Hi [[ session.user.profile.firstName ]]

The Future of Network Performance, Security and Management Efficiency

Join Arista and Forescout to learn how to reduce cyber risk and increase operational efficiency by providing policy driven network access control (NAC), cognitive network management and dynamic segmentation across campus, data center and cloud environments. Achieve benefits such as boost network performance, increase compliance and better secure heterogeneous networks by:

• Improving visibility and control of devices on wired, wireless and VPN networks
• Increasing security and reducing operating expense
• Accelerating incident response and Zero Trust enforcement
Recorded May 28 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jai Prakash Shukla, Product Line Manag. Lead, Ed Chapman, VP Bus. Dev, Arista, Howie Koh, Princ. Systems Engineer, Forescout
Presentation preview: The Future of Network Performance, Security and Management Efficiency

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Real-World Experiences Deploying & Operationalizing OT Security Recorded: Aug 4 2021 63 mins
    4 Energy-Utility Companies; J Bass, Accenture Managing Dir.; B Proctor, Forescout OT Strategist
    Watch this engaging discussion with a panel of critical infrastructure security experts from Duke Energy, EG.D (an E.ON Group Co.), Enbridge and Southern Company who are each monitoring over 100 sites. Topics include:
    • Priorities an OT SOC should consider and why
    • Lessons learned coordinating IT and OT security operations at scale
    • Overcoming staff and/or network constraints to accelerate OT security deployments without negatively affecting performance
    • Methods to overcome alert noise, rapidly respond to threats appropriately and improve business operations
    • Streamlining program maturity with standards such as NIST and NERC CIP

    Expert Panelists:
    • Tony Souza, Dir. Cybersecurity Architecture & Engineering, Duke Energy
    • Jaroslav Prochazka, Cyber Security Architect, EG.D (an E.ON Group Co.)
    • Doug Leece, OT Security Operations Lead, Enbridge
    • Steve Sanders, Power Delivery Cybersecurity Manager, Southern Company

    Hosted by:
    • Jamie Bass, Accenture Managing Director
    • Brian Proctor, Forescout OT Strategist
  • The State of IoT Cybersecurity Recorded: May 25 2021 32 mins
    Daniel dos Santos, Security Researcher, Forescout Technologies
    While companies rush to deploy IoT devices to address operational and functional gaps, cybercriminals match or exceed that pace with attacks targeting these devices. Forescout’s research team analyzed data on over 8 million devices to come up with an eagle-eye view of the risks IoT devices pose.

    Join our research analyst to learn:
    • What devices introduce the greatest risk to an organization
    • Which industries appear to have greater control of their devices
    • An expert’s advice on an effective path forward for securing IoT devices

    Which device is your weakest link?
  • How to Avoid OT System Downtime with Optimized Security Recorded: May 18 2021 48 mins
    Keith Gilbert, Systems Engineer, Forescout Technologies
    Are you actively protecting your networks from unexpected downtime?

    Have you been making trade-offs between OT security and uptime for the sake of business continuity? What if you don’t have to?

    Now you can prevent unplanned operational downtime and inefficiencies with an optimized OT cybersecurity strategy that includes:
    •ICS/OT threat detection and baselining
    •Optimized risk analysis
    •Network and device group probing

    Join this webinar to learn more about four key principles for minimizing cybersecurity risks across your OT devices:
    •Know what’s on your network
    •Introduce an Asset Risk Framework
    •Organize network devices according to the Purdue Model
    •Selectively probe networks and regulate device access

    Register now to learn how you can reduce business risk with cyber and operational incident prevention.
  • Zero Trust Security for IoT Devices Recorded: May 11 2021 35 mins
    Rich Agar, Systems Engineer, Forescout Technologies
    Achieving full Zero Trust enforcement can be challenging, considering the growing number of IoT and OT devices on corporate networks.

    Gartner states that “nearly 20% of organizations observed at least one Internet of Things (IoT)-based attack in the past three years.” (Gartner, 2019)

    To minimize the risk of a breach, security teams must ensure the right measures are put in place to proactively protect IoT devices.

    Find out what implementing a Zero Trust approach for IoT devices could look like for you.

    Join our webinar to learn how you can:
    • Identify and classify IoT devices
    • Create trust zones for all the devices on your network
    • Enforce least privilege policies
    • Continuously monitor for anomalous activity
    • Orchestrate and automate responses
  • NAME: WRECK – Mitigate Risks of the Latest TCP/IP Vulnerabilities Recorded: Apr 22 2021 49 mins
    Daniel dos Santos, Research Engr Mgr, Tamer Baker, CTO, Robert Slocum, PMM
    Forescout Research Labs, in collaboration with JSOF Research, recently released the third study from Project Memoria - the industry’s most comprehensive study of TCP/IP vulnerabilities. NAME: WRECK covers nine vulnerabilities affecting four popular TCP/IP stacks. These vulnerabilities relate to DNS implementations and can cause Denial of Service or Remote Code Execution, allowing attackers to take targeted IT, IoT or OT devices offline or take control of them.

    Join this roundtable discussion to learn about:

    • The most recently discovered vulnerabilities and how they impact FreeBSD, IPnet, Nucleus NET and NetX TCP/IP stacks
    • The types of organizations and devices these vulnerabilities are most likely to affect
    • How Forescout can help assess risk and protect enterprise networks
    • Mitigation strategies, tips & tricks and more

    Speakers:
    Daniel dos Santos, Research Manager, Forescout Research Labs
    Tamer Baker, Forescout CTO, Regional
    Robert Slocum, Forescout Sr. Product Marketing Manager
  • Lessons from the Trenches: An Electric Utility Discovers the Power of Zero Trust Recorded: Apr 14 2021 50 mins
    Jeff Haidet, Director of Application Development and Architecture, South Central Power Co.
    Ohio’s South Central Power Company (SCP) had invested considerable time and money in a multilayered, multivendor security stack. However, SCP officials still had no idea how many devices were on its network or whether their portfolio provided accurate information. They knew a Zero Trust solution could help but weren’t interested in adding another point solution.

    In this Lessons from the Trenches webinar, SCP’s Jeff Haidet discusses how he and his team searched for and found the platform that brought complete visibility and effective Zero Trust policy enforcement to South Central Power.

    Discussion highlights include:
    · The benefits of complete device visibility and effective Zero Trust policy enforcement
    · Applying continuous enforcement and monitoring of least-privileged NAC
    · Simplifying and accelerating design and deployment of network segmentation
    · Enhancing the overall effectiveness and value of SPC’s security stack
  • Using Research and Best Practices to Secure IoT Devices Recorded: Mar 31 2021 61 mins
    Robert S, PMM, Daniel S, Research Engr Mgr, T Baker, Principle Systems Engr, Robert L, Sr Systems Engineer
    The recent Verkada security camera breach impacted 150,000 IP cameras. This massive breach dominated headlines and spurred conversations among enterprise security teams and Board members who want answers to one critical question: Are our IoT devices secure?

    What can we learn from this breach in light of increasingly frequent attacks on IoT devices? Please join us as members of Forescout Research Labs, our system engineers and a featured Forescout customer discuss:
    • The recent attack landscape
    • Newly discovered IoT device vulnerabilities
    • Trends and best practices to mitigate these IoT risks
  • A New Era in DODIN Security: What C2C Brings to the Cyber Fight Recorded: Jan 26 2021 52 mins
    Edward Tuorinsky, Principal DTS, Carmen Santos-Logan, Deputy Director, DoD CIO, Cpt. David Tan, C2C Project Officer, USMC
    Comply-to-Connect is a framework that restricts unauthorized device access; reduces known vulnerabilities; takes actions to detect, identify, characterize, report and deter anomalous behaviors; and maintains the secure configuration of the network and its information resources. C2C capabilities secure all endpoints connected to the DODIN including IT, OT, PIT, ICS, IoT, Cloud and Datacenter devices. Watch now to learn from DoD leaders how C2C is rolling out across the DoD Enterprise to make cybersecurity move effectively and efficiently.
  • Cómo minimizar los riesgos de ciberseguridad en los dispositivos de OT Recorded: Jan 26 2021 66 mins
    Miguel Angel Rodriguez, Senior BDM, Forescout Technologies
    ¿Protege de forma activa sus redes para evitar períodos de inactividad imprevistos?

    ¿Se ha visto obligado a elegir entre seguridad de OT y tiempo de actividad para garantizar la continuidad de la actividad empresarial? ¿Y si esto no fuera necesario?

    Ahora puede evitar las interrupciones no planificadas y las ineficacias en las operaciones con una estrategia de ciberseguridad de OT optimizada que incluye:
    • Detección de amenazas de ICS/OT y análisis de línea de base
    • Análisis de riesgos optimizado
    • Sondeo de red y grupos de dispositivos

    Participe en este seminario web para descubrir los cuatro principios básicos para minimizar los riesgos de ciberseguridad en los dispositivos de OT:
    • Saber qué hay en su red
    • Introducir un marco de evaluación de riesgos
    • Organizar los dispositivos de la red según el modelo Purdue
    • Sondear grupos de redes y regular el acceso de los dispositivos

    Inscríbase ahora para descubrir cómo reducir el riesgo para la empresa con la prevención de incidentes operativos y de ciberseguridad.
  • Réduire les risques de cybersécurité des appareils OT Recorded: Jan 26 2021 54 mins
    Philippe Mathon, Systems Engineer, Forescout Technologies
    Protégez-vous efficacement vos réseaux contre les interruptions non planifiées ?

    Négligez-vous la sécurité et la disponibilité des systèmes OT pour assurer la continuité des activités ? Et si vous n’aviez pas à le faire ?

    Vous pouvez désormais éviter les interruptions non planifiées et les inefficacités grâce à une stratégie de cybersécurité OT optimisée incluant :
    • la détection des menaces ICS/OT et l’établissement de valeurs de référence ;
    • une analyse optimisée des risques ;
    • l’analyse des réseaux et des appareils.

    Participez à ce webinar pour en savoir plus sur les quatre principes de base permettant de réduire les risques de cybersécurité des appareils OT :
    • Visibilité sur les appareils connectés à votre réseau
    • Établissement d’un cadre d’évaluation des risques des actifs
    • Organisation des appareils connectés à votre réseau selon le modèle Purdue
    • Analyse de certains réseaux et contrôle de l’accès des appareils

    Inscrivez-vous dès à présent et découvrez comment réduire les risques métier grâce à la prévention des incidents opérationnels et de cybersécurité.
  • Limitare i rischi informatici nei dispositivi OT Recorded: Jan 26 2021 46 mins
    Stefano Innocenti, Channel Systems Engineer, Forescout Technologies
    Stai proteggendo attivamente le tue reti da blocchi operativi non preventivati?

    Stai sacrificando la sicurezza OT a favore dell'operatività per salvaguardare la continuità aziendale? E se non fosse necessario farlo?

    Ora puoi prevenire i blocchi operativi imprevisti e le inefficienze adottando una strategia di strategia per la sicurezza informatica ottimizzata che include:
    • Rilevamento delle minacce ICS/OT e baselining
    • Analisi dei rischi ottimizzata
    • Sondaggio della rete e dei gruppi di dispositivi

    Partecipa a questo webinar per conoscere i quattro principi cardine di una strategia di riduzione dei rischi informatici nei dispositivi OT:
    • Avere visibilità sui dispositivi presenti in rete
    • Introdurre un framework per la gestione dei rischi delle risorse
    • Organizzare i dispositivi della rete in base al modello Purdue (pianificazione e controllo)
    • Sondare selettivamente le reti e regolare l'accesso dei dispositivi

    Iscrivi subito per scoprire come ridurre il rischio aziendale adottando una strategia di prevenzione degli incidenti informatici e operativi.
  • How to Avoid OT System Downtime with Optimized Security Recorded: Jan 26 2021 48 mins
    Keith Gilbert, Systems Engineer, Forescout Technologies
    Are you actively protecting your networks from unexpected downtime?

    Have you been making trade-offs between OT security and uptime for the sake of business continuity? What if you don’t have to?

    Now you can prevent unplanned operational downtime and inefficiencies with an optimized OT cybersecurity strategy that includes:
    • ICS/OT threat detection and baselining
    • Optimized risk analysis
    • Network and device group probing

    Join this webinar to learn more about four key principles for minimizing cybersecurity risks across your OT devices:
    • Know what’s on your network
    • Introduce an Asset Risk Framework
    • Organize network devices according to the Purdue Model
    • Selectively probe networks and regulate device access

    Register now to learn how you can reduce business risk with cyber and operational incident prevention.
  • Mehr Cybersicherheit für Ihre OT-Geräte Recorded: Jan 26 2021 48 mins
    Christian Rippel, Pre-sales Engineer, Forescout Technologies
    Schützen Sie Ihre Netzwerke aktiv vor ungeplanten Ausfallzeiten?

    Gehen Sie Kompromisse zwischen IT-Sicherheit und Verfügbarkeit ein, um Unterbrechungen im Geschäftsbetrieb zu vermeiden? Was würden Sie sagen, wenn das gar nicht nötig wäre?

    Mit einer Strategie für optimierte OT-Cybersicherheit können Sie jetzt ungeplante Ausfallzeiten und Ineffizienz vermeiden, und zwar mit:
    • ICS/OT-Bedrohungserkennung und Basislinienbestimmung
    • Optimierte Risikoanalyse
    • Netzwerk- und Gerätegruppen-Tests

    In diesem Webinar erfahren Sie mehr über die vier Grundprinzipien für diezur Minimierung von Cybersicherheitsrisiken für Ihre OT-Geräte:
    • Den Überblick über Ihr Netzwerküberblick erschaffen behalten
    • Ein Risiko-Framework einführen
    • Netzwerkgeräte entsprechend dem Purdue-Modell organisieren
    • Netzwerke gezielt testen und den Gerätezugriff regulieren
  • Sécurité Zero Trust pour les appareils IoT Recorded: Jan 14 2021 55 mins
    Philippe Mathon, Systems Engineer, Forescout Technologies
    La mise en œuvre d’une approche Zero Trust n’est pas chose facile compte tenu du nombre croissant d’appareils IoT et OT connectés aux réseaux d’entreprise.

    Selon Gartner, « près de 20 % des entreprises ont subi au moins une attaque ciblant des appareils IoT (Internet des objets) au cours des trois dernières années ». (Gartner, 2019)

    Pour limiter le risque de compromission, les équipes de sécurité doivent protéger proactivement les appareils IoT au moyen de mesures adaptées.

    Découvrez à quoi pourrait ressembler l’implémentation d’une approche Zero Trust pour les appareils IoT de votre entreprise.

    Participez à notre webinar, au cours duquel les thèmes suivants seront abordés :
    • Identification et classification des appareils IoT
    • Création de zones de confiance pour tous les appareils connectés à votre réseau
    • Application de politiques basées sur le principe du moindre privilège
    • Surveillance continue des activités anormales
    • Orchestration et automatisation des interventions
  • Sicurezza Zero Trust per i dispositivi IoT Recorded: Jan 14 2021 54 mins
    Stefano Innocenti, Channel Systems Engineer, Forescout Technologies
    L’implementazione di un approccio Zero Trust non è semplice, considerando il crescente numero di dispositivi IoT e OT collegati alle reti aziendali.

    Secondo Gartner “quasi il 20% delle aziende ha subito almeno un attacco basato contro dispositivi IoT (Internet of Things) negli ultimi tre anni.” (Gartner 2019).

    Per ridurre il rischio di una violazione, i team della sicurezza devono proteggere proattivamente i dispositivi IoT con misure adeguate.

    Scopri come potrebbe essere l’implementazione di un approccio Zero Trust per i dispositivi IoT della tua azienda.

    Partecipa al nostro webinar nel corso del quale saranno affrontati i seguenti argomenti:
    • Identificazione e classificazione dei dispositivi IoT
    • Creazione di zone di fiducia per tutti i dispositivi collegati alla tua rete
    • Applicazione di policy basate sul principio del privilegio minimo
    • Monitoraggio costante delle attività anomale
    • Orchestrazione e automazione degli interventi
  • Zero Trust Security for IoT Devices Recorded: Jan 14 2021 34 mins
    Rich Agar, Systems Engineer, Forescout Technologies
    Achieving full Zero Trust enforcement can be challenging, considering the growing number of IoT and OT devices on corporate networks.

    Gartner states that “nearly 20% of organizations observed at least one Internet of Things (IoT)-based attack in the past three years.” (Gartner, 2019)

    To minimize the risk of a breach, security teams must ensure the right measures are put in place to proactively protect IoT devices.

    Find out what implementing a Zero Trust approach for IoT devices could look like for you.

    Join our webinar to learn how you can:
    • Identify and classify IoT devices
    • Create trust zones for all the devices on your network
    • Enforce least privilege policies
    • Continuously monitor for anomalous activity
    • Orchestrate and automate responses
  • Zero-Trust-Sicherheit für IoT-Geräte Recorded: Jan 14 2021 52 mins
    Daniel Künzli, Pre-sales Engineer, Forescout Technologies
    Durch die wachsende Zahl von IoT- und OT-Geräten in Unternehmensnetzwerken ist eine vollständige Durchsetzung von Zero-Trust-Sicherheit häufig schwierig.

    Laut Gartner haben „fast 20 % aller Unternehmen in den vergangenen drei Jahren mindestens einen IoT-basierten Angriff verzeichnet.“ (Gartner, 2019)

    Um das Risiko einer Sicherheitsverletzung zu verringern, müssen Sicherheitsteams geeignete Maßnahmen ergreifen, mit denen IoT-Geräte proaktiv geschützt werden.
    Erfahren Sie, wie Sie den Zero-Trust-Ansatz für IoT-Geräte in Ihrem Unternehmen implementieren können.

    Nehmen Sie an unserem Webinar mit folgenden Themen teil:
    • Erkennen und Klassifizieren von IoT-Geräten
    • Erstellen von vertrauenswürdigen Zonen für alle Geräte in Ihrem Netzwerk
    • Durchsetzen von Least-Privilege-Richtlinien
    • Permanente Überwachung auf ungewöhnliche Aktivitäten
    • Koordinieren und Automatisieren von Reaktionsmaßnahmen
  • Seguridad Zero Trust para dispositivos IoT Recorded: Jan 14 2021 63 mins
    Arturo Guillén, Systems Engineer, Forescout Technologies
    Implementar una estrategia de confianza cero o desconfianza total, lo que se conoce como "Zero Trust", puede ser difícil, sobre todo si tenemos en cuenta el aumento del número de dispositivos IoT y OT en las redes empresariales.

    Según Gartner en un informe del 2019, "casi el 20 % de las empresas han sufrido al menos un ataque basado en el Internet de las cosas (IoT) en los tres últimos años".

    Para minimizar el riesgo de una fuga de datos, los equipos de seguridad deben garantizar que se adopten las medidas adecuadas para proteger de manera proactiva los dispositivos IoT.

    Descubra cómo sería la implementación de una estrategia Zero Trust para sus dispositivos IoT.

    Únase a nuestro seminario web para aprender a:
    • Identificar y clasificar los dispositivos IoT
    • Crear zonas de confianza para todos los dispositivos de su red
    • Aplicar una política de limitación de privilegios al mínimo
    • Supervisar continuamente la actividad para detectar anomalías
    • Organizar y automatizar las respuestas
  • Cyber and the Water Sector: A Journey to Compliance Recorded: Dec 16 2020 70 mins
    Experts from Accenture, Welsh Water and Forescout
    In this recording, from a recent briefing hosted by techUK, we explore the progress and next steps to increase compliance in the water sector.

    This event includes three presentations from security professionals at Accenture, Welsh Water and Forescout.

    The topics covered include:
    • NIS Directive impacts: where have we seen progress?
    • Emerging threats: how is the threat landscape changing, post-COVID?
    • Technological innovation: how can the water sector keep pace with key security innovations?
    • Exploring how organisations across water and cyber can better engage, sharing best practice and partnering effectively.
  • How to Avoid OT System Downtime with Optimized Security Recorded: Dec 14 2020 48 mins
    Keith Gilbert, Systems Engineer, Forescout Technologies
    Are you actively protecting your networks from unexpected downtime?

    Have you been making trade-offs between OT security and uptime for the sake of business continuity? What if you don’t have to?

    Now you can prevent unplanned operational downtime and inefficiencies with an optimized OT cybersecurity strategy that includes:
    •ICS/OT threat detection and baselining
    •Optimized risk analysis
    •Network and device group probing

    Join this webinar to learn more about four key principles for minimizing cybersecurity risks across your OT devices:
    •Know what’s on your network
    •Introduce an Asset Risk Framework
    •Organize network devices according to the Purdue Model
    •Selectively probe networks and regulate device access

    Register now to learn how you can reduce business risk with cyber and operational incident prevention.
Webcasts for Network Security Professionals
Your organization has become an Enterprise of Things (EoT). PCs, mobile devices, cloud workloads and other traditional IT systems. Agentless IoT and OT devices. Device diversity is thriving at the cost of security as your users connect from all over the map – literally.

Every thing that touches your enterprise network exposes you to potential risk. You must see it and secure it.

Get to know Forescout. Learn more about our products, hear about new cyber security trends and see how Forescout helps you address these.

We offer the only solution that actively defends the Enterprise of Things at scale. Register for our webinars or visit our website for more information: www.forescout.com

Webinar languages include English, German, French, Italian and Spanish.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Future of Network Performance, Security and Management Efficiency
  • Live at: May 28 2020 3:00 pm
  • Presented by: Jai Prakash Shukla, Product Line Manag. Lead, Ed Chapman, VP Bus. Dev, Arista, Howie Koh, Princ. Systems Engineer, Forescout
  • From:
Your email has been sent.
or close