Hi [[ session.user.profile.firstName ]]

ForeScout

  • Date
  • Rating
  • Views
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout Recorded: Dec 11 2018 61 mins
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    •The current threat landscape and unique security challenges healthcare organizations face
    •Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    •How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • Implementing NIST 800-171 with ForeScout
    Implementing NIST 800-171 with ForeScout
    James John, Systems Engineer, ForeScout Technologies, Inc. Recorded: Dec 6 2018 42 mins
    The ForeScout platform helps with 800-171 preparedness by automating and accelerating your path to compliance, reducing overall risk and maintaining and demonstrating ongoing compliance. James John, Senior Systems Engineer with ForeScout has extensive experience implementing and deploying the ForeScout solution in both public and private sector environments. He will demonstrate and share tips and tricks to help you maximize your existing investment to comply with NIST 800-171. The webinar and interactive demo will show you how to:
    •Effectively identify Controlled Unclassified Information on your
    network
    •Assess devices that store CUI
    •Build policies to effectively segment and protect these devices
    •Implement these policies and plan for remediation
    •Integrate with your existing security solutions
  • Save your contracts! Understand and comply with DFARS & NIST 800-171
    Save your contracts! Understand and comply with DFARS & NIST 800-171
    Michael Correa, Senior Engineer, ForeScout Technologies, Inc. Recorded: Nov 29 2018 19 mins
    The Department of Defense (DoD) wants increased industry accountability for cybersecurity. In fact, the Department views cybersecurity as foundational to doing business with the DoD. What does that mean for your upcoming contracts? ForeScout Senior Engineer, Michael Correa has worked in the federal space for 25 years. Join us as Michael provides seven quick tips for ramping up on NIST 800-171 compliance. In this webinar you will learn:

    • How to effectively identify Controlled Unclassified Information (CUI)
    • How to gain quick wins by focusing on the most fundamental controls
    of NIST 800-171
    • What it takes to solidify your System Security Plan
    • Other quick tips for complying
  • It’s November.  How compliant are you with NIST 800-171?
    It’s November. How compliant are you with NIST 800-171?
    Leo Sheridan, Executive Liaison for Federal and Systems Integrators, ForeScout Technologies, Inc. Recorded: Nov 15 2018 39 mins
    Ten months after the mandate to comply with NIST 800-171, many prime contractors and subcontractors admit they underestimated the cost of implementation. The U.S. Deputy Secretary of Defense just announced that the Department of Defense (DoD) would bring even more pressure on DoD contractors to meet higher cybersecurity standards, and that they would hold large contractors responsible for demanding that their subcontractors do the same. The DoD plans to begin launching “red team cyberattacks” on industrial partners, in which a cell would test vulnerabilities and try to penetrate the contractors' systems. Leo Sheridan, executive liaison for federal and systems integrators will discuss:

    • How being noncompliant can affect your business revenue next year

    • Why it has been challenging to comply with NIST 800-171

    • How to quickly assess your level of compliance

    • Defining a path to clear up the confusion and focus on the key
    elements to a strong System Security Plan (SSP)
  • How Are You Responding to Threats? SANS 2018 Incident Response Survey
    How Are You Responding to Threats? SANS 2018 Incident Response Survey
    Brennen Reynolds, Senior Director Global Alliance Technology, ForeScout Technologies. Recorded: Nov 5 2018 61 mins
    What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This webcast will release results from the SANS 2018 Incident Response Survey, developed by Matt Bromiley, SANS Digital Forensics and Incident Response (IR) instructor and GIAC board member. Matt will examine how incident response teams are coping with organizational structures, resources and IR implementation in an ever-changing threat environment.

    In this webcast, you will learn how organizations have structured their incident response functions, what systems they are conducting investigations on, the threats they are uncovering and how they're uncovering them. For example:

    - What staffing, services and resources are they using, and how are they using them?
    - Are they still struggling with a silo mentality between operations and response?
    - During an investigation, are they able to get the data they need to fully discover the attack's spread and remediate all traces?
    - How automated are these processes of data collection and discovery?
  • Fostering Security Innovation with Optimized Asset Insight & Incident Response
    Fostering Security Innovation with Optimized Asset Insight & Incident Response
    Brennen Reynolds, ForeScout; Piero DePaoli, ServiceNow; Bob Bragdon, CSO Magazine Recorded: Oct 11 2018 51 mins
    The key to keeping your business secure is knowing all your assets and their potential security impact. The explosion of IoT, BYOD, guest and connected devices as a whole have expanded attack surfaces and introduced numerous blind spots and vulnerabilities that must be addressed. In this webcast, you will learn how you can reduce risk by streamlining security operations with automated device discovery, real-time asset management, continuous compliance enforcement and accelerated incident response and remediation workflows.
  • CIO Insights: Bridging Security Gaps with a Risk-based Approach
    CIO Insights: Bridging Security Gaps with a Risk-based Approach
    Julie Cullivan, CIO & Sr. VP Business Ops, ForeScout; Nir Gertner, Chief Security Strategist, CyberArk Recorded: Sep 20 2018 49 mins
    Embedding security into business processes and employee awareness, particularly outside of information security teams, can be especially challenging. Yet security operations is vital to protecting the health, safety and intellectual property of any organization and therefore cannot operate in a silo. Learn how to apply a risk-based approach that leverages continuous visibility of devices and privileged accounts on heterogenous networks to enhance organizational trust and business success.

    Speakers:
    Julie Cullivan, Chief Information Officer and Senior Vice President, Business Operations, ForeScout
    Nir Gertner, Chief Security Strategist, CyberArk
  • Visibility Platform for the Connected Campus
    Visibility Platform for the Connected Campus
    Shawn Rodriguez – RVP, SLED, Chris Dullea – SE Manager, SLED, ForeScout Technologies, Ken Compres, CSO, Hillsborough College Recorded: Aug 14 2018 58 mins
    Attendees of this webcast for higher education learned how the ForeScout Platform can identify and secure devices on a campus's network, without agents, and can help ensure that if they are connected, they are compliant and secure.
  • Compliance in Financial Services: Cloudy, With the Certainty of Change
    Compliance in Financial Services: Cloudy, With the Certainty of Change
    Tom Dolan, Global Vice President of Sales Financial Services, ForeScout Technologies Recorded: Aug 14 2018 16 mins
    Financial services firms are being challenged by three successive waves of challenges that have created the perfect storm for compliance, security and network professionals. In this webinar, Tom Dolan, Vice President of Sales for Financial Services will discuss how fast-changing regulatory requirements, advanced cybercriminals, and increasingly large and complex networks make compliance a top concern of financial services organizations.
  • Avoiding the Five Stages of Grief when Building a Successful NAC Program
    Avoiding the Five Stages of Grief when Building a Successful NAC Program
    Ellen Sundra, VP of Systems Engineering, Americas and Mitch Greenfield, Security Manager at Humana Recorded: Aug 2 2018 24 mins
    Grieving over a failed NAC program? It helps to talk about it—especially when you talk to experts. Learn best practices for a successful deployment and ways to get more value—and peace of mind—from someone who’s been through it before.

Embed in website or blog