Fostering Security Innovation with Optimized Asset Insight & Incident Response
The key to keeping your business secure is knowing all your assets and their potential security impact. The explosion of IoT, BYOD, guest and connected devices as a whole have expanded attack surfaces and introduced numerous blind spots and vulnerabilities that must be addressed. In this webcast, you will learn how you can reduce risk by streamlining security operations with automated device discovery, real-time asset management, continuous compliance enforcement and accelerated incident response and remediation workflows.
RecordedOct 11 201848 mins
Your place is confirmed, we'll send you email reminders
Sajed Naseem, CISO, NJ State Courts, Jack McCarthy, CIO, NJ State Courts & Ellen Sundra, VP of Systems Engineering, Forescout
When the pandemic hit in early March, the New Jersey Judiciary was faced with a monumental task to transform the court systems to operate virtually, while remaining secure. Join this session to hear firsthand from New Jersey Judiciary’s CIO, Jack McCarthy, and CISO, Sajed Naseem, as they bring you along in their leadership journey toward digital transformation.
Discussion highlights include:
• Expanding technological infrastructure to support triple the amount of people working remotely while staying secure with VPN
• Building ten times the number of existing virtual courtrooms within two weeks while enforcing network access controls that ensure only the right people get in
• Achieving full visibility and governance of 50,000 devices within two weeks
• Applying network security strategy and tactics to ensure the health and security of employees and the public are protected while keeping the judiciary system uninterrupted
Bob Reny, EMEA CTO and Principal Engineer, Forescout & Shawn Taylor, Senior Systems Engineer, Forescout
Events surrounding the COVID-19 pandemic have accelerated the migration to a remote workforce. Unfortunately, this rapid migration may have also adversely impacted the risk profile of your environment. This webinar covers Forescout best practices that can help you double-check your Forescout deployment—including your remote users’ asset software profile and compliance state—before employees and contractors begin returning to the workplace. Forescout presenters Bob Reny and Shawn Taylor address common components, policy interaction and best practices for streamlined compliance and enforcement, including:
• Policy workflow with classification, ownership and BYOD
• Dashboards and upstream reporting
• Segmentation and NAC impacts
Jai Prakash Shukla, Product Line Manag. Lead, Ed Chapman, VP Bus. Dev, Arista, Howie Koh, Princ. Systems Engineer, Forescout
Join Arista and Forescout to learn how to reduce cyber risk and increase operational efficiency by providing policy driven network access control (NAC), cognitive network management and dynamic segmentation across campus, data center and cloud environments. Achieve benefits such as boost network performance, increase compliance and better secure heterogeneous networks by:
• Improving visibility and control of devices on wired, wireless and VPN networks
• Increasing security and reducing operating expense
• Accelerating incident response and Zero Trust enforcement
Joe Cardamone, NA Privacy Officer & Sr. InfoSec Analyst, Haworth, Shane Coleman, Sr. Director of Sys Engineering, Forescout
Like so many in recent months, the teams at Haworth went virtual practically overnight, creating the need to batten down the hatches on VPN access. In this session, Joe Cardamone shares how they securely kept the business moving forward while creating an opportunity to evaluate and strengthen their orchestration policies.
Discussion highlights include:
• The time is ripe for gaining a clearer picture of your network segments
• Getting more information from VPN-connected devices
• Why information security should have a seat at the table for crisis planning and business agility
Mark Farrow, HC VP & CIO; Andy Brown, Arista; Lyle Kelly & Scott Barrett, Forescout; Tom Finn, Medigate
Join Mark Farrow, an industry renowned Healthcare VP & CIO with 35+ years experience leading IT & Clinical Informatics teams, as he discusses with Arista Networks, Forescout and Medigate healthcare experts the many issues facing hospital networks and connected medical devices in today’s world and how to overcome them by building a Healthy Hospital infrastructure that is:
In this webinar you will learn how to build a Healthy Hospital infrastructure that is founded on 5 key principles that help reduce the risk of cyberattacks, increase operational and asset management efficiency, reduce costs, improve application performance and protect digital patient services and data.
Leo Sheridan, Global Sys. Integrator, Dave Olschewske, Sys. Engineer & Dean Hullings, Global Defense Solutions, Forescout
In June 2020, the U.S. Department of Defense (DoD) will begin including requirements for contractors to meet specified levels of the Cybersecurity Maturity Model Certification (CMMC). Published in January 2020, CMMC Version 1.0 is a new set of cybersecurity standards that may impact up to 300,000 companies—including being subject to audits by third-party assessors. Do you contract or subcontract with the DoD? Join this session to learn who will be impacted, how, and what steps you can take to prepare.
Successfully implement enterprise-wide network segmentation while reducing operational complexity and minimizing business disruption. The Forescout platform and its eyeSegment product address organizations’ cross-domain, multi-use-case segmentation challenges across extended enterprises. Through context-aware policies, real-time visualizations, business-structured groups and proactive policy simulations, the Forescout platform enables segmentation controls that span diverse enforcement technologies and validate expected outcomes.
Join us to:
- Explore different approaches and best practices around dynamic network segmentation across the extended enterprise
- Learn about the latest enhancements and capabilities in Forescout eyeSegment, which helps you simplify the process of creating and simulating context-aware segmentation policies to minimize business disruption.
- See eyeSegment in action with a live demo highlighting some of the enterprise-wide network segmentation use cases
Nick Duda, Principal Security Engineer, HubSpot & Howie Koh, Principal System Engineer, Forescout
Organization are quickly adapting to support a global remote workforce and preparing for this to become the new norm. This shift has left IT security teams scrambling to sustain cyber hygiene and bolster cybersecurity to address escalated risk.
Nick Duda, Principal Security Engineer of HubSpot, shares what he and his peers have learned during this time and what actionable steps you can take to improve visibility and control of VPN-connected devices.
In this webinar, you will learn how to:
•Increase network admission data to better secure remote devices
•Update device classification policies to improve controls
•Leverage third-party technology integrations to strengthen endpoint defenses
Thomas Nuth, Sr Director, Product and Solutions Marketing & David Wolf, Principal Security Researcher, Forescout Technologies
Financial service organizations have experienced massive growth of new IoT, OT and remote devices within their network over the last five years. While device growth has optimized much of the financial services industry, it has also expanded the attack service of networks and exposed the financial services sector to new risk. Forescout Research Labs recently conducted deep analysis of 100 large financial service networks with over 8,500 virtual local area networks (VLANs) and nearly 900,000 devices with the aim of better understanding this topic.
As the world fights a pandemic, we all agree there is no such thing as ”business as usual”. World economies continue to spiral towards a recession. Businesses must adapt and respond to the rapidly changing social and economic climate while continuing to address regulatory compliance mandates. This environment creates the perfect storm for bad actors who continue to relentlessly exploit vulnerabilities with the intent to exfiltrate, expose and exploit sensitive financial data. Join our solutions team of Thomas Nuth and Jannine Mahone as they discuss:
• Forces that create the perfect storm for escalated cyber attacks
•Three steps to improving cyber security and compliance
•Building a cyber resilient library of resources to help weather the storm
Shawn Taylor, Customer Evangelist, Senior Systems Engineer, Forescout Technologies
Ransomware has been top of mind for Cybersecurity practitioners for years, but with COVID-19 driving such significant and rapid changes in the connectivity of the workforce, the threats not only continue, but are possibly becoming more prevalent. During this first session in our webinar series we will discuss insights and lessons learned based on first-hand experience responding to recent Ransomware events.
Ted Lee, Senior Systems Engineer II, Forescout Technologies
With a 112% increase in VPN usage in a matter of days, many teams are challenged with ensuring they continue to enforce mature device hygiene practices that support the world’s “new normal”. A normal that includes entire workforces connecting to corporate networks from home. Join this discussion to hear five key areas of focus to ensure your VPN connectivity and control is secure end-to-end, including:
· Visibility of Endpoints
· Manageability of Endpoints
· Assessment of Risk (Compliance) of VPN Endpoints
· Binary Control of VPN Endpoints
· Granular (Role Access) of VPN Endpoints
Matt Fleharty, Systems Engineer, Forescout & Eric Smith, OT Account Manager, Forescout
Cybersecurity in the oil & gas industry has skyrocketed to the top of everyone’s mind this year as stakeholders face new, advanced cyberthreats targeting their operational technology (OT) networks. Examples of these threats becoming a reality have played out with increasing frequency over the past three years, ranging from the TRITON attack that disabled safety controllers to the recent ransomware attack on a natural gas facility that shut down a pipeline for 2 days.
To truly mitigate operational and safety risks from disruptionware, oil & gas producers need the complete picture of what’s on their OT network, the threats its most vulnerable to, and how to mature their security program to a proactive, rather than reactive, position.
Join us during this webinar to learn:
- The nuances of IT-OT convergence within the oil & gas sector
- Common challenges and threats across the industry
- What risk management techniques forward-thinking companies are implementing
- Recommendations to future-proof OT security strategy for oil & gas producers
Jeni Lloyd, Product Marketing; David Wolf, Research; Mitesh Shah, Technical Marketing and Bob Reny, Systems Engineering
We’re all juggling numerous challenges from the rapid shift to remote working. The priority for most teams is maintaining productivity. Many organizations looked first to VPNs and quickly scaled their infrastructure to allow remote access to on-site corporate resources. Meanwhile, security teams continue to wrestle with how to ensure security without disrupting the business. To minimize risk, every organization needs complete visibility into the security of remotely connected corporate and BYOD assets.
Join Forescout to learn how to quickly:
•Discover all remote devices connecting to your network, including BYOD systems
•Identify which remotely connected devices meet your security policies, and which don’t
•Automate policy-based controls to protect your network, even with a remote team
Building a complete picture of your device landscape, including all device types, across siloed tools and teams, can be expensive and often impossible to achieve. However, complete situational accuracy of your device landscape is critical to accurately identifying and proactively responding to risk. CIOs, CISOs, network and security teams need a shared understanding of device insights to increase security collaboration.
Join us to learn how Forescout 8.2 can help you identify and act – faster, by providing actionable device context to pinpoint, prioritize and quickly mitigate risk across campus, data center, cloud and OT networks.
• Demo: Watch firsthand how Forescout 8.2 helps mitigate risk during a global outbreak
• eyeExtend App Ecosystem: Learn how to build an integrated security strategy by leveraging community-built apps
• Cloud-first deployments: Gain flexibility and faster time-to-value with AWS and Azure deployment options
Brian Proctor, Director of Strategic Accounts & Sandeep Lota, Sr. Systems Engineer, Forescout Technologies
Asset owners today want to understand how investments made in people, process, or technology are progressing the maturity of their ICS security programs to validate those investments. Whether asset owners are spending one dollar, one million dollars, or one hour of their time, understanding which investments are actually improving the overall ICS security program and reducing risk is essential to determine where to spend resources.
The NIST Cybersecurity Framework helps asset owners measure security control maturity in both IT and OT domains, and can be useful to understand if ICS security investments are working or not. This talk will breakdown all five NIST CSF functions and focus on specific use cases for each to help jumpstart any ICS security program.
Sandeep Kumar, Sr. Director of Product Marketing & Abdi Saee, Principal Product Marketing Manager
Accelerate network segmentation projects while reducing operational complexity and minimizing business disruption.
Forescout eyeSegment extends the capabilities of the Forescout platform to address segmentation challenges across multiple network domains and multiple enforcement technologies. It enables organizations to embrace zero trust principles for all connected devices, including IoT and OT.
Join us to learn how Forescout eyeSegment:
• Accelerates the design, planning and deployment of dynamic network segmentation across the extended enterprise to reduce your attack surface and regulatory risk.
• Simplifies the process of creating context-aware segmentation policies and simulating them prior to enforcement to minimize business disruption.
• Orchestrates segmentation controls across diverse enforcement technologies and network domains.
Sandeep Kumar, Sr. Director of Product Marketing, Forescout Feat. Chase Cunningham, Principal Analyst, Forrester
In its October 2019 Zero Trust eXtended Ecosystem Wave Report, Forrester calls IoT and OT device security, “one of the hardest problems to solve within the enterprise."* As unmanaged devices become commonplace on networks, security and risk professionals must rethink the concept of identity and expand their Zero Trust initiatives to include such devices.
Watch this live webinar hosted by Forescout Senior Director of Product Marketing Sandeep Kumar, featuring Chase Cunningham of Forrester Research to learn why it’s essential to:
• Embrace Zero Trust holistically across all types of users, devices and connected things
• Expand the concept of identity to include IoT and OT
• Use a context-based approach to enterprise-wide network segmentation
*Source: The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
Tim Jones, Sr. Dir of Sys Engr of Forescout; Scott Register, VP Product Mgt & Dennis Carpio, Sr. Dir , Bus. Dev. of Ixia
The Internet of Things (IoT) means a relentless stream of devices connecting to your network at all times. Together, ForeScout and Ixia have developed a proven approach to achieving constant visibility and control — and in turn, security.
Attend this webinar to learn about emerging challenges at the edge of your network where new users and operational technology (OT) devices may be connecting without alerting your IT team.
You will learn to:
• Continuously secure and manage your network across IT, IoT, and OT devices
• Bridge new visibility gaps from the data center to the network edge
• Streamline and accelerate migration to SD-WAN—without adding risk
Join us to secure devices the moment they connect — and maintain control for as long as they stay connected.
Device Visibility & Control across the extended enterprise
Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk.
Learn more about our products, hear about new cybersecurity trends and see how Forescout helps you address these.