Video On Demand
Epic Transformation: Convincing Campuses to Secure Their Devices
Tom Horton
Tom Horton
Runtime: 23:50
Until recently, Cornell has not seen a wide-spread application of its endpoint device security policy across campus. Traditionally, many faculty and some staff considered endpoint security an obstacle on the road to fulfilling the academic mission. The Certified Desktop program has changed that, and the results have been truly impressive. Learn how Cornell used CrowdStrike as one of its cornerstones to win over the hearts and minds of faculty and staff to truly secure endpoints in a traditional hands-off environment.

Related Videos

Security Strategy, Architecture & Operations Frictionless Zero Trust
Multiple Speakers CrowdStrike 18:01
Security Strategy, Architecture & Operations Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Multiple Speakers Consortium networks 13:14
Security Strategy, Architecture & Operations How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Doug Clifton EY 30:25