Earn up to 6.5 CPE credits by attending this virtual event.
For attackers, an endpoint actually represents a beginning point for an attack that can quickly spread and grow out of control. Desktops, laptops, printers, smartphones, servers, medical and industrial devices… the list of endpoints goes on and on. Before long, it can be easy to lose visibility into all the hidden nooks and crannies of your increasingly complex attack surface. Shadow IT, rogue devices and poor established BYOD policies only add to this problem, and it’s up to your security team to restore order before someone uses an endpoint to download a weaponized app, upload precious intellectual property or visit a malvertising website. This eSummit on September 13-14 will explore from head to toe the ins and outs of endpoint security, covering such topics as:
- CyberRisk Alliance’s exclusive endpoint security research
- How to sniff out shadow IT and anomalous endpoint activity on premises and in the cloud
- Device management best practices and user policies in a complex multi-device environment
- Innovations and advancements in unified endpoint management, self-healing endpoints, EDR and more