Hi [[ session.user.profile.firstName ]]

Securing Smart Transportation to Protect Your Community

The US Department of Homeland Security has identified transportation as one of three top sectors in creating a Smart City. The Department also addressed the fact that the same technologies driving this digital transformation - smart sensors, fare collection systems, power relays, HVAC, cameras, and other unmanaged IoT devices – are also expanding the cyber attack surface and pose significant security risks to both citizens and critical assets. The challenge before transportation administrators, state and local officials and security and IT experts is how to enable these beneficial systems while also ensuring optimum security protections.

Join us for this insightful webinar on the state of Smart Transportation initiatives and how you can gain the visibility and control you need to drive both Smart AND Secure Transportation to benefit your community.

Webinar topics include:
- The risks and challenges of new technologies and IoT inherent with Smart Transportation
- How real-time end-to-end visibility can offer critical situational awareness needed to reduce and manage risks
- Real world experiences
Recorded Oct 2 2017 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ryan Brichant, VP & CTO of Cyber Security, ForeScout & Ashok Sankar, Director of Public Sector Solutions & Strategy, Splunk
Presentation preview: Securing Smart Transportation to Protect Your Community

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Identify and Act Faster – Forescout 8.2 Accelerates Risk Mitigation. Mar 17 2020 3:00 pm UTC 60 mins
    Jeni Lloyd, Product Marketing, Forescout
    Building a complete picture of your device landscape, including all device types, across siloed tools and teams, can be expensive and often impossible to achieve. However, complete situational accuracy of your device landscape is critical to accurately identifying and proactively responding to risk. CIOs, CISOs, network and security teams need a shared understanding of device insights to increase security collaboration.

    Join us to learn how Forescout 8.2 can help you identify and act – faster, by providing actionable device context to pinpoint, prioritize and quickly mitigate risk across campus, data center, cloud and OT networks.

    Session highlights:

    • Demo: Watch firsthand how Forescout 8.2 helps mitigate risk during a global outbreak
    • eyeExtend App Ecosystem: Learn how to build an integrated security strategy by leveraging community-built apps
    • Cloud-first deployments: Gain flexibility and faster time-to-value with AWS and Azure deployment options
  • Drinking the ICS Jolt Cola: Jumpstart Your NIST CSF Maturity for OT Networks Recorded: Feb 19 2020 31 mins
    Brian Proctor, Director of Strategic Accounts & Sandeep Lota, Sr. Systems Engineer, Forescout Technologies
    Asset owners today want to understand how investments made in people, process, or technology are progressing the maturity of their ICS security programs to validate those investments. Whether asset owners are spending one dollar, one million dollars, or one hour of their time, understanding which investments are actually improving the overall ICS security program and reducing risk is essential to determine where to spend resources.

    The NIST Cybersecurity Framework helps asset owners measure security control maturity in both IT and OT domains, and can be useful to understand if ICS security investments are working or not. This talk will breakdown all five NIST CSF functions and focus on specific use cases for each to help jumpstart any ICS security program.
  • Accelerate Enterprise-Wide Network Segmentation with eyeSegment Recorded: Dec 11 2019 60 mins
    Sandeep Kumar, Sr. Director of Product Marketing & Abdi Saee, Principal Product Marketing Manager
    Accelerate network segmentation projects while reducing operational complexity and minimizing business disruption.

    Forescout eyeSegment extends the capabilities of the Forescout platform to address segmentation challenges across multiple network domains and multiple enforcement technologies. It enables organizations to embrace zero trust principles for all connected devices, including IoT and OT.

    Join us to learn how Forescout eyeSegment:
    • Accelerates the design, planning and deployment of dynamic network segmentation across the extended enterprise to reduce your attack surface and regulatory risk.
    • Simplifies the process of creating context-aware segmentation policies and simulating them prior to enforcement to minimize business disruption.
    • Orchestrates segmentation controls across diverse enforcement technologies and network domains.
  • Zero Trust Security in the Age of IoT and OT Recorded: Dec 3 2019 56 mins
    Sandeep Kumar, Sr. Director of Product Marketing, Forescout Feat. Chase Cunningham, Principal Analyst, Forrester
    In its October 2019 Zero Trust eXtended Ecosystem Wave Report, Forrester calls IoT and OT device security, “one of the hardest problems to solve within the enterprise."* As unmanaged devices become commonplace on networks, security and risk professionals must rethink the concept of identity and expand their Zero Trust initiatives to include such devices.

    Watch this live webinar hosted by Forescout Senior Director of Product Marketing Sandeep Kumar, featuring Chase Cunningham of Forrester Research to learn why it’s essential to:

    • Embrace Zero Trust holistically across all types of users, devices and connected things
    • Expand the concept of identity to include IoT and OT
    • Use a context-based approach to enterprise-wide network segmentation

    *Source: The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
  • IT, OT, and IoT — Oh, my! Learn to see and secure it all with Forescout + Ixia Recorded: Nov 21 2019 42 mins
    Tim Jones, Sr. Dir of Sys Engr of Forescout; Scott Register, VP Product Mgt & Dennis Carpio, Sr. Dir , Bus. Dev. of Ixia
    The Internet of Things (IoT) means a relentless stream of devices connecting to your network at all times. Together, ForeScout and Ixia have developed a proven approach to achieving constant visibility and control — and in turn, security.

    Attend this webinar to learn about emerging challenges at the edge of your network where new users and operational technology (OT) devices may be connecting without alerting your IT team.
    You will learn to:

    • Continuously secure and manage your network across IT, IoT, and OT devices
    • Bridge new visibility gaps from the data center to the network edge
    • Streamline and accelerate migration to SD-WAN—without adding risk

    Join us to secure devices the moment they connect — and maintain control for as long as they stay connected.
  • Best Practices for Healthcare Digital Transformation Recorded: Nov 21 2019 43 mins
    John Lehane, Product Marketing & Danny Akacki, Technical Manager, Gigamon; Lyle Kelly, Sr. Systems Engineer, Forescout
    Are you ready for digital transformation? Transformation begins with visibility – looking inside the network “black box” and understanding exactly what’s running. But we know that can be easier said than done, especially in the healthcare industry where privacy, security and compliance are paramount.

    Join our webinar to hear experts from Gigamon and Forescout delve into the network and security challenges they’ve observed in healthcare. Participants will learn how to surmount the challenges in:

    • Achieving visibility of digital app usage across distributed, dynamic environments
    • Ensuring the most relevant application traffic is delivered to the right security tool
    • Pinpointing lateral movement of malware and shadow IT for faster time to detection and remediation
    • Monitoring, tracking and securing Internet of Medical Things (IoMT) devices
    • Integrating new sites and locations into your network
  • Yes, IT and OT Are Converging. So How Does This Affect Compliance? Recorded: Nov 12 2019 59 mins
    Thomas Nuth, Sr. Director of Solution Marketing Don Weber, SANS Instructor
    Refreshing compliance strategy for the age of IT-OT convergence challenges cybersecurity stakeholders across the functional spectrum, from CISOs to plant managers. In this webinar, we will explore popular frameworks that help reduce cyber risk, as well as how organizations can streamline regulatory and compliance efforts with better processes and the right technology.

    Attendees will walk away with an understanding of key frameworks and standards, and the best practices for implementing them, including:

    - The NIST Cybersecurity Framework
    - NIST 800-53
    - The NERC CIP Regulations
  • Device Visibility and Control: Streamlining IT and OT Security Recorded: Nov 5 2019 60 mins
    Don Murdoch is a SANS community instructor & Sandeep Kumar, Senior Director of Product and Technical Marketing Forescout
    Recently Forescout updated its multifaceted IT/OT network device visibility and control platform to enhance the product's long-standing reputation for handling network admission controls. In this review, SANS analyst and instructor Don Murdoch digs into the product's capabilities and explores these key areas:

    - Device discovery
    - Auto classification
    - Risk assessment
    - Automating security controls
    - Scalability/flexibility

    Register today to be among the first to receive the associated whitepaper written by security expert Don Murdoch.
  • CEO Speaks: Top 5 Risks That CISOs Need to Quantify Recorded: Oct 29 2019 59 mins
    Jack Jones, Chairman of The FAIR Institute & Gaurav Pal, CEO and Founder of stackArmor
    As breaches continue to make headlines, CEOs are now being held personally accountable, often resulting in loss of job and reputation. This accountability extends to both public sector and commercial entities, especially those involved in critical infrastructure. Forescout is pleased to host a frank discussion with two experienced executives in the risk and information security industry who not only run these organizations, but also evangelize the importance of prioritizing risk from third-party and other sources.

    They will provide insight on:
    • Top risks and exposure, especially from the convergence of information technology (IT) and operational technology (OT) infrastructures.
    • How frameworks like NIST RMF and CSF play a role in establishing good risk hygiene.
    • Actionable playbook to consider when creating and presenting a risk plan to the CEO and board.
  • Protecting Today’s Smart City Through Device Visibility & Control Recorded: Oct 17 2019 27 mins
    Jonathan Jesse is a Senior Systems Engineer, State & Local, Forescout Technologies
    The vision of smart cities is bright—automating critical public services, improving community interactions and achieving untold levels of efficiency in a connected, technology-driven society. But along with all of this boundless potential comes untold risk of a cybersecurity breach.

    Join us for this insightful webinar to hear how Forescout Technologies is playing a critical role in securing these technologically advanced communities to mitigate risk, increase visibility across the extended enterprise, and provide the necessary controls needed to secure these smart environments.

    Webinar topics include:

    ·Protecting our Law Enforcement technology – from vehicles to dispatch, and all devices in between
    ·Risks and challenges of new technologies with Smart Transportation and Digital Services
    ·Real case studies of Smart Cities and how they manage the risk of IoT and the connected reality

    Sponsored By Forescout Technologies + ISA Cybersecurity
  • Tearing Down a Building Network Using IoT Devices: A Forescout Labs Case Study Recorded: Sep 5 2019 46 mins
    Daniel dos Santos, Forescout Labs Researcher
    With the advent of the Internet of Things (IoT), devices like surveillance cameras and smart lighting systems are now widely available and rapidly being integrated into new and existing smart buildings. These devices are much cheaper than industrial controllers and far easier to install, but they often lack security features, and vulnerabilities are being discovered with increasing frequency. As the scale of IoT devices grows, so does the need to keep them in check.

    Using a smart building as their case study, Forescout Labs investigated how IoT devices can be leveraged as an entry point to a building’s network, where legacy OT assets, IT systems and IoT devices all intersect. In this webinar, we discuss the key findings from our research, including:

    - How the IoT is impacting the organizational threat landscape
    - The additional risks that IoT devices introduce
    - How to evolve your cybersecurity strategy for the age of IoT
  • BLUEKEEP and Deja Blue: Havoc on the horizon for healthcare Recorded: Aug 28 2019 30 mins
    Liran Chen, Senior Director, System Engineering Forescout
    Despite dire warnings from Microsoft, industry and government agencies, the BlueKeep vulnerability still looms large on the networks of many enterprises with as many as 800,000 Windows devices still remain vulnerable to attackers using Remote Desktop Services in Windows.
    To help mitigate the risk of this potential vulnerability, join Liran Chen, Senior Director, System Engineering Forescout to learn how organizations can take the following actions:

    *Investigate the scope of BlueKeep risk, by identifying the quantity of vulnerable devices
    *Isolate non-compliant devices, and initiate remediation actions on actionable areas
    *Improve overall security posture and patching routines to maintain security compliance
  • Lessons Learned Fighting Modern Cyberthreats in ICS Networks Recorded: Jul 30 2019 57 mins
    Sandeep Lota, Senior Systems Engineer OT at Forescout
    Critical infrastructure organizations are increasingly becoming targets of malware campaigns. This rising tide of cyberthreats, coupled with the increased exposure of OT networks to the Internet is making ICS network protection a strategically important issue. To stay cyber resilient in today’s environment, asset owners need a fresh approach to cybersecurity.
    During this webinar, we will discuss an anonymized investigation conducted by our team to identify a real malware infection on a production network, the tools and techniques used to contain this threat and how to use threat intelligence and visibility to stay ahead of cyber adversaries.

    We will focus on improving security strategy in four key areas, in the context of the SANS Top 20 CIS Controls:
    - Asset visibility and network baselining
    - Continuous network monitoring
    - Threat intelligence ingestion
    - Thorough incident response plans
  • IT Centralization Challenges: M&A within the University Recorded: Jul 30 2019 55 mins
    Shawn Taylor, Sr. Systems Engineer, Forescout Technologies & Mark Runals, Sr. Solutions Architect, Blackwood Associates, Inc
    IT consolidation towards a single infrastructure management organization is an increasing trend within the Higher Education space. As Colleges and Universities move to undertake these centralization activities, concerns are raised by the central IT Operations, Networking, and Security teams over the lack of insight into the systems and environments to be "acquired." With partial asset lists and little to no visibility there is incomplete understanding of how the risk profile of Central IT will change or the lift associated with bringing the onboarded unit to existing organizational or regulatory compliance standards. This webinar will explore various challenges associated with centralization within Higher Ed and how Forescout helps centralized IT organizations achieve complete visibility and a contextual understanding of all assets and devices, ensuring they get a handle on the environments they’ll be onboarding; ultimately mitigating risks they instantly face when they take over operational responsibility.
  • Healthcare Under A Microscope – Understanding and Overcoming Cybersecurity Recorded: Jun 24 2019 28 mins
    LYLE KELLY, Sr. Solutions Engineer – Healthcare Forescout
    The device landscape in the healthcare sector is growing exponentially, adding to the complexity of the network, and making it challenging for IT and security personnel to remain compliant and enforce patient safety and privacy. To better understand the complexity of healthcare networks and potential vulnerabilities, Forescout research analyzed 75 healthcare deployments with over 1.5 million devices.

    Join Lyle Kelly, Sr. Solutions Engineer, to review the research findings and for an interactive discussion on overcoming common cybersecurity challenges by:

    Building a security foundation based on a complete and accurate asset inventory
    Minimizing downtime by containing risk with zone-based segmentation
    Improving security productivity and responsiveness by automating security controls
  • 2019 SANS OT/ICS Cybersecurity Survey Webcast Recorded: Jun 17 2019 61 mins
    SANS experts Doug Wylie and Barb Filkins, with advisor and SANS instructor Jason Dely
    Critical infrastructure organizations are increasingly becoming targets of malware campaigns. This rising tide of cyberthreats, coupled with the increased exposure of OT networks to the Internet is making ICS network protection a strategically important issue. To stay cyber resilient in todays environment, asset owners need a fresh approach to cybersecurity.

    During this webinar, we will discuss an anonymized investigation conducted by our team to identify a real malware infection on a production network, the tools and techniques used to contain this threat and how to use threat intelligence and visibility to stay ahead of cyber adversaries.

    We will focus on improving security strategy in four key areas, in the context of the SANS Top 20 CIS Controls:

    - Asset visibility and network baselining
    - Continuous network monitoring
    - Threat intelligence ingestion
    - Thorough incident response plans
  • Converged IIoT Networks: Gaining Comprehensive Device Visibility & Control Recorded: Jun 13 2019 32 mins
    Forescout Solution Expert
    Can you identify and secure what’s on your network? Do you worry that needed security will impact your operational uptime and will keep your critical infrastructure running 24/7?

    Today’s networks include a broad variety of devices - managed, unmanaged, IoT, medical, OT and HVAC – that aren’t always visible and therefore aren’t secure.

    Expanding the visibility is the first step in reducing the risk. In this session, learn from actual customer experiences that share how deploying a solution for device visibility and control provides the foundational layer needed for risk mitigation and protection.
  • Top Cybersecurity Practices (HICP) to Mitigate Cyber Threats in Healthcare Recorded: Apr 25 2019 59 mins
    Erik Decker, CISO & CPO, University of Chicago Medicine & Ellen Sundra, VP of Engineering at Forescout
    Join Erik Decker, Chief Information Security Officer and Chief Privacy Officer of the University of Chicago Medicine and Ellen Sundra, VP of Engineering at Forescout, to learn how to protect patients by applying the recommended principles and practices from Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP).

    Over the past decade, threats to the health care industry has increased dramatically along with the sophistication of cyber-attacks. As a result, the Healthcare Sector Coordinating Council and the US Department of Health and Human Services collaborated to establish cybersecurity practices that can be used across the healthcare industry. Our guest, Erik Decker, serves as the industry lead on the development of, “Health Industry Cybersecurity Practices (HICP)”, which resulted from insights of the task group and over 150 health IT professionals.

    Ellen Sundra leads this discussion to gain insights into actionable steps that health industry IT and HTM security professionals can establish, implement and maintain in their organizations to thwart cyber-attacks before they occur.

    What you will learn in this webinar:
    - How to reduce risk to the business by implementing solid security practices
    - Which are top security practices to consider when facing some of healthcare’s top issues
    - How using policy-based controls can simplify processes and protect the organization
  • Using Zero Trust to Protect Financial Services Networks Recorded: Apr 15 2019 51 mins
    Tom Dolan VP, Global Financial Services Forescout & John Kindervag Founder of Zero Trust and CTO Palo Alto Networks
    Is Zero Trust really achievable given the complexity in financial service organizations, especially considering limited staff, mergers and acquisitions and compliance pressures?

    With Phil Packman, a CISO at BT, as your host, learn from the founder of Zero Trust & Field CTO at Palo Alto Networks, John Kindervag, and the VP of Global Financial Services at Forescout, Tom Dolan, how your company can more easily embrace Zero Trust to proactively combat today’s high frequency and sophistication of cyberattacks.

    Join us to learn how to:
    - Proactively combat today’s high frequency and sophistication of cyberattacks
    - Gain unparalleled situational awareness of malicious activity
    - Prevent the exfiltration of sensitive data and money
    - Simplify adherence to compliance regulations
  • Automating Security Controls with Confidence Recorded: Apr 10 2019 58 mins
    Forescout Product Team
    IT security teams are inundated with increasing numbers of security and compliance issues reported by security tools that either lack sufficient device context for prioritization or automation capabilities to enforce risk mitigation controls. As a result, highly skilled security teams waste time manually troubleshooting low-impact issues, unable to focus on proactive risk reduction or rapid threat response.

Join us to learn how Forescout 8.1 enables organizations to orchestrate actions and automate controls while minimizing business disruption. Topics include:

    • Orchestration of segmentation controls across Fortinet®, Palo Alto Networks® and Check Point® firewalls
• Incident response automation with ServiceNow® ITSM and Security Operations

    • Automation of controls for network access and device compliance initiatives
Device Visibility & Control across the extended enterprise
Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk.

Learn more about our products, hear about new cybersecurity trends and see how Forescout helps you address these.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Smart Transportation to Protect Your Community
  • Live at: Oct 2 2017 5:00 pm
  • Presented by: Ryan Brichant, VP & CTO of Cyber Security, ForeScout & Ashok Sankar, Director of Public Sector Solutions & Strategy, Splunk
  • From:
Your email has been sent.
or close