I once wrote an article about how in theory a printer could get hacked. It was a hypothetical. At the time, the prospect was bizarre.
But that was probably 15 years ago. Endpoint security was pretty narrow in scope: lockdown the attack paths leading to a pretty finite number of devices. Get some good antivirus software. Implement and forget.
Obviously, with the proliferation of wireless networks and devices and the march to the cloud, endpoint security has grown far more complex. Yes, printers do get hacked. Pretty often actually. But so do any number of IoT devices that have emerged during the last decade.
I'd like to invite you to an event CyberRisk Alliance is hosting Nov. 18-19, where experts from the cybersecurity community, across sectors, will examine today's endpoint security challenge. And the challenges are many: How can businesses adequately address security when endpoints are no longer confined to their own network – particularly post pandemic with the explosion of remote working? How do security teams maintain control or even a clear inventory of devices? What expectations can a company place upon its supply chain to ensure endpoint security is not compromised, and of course, how can a business properly address those devices at the network's edge within a cloud infrastructure? How does endpoint security work in conjunction with a zero-trust security model? What’s the proper role of automation?
Among the featured speakers at this two-day event are Don Cox, vice president and chief information security officer at health care services company Mednax, and Lela Draganic, senior information security analyst at TD Bank. Hear from them and many others how endpoint threats are evolving and why traditional approaches to endpoint security are dead. I hope to see you there.