Hi [[ session.user.profile.firstName ]]

Real-Time Vulnerability Assessment for Rapid Response to Security Threats

State Garden, a top producer of salad greens in the northeastern U.S., had two serious cybersecurity issues that needed to be addressed:

1.) Internet of Things (IoT) endpoints on the company’s network were undetectable.
2.) Vulnerability Assessment (VA) scans were missing mobile Bring Your Own Device (BYOD) systems that come and go from the network.

Both issues were creating an attack surface that was increasingly harder to monitor and protect.

Billy Lewis, State Garden Director of IT, will share the challenges he faced to:
•Maximize efficiency of limited IT security resources and personnel
•Protect company assets from unauthorized or non-compliant devices connecting to the network
•Automate endpoint compliance and remediation
•Orchestrate multisystem security

In addition, Lewis will explain the role the ForeScout-Rapid7 solution played in reducing the attack surface and accelerating remediation on State Garden’s network.
Recorded Sep 28 2016 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bill Lewis, Dir. of IT, State Garden, Erick Ingleby, PM. Forescout & Jorhn Schimelpfenig, Sr. Business Dev. Manager, Rapid7
Presentation preview: Real-Time Vulnerability Assessment for Rapid Response to Security Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense Recorded: Dec 11 2018 61 mins
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    •The current threat landscape and unique security challenges healthcare organizations face
    •Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    •How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • Implementing NIST 800-171 with ForeScout Recorded: Dec 6 2018 42 mins
    James John, Systems Engineer, ForeScout Technologies, Inc.
    The ForeScout platform helps with 800-171 preparedness by automating and accelerating your path to compliance, reducing overall risk and maintaining and demonstrating ongoing compliance. James John, Senior Systems Engineer with ForeScout has extensive experience implementing and deploying the ForeScout solution in both public and private sector environments. He will demonstrate and share tips and tricks to help you maximize your existing investment to comply with NIST 800-171. The webinar and interactive demo will show you how to:
    •Effectively identify Controlled Unclassified Information on your
    •Assess devices that store CUI
    •Build policies to effectively segment and protect these devices
    •Implement these policies and plan for remediation
    •Integrate with your existing security solutions
  • Save your contracts! Understand and comply with DFARS & NIST 800-171 Recorded: Nov 29 2018 19 mins
    Michael Correa, Senior Engineer, ForeScout Technologies, Inc.
    The Department of Defense (DoD) wants increased industry accountability for cybersecurity. In fact, the Department views cybersecurity as foundational to doing business with the DoD. What does that mean for your upcoming contracts? ForeScout Senior Engineer, Michael Correa has worked in the federal space for 25 years. Join us as Michael provides seven quick tips for ramping up on NIST 800-171 compliance. In this webinar you will learn:

    • How to effectively identify Controlled Unclassified Information (CUI)
    • How to gain quick wins by focusing on the most fundamental controls
    of NIST 800-171
    • What it takes to solidify your System Security Plan
    • Other quick tips for complying
  • It’s November. How compliant are you with NIST 800-171? Recorded: Nov 15 2018 39 mins
    Leo Sheridan, Executive Liaison for Federal and Systems Integrators, ForeScout Technologies, Inc.
    Ten months after the mandate to comply with NIST 800-171, many prime contractors and subcontractors admit they underestimated the cost of implementation. The U.S. Deputy Secretary of Defense just announced that the Department of Defense (DoD) would bring even more pressure on DoD contractors to meet higher cybersecurity standards, and that they would hold large contractors responsible for demanding that their subcontractors do the same. The DoD plans to begin launching “red team cyberattacks” on industrial partners, in which a cell would test vulnerabilities and try to penetrate the contractors' systems. Leo Sheridan, executive liaison for federal and systems integrators will discuss:

    • How being noncompliant can affect your business revenue next year

    • Why it has been challenging to comply with NIST 800-171

    • How to quickly assess your level of compliance

    • Defining a path to clear up the confusion and focus on the key
    elements to a strong System Security Plan (SSP)
  • How Are You Responding to Threats? SANS 2018 Incident Response Survey Recorded: Nov 5 2018 61 mins
    Brennen Reynolds, Senior Director Global Alliance Technology, ForeScout Technologies.
    What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This webcast will release results from the SANS 2018 Incident Response Survey, developed by Matt Bromiley, SANS Digital Forensics and Incident Response (IR) instructor and GIAC board member. Matt will examine how incident response teams are coping with organizational structures, resources and IR implementation in an ever-changing threat environment.

    In this webcast, you will learn how organizations have structured their incident response functions, what systems they are conducting investigations on, the threats they are uncovering and how they're uncovering them. For example:

    - What staffing, services and resources are they using, and how are they using them?
    - Are they still struggling with a silo mentality between operations and response?
    - During an investigation, are they able to get the data they need to fully discover the attack's spread and remediate all traces?
    - How automated are these processes of data collection and discovery?
  • Fostering Security Innovation with Optimized Asset Insight & Incident Response Recorded: Oct 11 2018 51 mins
    Brennen Reynolds, ForeScout; Piero DePaoli, ServiceNow; Bob Bragdon, CSO Magazine
    The key to keeping your business secure is knowing all your assets and their potential security impact. The explosion of IoT, BYOD, guest and connected devices as a whole have expanded attack surfaces and introduced numerous blind spots and vulnerabilities that must be addressed. In this webcast, you will learn how you can reduce risk by streamlining security operations with automated device discovery, real-time asset management, continuous compliance enforcement and accelerated incident response and remediation workflows.
  • CIO Insights: Bridging Security Gaps with a Risk-based Approach Recorded: Sep 20 2018 49 mins
    Julie Cullivan, CIO & Sr. VP Business Ops, ForeScout; Nir Gertner, Chief Security Strategist, CyberArk
    Embedding security into business processes and employee awareness, particularly outside of information security teams, can be especially challenging. Yet security operations is vital to protecting the health, safety and intellectual property of any organization and therefore cannot operate in a silo. Learn how to apply a risk-based approach that leverages continuous visibility of devices and privileged accounts on heterogenous networks to enhance organizational trust and business success.

    Julie Cullivan, Chief Information Officer and Senior Vice President, Business Operations, ForeScout
    Nir Gertner, Chief Security Strategist, CyberArk
  • Visibility Platform for the Connected Campus Recorded: Aug 14 2018 58 mins
    Shawn Rodriguez – RVP, SLED, Chris Dullea – SE Manager, SLED, ForeScout Technologies, Ken Compres, CSO, Hillsborough College
    Attendees of this webcast for higher education learned how the ForeScout Platform can identify and secure devices on a campus's network, without agents, and can help ensure that if they are connected, they are compliant and secure.
  • Compliance in Financial Services: Cloudy, With the Certainty of Change Recorded: Aug 14 2018 16 mins
    Tom Dolan, Global Vice President of Sales Financial Services, ForeScout Technologies
    Financial services firms are being challenged by three successive waves of challenges that have created the perfect storm for compliance, security and network professionals. In this webinar, Tom Dolan, Vice President of Sales for Financial Services will discuss how fast-changing regulatory requirements, advanced cybercriminals, and increasingly large and complex networks make compliance a top concern of financial services organizations.
  • Avoiding the Five Stages of Grief when Building a Successful NAC Program Recorded: Aug 2 2018 24 mins
    Ellen Sundra, VP of Systems Engineering, Americas and Mitch Greenfield, Security Manager at Humana
    Grieving over a failed NAC program? It helps to talk about it—especially when you talk to experts. Learn best practices for a successful deployment and ways to get more value—and peace of mind—from someone who’s been through it before.
  • Secure Digital Innovation of Critical Infrastructure w/o Affecting Reliability Recorded: Jul 30 2018 49 mins
    Ryan Brichant, CTO, OT Security, Wayne Dixon, Dir. OT Tech, ForeScout & Jamison Utter, Head of IoT & OT at Palo Alto Networks
    Digital innovations are aggressively being introduced into public utilities and smart city operational technology (OT) infrastructure. This creates expanded attack surfaces that introduce enormous risk across a wide array of threat vectors. Yet, since OT environments were traditionally air-gapped, there has been less emphasis on cyber security.
    It is critical to discover and protect all device connections and profiles to defend against threats that can negatively affect business operations, data, and even citizen safety. Security best practices suggest the need to continually assess connected assets and enforce the right policies for controlled access, more granular network segmentation and immediate threat response.

    Watch this Carahsoft sponsored webcast to learn from ForeScout and Palo Alto Networks how you can use non-disruptive security techniques that achieve these core security principals while prioritizing uptime of operational networks and the safety of those involved.
  • At the Root of Adaptability is True Network Visibility Recorded: Jul 30 2018 37 mins
    Sean Telles | CISSP, CEA Manager, Solutions Architecture & Programs - Americas ForeScout Technologies
    As innovation continues, so does the growth of connected devices on your network. Every IoT, BYOD and traditional IT connected device poses risk as a potential cyberattack threat vector. At the root of adaptive security operations is continuously discovering, classifying and assessing both managed and unmanaged devices and users as they gain network access from any entry point across tiers. Optimizing such visibility with rich contextual insight and automatically using that insight to dynamically detect, prioritize and respond to security incidents further accelerates adaptive security operations and reduces overall risk.

    Join us for an insightful webcast on how ForeScout and Splunk can help you achieve more adaptive security practices by orchestrating proactive closed loop workflows from discovery to remediation.
  • The 2018 SANS Industrial IoT Security Survey - Shaping IIoT Security Concerns Recorded: Jul 25 2018 68 mins
    Wayne Dixon, Director of OT Technology Management
    This new SANS survey looks closely at the emergence and rapid growth of Industrial IoT (IIoT) systems, including broad-scale connectivity across industry and how well automation, critical control systems, digital/physical infrastructure and accompanying operations are protected against cybersecurity threats.

    Attendees will learn how security practitioners are safeguarding systems and assuring greater reliability, operational integrity, efficiency and productivity in these complex systems. Attendees also will learn about perceived threats
  • Preparing for Tomorrow’s Threats Across the Expanded Enterprise Recorded: Jun 20 2018 40 mins
    Dave DeWalt, Former CEO, FireEye & McAfee; Rob McNutt, VP Emerg. Tech., ForeScout; Stu Solomon, Chief Tech. & Strategy, Optiv
    Cyber leaders have a massive visibility problem that is only growing as the number of corporate unmanaged IP-connected devices continues to explode. Organizations are discovering up to 60 percent more devices on their network than previously known – amidst this rapid growth, where should CISOs and CIOs focus to increase their visibility, while at the same time manage and maintain security hygiene and compliance? Add to this, the expanded attack surface represented by non-traditional IoT and OT devices as entry points into the enterprise, and the challenge to prepare against threat actors seems overwhelming.

    In a rare opportunity to hear from an industry leader, join Dave DeWalt, former CEO of FireEye and McAfee, along with Rob McNutt, Vice President of Emerging Technologies at ForeScout, and Stuart Solomon, Chief Technology & Strategy Officer at Optiv, as they share insights and lessons on how today’s cyber leaders should be preparing for tomorrow’s expanded threats.

    Join this webinar to learn:
    - Where CISOs and CIOs should focus their resources to improve visibility
    - How device visibility can enable security hygiene and compliance
    - How organizations can shrink the attack surface created by IoT and OT
  • Endpoint Detection and Response: SANS 2018 Endpoint Security Survey Recorded: Jun 19 2018 61 mins
    Sandeep Kumar, Senior Director of Product Marketing at ForeScout
    In this new 2018 endpoint survey, publishing in association with the SANS DFIR Summit, SANS revisits threats, protections and response capabilities impacting endpoints. Results are presented in a two-part webcast series. The whitepaper and webcast developed from this survey are intended to promote better endpoint hygiene and provide valuable thought leadership to the community.

    In this second installment of the 2018 endpoint survey results webcast, we uncover:

    - How organizations are monitoring their endpoints and networks to detect threats to their endpoints
    - The value of utilizing services vs on premises endpoint monitoring
    - Average time to detect and average time to fully remediate
    - Best practices to integrate remediation workflow
    - Enablers and barriers to improving endpoint protection and response capabilities
  • IoT Risk and Posture Assessment Recorded: May 29 2018 43 mins
    Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.
    IoT devices being deployed by the thousands, they often lack IT oversight and basic security best practices such as strong credentials. A recent industry analysis notes that 81 percent of breaches involve the misuse of stolen, weak or default credentials. Botnets such as Mirai take advantage of weak IoT credentials and harvest millions of IoT devices to cause service disruptions. Hence, IoT assessment is the next logical step after IoT classification for managing risk and reducing your attack surface.
    Join us to learn how the ForeScout platform helps organizations assess IoT devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including functionality that lets you:
    • Identify IoT devices with factory default and weak credentials
    • Create your custom IoT credential assessment library or leverage the ForeScout-provided credential library
    • Create policies to automate assessment and initiate mitigation actions (alert, limit, block and segment)
  • Post Ransomware Crisis -Tips, Tricks, & Lessons Learned to Stay Protected Recorded: May 18 2018 33 mins
    Shawn Taylor, Sr. Systems Engineer ForeScout Technologies, Inc.
    Today, Ransomware attacks are more destructive than ever before. No organization, too large or small is safe from a potential attack. Watch this webinar to hear from our security solution expert, Senior Systems Engineer, Shawn Taylor to discuss recent ransomware breaches, the impact of those breaches, and steps you can take to better protect your organization from falling victim. In addition, you’ll discover how ForeScout’s security platform provides visibility into what’s on your network in order to and assist in identifying the potential risk that exists in your environment today.
  • Raising the Bar on Device Classification Recorded: May 15 2018 46 mins
    Mitesh Shah, Sr. Technical Marketing & Kevin Mayer, Product Management ForeScout Technologies, Inc.
    The device landscape on enterprise networks has evolved from a static set of laptops, workstations and servers to a diverse mix of mobile, BYOD, IoT and OT devices, as well as virtual machines. Many of these devices are transient and come and go with increasing frequency. Without continuous visibility and classification of connected devices, it’s impossible to establish an accurate device inventory or an in-depth understanding of device risk profiles. This visibility gap is being targeted by bad actors to gain a foothold on the network and access sensitive information or cause business disruption.

    Join us to learn how the ForeScout platform helps organizations classify devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including:

    • Real-time, granular auto-classification of enterprise devices without relying on agents
    • Device profile updates from ForeScout Device Cloud, a crowd-sourced repository of IoT device insight from more than 500 real-world customer environments
    • Extending built-in classification capabilities to create your own custom classification policies
  • Continually Reducing Risk Despite Constant Changes Recorded: Apr 30 2018 30 mins
    Julie Cullivan CIO, ForeScout Technologies, Inc.
    IoT is forcing security leaders to re-assess how they secure their networks. Each new device that comes online represents another attack vector for enterprises and it only takes one device to compromise an entire network and disrupt business operations, which can impact the bottom line.

    Recent Forrester research commissioned by ForeScout has unveiled some hidden technical and organisational challenges IT professionals should be aware of when managing IoT devices on their networks. The survey results demonstrate a dynamic shift in the way organisations are starting to think about security and risk as it relates to IoT.

    This session will highlight some key findings from this research and outline what organisations can do to better defend IoT-enabled systems from cyberattacks.
  • Visibility for the Extended Enterprise Recorded: Apr 25 2018 39 mins
    Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.
    How do you manage the explosive growth and diversity of devices connecting to your network? How do you handle those devices when the vast majority are IoT devices and operational technologies (OT), most of which cannot be managed via traditional agent-based security systems? Accurate device visibility is paramount for solving security use cases such as network access control, device compliance, asset management, network segmentation and incident response.

    Join us to learn how the ForeScout platform solves the device visibility problem across the extended enterprise. Get insight into the new capabilities of CounterACT 8, including:
    • Passive-only discovery and profiling in sensitive OT and industrial network zones without requiring agents
    • Support for cloud-based network management systems
    • A customizable web dashboard for device intelligence across campus, data center, cloud and OT networks

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Real-Time Vulnerability Assessment for Rapid Response to Security Threats
  • Live at: Sep 28 2016 6:00 pm
  • Presented by: Bill Lewis, Dir. of IT, State Garden, Erick Ingleby, PM. Forescout & Jorhn Schimelpfenig, Sr. Business Dev. Manager, Rapid7
  • From:
Your email has been sent.
or close