Endpoint Security , Next-Generation Technologies & Secure Development
Who's Responsible for Securing Endpoints?NSS Labs' Mike Spanbauer on Why Clear Roles of Authority Are Needed
Endpoints are most the likely point of compromise, and they are often difficult to identity. Organizations have more endpoints today than ever, and securing those endpoints is challenging, because it's rare that any one organization is responsible for all the endpoints that touch its network and servers, says Mike Spanbauer, vice president of research and strategy at NSS Labs. This is why it's so critical for businesses to identity who's responsible for securing which endpoints before a security incident occurs.
See Also: LIVE Webinar Tomorrow | Hackers Don't Back Down, So You Need to Back Up: Data Security's Hardest Truths
In this video interview at Information Security Media Group's 2017 Atlanta Fraud and Breach Prevention Summit about endpoint security, Spanbauer discusses:
- Identifying a responsible point of contact in the incident response plan;
- How to identify the endpoints at greatest risk, because you can't protect everything; and
- Understanding how security and general IT teams can work together to create a thorough endpoint security strategy.
As vice president of security test and advisory at NSS Labs, Spanbauer leads the analyst team in creating research that combines years of testing experience with quantitative analysis from leading security companies, products and markets. In addition to running the research organization, Spanbauer also advises clients about how best to address today's cybersecurity threats. Prior to joining NSS, he was service director at Current Analysis, managing its business technology and software group.