Hi [[ session.user.profile.firstName ]]

Compliance in FinServ… Cloudy with a chance of uncertainty

As the world fights a pandemic, we all agree there is no such thing as ”business as usual”. World economies continue to spiral towards a recession. Businesses must adapt and respond to the rapidly changing social and economic climate while continuing to address regulatory compliance mandates. This environment creates the perfect storm for bad actors who continue to relentlessly exploit vulnerabilities with the intent to exfiltrate, expose and exploit sensitive financial data. Join our solutions team of Thomas Nuth and Jannine Mahone as they discuss:
• Forces that create the perfect storm for escalated cyber attacks
•Three steps to improving cyber security and compliance
•Building a cyber resilient library of resources to help weather the storm
Recorded Apr 17 2020 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Thomas Nuth and Jannine Mahone
Presentation preview: Compliance in FinServ… Cloudy with a chance of uncertainty

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • NAC moderno vs. tradicional Jul 8 2020 2:00 pm UTC 60 mins
    Ricardo Hernández, Forescout Technologies
    El número de dispositivos no gestionados supera ampliamente al de dispositivos gestionados. Estos dispositivos no se autentican mediante los métodos tradicionales cuando se conectan a la red. Por lo tanto, no pueden identificarse con el proceso de autenticación.

    El control de acceso a la red (NAC) moderno ofrece una amplia variedad de funciones esenciales que van desde la identificación, las evaluaciones de estado y el cumplimiento, hasta la supervisión de los dispositivos conectados y las respuestas automatizadas. Un enfoque moderno del control de acceso a la red (NAC) puede mejorar su higiene de seguridad, impidiendo que se conecten a su red dispositivos no autorizados, no fiables o que suplantan a otros. Además, en su Guía de mercado NAC de 2020, Gartner recomienda que las organizaciones "adapten los proyectos de NAC a cualquier iniciativa de seguridad Zero Trust".

    Únase a este seminario web para descubrir cómo:
    • Identificar, clasificar e inventariar todos los dispositivos
    • Evaluar el estado de seguridad y cumplimiento de normativas
    • Controlar el acceso entre redes heterogéneas
  • Modern vs. Traditional NAC Jul 8 2020 1:00 pm UTC 45 mins
    Keith Gilbert, Systems Engineer, Forescout Technologies
    Unmanaged device growth is vastly outpacing managed devices. These devices do not authenticate using traditional methods when they connect to the network. Hence, they cannot be identified via the authentication process.

    Modern NAC spans a range of essential capabilities – from identification, posture and compliance assessments, and monitoring of connected devices all the way to automated responses. A modern NAC approach can improve your security hygiene by preventing unauthorized, rogue and impersonating devices from connecting to your network. In addition, in its 2020 NAC Market Guide, Gartner recommends that organisations, “align NAC projects with any Zero Trust security initiative”.

    Join this webinar to learn about ways to help you:
    • Discover, classify and inventory all devices
    • Assess security posture and enforce compliance
    • Control access across heterogeneous networks
  • Soluzioni NAC tradizionali e moderne a confronto Jul 8 2020 12:00 pm UTC 45 mins
    Stefano Innocenti, Channel Systems Engineer, Forescout Technologies
    Il numero di dispositivi non gestiti sta superando abbondantemente il numero di quelli gestiti. Quando si connettono alla rete, i dispositivi non gestiti non possono essere autenticati con metodi tradizionali pertanto, sfuggono al tradizionale processo di autenticazione.

    La moderna tecnologia NAC, cioè di controllo degli accessi alla rete, copre un'ampia gamma di funzionalità essenziali rivolte ai dispositivi, come l'identificazione, la valutazione dello stato di sicurezza e conformità, il monitoraggio dei dispositivi connessi fino alle risposte automatizzate. Una moderna strategia di controllo degli accessi alla rete concorre a migliorare lo stato di sicurezza globale impedendo l'ingresso in rete di dispositivi non autorizzati, inaffidabili o che si spacciano per legittimi. Tra l'altro, nella sua guida al Mercato NAC per il 2020 Gartner raccomanda alle aziende di "allineare i progetti NAC a qualsiasi iniziativa di sicurezza Zero Trust".

    Partecipa a questo webinar per scoprire nuovi metodi per:
    • Scoprire, classificare e inserire in un inventario tutti i dispositivi connessi
    • Valutare lo stato di sicurezza e imporre la conformità
    • Controllare gli accessi in reti eterogenee
  • NAC neu überdacht Jul 8 2020 11:00 am UTC 60 mins
    Christian Rippel, Presales Engineer, Forescout Technologies
    Die Anzahl nicht verwalteter Geräte wächst exponentiell. Diese Geräte authentifizieren sich beim Verbinden mit dem Netzwerk nicht mithilfe herkömmlicher Methoden und können daher beim Authentifizierungsprozess nicht identifiziert werden.

    Moderne NAC-Lösungen bieten unverzichtbare Funktionen wie Identifizierung, Einstufung der Sicherheitslage und Konformität sowie Überwachung aller verbundener Geräte bis hin zu automatisierten Problembehebungsmaßnahmen.

    Ein moderner NAC-Ansatz kann Ihre Sicherheitsmaßnahmen verbessern, indem er unberechtigten, nicht autorisierten Geräten die Verbindung mit dem Netzwerk verweigert. Im Sinne der Empfehlung des NAC-Marktleitfadens für 2020 von Gartner empfiehlt es sich, NAC-Projekte mit allen Zero-Trust-Sicherheitsinitiativen abzustimmen.

    Erfahren Sie in diesem Webinar, wie Sie diese Vorteile für sich nutzen können:
    • Erkennung, Klassifizierung und Bestandserfassung aller per IP-Adresse verbundener Geräte
    • Einstufung der Sicherheitslage und Einhaltung von Konformitätsrichtlinien
    • Zugriffskontrolle in heterogenen Unternehmensnetzwerken
  • NAC moderne contre NAC traditionnel Jul 8 2020 9:00 am UTC 60 mins
    Cédric Antoine, Systems Engineer, Forescout Technologies
    Le nombre d’appareils non gérés dépasse largement celui des appareils gérés. Ces appareils, lorsqu’ils se connectent au réseau, ne s’authentifient pas à l’aide des méthodes traditionnelles. Par conséquent, ils échappent à l’identification du processus d’authentification.

    Les solutions NAC modernes offrent un large éventail de fonctionnalités essentielles : identification, évaluation du niveau de sécurité et de conformité, surveillance des appareils connectés, automatisation des actions d’intervention. Une stratégie basée sur un NAC moderne peut améliorer vos pratiques de sécurité en empêchant les appareils non autorisés, non approuvés et faussement légitimes de se connecter à votre réseau. En outre, dans son Guide 2020 du marché des solutions de contrôle d’accès au réseau, Gartner recommande aux entreprises « d’aligner leurs projets NAC sur leurs éventuelles initiatives de sécurité Zero Trust ».

    Rejoignez ce webinaire pour apprendre comment vous pouvez :
    • découvrir, classifier et répertorier tous les appareils ;
    • évaluer leur niveau de sécurité et vous assurer qu’ils sont conformes ;
    • contrôler l’accès aux réseaux hétérogènes.
  • Transforming Enterprise-Wide Network Segmentation Recorded: Jun 29 2020 43 mins
    Doug Card, Senior Product Manager eyeSegment – Forescout Technologies
    CISOs are faced with the challenges of a growing number of threats while meeting more and more compliance directives. The new era of network segmentation has been designed to allow businesses to automate the identification and isolation of threats, without impacting operations. Despite network segmentation not being a new concept, adoption across the enterprise has been slow and when undertaken, often tedious – as typically organizations layer network segmentation on top of an existing network.
    Advanced network segmentation requires traffic context. Having insight into what devices are communicating between each other and what counts as legitimate or illegitimate traffic is paramount for CISOs today. Forescout’s eyeSegment allows organizations to create a baseline of what is communicating with what and helps make sense of the network chaos associated with the volume and diversity of connected devices, matching the demand from businesses to secure critical applications, mitigate increased exposure due to IoT devices and block the lateral movement of threats across flat networks.
  • What You Need to Know about Ripple20 Recorded: Jun 25 2020 38 mins
    Shlomi Oberman, CEO & Researcher, JSOF & Daniel dos Santos, Security Researcher, Forescout Technologies
    A Conversation with Shlomi Oberman from JSOF

    According to Gartner, “over 80% of organizations currently use IoT to solve business use cases, and almost 20% of organizations have already detected an IoT-based attack in the past three years.” By now, you’ve heard about Ripple20 – the collective group of vulnerabilities in a widely used Transmission Control Protocol/Internet Protocol (TCP/IP) software library developed by Treck Inc., and discovered by a team at JSOF.

    JSOF partnered with Forescout Research Labs to use Forescout’s Device Cloud, a unique data lake with information from more than 12 million devices categorized in more than 150 device types, to identify potentially impacted vendors and devices. Tens of millions of devices across over 50 vendors may be affected, exposing a complex supply chain for IoT devices. Additionally, threat actors could execute remote commands against devices connected to the internet, compromise them and move laterally within the network to access or infect other devices.

    How do security teams respond swiftly to identify and mitigate these vulnerable devices?

    Join us for a lively conversation with Shlomi Oberman (JSOF) and Daniel dos Santos (Forescout) as they explain:
    • What really is Ripple20? – a deep dive into discovered vulnerabilities
    • The impact on the supply chain and the impacted vendors
    • How to mitigate the risks – even in environments where these devices cannot be patched
    • What vendors and security teams must do next to limit their exposure
  • Which device will be YOUR weakest link? Recorded: Jun 22 2020 32 mins
    Daniel dos Santos, Security Researcher, Forescout Technologies
    While companies rush to deploy IoT devices to address operational and functional gaps, cybercriminals match or exceed that pace with attacks targeting these devices. Forescout’s research team analyzed data on over 8 million devices to come up with an eagle-eye view of the risks IoT devices pose.

    Join our research analyst to learn:
    • What devices introduce the greatest risk to an organization
    • Which industries appear to have greater control of their devices
    • An expert’s advice on an effective path forward for securing IoT devices
  • Lessons from the Trenches: Serving Justice Remotely During COVID-19 Recorded: Jun 11 2020 40 mins
    Sajed Naseem, CISO, NJ State Courts, Jack McCarthy, CIO, NJ State Courts & Ellen Sundra, VP of Systems Engineering, Forescout
    When the pandemic hit in early March, the New Jersey Judiciary was faced with a monumental task to transform the court systems to operate virtually, while remaining secure. Join this session to hear firsthand from New Jersey Judiciary’s CIO, Jack McCarthy, and CISO, Sajed Naseem, as they bring you along in their leadership journey toward digital transformation.

    Discussion highlights include:
    • Expanding technological infrastructure to support triple the amount of people working remotely while staying secure with VPN
    • Building ten times the number of existing virtual courtrooms within two weeks while enforcing network access controls that ensure only the right people get in
    • Achieving full visibility and governance of 50,000 devices within two weeks
    • Applying network security strategy and tactics to ensure the health and security of employees and the public are protected while keeping the judiciary system uninterrupted
  • Return to the Workplace without Introducing Risk Recorded: Jun 5 2020 41 mins
    Bob Reny, EMEA CTO and Principal Engineer, Forescout & Shawn Taylor, Senior Systems Engineer, Forescout
    Events surrounding the COVID-19 pandemic have accelerated the migration to a remote workforce. Unfortunately, this rapid migration may have also adversely impacted the risk profile of your environment. This webinar covers Forescout best practices that can help you double-check your Forescout deployment—including your remote users’ asset software profile and compliance state—before employees and contractors begin returning to the workplace. Forescout presenters Bob Reny and Shawn Taylor address common components, policy interaction and best practices for streamlined compliance and enforcement, including:

    • Integration/polling
    • Policy workflow with classification, ownership and BYOD
    • Dashboards and upstream reporting
    • Segmentation and NAC impacts
  • The Future of Network Performance, Security and Management Efficiency Recorded: May 28 2020 58 mins
    Jai Prakash Shukla, Product Line Manag. Lead, Ed Chapman, VP Bus. Dev, Arista, Howie Koh, Princ. Systems Engineer, Forescout
    Join Arista and Forescout to learn how to reduce cyber risk and increase operational efficiency by providing policy driven network access control (NAC), cognitive network management and dynamic segmentation across campus, data center and cloud environments. Achieve benefits such as boost network performance, increase compliance and better secure heterogeneous networks by:

    • Improving visibility and control of devices on wired, wireless and VPN networks
    • Increasing security and reducing operating expense
    • Accelerating incident response and Zero Trust enforcement
  • Lessons from the Trenches: Protecting the Mothership by Knowing Who’s On Board Recorded: May 27 2020 42 mins
    Joe Cardamone, NA Privacy Officer & Sr. InfoSec Analyst, Haworth, Shane Coleman, Sr. Director of Sys Engineering, Forescout
    Like so many in recent months, the teams at Haworth went virtual practically overnight, creating the need to batten down the hatches on VPN access. In this session, Joe Cardamone shares how they securely kept the business moving forward while creating an opportunity to evaluate and strengthen their orchestration policies.

    Discussion highlights include:
    • The time is ripe for gaining a clearer picture of your network segments
    • Getting more information from VPN-connected devices
    • Why information security should have a seat at the table for crisis planning and business agility
  • Accelerate Enterprise-Wide Network Segmentation with eyeSegment (in Hebrew) Recorded: May 21 2020 55 mins
    Eli Fainberg, Senior Director, Product Management at Forescout Technologies & Meni Bondarkar, CTO at 10Secure
    Accelerate network segmentation projects while reducing operational complexity and minimizing business disruption.

    Forescout eyeSegment extends the capabilities of the Forescout platform to address segmentation challenges across multiple network domains and multiple enforcement technologies. It enables organizations to embrace zero trust principles for all connected devices, including IoT and OT.

    Join Forescout and 10Secure to learn how Forescout eyeSegment:
    • Accelerates the design, planning and deployment of dynamic network segmentation across the extended enterprise to reduce your attack surface and regulatory risk.
    • Simplifies the process of creating context-aware segmentation policies and simulating them prior to enforcement to minimize business disruption.
    • Orchestrates segmentation controls across diverse enforcement technologies and network domains.
  • Increase Reliability & Reduce Risk with a Healthy Hospital Infrastructure Recorded: May 20 2020 51 mins
    Mark Farrow, HC VP & CIO; Andy Brown, Arista; Lyle Kelly & Scott Barrett, Forescout; Tom Finn, Medigate
    Join Mark Farrow, an industry renowned Healthcare VP & CIO with 35+ years experience leading IT & Clinical Informatics teams, as he discusses with Arista Networks, Forescout and Medigate healthcare experts the many issues facing hospital networks and connected medical devices in today’s world and how to overcome them by building a Healthy Hospital infrastructure that is:

    - Reliable
    - Cybersecure
    - Actionable
    - Automated
    - Compliant

    In this webinar you will learn how to build a Healthy Hospital infrastructure that is founded on 5 key principles that help reduce the risk of cyberattacks, increase operational and asset management efficiency, reduce costs, improve application performance and protect digital patient services and data.

    Thanks for joining. See you there.
  • Lessons from the Trenches: CMMC Risk & Reality Recorded: May 14 2020 40 mins
    Leo Sheridan, Global Sys. Integrator, Dave Olschewske, Sys. Engineer & Dean Hullings, Global Defense Solutions, Forescout
    In June 2020, the U.S. Department of Defense (DoD) will begin including requirements for contractors to meet specified levels of the Cybersecurity Maturity Model Certification (CMMC). Published in January 2020, CMMC Version 1.0 is a new set of cybersecurity standards that may impact up to 300,000 companies—including being subject to audits by third-party assessors. Do you contract or subcontract with the DoD? Join this session to learn who will be impacted, how, and what steps you can take to prepare.
  • Protección de los teletrabajadores más allá de la VPN Recorded: May 7 2020 29 mins
    Arturo Guillén, Systems Engineer, Forescout Technologies
    Cuando asistimos a un rápido cambio al trabajo a distancia son muchos los factores que hay que tener en cuenta. La prioridad para la mayoría de los equipos es mantener la productividad. Muchas empresas se han planteado en primer lugar las VPN y han escalado rápidamente su infraestructura para permitir a los empleados acceder a distancia a los recursos locales de la empresa.

    Mientras tanto, los equipos de seguridad siguen luchando para garantizar la seguridad sin interrumpir la actividad de la empresa. Para minimizar el riesgo, las empresas necesitan una visibilidad total de la seguridad de los recursos propiedad de los empleados y corporativos que se conectan a distancia.
    Únase a Forescout para descubrir cómo puede hacer lo siguiente rápidamente:

    • Descubrir todos los dispositivos remotos que hay conectados a su red, incluidos los sistemas personales usados en la empresa (BYOD).
    • Identificar qué dispositivos remotos cumplen sus directivas de seguridad y cuáles no.
    • Automatizar los controles basados en directivas para proteger su red, incluso con un equipo de teletrabajadores.
  • Implementing Enterprise-Wide Network Segmentation Recorded: May 6 2020 38 mins
    Abdi Saee, Principal Product Marketing Manager, Doug Card, eyeSegment Product Manager Forescout Technologies
    Successfully implement enterprise-wide network segmentation while reducing operational complexity and minimizing business disruption. The Forescout platform and its eyeSegment product address organizations’ cross-domain, multi-use-case segmentation challenges across extended enterprises. Through context-aware policies, real-time visualizations, business-structured groups and proactive policy simulations, the Forescout platform enables segmentation controls that span diverse enforcement technologies and validate expected outcomes.

    Join us to:
    - Explore different approaches and best practices around dynamic network segmentation across the extended enterprise
    - Learn about the latest enhancements and capabilities in Forescout eyeSegment, which helps you simplify the process of creating and simulating context-aware segmentation policies to minimize business disruption.
    - See eyeSegment in action with a live demo highlighting some of the enterprise-wide network segmentation use cases
  • Identify and Act on High-Risk Devices – Faster (in Arabic) Recorded: May 5 2020 43 mins
    Ahmed Abdelmotaleb, Systems Engineer, METAR, Forescout Technologies
    The mass expansion and proliferation of IT, IoT and OT devices pose new questions to network security: Legacy and vulnerable devices, noncompliant and misconfigured endpoints, and IoT and OT devices must all be identified and reported back to the board.

    Without a complete picture of connected devices across network domains, the ability to act quickly to mitigate risks is all but lost.

    Imagine you can access the right data about devices connecting to your network in real time to quickly identify and take action against high-risk devices that may pose threats to your organization. See how quickly you can identify IoT devices, segment them and show the board how you mitigated risks during a global outbreak.

    Join this webinar in Arabic to learn about ways to help you:

    - Identify and mitigate risk across the extended enterprise – Faster
    - Deploy enterprise-wide network segmentation – Easier
    - Demo: Control a real-life outbreak scenario – Better
  • Getting Richer Visibility and Classification of Remote Devices Recorded: Apr 30 2020 37 mins
    Nick Duda, Principal Security Engineer, HubSpot & Howie Koh, Principal System Engineer, Forescout
    Organization are quickly adapting to support a global remote workforce and preparing for this to become the new norm. This shift has left IT security teams scrambling to sustain cyber hygiene and bolster cybersecurity to address escalated risk.
    Nick Duda, Principal Security Engineer of HubSpot, shares what he and his peers have learned during this time and what actionable steps you can take to improve visibility and control of VPN-connected devices.
    In this webinar, you will learn how to:
    •Increase network admission data to better secure remote devices
    •Update device classification policies to improve controls
    •Leverage third-party technology integrations to strengthen endpoint defenses
  • Vai oltre la VPN per garantire la sicurezza della forza lavoro remota Recorded: Apr 29 2020 58 mins
    Stefano Innocenti, Channel Systems Engineer - Southern Europe, Forescout Technologies
    La brusca transizione allo smart working non è stata priva di sfide per le aziende. Per la maggior parte dei team, la priorità resta preservare la produttività. Tantissime aziende hanno prima di tutto attivato una VPN e quindi rapidamente ridimensionato l'infrastruttura per consentire ai dipendenti che lavorano da remoto di accedere alle risorse aziendali. Nel frattempo, i responsabili della sicurezza continuano a scontrarsi con la necessità di garantire la sicurezza senza interrompere l’attività lavorativa. Per contenere al massimo i rischi, le aziende devono avere visibilità completa sullo stato di sicurezza sia delle risorse aziendali sia di quelle di proprietà dei dipendenti che si connettono da remoto.

    Scopri insieme a Forescout come:

    • Rilevare rapidamente tutti i dispositivi remoti connessi alla tua rete, sistemi personali (BYOD) compresi
    • Individuare rapidamente quali dispositivi connessi da remoto soddisfano i tuoi requisiti di sicurezza e quali no
    • Attivare rapidamente e automaticamente controlli basati su policy per proteggere la tua rete, anche in presenza di una forza lavoro remota.
Device Visibility & Control across the extended enterprise
The Forescout platform provides organisations with complete situational awareness of their extended enterprise and the ability to orchestrate actions to reduce cyber risk.

Learn more about our products, hear about new cybersecurity trends and see how Forescout helps you address these.

Webinar languages include English, German, French, Italian and Spanish.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Compliance in FinServ… Cloudy with a chance of uncertainty
  • Live at: Apr 17 2020 6:00 pm
  • Presented by: Thomas Nuth and Jannine Mahone
  • From:
Your email has been sent.
or close