Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • The SANS 2016 Survey on Security and Risk in the Financial Sector The SANS 2016 Survey on Security and Risk in the Financial Sector Sandeep Kumar is the director of Product Marketing at ForeScout Technologies Recorded: Oct 24 2016 61 mins
    The financial sector is highly regulated, and as a result, often focuses on compliance. However, compliance rarely results in excellence, and thus financial institutions continue to suffer security-related breaches and losses, particularly by insiders according to the 2015 SANS survey on security spending and preparedness in the financial services sector.

    Today's webcast will focus on the relationship between compliance and security, and the best practices organizations can use to secure their financial environments. Specifically, attendees will learn about:

    The relationship between compliance and security
    The effectiveness of tools, skills and controls
    Ways to improve security effectiveness and reduce risk
    How to align security, risk and compliance programs with business goals
  • Learn What You Can Do To Help Avoid Ransomware Breaches Learn What You Can Do To Help Avoid Ransomware Breaches Liran Chen - Manager, Systems Engineering, ForeScout Technologies Recorded: Oct 13 2016 31 mins
    This webinar will discuss the recent ransomware breaches, malware attacks and potential protection strategies. Learn how ForeScout helps mitigate ransomware and other malware threats within your network environment. In addition, you’ll discover how ForeScout’s security platform helps organizations See, Control and Orchestrate enterprise security—and assist in identifying the potential risk that exists in your environment today.

    We hope you can join us for this timely webcast!
  • Real-Time Vulnerability Assessment for Rapid Response to Security Threats Real-Time Vulnerability Assessment for Rapid Response to Security Threats Bill Lewis, Dir. of IT, State Garden, Erick Ingleby, PM. Forescout & Jorhn Schimelpfenig, Sr. Business Dev. Manager, Rapid7 Recorded: Sep 28 2016 40 mins
    State Garden, a top producer of salad greens in the northeastern U.S., had two serious cybersecurity issues that needed to be addressed:

    1.) Internet of Things (IoT) endpoints on the company’s network were undetectable.
    2.) Vulnerability Assessment (VA) scans were missing mobile Bring Your Own Device (BYOD) systems that come and go from the network.

    Both issues were creating an attack surface that was increasingly harder to monitor and protect.

    Billy Lewis, State Garden Director of IT, will share the challenges he faced to:
    •Maximize efficiency of limited IT security resources and personnel
    •Protect company assets from unauthorized or non-compliant devices connecting to the network
    •Automate endpoint compliance and remediation
    •Orchestrate multisystem security

    In addition, Lewis will explain the role the ForeScout-Rapid7 solution played in reducing the attack surface and accelerating remediation on State Garden’s network.
  • Cybersecurity Awareness Is Just the Beginning Cybersecurity Awareness Is Just the Beginning Jerry Gamblin, Cyber Security Analyst, Len Rosenberg, VP of SE, ForeScout & Ellen Sundra, Director of SE, ForeScout Recorded: Sep 27 2016 15 mins
    In recognition of October’s designation as National Cyber Security Awareness Month—and to take things a critical step further—ForeScout Technologies is hosting the Turning Cybersecurity Awareness into Action webinar.

    Join renowned security specialist Jerry Gamblin, ForeScout VP of Systems Engineering Len Rosenberg, and ForeScout Director of Systems Engineering Ellen Sundra as they discuss the current state of cybersecurity and effective resources and practices for strengthening your defense posture.
  • The Next Step in IT Healthcare- Learn more on Compliance Regulations The Next Step in IT Healthcare- Learn more on Compliance Regulations Toni Buhrke, Director, Systems Engineering at ForeScout and Travis Funkhouser, Systems Engineer at ForeScout Recorded: Sep 20 2016 39 mins
    Learn what you can do to remain policy-compliant with today's complex healthcare networks, including clinical devices as well as IoT and BYOD devices. During this informative webinar, ForeScout Technologies Inc.’s network security and healthcare security experts will review the FDA's guidance on securing clinical devices, the “safe harbor” provision regarding breach notification and how CounterACT™ can help with both. Learn how to stay compliant and secure so you can focus on what matters most—providing the best care.
  • Supporting CIS Critical Security Controls with ForeScout Supporting CIS Critical Security Controls with ForeScout Darrell Kesti, Account Manager & Dean Kratzer, Senior Product Marketing Manager, ForeScout Technologies Recorded: Sep 7 2016 33 mins
    The Center for Internet Security has defined required controls for effective cyber defense (CIS Critical Security Controls). How do they relate to your security initiatives? Why is endpoint security and control such a major focal point of SANS security? How does the Internet of Things (IoT) impact you cybersecurity strategy?

    Join ForeScout's Darrell Kesti, and Dean Kratzer, ForeScout’s Senior Product Marketing Manager, as they discuss how ForeScout CounterACT® can help you create an effective cyber defense system. Discover how agentless cybersecurity technology and ForeScout’s See, Control and Orchestrate solution can accelerate this process with quick wins in the first 4 steps of this multistep process:

    1. Inventory of authorized and unauthorized devices
    2. Inventory of authorized and unauthorized software
    3. Secure configurations for hardware and software on mobile devices, laptops, workstations and servers
    4. Continuous vulnerability assessment and remediation
  • The Internet of Things Requires a Security Rethink The Internet of Things Requires a Security Rethink Zeus Kerravala, Founder and Principal Analyst at ZK Research Recorded: Sep 6 2016 44 mins
    The IoT Is Making Status Quo Network Security Obsolete

    The number of devices in the Internet of Things (IoT) category is exploding—adding billions of devices to networks every year that lack native security capabilities. Please join us as ZK Research Founder and Principal Analyst Zeus Kerravala discusses the Internet of Things and suggests ways to deal with IoT-related security challenges, including:
    • Why traditional perimeter defenses are no longer relevant and how IoT devices can circumvent conventional firewalls
    • The lack of IT and OT alignment—a major issue given that the IoT connects everything to a common network
    • The role agentless visibility and control play in finding, classifying and securing network-attached IoT devices
  • Place Your Bets on Securing Your Network Against Advanced Threats Place Your Bets on Securing Your Network Against Advanced Threats Gary Fisk (Solutions Architect, FireEye), Robert McNutt (Director, Strategic System Engineer, ForeScout) Recorded: Aug 16 2016 56 mins
    According to the latest M-Trends report, 53 percent of network compromises are identified by an external organization rather than the internal IT department. This is especially apparent in the hospitality industry where massive amounts of customer data and credit card information are stored. Now more than ever, it’s critical to understand the security posture of your network and implement comprehensive security solutions that help you rapidly detect, analyze and contain potential threats.

    Join us and learn how a Fortune 500 company Gaming/Hospitality company gained instant visibility of previously unknown devices and deployed policy-based access controls in days. Our special guest customer will comment on the state of threats to hospitality companies and discuss how FireEye Network Threat Prevention Platform (NX Series) and ForeScout CounterACT® work together to provide a holistic approach to risk mitigation and threat management.

    Gain visibility into what and who is on your network—especially un-managed devices. Improve your defenses against advanced threats and create a policy based automated response to potential threats.

    Register today [link] to learn how!
  • An Unvarnished Assessment of ForeScout Visibility An Unvarnished Assessment of ForeScout Visibility Robert Smithers, Miercom President and CEO Recorded: Aug 4 2016 50 mins
    When a disruptive technology emerges, it is often met with skepticism. A good case in point is ForeScout CounterACT®. It’s gaining a lot of traction in cybersecurity circles, with more than 2,000 large and medium enterprises and government agencies worldwide using the product as of April 2016. But for those IT professionals who might think its capabilities are too good to be true, ForeScout enlisted Miercom, a leading independent testing and consultancy, to provide unbiased, hands-on testing of CounterACT capabilities. Miercom’s findings are what this webinar is all about.
    Please join us as Miercom President and CEO Rob Smithers talks about his lab’s findings with regard to CounterACT’s:

    • Visibility (discovery, classification and compliance assessment) of network-connected corporate, BYOD, guest and IoT endpoints without use of agents or previous device knowledge
    • Detection and full classification of hundreds of endpoints in seconds
    • Policy-based control of devices by enabling IT staff to grant the appropriate level of network access to people, applications and devices
    • Ability to integrate with leading network infrastructure and endpoint protection technologies
  • SANS Health Care Provider Breaches and Risk Management Roadmap SANS Health Care Provider Breaches and Risk Management Roadmap Sandeep Kumar, Director of Product Marketing, Forescout Recorded: Jul 27 2016 62 mins
    This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach management, controls and budgets. Attendees will learn about:

    - Supporting operational priorities and business drivers (including mobile and cloud computing priorities)
    - Reducing risk while supporting new business drivers
    - Educating leadership and getting them on your team
    - Efficacy of controls, desired improvements and wish lists
    - Budgets and best practices

Embed in website or blog