Intelligent CIO Europe Issue 40 | Page 65

CASE STUDY without taking local resources like CPU cycles and bandwidth away from users . you into ‘ work mode ’ and puts your guard up . Contrast that to the daily reality of remote working …
More generally , we use CrowdStrike as a key part of our response and investigation into security incidents . The company helps to give us real-time intelligence and context of the threat environment and allow us to rapidly investigate breaches within the ‘ golden ’ first hour so that we can quickly stop and eject malicious attackers .
How do you ensure you protect your customers and avoid cyberattacks ?
We apply the same security principles and protections to our customers as we do to protect ourselves , but our approach can essentially be broken down into two elements . For all our customers , such as home broadband and mobile users , we very much aim to be the most intrinsically secure network they can choose , by ensuring that security sits at the heart of all our operating decisions and processes . We also provide a range of guidance around how they can stay safe online , for example with advice on how to identify and avoid scams .
Secondly , we also provide security solutions directly to private and public sector organisations via our BT Security unit . We work with a wide range of security partners to provide solutions that both protect their organisation from threats and enable them to securely adopt and reap the benefits of new technologies .
Has there been any change to how you manage security operations since the pandemic as more people work remotely ?
We quickly published security guidance that looked at how these changes can make you drop the security best practices that you ’ d naturally employ in the office . This ranged from a reminder of actions you need to take to stay secure accessing data at home , through to fundamental behavioural stuff like asking people to just

WE ALSO RECOGNISE THE IMPORTANCE OF ENSURING ALL OF BT ’ S CIRCA 100,000 EMPLOYEES UNDERSTAND

THE BEHAVIOURS THEY NEED TO ADOPT TO

PROTECT BT , AS YOU ’ RE ONLY EVER AS SECURE AS

YOUR WEAKEST LINK .

take a second to pause and take stock of their actions before continuing .
What do you predict the future will hold for BT and the cybersecurity challenges you might face as a business , as you continue your move to the cloud ?
The past year has really shown the importance of telecoms networks , as they ’ ve proved vital to enabling so many aspects of life in lockdown . Our network and systems coped really well with the increased demand – with daytime traffic on our core network more than doubling in 2020 – but this also means that securing those networks becomes more important than ever .
We employed a number of operational improvements , such as increased endpoint monitoring and heightened monitoring for any unusual system access , data extraction or unauthorised software . However , one of the most significant issues that we identified was that as well as the technological and logistical challenge , there was also a massive behavioural aspect .
The whole routine of going to work – getting dressed smartly , travelling to the office , using your passcard to enter , noting a CCTV camera and security guard – forms a mental process that subconsciously switches
As more and more organisations make the move to the cloud , so too do the criminals looking to exploit them . The transition to the cloud erases traditional security perimeters and hugely increases organisations ’ attack surface , meaning they need to move away from enacting certain security measures just because they ’ re expected , or they ’ ve done so in the past .
In the cloud , tech choices can ’ t be taken in isolation ; it ’ s not just about solving one problem . The thought process needs to explore where this tech will fit into the whole – what it will connect to and how .
Strong cloud security comes from knowledge in three key areas : a sound understanding of how the cloud works ; the applications a business wants to use ; and the business ’ plans for moving forward . Organisations that have knowledge about all three can build in effective security faster , more easily and at a lower cost . p
www . intelligentcio . com INTELLIGENTCIO EUROPE 65