Aaron Cockerill

Aaron Cockerill

Chief Strategy Officer

Lookout

company overview

Lookout is a leading cybersecurity company.  Our mission is to secure and empower our digital future in a privacy-focused world where mobility and cloud are essential to all we do for work and play.  We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust.  Lookout is trusted by millions of consumers, the largest enterprises and government agencies, and partners such as AT&T, Verizon, Vodafone, Microsoft, Google and Apple.  Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C.

Biography

As the Chief Strategy Officer, Aaron is responsible for developing, validating and implementing cross-functional strategic product initiatives that align with the Lookout vision of a secure connected world. Prior to Lookout, Aaron was the VP of Mobile Technologies at Citrix, where he and his team were responsible for the development of Citrix’s mobile apps and container technology while driving the acquisition of Zenprise. During his time at Citrix, Aaron drove the creation of Citrix’s desktop virtualization product, XenDesktop, which grew into more than $1 billion yearly revenue for Citrix during his five years of leadership.

Speech Topic & Synopses
Why Integrated Endpoint-to-Cloud Security is Essential

With users now working from anywhere, your data follows them.  To securely tap into this productivity, you need secure access service edge (SASE), delivering security in the cloud like you still have a perimeter.  But existing SASE technologies are invasive and clash with the user’s expectation of privacy when working remotely.  It’s only when you integrate endpoint security with SASE that can you protect your users and your data in a manner that respects personal privacy.

  • From data centers to the cloud, organisations own a complex collection of apps to support work from anywhere
  • VPNs enable access but undermine security
  • Employees are using devices, software and networks you don’t control
  • Employees also now expect their personal privacy to be respected
  • Integrated endpoint-to-cloud security is essential to safeguard data and users, while complying with regulations and respecting personal privacy.