The Business of IT Blog

How CISOs should navigate security in the months ahead

2 minute read
Bianca Buckridee

In our fourth post of our series of what digital leaders should consider as they navigate the scale, pace and actions required to steer their org back in the new normal, we’re going to talk all things cybersecurity. No one is more up to the task than the executive whose BAU mode is intricate, volatile and unpredictable environments: the Chief Information Security Officer. The mandate to enable a completely remote and distributed workforce left even CISOs drowning in a tech tsunami. Emergency purchasing needs3 included endpoint security controls, network and mobile device security and ways to enable/restrict access like multi-factor authorization. The degree of cooperation and collaboration between IT and line of business users remains unprecedented and trusted partners really stepped up to the plate to deliver.

With substantial disruptions to working environments potentially the new BAU, CISOs face significant questions:

  • What did we do well to secure remote workers and our data?
  • What weaknesses were exposed in how we monitor users and security?
  • What lessons did we learn the hard way about our infrastructure and network security?
  • Who demonstrated better practices about accelerating security controls that we could learn from?

Other questions for key processes as CISOs reevaluate cybersecurity controls:

Collaborating Beyond Business Lines

  • What infrastructure investments do we need to make and who needs to be at the table when we make these decisions?
  • How does the change to a remote, distributed workforce alter the risk profile of cyber intrusions within the organization4 ?

Securing User Experiences

  • What services are most valuable to our users and our adversaries?
  • What, if any, services do we need to alter if systems are overloaded and how do we minimize impact5 to the overall end user experience?

Trusted Partners

  • What potential key suppliers, contractors and vendors, will need to access our infrastructure to implement additional scale?
  • Do we have key points of contacts with IT and cloud suppliers for security incidents?

There is no doubt CISOs will be asked to accelerate digital transformation even faster and they should not miss the opportunities in front of them to help their organizations embrace intelligent, tech-enabled systems across every facet of the business.

To read more in this series:


Download Now: Turbocharge IT Ops and Security

Increase management speed and agility across your complex environment

These postings are my own and do not necessarily represent BMC's position, strategies, or opinion.

See an error or have a suggestion? Please let us know by emailing

Business, Faster than Humanly Possible

BMC works with 86% of the Forbes Global 50 and customers and partners around the world to create their future. With our history of innovation, industry-leading automation, operations, and service management solutions, combined with unmatched flexibility, we help organizations free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead.
Learn more about BMC ›

About the author

Bianca Buckridee

Bianca Buckridee is a solutions marketing manager at BMC, where she is responsible for developing marketing strategy and messaging for Digital Workplace, Digital Service, and the BMC Chatbot. Buckridee previously led Social Media Operations at JPMorgan Chase and SunTrust, where she pioneered new customer service experiences and built the operational and technological model to interact with customers via Twitter and Facebook. In addition to building a social media command center, she created a new cross line of business data intelligence model to gather voice of the customer reporting. She’s also taught kindergarten and third grade proving there is no challenge she won’t accept.