Discover What’s on Your Network and How to Respond to IOCs
You can’t secure what you can’t see. Don’t get caught without the answer to your CTO/CISO’s question of, “Exactly what devices are on our network, and are they secure?”
Join us and learn how the State of Missouri gained instant visibility of previously unknown devices and deployed policy-based access controls in days. You’ll also learn how to:
· See unknown devices on your network—especially unmanaged endpoints
· Control endpoints to improve compliance with industry mandates
· Orchestrate multisystem interoperability to automate workflows and accelerate threat response
Gain visibility into what is on your network, including unmanaged, BYOD and Internet of Things devices!
RecordedFeb 23 201651 mins
Your place is confirmed, we'll send you email reminders
Sandeep Lota, Senior Systems Engineer, Forescout Technologies
Critical infrastructure organizations are increasingly becoming targets of malware campaigns. This rising tide of cyberthreats, coupled with the increased exposure of OT networks to the Internet is making ICS network protection a strategically important issue. To stay cyber resilient in todays environment, asset owners need a fresh approach to cybersecurity.
During this webinar, we will discuss an anonymized investigation conducted by our team to identify a real malware infection on a production network, the tools and techniques used to contain this threat and how to use threat intelligence and visibility to stay ahead of cyber adversaries.
We will focus on improving security strategy in four key areas, in the context of the SANS Top 20 CIS Controls:
Can you identify and secure what’s on your network? Do you worry that needed security will impact your operational uptime and will keep your critical infrastructure running 24/7?
Today’s networks include a broad variety of devices - managed, unmanaged, IoT, medical, OT and HVAC – that aren’t always visible and therefore aren’t secure.
Expanding the visibility is the first step in reducing the risk. In this session, learn from actual customer experiences that share how deploying a solution for device visibility and control provides the foundational layer needed for risk mitigation and protection.
Erik Decker, CISO & CPO, University of Chicago Medicine & Ellen Sundra, VP of Engineering at Forescout
Join Erik Decker, Chief Information Security Officer and Chief Privacy Officer of the University of Chicago Medicine and Ellen Sundra, VP of Engineering at Forescout, to learn how to protect patients by applying the recommended principles and practices from Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP).
Over the past decade, threats to the health care industry has increased dramatically along with the sophistication of cyber-attacks. As a result, the Healthcare Sector Coordinating Council and the US Department of Health and Human Services collaborated to establish cybersecurity practices that can be used across the healthcare industry. Our guest, Erik Decker, serves as the industry lead on the development of, “Health Industry Cybersecurity Practices (HICP)”, which resulted from insights of the task group and over 150 health IT professionals.
Ellen Sundra leads this discussion to gain insights into actionable steps that health industry IT and HTM security professionals can establish, implement and maintain in their organizations to thwart cyber-attacks before they occur.
What you will learn in this webinar:
- How to reduce risk to the business by implementing solid security practices
- Which are top security practices to consider when facing some of healthcare’s top issues
- How using policy-based controls can simplify processes and protect the organization
Tom Dolan VP, Global Financial Services Forescout & John Kindervag Founder of Zero Trust and CTO Palo Alto Networks
Is Zero Trust really achievable given the complexity in financial service organizations, especially considering limited staff, mergers and acquisitions and compliance pressures?
With Phil Packman, a CISO at BT, as your host, learn from the founder of Zero Trust & Field CTO at Palo Alto Networks, John Kindervag, and the VP of Global Financial Services at Forescout, Tom Dolan, how your company can more easily embrace Zero Trust to proactively combat today’s high frequency and sophistication of cyberattacks.
Join us to learn how to:
- Proactively combat today’s high frequency and sophistication of cyberattacks
- Gain unparalleled situational awareness of malicious activity
- Prevent the exfiltration of sensitive data and money
- Simplify adherence to compliance regulations
IT security teams are inundated with increasing numbers of security and compliance issues reported by security tools that either lack sufficient device context for prioritization or automation capabilities to enforce risk mitigation controls. As a result, highly skilled security teams waste time manually troubleshooting low-impact issues, unable to focus on proactive risk reduction or rapid threat response. Join us to learn how Forescout 8.1 enables organizations to orchestrate actions and automate controls while minimizing business disruption. Topics include:
• Orchestration of segmentation controls across Fortinet®, Palo Alto Networks® and Check Point® firewalls
• Incident response automation with ServiceNow® ITSM and Security Operations
• Automation of controls for network access and device compliance initiatives
As digital transformation continues, organizations are using increasing numbers of smart devices on their networks. They are connecting previously separated IT and OT networks to automate business operations and boost efficiency. This convergence of IT and OT is putting new demands on CIOs and CISOs as they are being tasked with protecting the entire business ecosystem, well beyond enterprise IT systems. Join us to learn how Forescout 8.1 enables organizations to gain complete situational awareness of all devices in their interconnected environment to understand both their cyber and operational risk. Topics include:
• Visibility and continuous monitoring of all layers of the OT network stack
• Auto-classification of medical, industrial, networking and IoT devices
• Multi-cloud and data center visibility into Azure, AWS, VMware and Cisco ACI environments
Thomas Nuth, Sr. Director of Marketing, OT at Forescout
Many organizations reliant on critical infrastructure networks are striving to reduce risk with cybersecurity strategies that bridge both IT and OT asset domains. However, achieving comprehensive IT/OT cybersecurity is often a more challenging task in practice than it is conceptually.
Security professionals interested in effectively executing an integrated IT/OT cybersecurity strategy should join this webinar to learn how they can achieve end-to-end visibility into the full spectrum of both IT and OT network devices, as well as unified business risk management for today’s continuously evolving cyberthreat landscape. During this webinar, we will dive into four foundational elements of a comprehensive IT/OT cybersecurity strategy, including asset visibility, asset management, risk & compliance and investigation & response, with use cases of each.
Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout
The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.
With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?
Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:
•The current threat landscape and unique security challenges healthcare organizations face
•Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
•How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
James John, Systems Engineer, ForeScout Technologies, Inc.
The ForeScout platform helps with 800-171 preparedness by automating and accelerating your path to compliance, reducing overall risk and maintaining and demonstrating ongoing compliance. James John, Senior Systems Engineer with ForeScout has extensive experience implementing and deploying the ForeScout solution in both public and private sector environments. He will demonstrate and share tips and tricks to help you maximize your existing investment to comply with NIST 800-171. The webinar and interactive demo will show you how to:
•Effectively identify Controlled Unclassified Information on your
•Assess devices that store CUI
•Build policies to effectively segment and protect these devices
•Implement these policies and plan for remediation
•Integrate with your existing security solutions
Michael Correa, Senior Engineer, ForeScout Technologies, Inc.
The Department of Defense (DoD) wants increased industry accountability for cybersecurity. In fact, the Department views cybersecurity as foundational to doing business with the DoD. What does that mean for your upcoming contracts? ForeScout Senior Engineer, Michael Correa has worked in the federal space for 25 years. Join us as Michael provides seven quick tips for ramping up on NIST 800-171 compliance. In this webinar you will learn:
• How to effectively identify Controlled Unclassified Information (CUI)
• How to gain quick wins by focusing on the most fundamental controls
of NIST 800-171
• What it takes to solidify your System Security Plan
• Other quick tips for complying
Leo Sheridan, Executive Liaison for Federal and Systems Integrators, ForeScout Technologies, Inc.
Ten months after the mandate to comply with NIST 800-171, many prime contractors and subcontractors admit they underestimated the cost of implementation. The U.S. Deputy Secretary of Defense just announced that the Department of Defense (DoD) would bring even more pressure on DoD contractors to meet higher cybersecurity standards, and that they would hold large contractors responsible for demanding that their subcontractors do the same. The DoD plans to begin launching “red team cyberattacks” on industrial partners, in which a cell would test vulnerabilities and try to penetrate the contractors' systems. Leo Sheridan, executive liaison for federal and systems integrators will discuss:
• How being noncompliant can affect your business revenue next year
• Why it has been challenging to comply with NIST 800-171
• How to quickly assess your level of compliance
• Defining a path to clear up the confusion and focus on the key
elements to a strong System Security Plan (SSP)
Brennen Reynolds, Senior Director Global Alliance Technology, ForeScout Technologies.
What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This webcast will release results from the SANS 2018 Incident Response Survey, developed by Matt Bromiley, SANS Digital Forensics and Incident Response (IR) instructor and GIAC board member. Matt will examine how incident response teams are coping with organizational structures, resources and IR implementation in an ever-changing threat environment.
In this webcast, you will learn how organizations have structured their incident response functions, what systems they are conducting investigations on, the threats they are uncovering and how they're uncovering them. For example:
- What staffing, services and resources are they using, and how are they using them?
- Are they still struggling with a silo mentality between operations and response?
- During an investigation, are they able to get the data they need to fully discover the attack's spread and remediate all traces?
- How automated are these processes of data collection and discovery?
Brennen Reynolds, ForeScout; Piero DePaoli, ServiceNow; Bob Bragdon, CSO Magazine
The key to keeping your business secure is knowing all your assets and their potential security impact. The explosion of IoT, BYOD, guest and connected devices as a whole have expanded attack surfaces and introduced numerous blind spots and vulnerabilities that must be addressed. In this webcast, you will learn how you can reduce risk by streamlining security operations with automated device discovery, real-time asset management, continuous compliance enforcement and accelerated incident response and remediation workflows.
Embedding security into business processes and employee awareness, particularly outside of information security teams, can be especially challenging. Yet security operations is vital to protecting the health, safety and intellectual property of any organization and therefore cannot operate in a silo. Learn how to apply a risk-based approach that leverages continuous visibility of devices and privileged accounts on heterogenous networks to enhance organizational trust and business success.
Julie Cullivan, Chief Information Officer and Senior Vice President, Business Operations, ForeScout
Nir Gertner, Chief Security Strategist, CyberArk
Shawn Rodriguez – RVP, SLED, Chris Dullea – SE Manager, SLED, ForeScout Technologies, Ken Compres, CSO, Hillsborough College
Attendees of this webcast for higher education learned how the ForeScout Platform can identify and secure devices on a campus's network, without agents, and can help ensure that if they are connected, they are compliant and secure.
Tom Dolan, Global Vice President of Sales Financial Services, ForeScout Technologies
Financial services firms are being challenged by three successive waves of challenges that have created the perfect storm for compliance, security and network professionals. In this webinar, Tom Dolan, Vice President of Sales for Financial Services will discuss how fast-changing regulatory requirements, advanced cybercriminals, and increasingly large and complex networks make compliance a top concern of financial services organizations.
Ellen Sundra, VP of Systems Engineering, Americas and Mitch Greenfield, Security Manager at Humana
Grieving over a failed NAC program? It helps to talk about it—especially when you talk to experts. Learn best practices for a successful deployment and ways to get more value—and peace of mind—from someone who’s been through it before.
Ryan Brichant, CTO, OT Security, Wayne Dixon, Dir. OT Tech, ForeScout & Jamison Utter, Head of IoT & OT at Palo Alto Networks
Digital innovations are aggressively being introduced into public utilities and smart city operational technology (OT) infrastructure. This creates expanded attack surfaces that introduce enormous risk across a wide array of threat vectors. Yet, since OT environments were traditionally air-gapped, there has been less emphasis on cyber security.
It is critical to discover and protect all device connections and profiles to defend against threats that can negatively affect business operations, data, and even citizen safety. Security best practices suggest the need to continually assess connected assets and enforce the right policies for controlled access, more granular network segmentation and immediate threat response.
Watch this Carahsoft sponsored webcast to learn from ForeScout and Palo Alto Networks how you can use non-disruptive security techniques that achieve these core security principals while prioritizing uptime of operational networks and the safety of those involved.
Sean Telles | CISSP, CEA Manager, Solutions Architecture & Programs - Americas ForeScout Technologies
As innovation continues, so does the growth of connected devices on your network. Every IoT, BYOD and traditional IT connected device poses risk as a potential cyberattack threat vector. At the root of adaptive security operations is continuously discovering, classifying and assessing both managed and unmanaged devices and users as they gain network access from any entry point across tiers. Optimizing such visibility with rich contextual insight and automatically using that insight to dynamically detect, prioritize and respond to security incidents further accelerates adaptive security operations and reduces overall risk.
Join us for an insightful webcast on how ForeScout and Splunk can help you achieve more adaptive security practices by orchestrating proactive closed loop workflows from discovery to remediation.
This new SANS survey looks closely at the emergence and rapid growth of Industrial IoT (IIoT) systems, including broad-scale connectivity across industry and how well automation, critical control systems, digital/physical infrastructure and accompanying operations are protected against cybersecurity threats.
Attendees will learn how security practitioners are safeguarding systems and assuring greater reliability, operational integrity, efficiency and productivity in these complex systems. Attendees also will learn about perceived threats
Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk