Endpoint Security: More Than Just Windows Machines
Let's talk endpoint security with a dose of reality! 🛡️💻 In this eye-opening discussion, we explore the concept that attackers ultimately aim for an endpoint. But here's the catch: defining what an endpoint means in today's complex digital landscape isn't as straightforward as it seems.
If your idea of an endpoint is limited to just Windows machines, you might be in for a surprise. There's a lot more to it! 🌐
We also throw a couple of critical questions your way if you're putting all your security eggs in the endpoint basket: Are you 100% deployed to every endpoint in your environment? And can you guarantee that you'll stay that way?
Because, here's the kicker, even a 98% coverage leaves 2% vulnerable, and guess where the attackers are heading? Right for that 2%! 🚀
So, if you've been solely focused on endpoint security, it's time to rethink your strategy. Join us for an enlightening conversation that might just change the way you approach cybersecurity. 🤯🔒
GUEST BIOS
Jonathan Care
Jonathan Care is a recognised expert in the field of cybersecurity & fraud detection. A former top-rated Gartner analyst, Care was responsible for defining the Fraud market, and leading Gartner’s Insider Threat and Risk research. He regularly advises cybersecurity industry leaders on strategic growth and has worked with key figures in industry and government across the globe. He is a lead contributor for Dark Reading, an industry-defining publication. He has testified in court as an expert witness and forensic investigator and is a Fellow of the British Computer Society. He also fuels his creative passion as a composer of film/TV music.
Social media: @jonathanhcare & https://linkedin.com/in/computercrime
Chris Fielder
Christopher Fielder has been in the cybersecurity world for over 20 years with experience from a range of military, government and corporate environments. From this background, Christopher holds 18 industry certifications along with a Master's Degree in Information Security. While much of his career has involved traditional hands-on-keyboard security roles that covered offensive, defensive and analytics security positions, today he is the Field CTO for Arctic Wolf. This position allows him to research emerging security topics and remain at the forefront of highlighting the expertise of the entire Arctic Wolf team.
Other episodes you'll enjoy
Threat Intelligence & Collaboration
A Snapshot in Time: Why Penetration Testing Is Critical for Cybersecurity
For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com.
If you need consultation, visit www.razorthorn.com, We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion.
Linkedin: Razorthorn Security
Youtube: Razorthorn Security
Twitter: @RazorThornLTD
Website: www.razorthorn.com
#cybersecurity
#infosec
#shorts