Hi [[ session.user.profile.firstName ]]

Continually Reducing Risk Despite Constant Changes

IoT is forcing security leaders to re-assess how they secure their networks. Each new device that comes online represents another attack vector for enterprises and it only takes one device to compromise an entire network and disrupt business operations, which can impact the bottom line.

Recent Forrester research commissioned by ForeScout has unveiled some hidden technical and organisational challenges IT professionals should be aware of when managing IoT devices on their networks. The survey results demonstrate a dynamic shift in the way organisations are starting to think about security and risk as it relates to IoT.

This session will highlight some key findings from this research and outline what organisations can do to better defend IoT-enabled systems from cyberattacks.
Recorded Apr 30 2018 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Julie Cullivan CIO, ForeScout Technologies, Inc.
Presentation preview: Continually Reducing Risk Despite Constant Changes

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • CIO Insights: Bridging Security Gaps with a Risk-based Approach Sep 20 2018 3:00 pm UTC 60 mins
    Julie Cullivan, CIO & Sr. VP Business Ops, ForeScout; Nir Gertner, Chief Security Strategist, CyberArk
    Embedding security into business processes and employee awareness, particularly outside of information security teams, can be especially challenging. Yet security operations is vital to protecting the health, safety and intellectual property of any organization and therefore cannot operate in a silo. Learn how to apply a risk-based approach that leverages continuous visibility of devices and privileged accounts on heterogenous networks to enhance organizational trust and business success.

    Speakers:
    Julie Cullivan, Chief Information Officer and Senior Vice President, Business Operations, ForeScout
    Nir Gertner, Chief Security Strategist, CyberArk
  • Visibility Platform for the Connected Campus Recorded: Aug 14 2018 58 mins
    Shawn Rodriguez – RVP, SLED, Chris Dullea – SE Manager, SLED, ForeScout Technologies, Ken Compres, CSO, Hillsborough College
    Attendees of this webcast for higher education learned how the ForeScout Platform can identify and secure devices on a campus's network, without agents, and can help ensure that if they are connected, they are compliant and secure.
  • Compliance in Financial Services: Cloudy, With the Certainty of Change Recorded: Aug 14 2018 16 mins
    Tom Dolan, Global Vice President of Sales Financial Services, ForeScout Technologies
    Financial services firms are being challenged by three successive waves of challenges that have created the perfect storm for compliance, security and network professionals. In this webinar, Tom Dolan, Vice President of Sales for Financial Services will discuss how fast-changing regulatory requirements, advanced cybercriminals, and increasingly large and complex networks make compliance a top concern of financial services organizations.
  • Avoiding the Five Stages of Grief when Building a Successful NAC Program Recorded: Aug 2 2018 24 mins
    Ellen Sundra, VP of Systems Engineering, Americas and Mitch Greenfield, Security Manager at Humana
    Grieving over a failed NAC program? It helps to talk about it—especially when you talk to experts. Learn best practices for a successful deployment and ways to get more value—and peace of mind—from someone who’s been through it before.
  • Secure Digital Innovation of Critical Infrastructure w/o Affecting Reliability Recorded: Jul 30 2018 49 mins
    Ryan Brichant, CTO, OT Security, Wayne Dixon, Dir. OT Tech, ForeScout & Jamison Utter, Head of IoT & OT at Palo Alto Networks
    Digital innovations are aggressively being introduced into public utilities and smart city operational technology (OT) infrastructure. This creates expanded attack surfaces that introduce enormous risk across a wide array of threat vectors. Yet, since OT environments were traditionally air-gapped, there has been less emphasis on cyber security.
    It is critical to discover and protect all device connections and profiles to defend against threats that can negatively affect business operations, data, and even citizen safety. Security best practices suggest the need to continually assess connected assets and enforce the right policies for controlled access, more granular network segmentation and immediate threat response.

    Watch this Carahsoft sponsored webcast to learn from ForeScout and Palo Alto Networks how you can use non-disruptive security techniques that achieve these core security principals while prioritizing uptime of operational networks and the safety of those involved.
  • At the Root of Adaptability is True Network Visibility Recorded: Jul 30 2018 37 mins
    Sean Telles | CISSP, CEA Manager, Solutions Architecture & Programs - Americas ForeScout Technologies
    As innovation continues, so does the growth of connected devices on your network. Every IoT, BYOD and traditional IT connected device poses risk as a potential cyberattack threat vector. At the root of adaptive security operations is continuously discovering, classifying and assessing both managed and unmanaged devices and users as they gain network access from any entry point across tiers. Optimizing such visibility with rich contextual insight and automatically using that insight to dynamically detect, prioritize and respond to security incidents further accelerates adaptive security operations and reduces overall risk.

    Join us for an insightful webcast on how ForeScout and Splunk can help you achieve more adaptive security practices by orchestrating proactive closed loop workflows from discovery to remediation.
  • The 2018 SANS Industrial IoT Security Survey - Shaping IIoT Security Concerns Recorded: Jul 25 2018 68 mins
    Wayne Dixon, Director of OT Technology Management
    This new SANS survey looks closely at the emergence and rapid growth of Industrial IoT (IIoT) systems, including broad-scale connectivity across industry and how well automation, critical control systems, digital/physical infrastructure and accompanying operations are protected against cybersecurity threats.

    Attendees will learn how security practitioners are safeguarding systems and assuring greater reliability, operational integrity, efficiency and productivity in these complex systems. Attendees also will learn about perceived threats
  • Preparing for Tomorrow’s Threats Across the Expanded Enterprise Recorded: Jun 20 2018 40 mins
    Dave DeWalt, Former CEO, FireEye & McAfee; Rob McNutt, VP Emerg. Tech., ForeScout; Stu Solomon, Chief Tech. & Strategy, Optiv
    Cyber leaders have a massive visibility problem that is only growing as the number of corporate unmanaged IP-connected devices continues to explode. Organizations are discovering up to 60 percent more devices on their network than previously known – amidst this rapid growth, where should CISOs and CIOs focus to increase their visibility, while at the same time manage and maintain security hygiene and compliance? Add to this, the expanded attack surface represented by non-traditional IoT and OT devices as entry points into the enterprise, and the challenge to prepare against threat actors seems overwhelming.

    In a rare opportunity to hear from an industry leader, join Dave DeWalt, former CEO of FireEye and McAfee, along with Rob McNutt, Vice President of Emerging Technologies at ForeScout, and Stuart Solomon, Chief Technology & Strategy Officer at Optiv, as they share insights and lessons on how today’s cyber leaders should be preparing for tomorrow’s expanded threats.

    Join this webinar to learn:
    - Where CISOs and CIOs should focus their resources to improve visibility
    - How device visibility can enable security hygiene and compliance
    - How organizations can shrink the attack surface created by IoT and OT
    infrastructure
  • Endpoint Detection and Response: SANS 2018 Endpoint Security Survey Recorded: Jun 19 2018 61 mins
    Sandeep Kumar, Senior Director of Product Marketing at ForeScout
    In this new 2018 endpoint survey, publishing in association with the SANS DFIR Summit, SANS revisits threats, protections and response capabilities impacting endpoints. Results are presented in a two-part webcast series. The whitepaper and webcast developed from this survey are intended to promote better endpoint hygiene and provide valuable thought leadership to the community.

    In this second installment of the 2018 endpoint survey results webcast, we uncover:

    - How organizations are monitoring their endpoints and networks to detect threats to their endpoints
    - The value of utilizing services vs on premises endpoint monitoring
    - Average time to detect and average time to fully remediate
    - Best practices to integrate remediation workflow
    - Enablers and barriers to improving endpoint protection and response capabilities
  • IoT Risk and Posture Assessment Recorded: May 29 2018 43 mins
    Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.
    IoT devices being deployed by the thousands, they often lack IT oversight and basic security best practices such as strong credentials. A recent industry analysis notes that 81 percent of breaches involve the misuse of stolen, weak or default credentials. Botnets such as Mirai take advantage of weak IoT credentials and harvest millions of IoT devices to cause service disruptions. Hence, IoT assessment is the next logical step after IoT classification for managing risk and reducing your attack surface.
    Join us to learn how the ForeScout platform helps organizations assess IoT devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including functionality that lets you:
    • Identify IoT devices with factory default and weak credentials
    • Create your custom IoT credential assessment library or leverage the ForeScout-provided credential library
    • Create policies to automate assessment and initiate mitigation actions (alert, limit, block and segment)
  • Post Ransomware Crisis -Tips, Tricks, & Lessons Learned to Stay Protected Recorded: May 18 2018 33 mins
    Shawn Taylor, Sr. Systems Engineer ForeScout Technologies, Inc.
    Today, Ransomware attacks are more destructive than ever before. No organization, too large or small is safe from a potential attack. Watch this webinar to hear from our security solution expert, Senior Systems Engineer, Shawn Taylor to discuss recent ransomware breaches, the impact of those breaches, and steps you can take to better protect your organization from falling victim. In addition, you’ll discover how ForeScout’s security platform provides visibility into what’s on your network in order to and assist in identifying the potential risk that exists in your environment today.
  • Raising the Bar on Device Classification Recorded: May 15 2018 46 mins
    Mitesh Shah, Sr. Technical Marketing & Kevin Mayer, Product Management ForeScout Technologies, Inc.
    The device landscape on enterprise networks has evolved from a static set of laptops, workstations and servers to a diverse mix of mobile, BYOD, IoT and OT devices, as well as virtual machines. Many of these devices are transient and come and go with increasing frequency. Without continuous visibility and classification of connected devices, it’s impossible to establish an accurate device inventory or an in-depth understanding of device risk profiles. This visibility gap is being targeted by bad actors to gain a foothold on the network and access sensitive information or cause business disruption.

    Join us to learn how the ForeScout platform helps organizations classify devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including:

    • Real-time, granular auto-classification of enterprise devices without relying on agents
    • Device profile updates from ForeScout Device Cloud, a crowd-sourced repository of IoT device insight from more than 500 real-world customer environments
    • Extending built-in classification capabilities to create your own custom classification policies
  • Continually Reducing Risk Despite Constant Changes Recorded: Apr 30 2018 30 mins
    Julie Cullivan CIO, ForeScout Technologies, Inc.
    IoT is forcing security leaders to re-assess how they secure their networks. Each new device that comes online represents another attack vector for enterprises and it only takes one device to compromise an entire network and disrupt business operations, which can impact the bottom line.

    Recent Forrester research commissioned by ForeScout has unveiled some hidden technical and organisational challenges IT professionals should be aware of when managing IoT devices on their networks. The survey results demonstrate a dynamic shift in the way organisations are starting to think about security and risk as it relates to IoT.

    This session will highlight some key findings from this research and outline what organisations can do to better defend IoT-enabled systems from cyberattacks.
  • Visibility for the Extended Enterprise Recorded: Apr 25 2018 39 mins
    Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.
    How do you manage the explosive growth and diversity of devices connecting to your network? How do you handle those devices when the vast majority are IoT devices and operational technologies (OT), most of which cannot be managed via traditional agent-based security systems? Accurate device visibility is paramount for solving security use cases such as network access control, device compliance, asset management, network segmentation and incident response.

    Join us to learn how the ForeScout platform solves the device visibility problem across the extended enterprise. Get insight into the new capabilities of CounterACT 8, including:
    • Passive-only discovery and profiling in sensitive OT and industrial network zones without requiring agents
    • Support for cloud-based network management systems
    • A customizable web dashboard for device intelligence across campus, data center, cloud and OT networks
  • ForeScout's approach to becoming GDPR-compliant Recorded: Mar 22 2018 43 mins
    Tony Miller, Sr. Director of Legal Affairs & Jannine Mahone, Sr. Solutions Marketing Compliance, ForeScout Technologies Inc.
    More than 92 percent of multinational companies are focused on GDPR as a top priority1. ForeScout Technologies is one of them. Tony Miller, Sr. Director of Legal Affairs at ForeScout shares lessons learned in ForeScout's quest to assure data privacy and become GDPR compliant. This informal event will be in the form of questions and answers.
  • Crucial Components of your SWIFT Customer Security Programme (CSP) Compliance Recorded: Mar 21 2018 29 mins
    Matt Buller, CTO Financial Services, ForeScout & Adam Kohler, Sr. Engineer, ForeScout
    In the wake of the high-profile, multi-million-dollar breaches using their infrastructure, SWIFT created the Customer Security Programme (CSP) to ensure their customers meet the required levels of security and compliance. Learn how ForeScout plays a crucial role in helping ensure SWIFT CSP compliance from ForeScout experts Matt Buller and Adam Kohler.
  • The Good, the Bad, & the Downright Dangerous: IoT & Healthcare Recorded: Mar 6 2018 22 mins
    Vice President of Americas, Systems Engineering, Forescout Technologies, Inc.
    Organizations are struggling to wrap programs to increase the base level security on all devices, then Automate more process, and share more information with internal and external customers. This demands a fresh look at how operations teams works together including: share information better, improve patient care, streamline auditing all devices, and apply policy while still stretching the IT budget. The medical industry is at the precipice of the IoT and corporate networks.
  • Reduce Risk with Privileged Account Security & Continuous Visibility Recorded: Feb 7 2018 44 mins
    Aytug Celikbas, Sales Engineer, CyberArk & Jim Higginbottom, Director Global Alliances, ForeScout
    With the threat landscape expanding every second, protecting the “keys to the kingdom” is vital to securing your business and its assets. Unsecured privileged accounts affords cyber criminals access to your highest value assets and data. Join your host, Conexsys Communications, to learn how CyberArk and ForeScout address this issue by reducing the attack surface. ForeScout scans the network in real time and automates policy-driven access control based on device security posture and behavior without using an agent. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets.
  • Preventing Cyberattacks via Dynamic Network Segmentation Recorded: Oct 16 2017 49 mins
    Ward Holloway, ForeScout Technologies & Chris Ebley, Managing Partner, BAI & Lee Space, Palo Alto Networks
    In today’s era of ‘Bring your own device’ (BYOD) mobility and ‘Internet of Things’ (IoT) devices proliferating networks as unknown or unmanaged connections, the cyberattack surface for most any organization continues to grow at an alarming rate. No longer can organizations rely on guarding their perimeter and trusting they know everyone and everything that is accessing their network. Proactive threat prevention in today’s BYOD and IoT era requires continuous network access visibility and intelligence as well as being able to automatically apply context-aware security policies such as segmenting devices and users without having to re-build networks or knowing the devices upfront.
    Webinar topics include:
    - Network security trends and challenges, including the more destructive ransomware, cryptoransomware, wipers, etc.
    - Risk prevention architecture considerations
    - Best practices based on real world experiences

    BAI will share some of its key learnings based on extensive experience implementing successful solutions that target attacks while creating more highly available, responsive, and automated networks. BAI is a team of Security Architects who have provided Automated Detection, Prevention, and Orchestration to protect Government Agencies, Higher Education and Fortune 1000 commercial accounts.
  • Securing Smart Transportation to Protect Your Community Recorded: Oct 2 2017 43 mins
    Ryan Brichant, VP & CTO of Cyber Security, ForeScout & Ashok Sankar, Director of Public Sector Solutions & Strategy, Splunk
    The US Department of Homeland Security has identified transportation as one of three top sectors in creating a Smart City. The Department also addressed the fact that the same technologies driving this digital transformation - smart sensors, fare collection systems, power relays, HVAC, cameras, and other unmanaged IoT devices – are also expanding the cyber attack surface and pose significant security risks to both citizens and critical assets. The challenge before transportation administrators, state and local officials and security and IT experts is how to enable these beneficial systems while also ensuring optimum security protections.

    Join us for this insightful webinar on the state of Smart Transportation initiatives and how you can gain the visibility and control you need to drive both Smart AND Secure Transportation to benefit your community.

    Webinar topics include:
    - The risks and challenges of new technologies and IoT inherent with Smart Transportation
    - How real-time end-to-end visibility can offer critical situational awareness needed to reduce and manage risks
    - Real world experiences
ForeScout
ForeScout

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Continually Reducing Risk Despite Constant Changes
  • Live at: Apr 30 2018 6:30 pm
  • Presented by: Julie Cullivan CIO, ForeScout Technologies, Inc.
  • From:
Your email has been sent.
or close