Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • The Good, the Bad, & the Downright Dangerous: IoT & Healthcare
    The Good, the Bad, & the Downright Dangerous: IoT & Healthcare Vice President of Americas, Systems Engineering, Forescout Technologies, Inc. Recorded: Mar 6 2018 22 mins
    Organizations are struggling to wrap programs to increase the base level security on all devices, then Automate more process, and share more information with internal and external customers. This demands a fresh look at how operations teams works together including: share information better, improve patient care, streamline auditing all devices, and apply policy while still stretching the IT budget. The medical industry is at the precipice of the IoT and corporate networks.
  • Reduce Risk with Privileged Account Security & Continuous Visibility
    Reduce Risk with Privileged Account Security & Continuous Visibility Aytug Celikbas, Sales Engineer, CyberArk & Jim Higginbottom, Director Global Alliances, ForeScout Recorded: Feb 7 2018 44 mins
    With the threat landscape expanding every second, protecting the “keys to the kingdom” is vital to securing your business and its assets. Unsecured privileged accounts affords cyber criminals access to your highest value assets and data. Join your host, Conexsys Communications, to learn how CyberArk and ForeScout address this issue by reducing the attack surface. ForeScout scans the network in real time and automates policy-driven access control based on device security posture and behavior without using an agent. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets.
  • Preventing Cyberattacks via Dynamic Network Segmentation
    Preventing Cyberattacks via Dynamic Network Segmentation Ward Holloway, ForeScout Technologies & Chris Ebley, Managing Partner, BAI & Lee Space, Palo Alto Networks Recorded: Oct 16 2017 49 mins
    In today’s era of ‘Bring your own device’ (BYOD) mobility and ‘Internet of Things’ (IoT) devices proliferating networks as unknown or unmanaged connections, the cyberattack surface for most any organization continues to grow at an alarming rate. No longer can organizations rely on guarding their perimeter and trusting they know everyone and everything that is accessing their network. Proactive threat prevention in today’s BYOD and IoT era requires continuous network access visibility and intelligence as well as being able to automatically apply context-aware security policies such as segmenting devices and users without having to re-build networks or knowing the devices upfront.
    Webinar topics include:
    - Network security trends and challenges, including the more destructive ransomware, cryptoransomware, wipers, etc.
    - Risk prevention architecture considerations
    - Best practices based on real world experiences

    BAI will share some of its key learnings based on extensive experience implementing successful solutions that target attacks while creating more highly available, responsive, and automated networks. BAI is a team of Security Architects who have provided Automated Detection, Prevention, and Orchestration to protect Government Agencies, Higher Education and Fortune 1000 commercial accounts.
  • Securing Smart Transportation to Protect Your Community
    Securing Smart Transportation to Protect Your Community Ryan Brichant, VP & CTO of Cyber Security, ForeScout & Ashok Sankar, Director of Public Sector Solutions & Strategy, Splunk Recorded: Oct 2 2017 43 mins
    The US Department of Homeland Security has identified transportation as one of three top sectors in creating a Smart City. The Department also addressed the fact that the same technologies driving this digital transformation - smart sensors, fare collection systems, power relays, HVAC, cameras, and other unmanaged IoT devices – are also expanding the cyber attack surface and pose significant security risks to both citizens and critical assets. The challenge before transportation administrators, state and local officials and security and IT experts is how to enable these beneficial systems while also ensuring optimum security protections.

    Join us for this insightful webinar on the state of Smart Transportation initiatives and how you can gain the visibility and control you need to drive both Smart AND Secure Transportation to benefit your community.

    Webinar topics include:
    - The risks and challenges of new technologies and IoT inherent with Smart Transportation
    - How real-time end-to-end visibility can offer critical situational awareness needed to reduce and manage risks
    - Real world experiences
  • Gain Real-Time Vulnerability Assessment for Rapid Response to Security Threats
    Gain Real-Time Vulnerability Assessment for Rapid Response to Security Threats John Chirhart, Federal Technical Director, Tenable & Ellen Sundra, RVP of Systems Engineering PubSec, ForeScout Technologies Recorded: Sep 25 2017 50 mins
    Whether you’re an information security, compliance or IT executive, your job is harder than it’s ever been before. Regardless of your organization’s size or industry, there is a lack of immunity against the increasingly advanced threat environment.

    The number of data breaches reported today is growing at a rapid pace – as are the associated costs. At the same time, regulatory mandates continue to evolve. Yet, even with most organizations spending significant money on people and technology, the bad guys keep getting through.

    Join industry experts John Chirhart, Tenable and Ellen Sundra, ForeScout, on June 14 and discover how to:

    - Reduce security risk through faster, automated vulnerability scans of newly introduced systems on your network
    - Improve efficiency by focusing vulnerability scans on newly detected systems and on systems that have changed since the last scan
    - Increase ability to identify and eliminate vulnerable systems in hard to reach or unknown areas within your network
    - Orchestrate multi-system security
  • Extend Visibility & Control to Your Private Cloud & Software-Defined Data Center
    Extend Visibility & Control to Your Private Cloud & Software-Defined Data Center Sumit Bhat: Senior Product Marketing Manager, ForeScout Technologies Recorded: Sep 21 2017 20 mins
    Private and public cloud security are logical extensions of securing managed, unmanaged and IoT devices in the physical world. ForeScout security solutions help enhance security and compliance of your virtual assets, regardless of where they are located. In addition, ForeScout’s heterogeneous platform lets you to leverage your on-premises security operations team’s skills and maximize your existing security investments. In this webinar, you’ll learn how ForeScout integrates with third-party solutions to:
    • Discover and classify virtual instances (and cloud workloads) and assess their security posture
    • Gain consolidated visibility and provide unified policy management across Data Center and cloud environments
    • Proactively identify and manage underutilized or shadow VMs
    • Allow, deny or segment virtual machines and cloud instances based upon policy compliance

    Learn how you can enforce security across your hybrid campus and cloud deployments using one solution. Join us for this live online webinar.
  • Staying Secure in the Era of Smart Things
    Staying Secure in the Era of Smart Things Shawn Taylor, PubSec SE, ForeScout, John MacMichael, CISO, DC Gov, Geoff Brown, CISO, City of NY Recorded: Sep 14 2017 62 mins
    As the world grows more interconnected by the day, security practitioners need to see beyond the network. The Internet of Things is presenting organizations with a threat landscape they’ve never seen before. We’ve entered an uber-connected world of sensors, cameras and other various data collection systems...making their jobs harder than ever before.

    Find out how City and Municipality organizations are learning to become flexible and nimble as they harness the future, all while maintaining the security needed to protect the data deluge from billions of sensors and devices.

    In this webinar, you will learn:

    - How you can easily gain visibility to all of the devices connecting to your network
    - Increase the security posture of your organization by enforcing policies around compliance without the use of agents
    - How to operationalize your organization so your security is dynamic and adaptable to change
  • Extending Agentless Visibility and Control Across Campus, Data Center and Cloud
    Extending Agentless Visibility and Control Across Campus, Data Center and Cloud Sandeep Kumar, Director of Product Marketing, ForeScout Technologies Recorded: Sep 11 2017 44 mins
    To support the exponential growth of IoT, operational technology (OT) and virtualization on enterprise networks, ForeScout has new product features and technology partnerships to help keep the evolving enterprise infrastructure secure.

    Join Sandeep Kumar, ForeScout’s Director of Product Marketing, as he provides an in-depth update on ForeScout’s latest product advancements and how customers can benefit:

    - Advanced out-of-the box device classification with new taxonomy for IoT and OT devices
    - Enterprise scale and resiliency to manage over one million devices per deployment with new failover capability
    - Enhanced user interface for consolidated visibility, policy management and controls across heterogeneous infrastructures
    - Expanded collaboration with VMware and AWS to extend visibility and control across software-defined data centers and public cloud
  • Using Agentless Visibility to Simplify Network Segmentation
    Using Agentless Visibility to Simplify Network Segmentation Eric Nelson, Manager, Systems Engineering, ForeScout Technologies Recorded: Aug 30 2017 18 mins
    Network segmentation projects are on everyone’s radar for 2017 since outside-in perimeter security technologies such as firewalls, intrusion prevention systems and advance threat protection systems are unable to prevent some of the recent notable cyberattacks. Once threats are inside a flat network, they can roam and spread freely. Segmentation is a best practice to contain these threats and protect network resources. This 40-minute seminar will share the key areas for effective network segmentation, including:
    • Using agentless visibility and granular device classification to define profiles, roles and zones
    • Leveraging existing infrastructure investments to segment today’s flat networks
    •  Automating and maintaining network segmentation hygiene with ForeScout CounterACT®
  • Gaining Compliance with DFARs
    Gaining Compliance with DFARs Heather Engel, Chief Strategy Officer, Sera-Brynn Recorded: Aug 24 2017 49 mins
    U.S. Defense Contractors and soon all Federal Agencies will be required to meet the DFARS 7012 mandate with critical cybersecurity controls against NIST 800-171. The overwhelming challenges presented by these stringent guidelines are having a major impact on the contracting community which supports our warfighters. These requirements must be implemented by December 31, 2017.

Embed in website or blog