Hi [[ session.user.profile.firstName ]]

ForeScout

  • Date
  • Rating
  • Views
  • Avoiding the Five Stages of Grief when Building a Successful NAC Program
    Avoiding the Five Stages of Grief when Building a Successful NAC Program Ellen Sundra, VP of Systems Engineering, Americas and Mitch Greenfield, Security Manager at Humana Recorded: Aug 2 2018 24 mins
    Grieving over a failed NAC program? It helps to talk about it—especially when you talk to experts. Learn best practices for a successful deployment and ways to get more value—and peace of mind—from someone who’s been through it before.
  • Secure Digital Innovation of Critical Infrastructure w/o Affecting Reliability
    Secure Digital Innovation of Critical Infrastructure w/o Affecting Reliability Ryan Brichant, CTO, OT Security, Wayne Dixon, Dir. OT Tech, ForeScout & Jamison Utter, Head of IoT & OT at Palo Alto Networks Recorded: Jul 30 2018 49 mins
    Digital innovations are aggressively being introduced into public utilities and smart city operational technology (OT) infrastructure. This creates expanded attack surfaces that introduce enormous risk across a wide array of threat vectors. Yet, since OT environments were traditionally air-gapped, there has been less emphasis on cyber security.
    It is critical to discover and protect all device connections and profiles to defend against threats that can negatively affect business operations, data, and even citizen safety. Security best practices suggest the need to continually assess connected assets and enforce the right policies for controlled access, more granular network segmentation and immediate threat response.

    Watch this Carahsoft sponsored webcast to learn from ForeScout and Palo Alto Networks how you can use non-disruptive security techniques that achieve these core security principals while prioritizing uptime of operational networks and the safety of those involved.
  • At the Root of Adaptability is True Network Visibility
    At the Root of Adaptability is True Network Visibility Sean Telles | CISSP, CEA Manager, Solutions Architecture & Programs - Americas ForeScout Technologies Recorded: Jul 30 2018 37 mins
    As innovation continues, so does the growth of connected devices on your network. Every IoT, BYOD and traditional IT connected device poses risk as a potential cyberattack threat vector. At the root of adaptive security operations is continuously discovering, classifying and assessing both managed and unmanaged devices and users as they gain network access from any entry point across tiers. Optimizing such visibility with rich contextual insight and automatically using that insight to dynamically detect, prioritize and respond to security incidents further accelerates adaptive security operations and reduces overall risk.

    Join us for an insightful webcast on how ForeScout and Splunk can help you achieve more adaptive security practices by orchestrating proactive closed loop workflows from discovery to remediation.
  • The 2018 SANS Industrial IoT Security Survey - Shaping IIoT Security Concerns
    The 2018 SANS Industrial IoT Security Survey - Shaping IIoT Security Concerns Wayne Dixon, Director of OT Technology Management Recorded: Jul 25 2018 68 mins
    This new SANS survey looks closely at the emergence and rapid growth of Industrial IoT (IIoT) systems, including broad-scale connectivity across industry and how well automation, critical control systems, digital/physical infrastructure and accompanying operations are protected against cybersecurity threats.

    Attendees will learn how security practitioners are safeguarding systems and assuring greater reliability, operational integrity, efficiency and productivity in these complex systems. Attendees also will learn about perceived threats
  • Preparing for Tomorrow’s Threats Across the Expanded Enterprise
    Preparing for Tomorrow’s Threats Across the Expanded Enterprise Dave DeWalt, Former CEO, FireEye & McAfee; Rob McNutt, VP Emerg. Tech., ForeScout; Stu Solomon, Chief Tech. & Strategy, Optiv Recorded: Jun 20 2018 40 mins
    Cyber leaders have a massive visibility problem that is only growing as the number of corporate unmanaged IP-connected devices continues to explode. Organizations are discovering up to 60 percent more devices on their network than previously known – amidst this rapid growth, where should CISOs and CIOs focus to increase their visibility, while at the same time manage and maintain security hygiene and compliance? Add to this, the expanded attack surface represented by non-traditional IoT and OT devices as entry points into the enterprise, and the challenge to prepare against threat actors seems overwhelming.

    In a rare opportunity to hear from an industry leader, join Dave DeWalt, former CEO of FireEye and McAfee, along with Rob McNutt, Vice President of Emerging Technologies at ForeScout, and Stuart Solomon, Chief Technology & Strategy Officer at Optiv, as they share insights and lessons on how today’s cyber leaders should be preparing for tomorrow’s expanded threats.

    Join this webinar to learn:
    - Where CISOs and CIOs should focus their resources to improve visibility
    - How device visibility can enable security hygiene and compliance
    - How organizations can shrink the attack surface created by IoT and OT
    infrastructure
  • Endpoint Detection and Response: SANS 2018 Endpoint Security Survey
    Endpoint Detection and Response: SANS 2018 Endpoint Security Survey Sandeep Kumar, Senior Director of Product Marketing at ForeScout Recorded: Jun 19 2018 61 mins
    In this new 2018 endpoint survey, publishing in association with the SANS DFIR Summit, SANS revisits threats, protections and response capabilities impacting endpoints. Results are presented in a two-part webcast series. The whitepaper and webcast developed from this survey are intended to promote better endpoint hygiene and provide valuable thought leadership to the community.

    In this second installment of the 2018 endpoint survey results webcast, we uncover:

    - How organizations are monitoring their endpoints and networks to detect threats to their endpoints
    - The value of utilizing services vs on premises endpoint monitoring
    - Average time to detect and average time to fully remediate
    - Best practices to integrate remediation workflow
    - Enablers and barriers to improving endpoint protection and response capabilities
  • IoT Risk and Posture Assessment
    IoT Risk and Posture Assessment Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc. Recorded: May 29 2018 43 mins
    IoT devices being deployed by the thousands, they often lack IT oversight and basic security best practices such as strong credentials. A recent industry analysis notes that 81 percent of breaches involve the misuse of stolen, weak or default credentials. Botnets such as Mirai take advantage of weak IoT credentials and harvest millions of IoT devices to cause service disruptions. Hence, IoT assessment is the next logical step after IoT classification for managing risk and reducing your attack surface.
    Join us to learn how the ForeScout platform helps organizations assess IoT devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including functionality that lets you:
    • Identify IoT devices with factory default and weak credentials
    • Create your custom IoT credential assessment library or leverage the ForeScout-provided credential library
    • Create policies to automate assessment and initiate mitigation actions (alert, limit, block and segment)
  • Post Ransomware Crisis -Tips, Tricks, & Lessons Learned to Stay Protected
    Post Ransomware Crisis -Tips, Tricks, & Lessons Learned to Stay Protected Shawn Taylor, Sr. Systems Engineer ForeScout Technologies, Inc. Recorded: May 18 2018 33 mins
    Today, Ransomware attacks are more destructive than ever before. No organization, too large or small is safe from a potential attack. Watch this webinar to hear from our security solution expert, Senior Systems Engineer, Shawn Taylor to discuss recent ransomware breaches, the impact of those breaches, and steps you can take to better protect your organization from falling victim. In addition, you’ll discover how ForeScout’s security platform provides visibility into what’s on your network in order to and assist in identifying the potential risk that exists in your environment today.
  • Raising the Bar on Device Classification
    Raising the Bar on Device Classification Mitesh Shah, Sr. Technical Marketing & Kevin Mayer, Product Management ForeScout Technologies, Inc. Recorded: May 15 2018 46 mins
    The device landscape on enterprise networks has evolved from a static set of laptops, workstations and servers to a diverse mix of mobile, BYOD, IoT and OT devices, as well as virtual machines. Many of these devices are transient and come and go with increasing frequency. Without continuous visibility and classification of connected devices, it’s impossible to establish an accurate device inventory or an in-depth understanding of device risk profiles. This visibility gap is being targeted by bad actors to gain a foothold on the network and access sensitive information or cause business disruption.

    Join us to learn how the ForeScout platform helps organizations classify devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including:

    • Real-time, granular auto-classification of enterprise devices without relying on agents
    • Device profile updates from ForeScout Device Cloud, a crowd-sourced repository of IoT device insight from more than 500 real-world customer environments
    • Extending built-in classification capabilities to create your own custom classification policies
  • Continually Reducing Risk Despite Constant Changes
    Continually Reducing Risk Despite Constant Changes Julie Cullivan CIO, ForeScout Technologies, Inc. Recorded: Apr 30 2018 30 mins
    IoT is forcing security leaders to re-assess how they secure their networks. Each new device that comes online represents another attack vector for enterprises and it only takes one device to compromise an entire network and disrupt business operations, which can impact the bottom line.

    Recent Forrester research commissioned by ForeScout has unveiled some hidden technical and organisational challenges IT professionals should be aware of when managing IoT devices on their networks. The survey results demonstrate a dynamic shift in the way organisations are starting to think about security and risk as it relates to IoT.

    This session will highlight some key findings from this research and outline what organisations can do to better defend IoT-enabled systems from cyberattacks.

Embed in website or blog