Next-Gen Endpoints Risks and Protections: A SANS Survey Part 1: New Devices and Risks

  • Webcast Aired Tuesday, 28 Feb 2017 1:00PM EST (28 Feb 2017 18:00 UTC)
  • Speakers: G.W. Ray Davidson, PhD, Dana Torgersen, Anthony Di Bello, Nick Charpentier

Endpoints are more than just servers, desktops and laptops--and not all of them are under corporate control. Today's endpoints also include printers, industrial controls, HVAC systems and even wearables, according to the 2016 endpoint security survey.

So, how has the endpoint threat landscape changed in the last year? And what have IT security teams done to improve their ability to identify and protect the endpoints they deem risky? Attendees will get answers to these questions, as well as learn about the following:

  • What new devices are considered endpoints and how well these devices are wrapped into respondents' security programs
  • Types of breaches organizations are detecting
  • How endpoint breaches are detected
  • What was targeted on those endpoints and why
  • How endpoints are still used to pivot deeper into the organization through credential theft and other means
  • Whether or not organizations prioritize and manage risk related to those endpoints

Answers to these questions directly relate to what IT professionals demand from next-gen endpoint protections, which is the topic of SANS' Part 2 webcast on March 1, 2017. Click here to register for the Part 2 webcast.

Click here to be among the first to receive the associated whitepaper written by SANS Analyst G. W. Ray Davidson.