How to Build a Workplace Collaboration Security Strategy

Author: Irwin Lazar, President and Principal Analyst

Not available for licensing.

Driven by the rapidly evolving workplace collaboration landscape, CISO/CSO teams are more involved in application due diligence and purchase than ever before. Ever expanding challenges arise from growth in the number of collaboration applications, new features within apps that generate content of their own as well as allow for the sharing of information among meeting and messaging participants, growing integration of UC, contact center, and features delivered via API, and the new age of hybrid and remote work allowing for application access from anywhere.

To meet these challenges, IT, security, and business leaders must implement proactive security strategy to minimize threat of data loss and disruption. IT, security, and business leaders can no longer take security for granted. This includes assessing security requirements, investing in third-party tools where appropriate, and utilizing workplace collaboration application providers that have a demonstrated commitment to security.

Metrigy recommends that IT, business, and security leaders work together to:

  • Document the workplace collaboration applications and features in use and assess risk of data loss
  • Develop a proactive security strategy with input from information security and workplace collaboration teams, as well as from areas including HR and networking, as appropriate
  • Expand security strategies to incorporate contact center and CPaaS integrations
  • Invest in third-party security platforms to centralize and augment security and compliance controls available from collaboration application providers
  • Assess the security and compliance capabilities of application providers, to include security certifications and available security features

Table of Contents
  • Executive Summary
  • Growing Security Challenges
  • Security Teams Growing Workplace Collaboration Influence
  • Preparing for Workplace Collaboration Security Evaluations
  • Building a Proactive Security Strategy
  • The Role of Third-Party Security Platforms
  • Assessing WC Provider Security Capabilities
  • Conclusions and Recommendations