Alaap B. Shah, Member of the Firm in the Health Care & Life Sciences practice, in the firm’s Washington, DC, office, was quoted in SC Media, in “Rationalizing the Endpoint COW,” by Esther Shein. (Read the full version – subscription required.)

Following is an excerpt:

It seems rather appropriate that at University of Wisconsin-Madison, when suspect information goes in or out of a mobile device, security officials have dubbed it a COW — a “Condition of Weirdness.”

Humor aside, university officials take security seriously, especially today since the network perimeter has been extended, thanks to a large fleet of mobile and internet of things (IoT) devices and the cloud. CISO Bob Turner estimates his staff is tasked with managing some 100,000 endpoint devices, which he defines as anything that is not a switch or router. This includes laptops, smartphones, IoT sensors, surveillance cameras, tower servers, cloud and virtual components, classroom- and network-connected printers, access control systems, imaging devices, and mobile display devices around campus.

Managing and securing all those endpoints is a never-ending challenge. Based on research the university and others have done, UW-Madison security officials feel confident they can figure out when something does not look quite right. …

Attorney Alaap Shah, a privacy and cybersecurity expert with the Washington, D.C.-based law firm Epstein Becker & Green P.C., agrees that knowing what you have and where it is located is essential. That is why companies should employ effective network mapping tools.

“Once the tech landscape is catalogued,” he says “professionals should assess how best to segment, configure, patch and run routine malware scanning on such devices. Each environment will require different security strategies and tactics.”

Jump to Page

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.