How do you define 'Endpoint'?: Extending Traditional Endpoint Security to Mobile & IoT Devices
Are your mobile devices still managed by a separate group than your traditional computer endpoints?
Do you struggle with visibility of connected/network-enabled IoT devices in your environments
Do you have defined security policies governing the use, compliance and control of mobile and IoT devices?
Do you feel your existing security controls can be realistically extended to non-traditional endpoints?
How can the security industry help respond to the lack of standards, testing and updates of IoT devices?
How do your password management efforts differ between traditional and non-traditional endpoints?
In the world of mobile/IoT devices, is any one of security's core principles of "confidentiality", "integrity", and "availability" significantly different than traditional endpoints?
Ransomware and botnets are two key threats for mobile/IoT devices. What security controls can be leveraged against these vectors?
What role does AI play in managing and security non-traditional endpoints? Do you see the emergence of any particular I.T. or security frameworks for managing mobile and IoT devices in an enterprise?
Become a VIP attendee for the CISO Digital Boardroom by Blackberry Digital Boardroom
and move your organization forward on current goals. If you are interested in attending the digital
event, fill out the form below and a CDM Media representative will contact you with more information.
If you would like to speak directly with someone about the event, contact firstname.lastname@example.org or +1 312.374.0805.