For government cyber professionals, the challenge is not just that malicious actors have become sophisticated and their tactics more lethal. It’s also that the IT environment has become increasingly complex.
Employees are accessing data and applications using multiple devices, including laptops, tablets and smart phones, each with its own operating systems and software versions. And sometimes they are on site and sometimes remote. All of this complexity adds up to more vulnerabilities that malicious actors know how to exploit, said Jared Vichengrad, Head of Public Sector, Check Point Software Technologies.
“Addressing all these challenges requires a comprehensive endpoint, protection strategy that includes robust policies, advanced security tools and the continuous monitoring of the environment,” he said.
In this video interview, Vichengrad discusses how agencies can take a more comprehensive approach to endpoint security. Topics addressed include:
- The key ingredients of an endpoint security strategy
- The role of zero trust in managing an increasingly complex cyber environment
- Three use cases for using AI to bolster cyber defenses
