John Meakin, CISO, Formerly Burberry

Effective Deployment Depends on Understanding Your Threat Scenarios

  • Rather than searching for the perfect endpoint solution, begin by carefully thinking through the most likely threat scenarios that apply to your endpoint estate.
  • The best approaches for securing the endpoint broadly fit into architecture where there’s an agent on the endpoint that it is fed actionable machine intelligence from a cloud service.

“The best approaches for securing the endpoint broadly fit into architecture where there’s an agent on the endpoint that it is fed actionable machine intelligence from a cloud service.”

For John Meakin, former chief risk and security officer at Burberry, today’s retail environment is rich in endpoint computing that encompasses core office activities, connections to manufacturing facilities, and sales assistants working within the retail network. Beyond this, there is a very active online customer engagement and sales process that often involves multiple channels.  “We see the endpoint being right there on the perimeter,” Meakin says, emphasizing the importance of endpoints to his overall security strategy.

This is an excerpt from 32 Security Experts on Changing Endpoint Security. The eBook was generously sponsored by Carbon Black.

Carbon Black