Hi [[ session.user.profile.firstName ]]

ForeScout EMEA

  • Date
  • Rating
  • Views
  • Livestream Video - Securing the IoT in the Age of Threats
    Livestream Video - Securing the IoT in the Age of Threats
    Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Andrew Hollister, LogRhythm | Jason Soroko, Sectigo Recorded: Jun 4 2019 43 mins
    The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?

    Join this interactive panel with IoT and security experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Panellists
    Jason Soroko, CTO of IoT, Sectigo
    Andrew Hollister, Chief Architect & Product Manager, LogRhythm
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies
    Nigel Stanley, CTO - Global OT & Industrial Cyber Security CoE, TÜV Rheinland Group

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the Cyber Risk Expert: How to Minimise Cybersecurity Risk Factor in M&A
    Ask the Cyber Risk Expert: How to Minimise Cybersecurity Risk Factor in M&A
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies Recorded: Jun 4 2019 8 mins
    Any merger or acquisition poses daunting challenges to IT leaders. Not only are they tasked with integrating people, processes and technology in the shortest possible time frame, they must also remain vigilant about addressing the added cybersecurity risks.

    Join this interactive 1-2-1 discussion where systems engineering expert, Wallace Sann will share how to minimise the cybersecurity risk factor in M&A including;


    Who are the key decision makers in the M&A process and what are the different/new challenges they’re facing?
    What has historically been the risk focus for acquiring companies, and how is that focus changing?
    How can companies as a whole minimize cyber risk and protect themselves during the M&A process?
    Are there any opportunities for IT teams to reduce cyber risk during an M&A?
    What does Forescout recommend companies do in order to enhance their cybersecurity posture when preparing for an acquisition?
    With the explosion of IoT devices across industries, should there be more concern around connected devices during an acquisition?
  • Using Zero Trust to Protect Financial Services Networks
    Using Zero Trust to Protect Financial Services Networks
    Tom Dolan VP, Global Financial Services Forescout & John Kindervag Founder of Zero Trust and CTO Palo Alto Networks Recorded: Apr 15 2019 51 mins
    Is Zero Trust really achievable given the complexity in financial service organizations, especially considering limited staff, mergers and acquisitions and compliance pressures?

    With Phil Packman, a CISO at BT, as your host, learn from the founder of Zero Trust & Field CTO at Palo Alto Networks, John Kindervag, and the VP of Global Financial Services at Forescout, Tom Dolan, how your company can more easily embrace Zero Trust to proactively combat today’s high frequency and sophistication of cyberattacks.

    Join us to learn how to:
    - Proactively combat today’s high frequency and sophistication of cyberattacks
    - Gain unparalleled situational awareness of malicious activity
    - Prevent the exfiltration of sensitive data and money
    - Simplify adherence to compliance regulations
  • Automating Security Controls with Confidence
    Automating Security Controls with Confidence
    Forescout Product Team Recorded: Apr 10 2019 58 mins
    IT security teams are inundated with increasing numbers of security and compliance issues reported by security tools that either lack sufficient device context for prioritization or automation capabilities to enforce risk mitigation controls. As a result, highly skilled security teams waste time manually troubleshooting low-impact issues, unable to focus on proactive risk reduction or rapid threat response.

Join us to learn how Forescout 8.1 enables organizations to orchestrate actions and automate controls while minimizing business disruption. Topics include:

    • Orchestration of segmentation controls across Fortinet®, Palo Alto Networks® and Check Point® firewalls
    
• Incident response automation with ServiceNow® ITSM and Security Operations

    • Automation of controls for network access and device compliance initiatives
  • Achieving improved cybersecurity posture across IT and OT Infrastructures
    Achieving improved cybersecurity posture across IT and OT Infrastructures
    Moderator - Dan Raywood, Speakers - Andrew Noonan, Torry Crass Recorded: Apr 2 2019 62 mins
    In this webinar, we will look at the concept of why device visibility poses such a challenge for business, what is getting in the way and why OT and IT convergence has added an extra consideration.

    Key takeaways:
    •How your security strategy benefits from better device visibility
    •How compliance and risk management can be optimised
    •Unifying device visibility and control for IT and OT environments
    •Ways to improve the effectiveness of existing tools
  • Unified Device Visibility for IT and OT Environments
    Unified Device Visibility for IT and OT Environments
    Forescout Product Team Recorded: Mar 27 2019 48 mins
    As digital transformation continues, organizations are using increasing numbers of smart devices on their networks. They are connecting previously separated IT and OT networks to automate business operations and boost efficiency. This convergence of IT and OT is putting new demands on CIOs and CISOs as they are being tasked with protecting the entire business ecosystem, well beyond enterprise IT systems. 

Join us to learn how Forescout 8.1 enables organizations to gain complete situational awareness of all devices in their interconnected environment to understand both their cyber and operational risk. Topics include:
    
• Visibility and continuous monitoring of all layers of the OT network stack 

    • Auto-classification of medical, industrial, networking and IoT devices
    
• Multi-cloud and data center visibility into Azure, AWS, VMware and Cisco ACI environments
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout Recorded: Dec 11 2018 61 mins
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    •The current threat landscape and unique security challenges healthcare organizations face
    •Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    •How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • Secure Digital Innovation of Critical Infrastructure w/o Affecting Reliability
    Secure Digital Innovation of Critical Infrastructure w/o Affecting Reliability
    Ryan Brichant, CTO, OT Security, Wayne Dixon, Dir. OT Tech, ForeScout & Jamison Utter, Head of IoT & OT at Palo Alto Networks Recorded: Sep 19 2018 49 mins
    Digital innovations are aggressively being introduced into public utilities and smart city operational technology (OT) infrastructure. This creates expanded attack surfaces that introduce enormous risk across a wide array of threat vectors. Yet, since OT environments were traditionally air-gapped, there has been less emphasis on cyber security.
    It is critical to discover and protect all device connections and profiles to defend against threats that can negatively affect business operations, data, and even citizen safety. Security best practices suggest the need to continually assess connected assets and enforce the right policies for controlled access, more granular network segmentation and immediate threat response.

    Watch this Carahsoft sponsored webcast to learn from ForeScout and Palo Alto Networks how you can use non-disruptive security techniques that achieve these core security principals while prioritizing uptime of operational networks and the safety of those involved.
  • Securing the Internet of Things
    Securing the Internet of Things
    Joseph Carson (Thycotic) | Chris Morales (Vectra Networks) | Simon Crocker (Palo Alto Networks) | Matt Butler (ForeScout) Recorded: Jun 5 2018 53 mins
    The Internet of Things is everywhere - and it's an easy and frequent target of cyber attackers, as evidenced by the recent attacks on cities, industrial control systems, transportation systems, utilities and other infrastructure.

    IoT devices are built for convenience, efficiency and cost, and are riddled with vulnerabilities attackers are eager to exploit. So, who is in charge of securing the IoT? Does the responsibility lie with the manufacturer, seller, app developer, security team, or end user?

    Join the industry experts for this interactive Q&A discussion on:
    - The top IoT trends in 2018
    - Threats targeting the IoT
    - What's needed to secure connected devices
    - How to better defend our critical infrastructure from cyber warfare

    Speakers:
    - Joseph Carson, Chief Security Scientist, Thycotic
    - Matt Buller, CTO – Financial Services, ForeScout Technologies
    - Simon Crocker, Systems Engineering Director, Palo Alto Networks
    - Christopher Morales, Head of Security Analytics, Vectra Networks

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • ForeScout's approach to becoming GDPR-compliant
    ForeScout's approach to becoming GDPR-compliant
    Tony Miller, Sr. Director of Legal Affairs & Jannine Mahone, Sr. Solutions Marketing Compliance, ForeScout Technologies Inc. Recorded: Mar 22 2018 43 mins
    More than 92 percent of multinational companies are focused on GDPR as a top priority1. ForeScout Technologies is one of them. Tony Miller, Sr. Director of Legal Affairs at ForeScout shares lessons learned in ForeScout's quest to assure data privacy and become GDPR compliant. This informal event will be in the form of questions and answers.

Embed in website or blog