Epic Transformation: Convincing Campuses to Secure Their Devices
Tom Horton
Runtime: 23:50
Until recently, Cornell has not seen a wide-spread application of its endpoint device security policy across campus. Traditionally, many faculty and some staff considered endpoint security an obstacle on the road to fulfilling the academic mission. The Certified Desktop program has changed that, and the results have been truly impressive. Learn how Cornell used CrowdStrike as one of its cornerstones to win over the hearts and minds of faculty and staff to truly secure endpoints in a traditional hands-off environment.
Related Videos
Frictionless Zero Trust
Security Strategy, Architecture & Operations
Frictionless Zero Trust
Multiple Speakers
CrowdStrike
18:01
Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Security Strategy, Architecture & Operations
Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Multiple Speakers
Consortium networks
13:14
How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Security Strategy, Architecture & Operations
How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Doug Clifton
EY
30:25
{Will be replaced by the modal content}