cyber intelligence expert, author, professor and leader in the field of cybersecurity. He held a seat on the Commission on Cyber Security for the 44th President of the United States and served as an adviser to the International Cyber Security Protection Alliance. As chief cybersecurity officer for Trend Micro, he was responsible for analysis of emerging cybersecurity threats and relevant defensive technologies.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.