Hi [[ session.user.profile.firstName ]]

Smart Cities, a Hacker's Playground

It’s clear that smart technologies and the Internet of Things (IoT) are the future of our communities. Is government ready for billions – soon to be trillions – of sensors and devices connected to one another that will transform our society? This session explores the role of government in using, exploiting, controlling and surviving the hyper-connected world of IoT and how it will affect our communities.
Recorded Jun 21 2017 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Gillespie, US Public Sector Strategist, ForeScout Technologies
Presentation preview: Smart Cities, a Hacker's Playground

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • IoT Risk and Posture Assessment May 29 2018 4:00 pm UTC 45 mins
    Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.
    IoT devices being deployed by the thousands, they often lack IT oversight and basic security best practices such as strong credentials. A recent industry analysis notes that 81 percent of breaches involve the misuse of stolen, weak or default credentials. Botnets such as Mirai take advantage of weak IoT credentials and harvest millions of IoT devices to cause service disruptions. Hence, IoT assessment is the next logical step after IoT classification for managing risk and reducing your attack surface.
    Join us to learn how the ForeScout platform helps organizations assess IoT devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including functionality that lets you:
    • Identify IoT devices with factory default and weak credentials
    • Create your custom IoT credential assessment library or leverage the ForeScout-provided credential library
    • Create policies to automate assessment and initiate mitigation actions (alert, limit, block and segment)
  • Raising the Bar on Device Classification May 15 2018 5:00 pm UTC 45 mins
    Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.
    The device landscape on enterprise networks has evolved from a static set of laptops, workstations and servers to a diverse mix of mobile, BYOD, IoT and OT devices, as well as virtual machines. Many of these devices are transient and come and go with increasing frequency. Without continuous visibility and classification of connected devices, it’s impossible to establish an accurate device inventory or an in-depth understanding of device risk profiles. This visibility gap is being targeted by bad actors to gain a foothold on the network and access sensitive information or cause business disruption.

    Join us to learn how the ForeScout platform helps organizations classify devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including:

    • Real-time, granular auto-classification of enterprise devices without relying on agents
    • Device profile updates from ForeScout Device Cloud, a crowd-sourced repository of IoT device insight from more than 500 real-world customer environments
    • Extending built-in classification capabilities to create your own custom classification policies
  • Visibility for the Extended Enterprise Apr 25 2018 4:00 pm UTC 45 mins
    Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.
    How do you manage the explosive growth and diversity of devices connecting to your network? How do you handle those devices when the vast majority are IoT devices and operational technologies (OT), most of which cannot be managed via traditional agent-based security systems? Accurate device visibility is paramount for solving security use cases such as network access control, device compliance, asset management, network segmentation and incident response.

    Join us to learn how the ForeScout platform solves the device visibility problem across the extended enterprise. Get insight into the new capabilities of CounterACT 8, including:
    • Passive-only discovery and profiling in sensitive OT and industrial network zones without requiring agents
    • Support for cloud-based network management systems
    • A customizable web dashboard for device intelligence across campus, data center, cloud and OT networks
  • ForeScout's approach to becoming GDPR-compliant Recorded: Mar 22 2018 43 mins
    Tony Miller, Sr. Director of Legal Affairs & Jannine Mahone, Sr. Solutions Marketing Compliance, ForeScout Technologies Inc.
    More than 92 percent of multinational companies are focused on GDPR as a top priority1. ForeScout Technologies is one of them. Tony Miller, Sr. Director of Legal Affairs at ForeScout shares lessons learned in ForeScout's quest to assure data privacy and become GDPR compliant. This informal event will be in the form of questions and answers.
  • Crucial Components of your SWIFT Customer Security Programme (CSP) Compliance Recorded: Mar 21 2018 29 mins
    Matt Buller, CTO Financial Services, ForeScout & Adam Kohler, Sr. Engineer, ForeScout
    In the wake of the high-profile, multi-million-dollar breaches using their infrastructure, SWIFT created the Customer Security Programme (CSP) to ensure their customers meet the required levels of security and compliance. Learn how ForeScout plays a crucial role in helping ensure SWIFT CSP compliance from ForeScout experts Matt Buller and Adam Kohler.
  • The Good, the Bad, & the Downright Dangerous: IoT & Healthcare Recorded: Mar 6 2018 22 mins
    Vice President of Americas, Systems Engineering, Forescout Technologies, Inc.
    Organizations are struggling to wrap programs to increase the base level security on all devices, then Automate more process, and share more information with internal and external customers. This demands a fresh look at how operations teams works together including: share information better, improve patient care, streamline auditing all devices, and apply policy while still stretching the IT budget. The medical industry is at the precipice of the IoT and corporate networks.
  • Reduce Risk with Privileged Account Security & Continuous Visibility Recorded: Feb 7 2018 44 mins
    Aytug Celikbas, Sales Engineer, CyberArk & Jim Higginbottom, Director Global Alliances, ForeScout
    With the threat landscape expanding every second, protecting the “keys to the kingdom” is vital to securing your business and its assets. Unsecured privileged accounts affords cyber criminals access to your highest value assets and data. Join your host, Conexsys Communications, to learn how CyberArk and ForeScout address this issue by reducing the attack surface. ForeScout scans the network in real time and automates policy-driven access control based on device security posture and behavior without using an agent. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets.
  • Preventing Cyberattacks via Dynamic Network Segmentation Recorded: Oct 16 2017 49 mins
    Ward Holloway, ForeScout Technologies & Chris Ebley, Managing Partner, BAI & Lee Space, Palo Alto Networks
    In today’s era of ‘Bring your own device’ (BYOD) mobility and ‘Internet of Things’ (IoT) devices proliferating networks as unknown or unmanaged connections, the cyberattack surface for most any organization continues to grow at an alarming rate. No longer can organizations rely on guarding their perimeter and trusting they know everyone and everything that is accessing their network. Proactive threat prevention in today’s BYOD and IoT era requires continuous network access visibility and intelligence as well as being able to automatically apply context-aware security policies such as segmenting devices and users without having to re-build networks or knowing the devices upfront.
    Webinar topics include:
    - Network security trends and challenges, including the more destructive ransomware, cryptoransomware, wipers, etc.
    - Risk prevention architecture considerations
    - Best practices based on real world experiences

    BAI will share some of its key learnings based on extensive experience implementing successful solutions that target attacks while creating more highly available, responsive, and automated networks. BAI is a team of Security Architects who have provided Automated Detection, Prevention, and Orchestration to protect Government Agencies, Higher Education and Fortune 1000 commercial accounts.
  • Securing Smart Transportation to Protect Your Community Recorded: Oct 2 2017 43 mins
    Ryan Brichant, VP & CTO of Cyber Security, ForeScout & Ashok Sankar, Director of Public Sector Solutions & Strategy, Splunk
    The US Department of Homeland Security has identified transportation as one of three top sectors in creating a Smart City. The Department also addressed the fact that the same technologies driving this digital transformation - smart sensors, fare collection systems, power relays, HVAC, cameras, and other unmanaged IoT devices – are also expanding the cyber attack surface and pose significant security risks to both citizens and critical assets. The challenge before transportation administrators, state and local officials and security and IT experts is how to enable these beneficial systems while also ensuring optimum security protections.

    Join us for this insightful webinar on the state of Smart Transportation initiatives and how you can gain the visibility and control you need to drive both Smart AND Secure Transportation to benefit your community.

    Webinar topics include:
    - The risks and challenges of new technologies and IoT inherent with Smart Transportation
    - How real-time end-to-end visibility can offer critical situational awareness needed to reduce and manage risks
    - Real world experiences
  • Gain Real-Time Vulnerability Assessment for Rapid Response to Security Threats Recorded: Sep 25 2017 50 mins
    John Chirhart, Federal Technical Director, Tenable & Ellen Sundra, RVP of Systems Engineering PubSec, ForeScout Technologies
    Whether you’re an information security, compliance or IT executive, your job is harder than it’s ever been before. Regardless of your organization’s size or industry, there is a lack of immunity against the increasingly advanced threat environment.

    The number of data breaches reported today is growing at a rapid pace – as are the associated costs. At the same time, regulatory mandates continue to evolve. Yet, even with most organizations spending significant money on people and technology, the bad guys keep getting through.

    Join industry experts John Chirhart, Tenable and Ellen Sundra, ForeScout, on June 14 and discover how to:

    - Reduce security risk through faster, automated vulnerability scans of newly introduced systems on your network
    - Improve efficiency by focusing vulnerability scans on newly detected systems and on systems that have changed since the last scan
    - Increase ability to identify and eliminate vulnerable systems in hard to reach or unknown areas within your network
    - Orchestrate multi-system security
  • Extend Visibility & Control to Your Private Cloud & Software-Defined Data Center Recorded: Sep 21 2017 20 mins
    Sumit Bhat: Senior Product Marketing Manager, ForeScout Technologies
    Private and public cloud security are logical extensions of securing managed, unmanaged and IoT devices in the physical world. ForeScout security solutions help enhance security and compliance of your virtual assets, regardless of where they are located. In addition, ForeScout’s heterogeneous platform lets you to leverage your on-premises security operations team’s skills and maximize your existing security investments. In this webinar, you’ll learn how ForeScout integrates with third-party solutions to:
    • Discover and classify virtual instances (and cloud workloads) and assess their security posture
    • Gain consolidated visibility and provide unified policy management across Data Center and cloud environments
    • Proactively identify and manage underutilized or shadow VMs
    • Allow, deny or segment virtual machines and cloud instances based upon policy compliance

    Learn how you can enforce security across your hybrid campus and cloud deployments using one solution. Join us for this live online webinar.
  • Staying Secure in the Era of Smart Things Recorded: Sep 14 2017 62 mins
    Shawn Taylor, PubSec SE, ForeScout, John MacMichael, CISO, DC Gov, Geoff Brown, CISO, City of NY
    As the world grows more interconnected by the day, security practitioners need to see beyond the network. The Internet of Things is presenting organizations with a threat landscape they’ve never seen before. We’ve entered an uber-connected world of sensors, cameras and other various data collection systems...making their jobs harder than ever before.

    Find out how City and Municipality organizations are learning to become flexible and nimble as they harness the future, all while maintaining the security needed to protect the data deluge from billions of sensors and devices.

    In this webinar, you will learn:

    - How you can easily gain visibility to all of the devices connecting to your network
    - Increase the security posture of your organization by enforcing policies around compliance without the use of agents
    - How to operationalize your organization so your security is dynamic and adaptable to change
  • Extending Agentless Visibility and Control Across Campus, Data Center and Cloud Recorded: Sep 11 2017 44 mins
    Sandeep Kumar, Director of Product Marketing, ForeScout Technologies
    To support the exponential growth of IoT, operational technology (OT) and virtualization on enterprise networks, ForeScout has new product features and technology partnerships to help keep the evolving enterprise infrastructure secure.

    Join Sandeep Kumar, ForeScout’s Director of Product Marketing, as he provides an in-depth update on ForeScout’s latest product advancements and how customers can benefit:

    - Advanced out-of-the box device classification with new taxonomy for IoT and OT devices
    - Enterprise scale and resiliency to manage over one million devices per deployment with new failover capability
    - Enhanced user interface for consolidated visibility, policy management and controls across heterogeneous infrastructures
    - Expanded collaboration with VMware and AWS to extend visibility and control across software-defined data centers and public cloud
  • Using Agentless Visibility to Simplify Network Segmentation Recorded: Aug 30 2017 18 mins
    Eric Nelson, Manager, Systems Engineering, ForeScout Technologies
    Network segmentation projects are on everyone’s radar for 2017 since outside-in perimeter security technologies such as firewalls, intrusion prevention systems and advance threat protection systems are unable to prevent some of the recent notable cyberattacks. Once threats are inside a flat network, they can roam and spread freely. Segmentation is a best practice to contain these threats and protect network resources. This 40-minute seminar will share the key areas for effective network segmentation, including:
    • Using agentless visibility and granular device classification to define profiles, roles and zones
    • Leveraging existing infrastructure investments to segment today’s flat networks
    •  Automating and maintaining network segmentation hygiene with ForeScout CounterACT®
  • Gaining Compliance with DFARs Recorded: Aug 24 2017 49 mins
    Heather Engel, Chief Strategy Officer, Sera-Brynn
    U.S. Defense Contractors and soon all Federal Agencies will be required to meet the DFARS 7012 mandate with critical cybersecurity controls against NIST 800-171. The overwhelming challenges presented by these stringent guidelines are having a major impact on the contracting community which supports our warfighters. These requirements must be implemented by December 31, 2017.
  • Transforming K-12 Cybersecurity Through Visibility Recorded: Aug 1 2017 50 mins
    Dr. Kecia Ray, Exec Director, Center for Digital Education & Erik Floden, K12 Education Strategist, ForeScout Technologies
    As school districts continue to make technology adoption in the classroom a top priority, they face increasing network security risks, including persistent cyberattacks and the potential theft or manipulation of student data. Dr. Kecia Ray, Executive Director of the Center for Digital Education, will address these challenges and discuss how school districts can effectively manage the rapid expansion of the number of devices students, educators and administrators are adding to their IT networks. Webinar topics will include:
    • Cybersecurity and student data security trends in K-12
    • Top K-12 priorities to address these challenges
    • Recent funding and legislative developments at federal and state levels
  • Global Partner Program Recorded: Jun 30 2017 10 mins
    Todd DeBell, VP of Global Channel Sales
    Todd DeBell, ForeScout’s VP of Global Channel Sales, walks you through the details of our new partner program – ForeScout Forward Partner Program. Todd will cover key highlights, what’s new, including incentive rewards, sales and pre-sales technical enablement offerings, marketing development funds, and more. This session is relevant to ForeScout Value Added Resellers across the globe, in which you’ll learn about the commitment we are making to support your business and help drive profitability.
  • Smart Cities, a Hacker's Playground Recorded: Jun 21 2017 31 mins
    Tony Gillespie, US Public Sector Strategist, ForeScout Technologies
    It’s clear that smart technologies and the Internet of Things (IoT) are the future of our communities. Is government ready for billions – soon to be trillions – of sensors and devices connected to one another that will transform our society? This session explores the role of government in using, exploiting, controlling and surviving the hyper-connected world of IoT and how it will affect our communities.
  • RWJBarnabas on Automation and Compliance in the Age of Connected Healthcare Recorded: May 3 2017 49 mins
    Hussein Syed, Chief Information Security Officer & Dominic Hart, Manager Information Security Architecture, RWJBarnabas
    As New Jersey’s largest integrated healthcare delivery system and one of the country’s fastest-growing health organizations, RWJBarnabas Health has dealt with formidable cybersecurity and data privacy challenges, such as:

    •Discovering and securing agentless clinical devices while maintaining availability
    •Supporting compliance with regulatory mandates such as HIPAA and HITECH
    •Merging highly mixed environments due to merger and acquisition activity
    •Securing guest-, vendor-owned and IoT devices through network segmentation

    During this webinar, RWJBarnabas Health’s Hussein Syed, Chief Information Security Officer, and Dominic Hart, Manager Information Security Architecture and Security, will discuss why agentless visibility and control are essential for securing healthcare environments.
  • Maximizing Value of Security Investments Recorded: Apr 11 2017 43 mins
    Sandeep Kumar, Director of Product Marketing, ForeScout Technologies
    Join Sandeep Kumar, Director of Product Marketing at ForeScout Technologies, as he shares insights from a study that IDC conducted by interviewing seven ForeScout customers. The study showed that, on an average, the ForeScout solution discovered 24 percent more devices, and helped bring put 18 percent more devices into compliance with security policies. The study also concluded the ForeScout platform saved $46,000 for every 1,000 devices, had a payback time of just 13 months and achieved a five-year ROI of 392 percent.

    ForeScout achieves this by using its agentless solution that continuously monitors a heterogeneous environment and automates system-wide threat response. Benefits of this approach will magnify even more in a world experiencing exponential growth in diverse systems ranging from traditional endpoints, Bring Your Own Device (BYOD) systems and Internet of Things (IoT) devices.

    With 20 years of experience in IT security and enterprise products, Sandeep Kumar is the director of Product Marketing at ForeScout. In his current role, he is responsible for various aspects of ForeScout's go to market and content strategy. He has previously held senior positions in product marketing, product management and engineering at several IT security companies including Symantec, Recourse and Axent Technologies. Sandeep holds MS and BS degrees in computer science.
ForeScout
ForeScout

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Smart Cities, a Hacker's Playground
  • Live at: Jun 21 2017 4:00 pm
  • Presented by: Tony Gillespie, US Public Sector Strategist, ForeScout Technologies
  • From:
Your email has been sent.
or close