Hi [[ session.user.profile.firstName ]]

SANS Health Care Provider Breaches and Risk Management Roadmap

This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach management, controls and budgets. Attendees will learn about:

- Supporting operational priorities and business drivers (including mobile and cloud computing priorities)
- Reducing risk while supporting new business drivers
- Educating leadership and getting them on your team
- Efficacy of controls, desired improvements and wish lists
- Budgets and best practices
Recorded Jul 27 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sandeep Kumar, Director of Product Marketing, Forescout
Presentation preview: SANS Health Care Provider Breaches and Risk Management Roadmap

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Extend Visibility & Control to Your Private Cloud & Software-Defined Data Center Sep 21 2017 5:00 pm UTC 45 mins
    Sumit Bhat: Senior Product Marketing Manager, ForeScout Technologies
    Private and public cloud security are logical extensions of securing managed, unmanaged and IoT devices in the physical world. ForeScout security solutions help enhance security and compliance of your virtual assets, regardless of where they are located. In addition, ForeScout’s heterogeneous platform lets you to leverage your on-premises security operations team’s skills and maximize your existing security investments. In this webinar, you’ll learn how ForeScout integrates with third-party solutions to:
    • Discover and classify virtual instances (and cloud workloads) and assess their security posture
    • Gain consolidated visibility and provide unified policy management across Data Center and cloud environments
    • Proactively identify and manage underutilized or shadow VMs
    • Allow, deny or segment virtual machines and cloud instances based upon policy compliance

    Learn how you can enforce security across your hybrid campus and cloud deployments using one solution. Join us for this live online webinar.
  • Gaining Compliance with DFARs Aug 24 2017 6:00 pm UTC 75 mins
    Heather Engel, Chief Strategy Officer, Sera-Brynn
    U.S. Defense Contractors and soon all Federal Agencies will be required to meet the DFARS 7012 mandate with critical cybersecurity controls against NIST 800-171. The overwhelming challenges presented by these stringent guidelines are having a major impact on the contracting community which supports our warfighters. These requirements must be implemented by December 31, 2017.
  • Transforming K-12 Cybersecurity Through Visibility Recorded: Aug 1 2017 50 mins
    Dr. Kecia Ray, Exec Director, Center for Digital Education & Erik Floden, K12 Education Strategist, ForeScout Technologies
    As school districts continue to make technology adoption in the classroom a top priority, they face increasing network security risks, including persistent cyberattacks and the potential theft or manipulation of student data. Dr. Kecia Ray, Executive Director of the Center for Digital Education, will address these challenges and discuss how school districts can effectively manage the rapid expansion of the number of devices students, educators and administrators are adding to their IT networks. Webinar topics will include:
    • Cybersecurity and student data security trends in K-12
    • Top K-12 priorities to address these challenges
    • Recent funding and legislative developments at federal and state levels
  • Global Partner Program Recorded: Jun 30 2017 10 mins
    Todd DeBell, VP of Global Channel Sales
    Todd DeBell, ForeScout’s VP of Global Channel Sales, walks you through the details of our new partner program – ForeScout Forward Partner Program. Todd will cover key highlights, what’s new, including incentive rewards, sales and pre-sales technical enablement offerings, marketing development funds, and more. This session is relevant to ForeScout Value Added Resellers across the globe, in which you’ll learn about the commitment we are making to support your business and help drive profitability.
  • Smart Cities, a Hacker's Playground Recorded: Jun 21 2017 31 mins
    Tony Gillespie, US Public Sector Strategist, ForeScout Technologies
    It’s clear that smart technologies and the Internet of Things (IoT) are the future of our communities. Is government ready for billions – soon to be trillions – of sensors and devices connected to one another that will transform our society? This session explores the role of government in using, exploiting, controlling and surviving the hyper-connected world of IoT and how it will affect our communities.
  • RWJBarnabas on Automation and Compliance in the Age of Connected Healthcare Recorded: May 3 2017 49 mins
    Hussein Syed, Chief Information Security Officer & Dominic Hart, Manager Information Security Architecture, RWJBarnabas
    As New Jersey’s largest integrated healthcare delivery system and one of the country’s fastest-growing health organizations, RWJBarnabas Health has dealt with formidable cybersecurity and data privacy challenges, such as:

    •Discovering and securing agentless clinical devices while maintaining availability
    •Supporting compliance with regulatory mandates such as HIPAA and HITECH
    •Merging highly mixed environments due to merger and acquisition activity
    •Securing guest-, vendor-owned and IoT devices through network segmentation

    During this webinar, RWJBarnabas Health’s Hussein Syed, Chief Information Security Officer, and Dominic Hart, Manager Information Security Architecture and Security, will discuss why agentless visibility and control are essential for securing healthcare environments.
  • Maximizing Value of Security Investments Recorded: Apr 11 2017 43 mins
    Sandeep Kumar, Director of Product Marketing, ForeScout Technologies
    Join Sandeep Kumar, Director of Product Marketing at ForeScout Technologies, as he shares insights from a study that IDC conducted by interviewing seven ForeScout customers. The study showed that, on an average, the ForeScout solution discovered 24 percent more devices, and helped bring put 18 percent more devices into compliance with security policies. The study also concluded the ForeScout platform saved $46,000 for every 1,000 devices, had a payback time of just 13 months and achieved a five-year ROI of 392 percent.

    ForeScout achieves this by using its agentless solution that continuously monitors a heterogeneous environment and automates system-wide threat response. Benefits of this approach will magnify even more in a world experiencing exponential growth in diverse systems ranging from traditional endpoints, Bring Your Own Device (BYOD) systems and Internet of Things (IoT) devices.

    With 20 years of experience in IT security and enterprise products, Sandeep Kumar is the director of Product Marketing at ForeScout. In his current role, he is responsible for various aspects of ForeScout's go to market and content strategy. He has previously held senior positions in product marketing, product management and engineering at several IT security companies including Symantec, Recourse and Axent Technologies. Sandeep holds MS and BS degrees in computer science.
  • The SANS 2016 Survey on Security and Risk in the Financial Sector Recorded: Oct 24 2016 61 mins
    Sandeep Kumar is the director of Product Marketing at ForeScout Technologies
    The financial sector is highly regulated, and as a result, often focuses on compliance. However, compliance rarely results in excellence, and thus financial institutions continue to suffer security-related breaches and losses, particularly by insiders according to the 2015 SANS survey on security spending and preparedness in the financial services sector.

    Today's webcast will focus on the relationship between compliance and security, and the best practices organizations can use to secure their financial environments. Specifically, attendees will learn about:

    The relationship between compliance and security
    The effectiveness of tools, skills and controls
    Ways to improve security effectiveness and reduce risk
    How to align security, risk and compliance programs with business goals
  • Learn What You Can Do To Help Avoid Ransomware Breaches Recorded: Oct 13 2016 31 mins
    Liran Chen - Manager, Systems Engineering, ForeScout Technologies
    This webinar will discuss the recent ransomware breaches, malware attacks and potential protection strategies. Learn how ForeScout helps mitigate ransomware and other malware threats within your network environment. In addition, you’ll discover how ForeScout’s security platform helps organizations See, Control and Orchestrate enterprise security—and assist in identifying the potential risk that exists in your environment today.

    We hope you can join us for this timely webcast!
  • Real-Time Vulnerability Assessment for Rapid Response to Security Threats Recorded: Sep 28 2016 40 mins
    Bill Lewis, Dir. of IT, State Garden, Erick Ingleby, PM. Forescout & Jorhn Schimelpfenig, Sr. Business Dev. Manager, Rapid7
    State Garden, a top producer of salad greens in the northeastern U.S., had two serious cybersecurity issues that needed to be addressed:

    1.) Internet of Things (IoT) endpoints on the company’s network were undetectable.
    2.) Vulnerability Assessment (VA) scans were missing mobile Bring Your Own Device (BYOD) systems that come and go from the network.

    Both issues were creating an attack surface that was increasingly harder to monitor and protect.

    Billy Lewis, State Garden Director of IT, will share the challenges he faced to:
    •Maximize efficiency of limited IT security resources and personnel
    •Protect company assets from unauthorized or non-compliant devices connecting to the network
    •Automate endpoint compliance and remediation
    •Orchestrate multisystem security

    In addition, Lewis will explain the role the ForeScout-Rapid7 solution played in reducing the attack surface and accelerating remediation on State Garden’s network.
  • Cybersecurity Awareness Is Just the Beginning Recorded: Sep 27 2016 15 mins
    Jerry Gamblin, Cyber Security Analyst, Len Rosenberg, VP of SE, ForeScout & Ellen Sundra, Director of SE, ForeScout
    In recognition of October’s designation as National Cyber Security Awareness Month—and to take things a critical step further—ForeScout Technologies is hosting the Turning Cybersecurity Awareness into Action webinar.

    Join renowned security specialist Jerry Gamblin, ForeScout VP of Systems Engineering Len Rosenberg, and ForeScout Director of Systems Engineering Ellen Sundra as they discuss the current state of cybersecurity and effective resources and practices for strengthening your defense posture.
  • The Next Step in IT Healthcare- Learn more on Compliance Regulations Recorded: Sep 20 2016 39 mins
    Toni Buhrke, Director, Systems Engineering at ForeScout and Travis Funkhouser, Systems Engineer at ForeScout
    Learn what you can do to remain policy-compliant with today's complex healthcare networks, including clinical devices as well as IoT and BYOD devices. During this informative webinar, ForeScout Technologies Inc.’s network security and healthcare security experts will review the FDA's guidance on securing clinical devices, the “safe harbor” provision regarding breach notification and how CounterACT™ can help with both. Learn how to stay compliant and secure so you can focus on what matters most—providing the best care.
  • Supporting CIS Critical Security Controls with ForeScout Recorded: Sep 7 2016 33 mins
    Darrell Kesti, Account Manager & Dean Kratzer, Senior Product Marketing Manager, ForeScout Technologies
    The Center for Internet Security has defined required controls for effective cyber defense (CIS Critical Security Controls). How do they relate to your security initiatives? Why is endpoint security and control such a major focal point of SANS security? How does the Internet of Things (IoT) impact you cybersecurity strategy?

    Join ForeScout's Darrell Kesti, and Dean Kratzer, ForeScout’s Senior Product Marketing Manager, as they discuss how ForeScout CounterACT® can help you create an effective cyber defense system. Discover how agentless cybersecurity technology and ForeScout’s See, Control and Orchestrate solution can accelerate this process with quick wins in the first 4 steps of this multistep process:

    1. Inventory of authorized and unauthorized devices
    2. Inventory of authorized and unauthorized software
    3. Secure configurations for hardware and software on mobile devices, laptops, workstations and servers
    4. Continuous vulnerability assessment and remediation
  • The Internet of Things Requires a Security Rethink Recorded: Sep 6 2016 44 mins
    Zeus Kerravala, Founder and Principal Analyst at ZK Research
    The IoT Is Making Status Quo Network Security Obsolete

    The number of devices in the Internet of Things (IoT) category is exploding—adding billions of devices to networks every year that lack native security capabilities. Please join us as ZK Research Founder and Principal Analyst Zeus Kerravala discusses the Internet of Things and suggests ways to deal with IoT-related security challenges, including:
    • Why traditional perimeter defenses are no longer relevant and how IoT devices can circumvent conventional firewalls
    • The lack of IT and OT alignment—a major issue given that the IoT connects everything to a common network
    • The role agentless visibility and control play in finding, classifying and securing network-attached IoT devices
  • Place Your Bets on Securing Your Network Against Advanced Threats Recorded: Aug 16 2016 56 mins
    Gary Fisk (Solutions Architect, FireEye), Robert McNutt (Director, Strategic System Engineer, ForeScout)
    According to the latest M-Trends report, 53 percent of network compromises are identified by an external organization rather than the internal IT department. This is especially apparent in the hospitality industry where massive amounts of customer data and credit card information are stored. Now more than ever, it’s critical to understand the security posture of your network and implement comprehensive security solutions that help you rapidly detect, analyze and contain potential threats.

    Join us and learn how a Fortune 500 company Gaming/Hospitality company gained instant visibility of previously unknown devices and deployed policy-based access controls in days. Our special guest customer will comment on the state of threats to hospitality companies and discuss how FireEye Network Threat Prevention Platform (NX Series) and ForeScout CounterACT® work together to provide a holistic approach to risk mitigation and threat management.

    Gain visibility into what and who is on your network—especially un-managed devices. Improve your defenses against advanced threats and create a policy based automated response to potential threats.

    Register today [link] to learn how!
  • An Unvarnished Assessment of ForeScout Visibility Recorded: Aug 4 2016 50 mins
    Robert Smithers, Miercom President and CEO
    When a disruptive technology emerges, it is often met with skepticism. A good case in point is ForeScout CounterACT®. It’s gaining a lot of traction in cybersecurity circles, with more than 2,000 large and medium enterprises and government agencies worldwide using the product as of April 2016. But for those IT professionals who might think its capabilities are too good to be true, ForeScout enlisted Miercom, a leading independent testing and consultancy, to provide unbiased, hands-on testing of CounterACT capabilities. Miercom’s findings are what this webinar is all about.
    Please join us as Miercom President and CEO Rob Smithers talks about his lab’s findings with regard to CounterACT’s:

    • Visibility (discovery, classification and compliance assessment) of network-connected corporate, BYOD, guest and IoT endpoints without use of agents or previous device knowledge
    • Detection and full classification of hundreds of endpoints in seconds
    • Policy-based control of devices by enabling IT staff to grant the appropriate level of network access to people, applications and devices
    • Ability to integrate with leading network infrastructure and endpoint protection technologies
  • SANS Health Care Provider Breaches and Risk Management Roadmap Recorded: Jul 27 2016 62 mins
    Sandeep Kumar, Director of Product Marketing, Forescout
    This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach management, controls and budgets. Attendees will learn about:

    - Supporting operational priorities and business drivers (including mobile and cloud computing priorities)
    - Reducing risk while supporting new business drivers
    - Educating leadership and getting them on your team
    - Efficacy of controls, desired improvements and wish lists
    - Budgets and best practices
  • Bringing Shadow Devices into the Light Recorded: Jul 19 2016 48 mins
    Mike Rothman, Securosis Analyst and President
    Shadow Devices and Cybersecurity

    Along with the burgeoning Internet of Things comes a new reality: billions of invisible devices connected to private networks. These “shadow devices” enlarge your attack surface and, if left in the dark, expose your organization to malware propagation and theft of critical resources.

    In this webinar, Mr. Rothman defines the classes of shadow devices—everything from sensors to medical devices to industrial control systems—and discusses how to gain visibility and control of these potentially dangerous endpoints. In addition, he’ll talk about next-generation access control and the strategies and technologies that reveal shadow devices through:

    • Visibility and risk profiling
    • Controls to protect vulnerable agentless devices
    • Automation and integration of existing security technologies


    Mike Rothman, Analyst & President, Securosis, Inc. started his career as a programmer and a networking consultant. Today, he specializes in protecting networks and endpoints, security management, and compliance, or what he calls “the sexy aspects of security.” Mike is one of the most sought-after speakers and commentators in the security field and, after 20 years in the business, he’s one of the guys who “knows where the bodies are buried.”
  • The Internet of Things Isn’t Coming, It’s Here. Recorded: Jul 12 2016 42 mins
    Steven Taylor, Editor-in-Chief of Webtorials
    Learn what your peers think about the state of IoT security.

    Webtorials surveyed IT professionals worldwide who are responsible for enterprise communications networks regarding their view about the prevalence and security of the Internet of Things (IoT). The study was sponsored by ForeScout Technologies, a world leader in visibility, control and orchestration solutions for cybersecurity.

    Here are just a few findings:

    • Only 30 percent are confident they really know what “things” are on their networks
    • Respondents who initially thought they had no IoT devices on their networks realized they had eight IoT device types, on average (when asked to choose from a list of devices)
    • Only 44 percent of respondents had a known security policy for IoT
    • 86 percent of respondents think it is important to discover and classify devices without using an agent


    Steven Taylor, Editor-in-Chief of Webtorials

    With over thirty years' experience as President and Principal Analyst at Distributed Networking Associates, Inc. Steven Taylor has spent his career as an analyst, journalist, teacher, and evangelist for emerging technologies. This experience allows him to temper the often starry-eyed prognostications about the "Next Big Thing" with a heavy dose of realism and déjà vu. Over a decade ago, Taylor founded the Webtorials project where he pioneered the use of the Internet to supplement (and replace) traditional technology trade publications and training.
  • The Value of Intelligent Cybersecurity Technologies for Smart Cities Recorded: Jul 7 2016 38 mins
    Raul Documet, Public Sector Systems Engineer at ForeScout Technologies Inc.
    Smart Cities Value Intelligent Cybersecurity

    The vision of smart cities is bright—automating critical public services, improving community interactions and achieving untold levels of efficiency in a connected, technology-driven society. But along with all of this boundless potential comes risk.

    In this webinar, Mr. Documet discusses the cybersecurity challenges all smart cities will face. In addition, he’ll address the role ForeScout Technologies is playing today in helping municipalities around the globe to:

    • Protect sensitive systems and data
    • Securely embrace IoT and smart utility innovations
    • Ensure interoperability with current and future systems
    • Maintain resiliency and availability for critical public services
    • Comply with regulatory mandates

    Register now!


    Raul Documet is a Public Sector Systems Engineer with over 12 years of experience in IT Security. Raul’s areas of expertise range from IT Auditing and Outsourcing Security to Cloud and Datacenter planning and deployment.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: SANS Health Care Provider Breaches and Risk Management Roadmap
  • Live at: Jul 27 2016 3:45 pm
  • Presented by: Sandeep Kumar, Director of Product Marketing, Forescout
  • From:
Your email has been sent.
or close