Archived: Maintaining Endpoint Security: New opportunities and new risks

On-Demand Event

Earn up to 3 CPE credits by attending this virtual conference.

Endpoint security has become an area of intense scrutiny and change, since the start of the pandemic, as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures have led many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

SC Media’s virtual event “Maintaining Endpoint Security: New Opportunities and New Risks” is designed to help organizations set a course for secure workforce growth and change following over a year of disruption. This on-demand program convenes cybersecurity innovators and practitioners to share their expertise and experience in addressing critical endpoint security issues, including:

• The problem of data-sharing and how to rein it in
• Determining the endpoint capabilities your organization needs to achieve its goals
• Understanding the top security threats for remote users

Now more than ever, the cybersecurity battle is being fought at the endpoint. Access the on-demand content today!


10:45 AM ET 
Conference opens 

11:00 AM ET
KEYNOTE | Nearly a decade in, assessing EDR’s relevance
Anton Chuvakin, Security Solutions Strategy, Google Cloud

According to Google’s Anton Chuvakin, endpoint detection and response was invented in 2013. So, what happened in the past nine years? 

Hear Chuvakin offer specifics on how far EDR has come, whether it’s evolved with the rest of the market and where it must go from here to stay relevant as enterprises focus attention on zero trust security models.

11:40 AM ET
Hacking multifactor authentication: Lessons learned after testing 150 MFA products
Roger Grimes, Data-Driven Defense Evangelist, KnowBe4 

Multifactor authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and data-driven defense evangelist at KnowBe4, Roger Grimes. Roger tested over 150 MFA solutions and he wants to share what he learned with you! 

Join Roger as he discusses the lessons learned from his research, such as what works, what doesn’t, and what you should absolutely avoid. 

In this webcast you’ll learn about: 

  • Differences between various MFA tools and why they matter 
  • Real-world hacking techniques used to expose MFA weaknesses 
  • What makes MFA software weak or strong and what that means to you 
  • Tips on choosing the best MFA software for your company 
  • Why a strong human firewall is your best last line of defense. 

Get the details you need to know to become a better IT security defender. 
12:20 PM ET  
Complete endpoint security: Five critical steps  
Christopher Hills, Senior Security and Architecture Engineer, BeyondTrust 

In 2019, 70% of successful breaches started at the endpoint. Since then, a global pandemic has caused a large-scale shift to remote work – a perfect storm for privilege abuse. As a result, malware has increased by 30,000% in 2020. This is especially concerning when many companies still rely on antivirus software (AV) or Endpoint Detection and Response solutions (EDR) alone to secure endpoints. 

In this visionary session, we will be highlighting which two overlooked steps can mitigate the 60% of modern threats that are missed by AV, and why the need for organizations to move from a reactive to a preventative approach is more important than ever. Focus topics include: 

  • An overview of endpoint security and why it is crucial for your organization 
  • Traditional challenges and existing problems with endpoint security 
  • The five critical steps to achieving complete endpoint security 

1:00 PM ET 
Exposed: Keep your organization’s sensitive data safe from careless end users 
Arif Khan,VP, Solution Engineering, PKWARE

If security practices feel too cumbersome or complicated, employees tend to find workarounds—or worse, skip security altogether. This creates dangerous vulnerabilities, especially in today’s hybrid office/remote environment. Organizations must find the critical balance between data security and usability so end users don’t bypass important practices wherever they are to get work done.  

Join PKWARE in this session to learn about challenges of data security versus usability and how organizations can find the right balance. Attendees will walk away with tips on how to: 

  • Capitalize on employee willingness to participate in security for more informed decision-making in data security practices 
  • Put controlled security power in the hands of employees through a mix of automation and manual classification practices 
  • Regularly and accurately detect and protect information on endpoint devices such as laptops and mobile. 

1:40 PM ET  
Practical and secure file sharing for a distributed workforce 
David Perez, Product Marketing Manager, Progress 

Remote work has compelled us to revisit the security of our most valuable data, as new mobile and API endpoints are added to our digital environment. With the increase in endpoints comes the risk of new threats and vulnerabilities to the security of the data we share. Knowing that the different versions of flexible work are here to stay, and the average cost of a data breach is in the millions, it’s important that we take a hard look at what practical steps can be taken to secure files as they are sent to diverse endpoints in the new world of remote distributed collaboration. 

Join this session as we discuss how managed file transfer: 

  • Addresses threats our files face throughout their lifecycle 
  • Offers practical steps to secure file sharing for a remote/hybrid workforce 
  • Helps us implement best practices to improve data security 

2:20 PM ET  

Secure access best practices to minimize risk of a breach 
Ganesh Umapathy, Product Marketing Manager, Duo Security – Cisco 

Stolen credentials and unpatched software are common attack vectors used by cybercriminals in many types of attacks, including ransomware. Organizations have invested in security tools such as MFA, EDRs, MDMs, VPNs and more to mitigate these attacks. But security tools need to be supported with simple processes and great usability for maximum security efficacy. In this session, Duo Security Product Marketing Manager Ganesh Umapathy will share the best practices implemented by Cisco to enable secure endpoint access for a global remote workforce, providing the best experience for productivity without compromising on security. 

2:50 PM ET  
Visit exhibit hall 

3:00 PM ET  
Minimizing the risk of supply chain attacks: Best practices guidelines 
Rajan Sanhotra, Global Campaigns Marketing Manager, Sophos 

Having just a single trusted third-party supplier connected to your network introduces the risk of a supply chain cyberattack. Yet despite this risk, many organizations are unprepared to defend against them because they simply don’t know where to start. 

Join Sophos to learn: 

  • How supply chain attacks work 
  • Five best practice guidelines for defending against them 
  • The role of cybersecurity technology and services in minimizing supply chain risk 

3:30 PM ET  
Visit exhibit hall 

3:40 PM ET 
KEYNOTE | How to effectively manage XDR 
Allie Mellen, Analyst, Security and Risk, Forrester Research 

Extended Detection and Response (XDR) is still a relatively new term and not always defined the same by different parties. In this Q&A, SC Media Senior Reporter Derek Johnson interviews Forrester Analyst Allie Mellen to discuss: 

  • What we mean when we talk about XDR: How does the technology differ from other security tools? What’s the difference between native and hybrid options? 
  • What it takes – from resources and staffing to configuration and tuning – to effectively manage XDR 
  • Automation, machine learning and alert fatigue