| | OCTOBER 20209CIOReviewweekend to work from home. The implications for secure authentication were immediate. When an adjuster is working from home, instead of within the secure perimeter of the office network, how do you know with certainty that's who is really signing on to the network every morning? And once you realize you can indeed establish that knowledge using modern identity technology, and everything is working smoothly, the questions become larger. If all those people are authenticating securely from remote locations, do you really need them all to eventually return to that costly Manhattan office building? No? Well, then, do you really need all those claims adjusters to live and work in Manhattan? Could you hire more adjusters in other cities, attract more talent, and build a more diverse workforce? Considering the transformative potential of a remote workforce, it's essential to keep in mind the principal security challenge of a remote workforce: the complete disruption of the model for establishing trusted relationships. Think about the ritual of a new claims adjuster starting a job onsite, presenting credentials like a driver's license and a W-4 form, and getting a good-luck handshake from her manager. It's irrelevant in a remote world, both as an onboarding process and as a way to begin to build trust between the organization and the people who work there (or literally not there, as the case may be). What do credentials mean, and how is trust built in a world where trust is traditionally built on a personal presence and in-person relationships?The question of trust is amplified by the gig economy, where people are both off-site and short-term. How much trust do you need in someone whose access to customers and their information is limited to dropping packages off at their front door? What credentials are needed to establish that trust? And how is it different from the trust required in someone who's carrying not packages, but customers? Or someone who is processing customers' financial transactions? And is it different if they're processing them at home instead of in the already IT-secured office? Adapting to change is part and parcel of managing identities and access, and this time in history is no different. It's just happening faster and on a greater scale than we're accustomed to. Today's changes will continue to raise many questions. It's not essential or even expected, that we have all the answers right away. The most important thing is to be aware of the nature of change and know that it's going to affect how we build trust to secure critical data and resources. Considering the transformative potential of a remote workforce, it's essential to keep in mind the principal security challenge of a remote workforce: the complete disruption of the model for establishing trusted relationships
<
Page 8 |
Page 10 >