Hi [[ session.user.profile.firstName ]]

Comply to Connect

The idea behind Comply to Connect (C2C) is simple: Implement controlling countermeasures that safeguard your information systems. However, as with any U.S. Government initiative, there are a few details you should know. Join ForeScout as we clarify the concept and use case of Comply to Connect. During this informative webinar, you’ll also see real-world examples of how ForeScout® CounterACT® can provide visibility, hygiene, mitigation and control across technical, management and operational assets in accordance with the U.S. Government’s 800-53 and NIST SP 800-171 standards.
Recorded Apr 27 2016 24 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Gillespie, US Public Sector Strategist
Presentation preview: Comply to Connect

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The SANS 2016 Survey on Security and Risk in the Financial Sector Recorded: Oct 24 2016 61 mins
    Sandeep Kumar is the director of Product Marketing at ForeScout Technologies
    The financial sector is highly regulated, and as a result, often focuses on compliance. However, compliance rarely results in excellence, and thus financial institutions continue to suffer security-related breaches and losses, particularly by insiders according to the 2015 SANS survey on security spending and preparedness in the financial services sector.

    Today's webcast will focus on the relationship between compliance and security, and the best practices organizations can use to secure their financial environments. Specifically, attendees will learn about:

    The relationship between compliance and security
    The effectiveness of tools, skills and controls
    Ways to improve security effectiveness and reduce risk
    How to align security, risk and compliance programs with business goals
  • Learn What You Can Do To Help Avoid Ransomware Breaches Recorded: Oct 13 2016 31 mins
    Liran Chen - Manager, Systems Engineering, ForeScout Technologies
    This webinar will discuss the recent ransomware breaches, malware attacks and potential protection strategies. Learn how ForeScout helps mitigate ransomware and other malware threats within your network environment. In addition, you’ll discover how ForeScout’s security platform helps organizations See, Control and Orchestrate enterprise security—and assist in identifying the potential risk that exists in your environment today.

    We hope you can join us for this timely webcast!
  • Real-Time Vulnerability Assessment for Rapid Response to Security Threats Recorded: Sep 28 2016 40 mins
    Bill Lewis, Dir. of IT, State Garden, Erick Ingleby, PM. Forescout & Jorhn Schimelpfenig, Sr. Business Dev. Manager, Rapid7
    State Garden, a top producer of salad greens in the northeastern U.S., had two serious cybersecurity issues that needed to be addressed:

    1.) Internet of Things (IoT) endpoints on the company’s network were undetectable.
    2.) Vulnerability Assessment (VA) scans were missing mobile Bring Your Own Device (BYOD) systems that come and go from the network.

    Both issues were creating an attack surface that was increasingly harder to monitor and protect.

    Billy Lewis, State Garden Director of IT, will share the challenges he faced to:
    •Maximize efficiency of limited IT security resources and personnel
    •Protect company assets from unauthorized or non-compliant devices connecting to the network
    •Automate endpoint compliance and remediation
    •Orchestrate multisystem security

    In addition, Lewis will explain the role the ForeScout-Rapid7 solution played in reducing the attack surface and accelerating remediation on State Garden’s network.
  • Cybersecurity Awareness Is Just the Beginning Recorded: Sep 27 2016 15 mins
    Jerry Gamblin, Cyber Security Analyst, Len Rosenberg, VP of SE, ForeScout & Ellen Sundra, Director of SE, ForeScout
    In recognition of October’s designation as National Cyber Security Awareness Month—and to take things a critical step further—ForeScout Technologies is hosting the Turning Cybersecurity Awareness into Action webinar.

    Join renowned security specialist Jerry Gamblin, ForeScout VP of Systems Engineering Len Rosenberg, and ForeScout Director of Systems Engineering Ellen Sundra as they discuss the current state of cybersecurity and effective resources and practices for strengthening your defense posture.
  • The Next Step in IT Healthcare- Learn more on Compliance Regulations Recorded: Sep 20 2016 39 mins
    Toni Buhrke, Director, Systems Engineering at ForeScout and Travis Funkhouser, Systems Engineer at ForeScout
    Learn what you can do to remain policy-compliant with today's complex healthcare networks, including clinical devices as well as IoT and BYOD devices. During this informative webinar, ForeScout Technologies Inc.’s network security and healthcare security experts will review the FDA's guidance on securing clinical devices, the “safe harbor” provision regarding breach notification and how CounterACT™ can help with both. Learn how to stay compliant and secure so you can focus on what matters most—providing the best care.
  • Supporting CIS Critical Security Controls with ForeScout Recorded: Sep 7 2016 33 mins
    Darrell Kesti, Account Manager & Dean Kratzer, Senior Product Marketing Manager, ForeScout Technologies
    The Center for Internet Security has defined required controls for effective cyber defense (CIS Critical Security Controls). How do they relate to your security initiatives? Why is endpoint security and control such a major focal point of SANS security? How does the Internet of Things (IoT) impact you cybersecurity strategy?

    Join ForeScout's Darrell Kesti, and Dean Kratzer, ForeScout’s Senior Product Marketing Manager, as they discuss how ForeScout CounterACT® can help you create an effective cyber defense system. Discover how agentless cybersecurity technology and ForeScout’s See, Control and Orchestrate solution can accelerate this process with quick wins in the first 4 steps of this multistep process:

    1. Inventory of authorized and unauthorized devices
    2. Inventory of authorized and unauthorized software
    3. Secure configurations for hardware and software on mobile devices, laptops, workstations and servers
    4. Continuous vulnerability assessment and remediation
  • The Internet of Things Requires a Security Rethink Recorded: Sep 6 2016 44 mins
    Zeus Kerravala, Founder and Principal Analyst at ZK Research
    The IoT Is Making Status Quo Network Security Obsolete

    The number of devices in the Internet of Things (IoT) category is exploding—adding billions of devices to networks every year that lack native security capabilities. Please join us as ZK Research Founder and Principal Analyst Zeus Kerravala discusses the Internet of Things and suggests ways to deal with IoT-related security challenges, including:
    • Why traditional perimeter defenses are no longer relevant and how IoT devices can circumvent conventional firewalls
    • The lack of IT and OT alignment—a major issue given that the IoT connects everything to a common network
    • The role agentless visibility and control play in finding, classifying and securing network-attached IoT devices
  • Place Your Bets on Securing Your Network Against Advanced Threats Recorded: Aug 16 2016 56 mins
    Gary Fisk (Solutions Architect, FireEye), Robert McNutt (Director, Strategic System Engineer, ForeScout)
    According to the latest M-Trends report, 53 percent of network compromises are identified by an external organization rather than the internal IT department. This is especially apparent in the hospitality industry where massive amounts of customer data and credit card information are stored. Now more than ever, it’s critical to understand the security posture of your network and implement comprehensive security solutions that help you rapidly detect, analyze and contain potential threats.

    Join us and learn how a Fortune 500 company Gaming/Hospitality company gained instant visibility of previously unknown devices and deployed policy-based access controls in days. Our special guest customer will comment on the state of threats to hospitality companies and discuss how FireEye Network Threat Prevention Platform (NX Series) and ForeScout CounterACT® work together to provide a holistic approach to risk mitigation and threat management.

    Gain visibility into what and who is on your network—especially un-managed devices. Improve your defenses against advanced threats and create a policy based automated response to potential threats.

    Register today [link] to learn how!
  • An Unvarnished Assessment of ForeScout Visibility Recorded: Aug 4 2016 50 mins
    Robert Smithers, Miercom President and CEO
    When a disruptive technology emerges, it is often met with skepticism. A good case in point is ForeScout CounterACT®. It’s gaining a lot of traction in cybersecurity circles, with more than 2,000 large and medium enterprises and government agencies worldwide using the product as of April 2016. But for those IT professionals who might think its capabilities are too good to be true, ForeScout enlisted Miercom, a leading independent testing and consultancy, to provide unbiased, hands-on testing of CounterACT capabilities. Miercom’s findings are what this webinar is all about.
    Please join us as Miercom President and CEO Rob Smithers talks about his lab’s findings with regard to CounterACT’s:

    • Visibility (discovery, classification and compliance assessment) of network-connected corporate, BYOD, guest and IoT endpoints without use of agents or previous device knowledge
    • Detection and full classification of hundreds of endpoints in seconds
    • Policy-based control of devices by enabling IT staff to grant the appropriate level of network access to people, applications and devices
    • Ability to integrate with leading network infrastructure and endpoint protection technologies
  • SANS Health Care Provider Breaches and Risk Management Roadmap Recorded: Jul 27 2016 62 mins
    Sandeep Kumar, Director of Product Marketing, Forescout
    This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach management, controls and budgets. Attendees will learn about:

    - Supporting operational priorities and business drivers (including mobile and cloud computing priorities)
    - Reducing risk while supporting new business drivers
    - Educating leadership and getting them on your team
    - Efficacy of controls, desired improvements and wish lists
    - Budgets and best practices
  • Bringing Shadow Devices into the Light Recorded: Jul 19 2016 48 mins
    Mike Rothman, Securosis Analyst and President
    Shadow Devices and Cybersecurity

    Along with the burgeoning Internet of Things comes a new reality: billions of invisible devices connected to private networks. These “shadow devices” enlarge your attack surface and, if left in the dark, expose your organization to malware propagation and theft of critical resources.

    In this webinar, Mr. Rothman defines the classes of shadow devices—everything from sensors to medical devices to industrial control systems—and discusses how to gain visibility and control of these potentially dangerous endpoints. In addition, he’ll talk about next-generation access control and the strategies and technologies that reveal shadow devices through:

    • Visibility and risk profiling
    • Controls to protect vulnerable agentless devices
    • Automation and integration of existing security technologies


    Mike Rothman, Analyst & President, Securosis, Inc. started his career as a programmer and a networking consultant. Today, he specializes in protecting networks and endpoints, security management, and compliance, or what he calls “the sexy aspects of security.” Mike is one of the most sought-after speakers and commentators in the security field and, after 20 years in the business, he’s one of the guys who “knows where the bodies are buried.”
  • The Internet of Things Isn’t Coming, It’s Here. Recorded: Jul 12 2016 42 mins
    Steven Taylor, Editor-in-Chief of Webtorials
    Learn what your peers think about the state of IoT security.

    Webtorials surveyed IT professionals worldwide who are responsible for enterprise communications networks regarding their view about the prevalence and security of the Internet of Things (IoT). The study was sponsored by ForeScout Technologies, a world leader in visibility, control and orchestration solutions for cybersecurity.

    Here are just a few findings:

    • Only 30 percent are confident they really know what “things” are on their networks
    • Respondents who initially thought they had no IoT devices on their networks realized they had eight IoT device types, on average (when asked to choose from a list of devices)
    • Only 44 percent of respondents had a known security policy for IoT
    • 86 percent of respondents think it is important to discover and classify devices without using an agent


    Steven Taylor, Editor-in-Chief of Webtorials

    With over thirty years' experience as President and Principal Analyst at Distributed Networking Associates, Inc. Steven Taylor has spent his career as an analyst, journalist, teacher, and evangelist for emerging technologies. This experience allows him to temper the often starry-eyed prognostications about the "Next Big Thing" with a heavy dose of realism and déjà vu. Over a decade ago, Taylor founded the Webtorials project where he pioneered the use of the Internet to supplement (and replace) traditional technology trade publications and training.
  • The Value of Intelligent Cybersecurity Technologies for Smart Cities Recorded: Jul 7 2016 38 mins
    Raul Documet, Public Sector Systems Engineer at ForeScout Technologies Inc.
    Smart Cities Value Intelligent Cybersecurity

    The vision of smart cities is bright—automating critical public services, improving community interactions and achieving untold levels of efficiency in a connected, technology-driven society. But along with all of this boundless potential comes risk.

    In this webinar, Mr. Documet discusses the cybersecurity challenges all smart cities will face. In addition, he’ll address the role ForeScout Technologies is playing today in helping municipalities around the globe to:

    • Protect sensitive systems and data
    • Securely embrace IoT and smart utility innovations
    • Ensure interoperability with current and future systems
    • Maintain resiliency and availability for critical public services
    • Comply with regulatory mandates

    Register now!


    Raul Documet is a Public Sector Systems Engineer with over 12 years of experience in IT Security. Raul’s areas of expertise range from IT Auditing and Outsourcing Security to Cloud and Datacenter planning and deployment.
  • Automating System-Wide Security Response through Orchestration Recorded: Jun 28 2016 28 mins
    Jennifer Geisler , Vice President of Marketing, ForeScout Technologies
    Discover the Anatomy of Multivendor Security Orchestration

    Multivendor integration can improve operational efficiencies, accelerate threat response, boost security ROI and greatly improve a company’s network security and compliance posture. In this webinar, Ms. Geisler breaks down the anatomy of security orchestration. In addition, you’ll learn how ForeScout is extending the visibility and control capabilities of ForeScout CounterACT® to its partners’ security management products, as well as:
    - The role ForeScout ControlFabric® Architecture and ForeScout Extended Modules play in achieving rapid security orchestration
    - Real-world security orchestration use cases
    - Specific examples of how ForeScout helps leading security management vendors share information and automate security workflows and response

    Register now!


    Jennifer Geisler , Vice President of Marketing, ForeScout Technologies

    With 20 years of industry experience, Jennifer drives ForeScout’s corporate branding, content marketing and sales enablement initiatives. Prior to joining ForeScout, Jennifer held senior marketing positions at Packeteer (acquired by Blue Coat Systems), Cisco and Intel Security. Jennifer holds a bachelor’s degree in business from Wright State University.
  • Comply to Connect Recorded: Apr 27 2016 24 mins
    Tony Gillespie, US Public Sector Strategist
    The idea behind Comply to Connect (C2C) is simple: Implement controlling countermeasures that safeguard your information systems. However, as with any U.S. Government initiative, there are a few details you should know. Join ForeScout as we clarify the concept and use case of Comply to Connect. During this informative webinar, you’ll also see real-world examples of how ForeScout® CounterACT® can provide visibility, hygiene, mitigation and control across technical, management and operational assets in accordance with the U.S. Government’s 800-53 and NIST SP 800-171 standards.
  • Blind Spots: Gain Real Time Visibility & Control of Unmanaged Endpoints Recorded: Mar 29 2016 26 mins
    Jennifer Geisler, Vice President of Marketing
    In today’s distributed enterprise, creating a truly secure network, whether managed or unmanaged, requires instant visibility into the devices that are connecting to it, paired with an ability to automate threat responses. A recent study conducted by Frost & Sullivan identified that majority of enterprises suffer from security ‘blind spots’, with 72 percent of organizations experiencing five or more network security incidents in the past 12 months. Learn more about these findings from ForeScout Technologies Inc., the pioneer in agentless cybersecurity, and how automation can help security teams orchestrate their technologies to help eliminate network blind spots—giving them true visibility and actionability into their connected devices.
  • Discover What’s on Your Network and How to Respond to IOCs Recorded: Feb 23 2016 51 mins
    Amy De Salvatore, DJ Koehler, Michael Roling, Wallace Sann
    You can’t secure what you can’t see. Don’t get caught without the answer to your CTO/CISO’s question of, “Exactly what devices are on our network, and are they secure?”

    Join us and learn how the State of Missouri gained instant visibility of previously unknown devices and deployed policy-based access controls in days. You’ll also learn how to:
    · See unknown devices on your network—especially unmanaged endpoints
    · Control endpoints to improve compliance with industry mandates
    · Orchestrate multisystem interoperability to automate workflows and accelerate threat response

    Gain visibility into what is on your network, including unmanaged, BYOD and Internet of Things devices!

    Register today!
  • Secure Your Network Against Advanced Threats Recorded: Feb 12 2016 19 mins
    Mike Resong, FireEye Director, Technology Alliances and Amy De Salvatore, ForeScout Senior Director, Strategic Alliances
    How do you reveal unknown risks on your network and enforce your security and compliance policies? What’s required to reduce your attack surface, detect and block advanced threats and rapidly respond to security breaches? Good Questions!

    Join us and learn the answers to these real-world problems and discover how ForeScout and FireEye’s joint solution reduces the threat landscape and automates security management and response, allowing you to:
    · Identify devices—including Internet of Things endpoints—the instant they connect to your network
    · Quickly detect advanced threats
    · Scan for indicators of compromise (IOCs)
    · Contain infected endpoints and automate threat response
    · Limit malware propagation and break the cyber kill chain

    Register today and learn to improve your company’s defenses against advanced threats and automate threat response!

    Michael Resong, FireEye Director, Technology Alliances
    Michael has been with FireEye since April 2013. Before joining Technology Alliances, he led various systems engineering and architect teams at FireEye. Prior to FireEye, Micheal performed numerous systems engineering and management functions at McAfee, Secure Computing, Network Appliance and other leading technology companies.

    Amy De Salvatore, ForeScout Senior Director, Strategic Alliances
    Amy currently manages a team focused on a discreet portfolio of technology and go-to-market partners. As one of ForeScout’s top strategic partner liaisons, Amy manages the FireEye alliance, and is responsible for all development, marketing, engagement and delivery aspects of the relationship.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Comply to Connect
  • Live at: Apr 27 2016 4:00 pm
  • Presented by: Tony Gillespie, US Public Sector Strategist
  • From:
Your email has been sent.
or close