Business Continuity Management / Disaster Recovery , Governance & Risk Management

Ensuring Business Continuity for the Remote Workforce

Akamai's Tony Lauro Discusses Challenges Facing Employees Working at Home
Tony Lauro, director of technology and security strategy, Akamai Technologies

From DDoS attacks to concerns over the reliability of VPNs, the remote workforce is facing an unprecedented array of security challenges, says Tony Lauro of Akamai, who offers strategies to mitigate these risks and ensure business continuity.

See Also: Live Webinar | App Defined, Autonomous and Delivered from the Cloud

In a video interview with Information Security Media Group, Lauro discusses a number security issues that will be addressed in an upcoming series of virtual roundtables, including:

  • Why DDoS attack are a growing concern for many organizations;
  • Whether older technologies can keep up with the demands of the remote workforce;
  • Strategies and practices for better managing technologies to support remote workers.

Lauro is director of technology and security strategy for Akamai Technologies. He has worked with Akamai's top global clients to provide cybersecurity guidance, architectural analysis, web application and network security expertise. With over 20 years of information security operations experience, Lauro has worked and consulted in many sectors, including finance, automotive and medical/healthcare as well as with enterprise and mobile applications.


About the Author

Scott Ferguson

Scott Ferguson

Managing Editor, News Desk

Ferguson is the managing editor for the news desk at Information Security Media Group. He's been covering the IT industry for more than 13 years. Before joining ISMG, Ferguson was editor-in-chief at eWEEK and director of audience development for InformationWeek. He's also written and edited for Light Reading, Security Now, Enterprise Cloud News, TU-Automotive, Dice Insights and DevOps.com.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.