DiscoverCISO Edge, The Gartner Cybersecurity PodcastShould Cybersecurity Own End-User Device Management From End to End?
Should Cybersecurity Own End-User Device Management From End to End?

Should Cybersecurity Own End-User Device Management From End to End?

Update: 2024-06-04
Share

Description

Join Gartner experts Eric Grenier and Chris Mixter on this episode of CISO Edge for a conversation on the steps that CISOs must take to close the gap between prioritizing employee productivity and cybersecurity in end-user device management.

Eric Grenier is a Director Analyst with Gartner, focusing on endpoint security including endpoint protection (EPP) and endpoint detection and response (EDR). Eric’s research and advisory supports clients implementing EPP and EDR tooling, securing endpoints and using tools like unified endpoint management (UEM) and strategies such as bring your own device (BYOD) and bring your own PC (BYOPC) that allows users to remain productive from wherever they work and be secure. In addition to his work at Gartner, he is also a professor at Central Connecticut State University.

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Should Cybersecurity Own End-User Device Management From End to End?

Should Cybersecurity Own End-User Device Management From End to End?

Eric Grenier, Christopher Mixter