Hi [[ session.user.profile.firstName ]]

Skybox Security

  • Date
  • Rating
  • Views
  • Firewall Optimization and Cleanup
    Firewall Optimization and Cleanup
    Greg Singh, Technical Marketing Engineer, Skybox Security Recorded: Dec 5 2018 59 mins
    Due to the rapid pace of change and the sheer scale of today’s networks, many devices have never had the benefit of an orderly, well-managed change process. As a result, firewall rulesets have often grown organically, messily and in ways that differ from designed policy, decreasing performance and increasing the cyber risk of the organization.

    In this webinar we will explore Skybox’s firewall optimization and cleanup capabilities in our latest web UI. Register to learn:

    • Why analytics-driven automation is fundamental to improve firewall auditing and management, and what’s needed in an analytics-driven automation solution
    • How Skybox can support a systematic approach to continuously improve firewall performance and defense posture
    • How to use Skybox to ensure the security designed in policy is implemented and adhered to in your network
    • How Skybox’s powerful toolset and new, intuitive UI helps organizations quickly get a handle on security and performance issues in their multi-vendor firewall fleet
  • Securing the Hybrid Environment
    Securing the Hybrid Environment
    Michelle Johnson Cobb, Chief Marketing Officer, Skybox Security Recorded: Oct 23 2018 34 mins
    For many organizations, the challenge of cloud security isn’t purely a cloud problem. As efforts are underway to migrate workloads to the cloud, highly complex infrastructures have taken shape spanning on-prem and multi-cloud networks. To effectively protect these hybrid environments, organizations need to take a holistic approach to their security, understand their interconnections and dependencies, and ensure that security and compliance standards are being met anywhere in the network.

    Register for the webinar to secure your migration to the cloud and see the benefits of unifying security management across your hybrid environment.

    In this webinar, you’ll learn:

    -Why breaking down data silos between on-prem and multi-cloud networks is fundamental to good cyber hygiene — not to mention security team sanity
    -How data correlation can be used to detect vulnerabilities in cloud environments without an active scan
    -How the single-pane-of-glass view of your attack surface to supports secure cloud migrations
    -How attack surface modeling and analysis illuminates paths between and within networks, vulnerability exposures, misconfigurations, policy violations and more
    -What processes of hybrid security management can be offloaded to automation and what ingredients are needed to make that automation an effective risk-fighting tool
  • To Automate or Not to Automate Is Not the Question - Where and How Is
    To Automate or Not to Automate Is Not the Question - Where and How Is
    Michael D. Osterman, Principal Analyst, Osterman Research Recorded: Sep 26 2018 38 mins
    Organizations worldwide are on a journey of automating security processes, but questions remain.

    Seems like these days everyone in security is talking about automation, artificial intelligence (AI) and machine learning (ML). However, what are organizations actually doing? What percentage of core security processes are fully or partially automated? And, where do security leaders see the greatest business impact?

    Join Michael D. Osterman, principal analyst of Osterman Research, as he explores the findings of a new global survey sponsored by Skybox Security on automation in cybersecurity. And, learn from Skybox what the foundation of any automation program should be.

    •What are the key business drivers of automation in security?
    •Where are the challenges and problems security leaders are trying to solve?
    •Where are security teams automating most and what is the business impact?
    •How is migration to the cloud affecting automation of security policy?
    •How many are actually using AI?
    •How can this data help you in your journey toward automation?
  • Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense
    Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense
    Terry Olaes, Sales Engineering Lead, Central US Skybox Security Recorded: Aug 16 2018 57 mins
    Critical infrastructure — from energy production to manufacturing to public utilities — is becoming a more prevalent attack vector for nation-state threat actors as well as the common cybercriminal. These attackers are frequently exploiting the interconnectedness of IT and operational technology (OT) networks, finding their foothold in the disconnect between their security management.

    In response, many organizations are looking to unify and align their IT-OT security programs to better understand and tackle cyber risks in both environments. In this session, Skybox Security SE Terry Olaes will cover what challenges to expect in this an endeavor, and how to use comprehensive visibility and contextual intelligence to overcome them.

    In this webinar, you will learn:
    - What are the inherent risks to OT security and how the continued integration with IT impact risk in both environments
    - What are the key concerns for IT and OT security teams and how can they can align to improve security throughout the organization
    - Which elements and capabilities needed to gain seamless visibility of on-prem, cloud and OT networks
    - How to use modeling and analytics to put risk in the context of your attack surface and effectively prioritize response
  • Fighting Blind: Why Vulnerability Management Demands More Than Scan-and-Patch
    Fighting Blind: Why Vulnerability Management Demands More Than Scan-and-Patch
    Alastair Williams, EMEA Technical Director, Skybox Security Recorded: Jul 18 2018 49 mins
    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to their host’s place in the network, meaning efforts can be wasted on remediating already protected vulnerabilities while ignoring those left exposed to attack.

    To have a real impact on lowering your risk of cyberattack, organizations need to centralize and analyze data from their entire attack surface to narrow focus on the vulnerabilities most likely to be used in a cyberattack.

    In this webinar, you will learn:
    -What scanners miss in discovery, prioritization, remediation and oversight processes and how to fill in the gaps
    -How the intersection of your assets, networks, business and the threat landscape impact vulnerability risk
    -Why context-based approaches target remediation at your riskiest vulnerabilities and help identify patching alternatives
    -Insights from Skybox’s 2018 Vulnerability and Threat Trends Report mid-year update

    Join Alastair Williams, EMEA technical director for Skybox Security, as he explores how to get more value out of your data, visualize your attack surface and centralize vulnerability management to systematically reduce your risk of cyberattack.
  • Life After May 25: Sustainable GDPR Compliance With Visibility and Automation
    Life After May 25: Sustainable GDPR Compliance With Visibility and Automation
    Peter Hughes, Technical Director, Sales, Skybox Security Recorded: May 24 2018 46 mins
    Deadline day for the European Union’s General Data Protection Regulation (GDPR) has been looming large for security programs around the world. But is your organization ready to efficiently and effectively maintain compliance beyond May 25?

    Join Skybox Security for the BrightTALK webinar on simplifying compliance management with comprehensive attack surface visibility and automation.

    In this webinar, you’ll learn:
    • How network modeling provides fundamental visibility to understand what data is at risk and what resources you have to protect it
    • Which automated processes will have the greatest benefit on reducing an organization’s data security risk
    • How combining visibility and automation can systematically tighten access and improve security process efficiency and impact
    • The benefits of visibility and automation in compliance-related use cases such as firewall auditing, change management, rule life cycle management, vulnerability management and more
  • More, More, More: Targeting Risk With Context-Aware Vulnerability Management
    More, More, More: Targeting Risk With Context-Aware Vulnerability Management
    Sean Pike, program vice president of security products, IDC Recorded: May 23 2018 33 mins
    Vulnerability management is about more than scanning, severity levels and patching. To have a real impact on lowering your risk of cyberattack, you need to centralize and analyze data from your entire attack surface. This type of approach means using more data sources in vulnerability discovery, more context in prioritization, more options in remediation and more accountability in oversight..

    In this webinar you will learn:

    What data sources are needed for accurate, comprehensive vulnerability data on demand

    Why relying on scanners alone leaves blind spots in discovery, prioritization, remediation and oversight processes

    How to contextualize vulnerability data from asset, network, business and threat perspectives

    Why context-based approaches target remediation at your riskiest vulnerabilities

    How to use network context to find patching alternatives

    Join Sean Pike, program vice president of security products at IDC, and Skybox Security’s Global Director of Technical Product Marketing Sean Keef in a webinar that explores how to get more value out of your data and take vulnerability management from scan-and-patch to a systematic, risk-fighting program.
  • Using Queryable Infrastructure To Understand Vulnerability Risk
    Using Queryable Infrastructure To Understand Vulnerability Risk
    Josh Zelonis, senior analyst, Forrester Recorded: Apr 25 2018 38 mins
    Vulnerability scan data can only provide insight into the existence of vulnerabilities in your infrastructure. To prioritize remediation efforts, it’s essential to have additional information about the impacted assets and the environment in which they exist. Building “queryable infrastructure” allows you to have a real-time snapshot of which vulnerable assets are exposed or are adequately protected by compensating controls. The addition of threat intelligence feeds further helps to narrow focus, as knowing how a vulnerability can be exploited will reveal which systems are most likely to be attacked.

    In this webinar you will learn:

    What blind spots can be left by scanning and how to fill in the holes

    Why it’s important for vulnerability management solutions to be vendor agnostic and able to merge and centralize data

    How to use queryable infrastructures in vulnerability management processes

    How automation simplifies the maintenance of a queryable infrastructure and risk-based vulnerability analysis

    Join Skybox Security Global Director of Technical Product Marketing Sean Keef and featured speaker Josh Zelonis, Forrester senior analyst, in a webinar that considers why “queryable infrastructure” is crucial to effective, informed vulnerability management.
  • Managing Security In Hybrid IT-OT Environments
    Managing Security In Hybrid IT-OT Environments
    Peter Hughes, Technical Director, Skybox Security Recorded: Mar 28 2018 40 mins
    The cyberthreat to critical infrastructure — from utilities to energy production, transportation, manufacturing and more — is very real. Operational technology (OT) is becoming a more prevalent attack vector for nation–state threat actors as well as the common cybercriminal. And attackers of all sorts are frequently exploiting the interconnectedness of IT and OT networks.

    In this session, we will cover:

    The evolution of OT security challenges and the major threats looking to exploit them

    The inherent characteristics of OT networks that complicate incorporating them under traditional IT security programs

    How OT connectivity with IT affects risks to both networks with real–world examples of successful cyberattacks on connected environments

    The security management use cases supported by comprehensive visibility and business benefits
  • Vulnerability and Threat Trends 2018
    Vulnerability and Threat Trends 2018
    Marina Kidron, Senior Security Analyst and Group Leader of Skybox Research Lab Recorded: Feb 28 2018 34 mins
    What Happened in 2017? Your Job Got Harder
    Cyber defenders are facing a better outfitted landscape than ever before. According to findings of the Vulnerability and Threat Trends Report 2018 — which examines vulnerabilities, exploits and threat in play — in 2017:

    - The amount of newly published CVEs doubled, rising to 14,000
    - The monthly average of new sample exploit code rose 60%
    - New vulnerabilities impacting operational technology grew by 120%

    Register for this on-demand webinar to examine what’s behind these and other trends, including the state of the exploit kit industry, the top malware to follow and more.

Embed in website or blog