Exploring Endpoint Security: From Basics to AI-Era Threats, With Raakesh Thayyil
From antivirus to AI-powered threats, this session with Raakesh Thayyil (Group Head of Security & Privacy at PropertyGuru) breaks down the evolving world of endpoint security—what it means today, how remote work changed the game, and what lean security teams can actually do about it.
🔍 What you’ll learn:
- Endpoint security basics explained with a castle analogy 🏰
- How remote work broke security - and what’s still broken
- Why AI is both your best friend and worst enemy in cybersecurity
- Real-world frameworks, tools & tips for small security teams
- Is traditional antivirus dead? (Spoiler: not yet)
- How to think about Zero Trust, XDR, DSPM & more
- Rapid-fire fun: Cybersecurity theme songs, mascots & coffee choices ☕
👇 Timestamps & Q&A included in the video chapters!
📢 Brought to you by The 403 Circle – an invite-only community for top CTOs & CISOs.
Join the community: https://www.getastra.com/the403circle-community-by-astra
00:00 - Introduction & Session Agenda
00:42 - About The 403 Circle Community
01:30 - Introduction to Astra Security
02:00 - Speaker Introduction: Rakesh Thayyil (Group Head of Security, PropertyGuru)
03:10 - What is Endpoint Security? (Castle Analogy)
06:00 - Impact of Remote Work on Endpoint Security
10:20 - Components of Endpoint Security: Basics to Advanced
13:00 - How AI Is Changing the Threat Landscape
18:00 - AI for Attackers vs Defenders
22:10 - AI in Security vs Security of AI
25:10 - Zero Trust, Microsegmentation & Modern Security Strategies
28:00 - Rapid-Fire Round with Rakesh
31:05 - Role of End Users in Endpoint Security
34:45 - Is Traditional Antivirus Still Relevant?
37:20 - Where Small Security Teams Should Start
41:55 - Frameworks and Practical Advice for SMBs
46:20 - Future of Endpoint Security & AI’s Dual Role
48:20 - Audience Q&A Begins
48:55 - Mistakes Companies Still Pay for After Remote Transition
50:55 - Best Endpoint Security Tools? (It Depends)
52:10 - Hybrid Work: Long-Term Risk?
53:50 - Addressing Compromised Devices and Users
56:00 - Thoughts on Application Virtualization
58:10 - Will Hardware Replace Software-Based Endpoint Security?
59:20 - Thoughts on Bitdefender EDR & Vendor Neutrality
60:20 - Closing Remarks & How to Connect with Rakesh