Events , RSA Conference , RSA Conference Videos

SASE: The Need, the Challenges, the Payoff

Netskope's Mike Anderson, Health Partners Plans CISO Mark Eggleston Share Insights
Mike Anderson, CDO & CIO, Netskope; Mark Eggleston VP, Chief Information Security and Privacy Officer, Health Partners Plans

Secure Access Service Edge - SASE - has emerged in hardly two years' time as a new cloud-enabled architecture for delivering cybersecurity to today's dispersed workforce. Mike Anderson of Netskope and Mark Eggleston of Health Partners Plans discuss the promise and potential pitfalls of SASE.

In a video interview with Information Security Media Group as part of its RSA Conference 2021 coverage, Anderson and Eggleston discuss:

  • Why SASE is needed now;
  • The pitfalls of poor execution;
  • The human element challenges to moving to the new architecture.

Anderson brings over 20 years of experience to his role as chief digital and information officer for Netskope, having built and led high-performing teams across a wide range of disciplines, including sales, operations, business development and information technology. He joins Netskope from Schneider Electric, a global Fortune 500 industrial manufacturer, where he served as SVP, CIO and digital leader for North America..

At Health Partners Plans, a Philadelphia-based health insurance company, Eggleston leads the maturation of various security technologies and privacy initiatives and manages a business continuity and disaster recovery program.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.