The book includes insights from the following experts:
- Alina Sarvey, Endpoint Security Engineer, Leidos, Data Shows the Need for Better Endpoint Security>>
- Brent Maher, Senior Vice President – Chief Information Security Officer, Johnson Financial Group, Endpoint Security Decisions Require a Strategic Approach>>
- Brian Timmeny, Vice President | Global Head of Advanced Engineering, DevOps & Engineering Processes, BBVA, Endpoints Must Be Protected at Several Levels>>
- Dan Bowden, VP & CISO, Sentara Healthcare, Automated Forensics Boost a Security Team’s Effectiveness>>
- Daniel Schatz, CISO, Perform Group, Keys to Maximizing the Value of Endpoint Security>>
- David Merrill, Sr Director of Data Security, Travelers, Implementation Should Be Gradual and Collaborative>>
- Elliott Breukelman, Senior Information Security Engineer, Land O’Lakes, Inc., A Good Endpoint Security Strategy Focuses on Data Usage>>
- Catharina “DD” Budiharto, Director, Information Security, CB&I, In Selling Management on Security Needs, Scare Tactics Only Go So Far>>
- Chris Thompson, Global Director, IT Security and Controls, Bentley Systems, Adopting Endpoint Security Involves Both Business and Technical Considerations>>
- Richard Davis, Executive Director of IT Security, Embry-Riddle Aeronautical University, Make Sure the Solution Fits the Environment and the Need>>
- Wayne Peterson, Global Chief Information Security Officer, Kroll, To Prevent Attacks, Start with the Endpoints>>
- Harshil Parikh, Director of Security and Compliance, Medallia, Making the Case for an Endpoint Security Solution>>
- Isabel Maria Gomez, Group Information Security Manager, Bankia, Effective Implementation Depends on Effective Communication>>
- John Meakin, Chief Risk & Security Officer, Burberry, Effective Deployment Depends on Understanding Your Threat Scenarios>>
- Kalin Kingsland, Senior Security Architect, Global Financial Services Organization, Be Able to Utilize the Data Generated by Endpoint Security Tools>>
- Kevin Fielder, Chief Information Security Officer, JUST EAT, Be Aggressive in Protecting Your Endpoints>>
- Mike Santos, Director of Security & Information Governance, Cooley LLP, To Secure Security Funding, Get Quantitative>>
- Paul Heffernan, Group CISO, Unipart, Understanding Your Company’s Endpoint Security Requirements>>
- Robert Hood, Information Security Solutions Architect, BJ’s Wholesale Club, Moving Real-Time Forensics to the Endpoint>>
- Scott Harris, Vice President – Chief Information Security Officer, Lockton Companies, Better Security Through Early Detection and Response >>
- Scott Saunders, Cyber Security Consultant, Exelon Corporation, Early Detection Is Key to Shutting Down Attacks >>
32 Security Experts On Changing Endpoint Security was generously sponsored by Carbon Black.
Without a doubt, endpoint security has become an urgent priority for many organizations, and it’s not hard to see why. Industry research by IDC is showing that 70 percent of successful breaches enter through an endpoint. Other research shows that more than half of companies have been hit with successful attacks, and more than three-quarters of those attacks were fileless.
For many companies, the modern business environment has become a mobile workplace in which employees work from wherever they happen to be. The fact that people continue to be the weakest security link has made mobile PCs and extended networks a sweet spot for attackers. So how are companies responding?
To find out, we drilled into the question of endpoint security with the generous support of Carbon Black. We approached 30 security experts to discuss these aspects of endpoint security:
- Keys to shutting down attacks
- Rethinking your network strategy
- Justifying the value of endpoint security
- Moving to a cloud-based next-generation platform for endpoint security
In speaking to security experts from a number of different industries, two things are clear. Endpoint security has become a critical piece of a broader security strategy, and securing the traditional network perimeter alone will not save you. One contributor observed that endpoints are in fact the new perimeter.
These essays contain useful and practical insights into evaluating endpoint security needs and implementing endpoint strategies. Regardless of how you think about the role of endpoint security in your overall strategy, I highly recommend that you read what these experts have to say.