Governance & Risk Management , Remote Workforce

Mitigating the Risks of a Remote Workforce

Nathan Howe and Kevin Schwarz of Zscaler Discuss Security Implications
Nathan Howe (left) and Kevin Schwarz of Zscaler

The transition to a remote workforce in recent weeks has significant security implications, according to Nathan Howe and Kevin Schwarz of Zscaler, who provide guidance on mitigating the risks in this preview of an upcoming virtual roundtable discussion.

See Also: How Enterprise Browsers Enhance Security and Efficiency

In a video interview with Information Security Media Group, Howe and Schwarz discuss:

  • Whether a remote workforce will be the “new normal” going forward;
  • How work-at-home employees can be protected from cyberthreats;
  • How cybersecurity professionals can get mindshare of executives who may be dealing with more pressing crises.

Howe is director of transformation strategy at Zscaler. He has more than 20 years of security experience at governments, enterprises and telco service providers. Prior to joining the Zscaler team in 2016, Howe had a 12-year career at Nestle, where he created a global cybersecurity compliance program.

Schwarz is Zscaler’s director of transformation strategy. He has many years of project and program management and management consulting experience for global enterprises. He was responsible for software rollouts and large telecom transition and transformation for global network security programs within a Dax listed company.


About the Author

Nick Holland

Nick Holland

Former Director, Banking and Payments

Holland focused on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.