Hi [[ session.user.profile.firstName ]]

Advance Your Healthcare Delivery Organization’s Network Segmentation Practices

In order to successfully implement segmentation controls for healthcare delivery organizations, it is key to leverage real-time, rich contextual device and risk intelligence, particularly for medical devices, that also drives automation of dynamic context-aware segmentation and network access policy enforcement without compromising critical operations or patient safety. Learn how the Forescout and Medigate integrated solution helps you proactively and safely defend against cyberattacks or breaches through advanced device intelligence and segmentation controls.

Watch this webinar to witness advancements such as:
• Comprehensive depth and breadth of enterprise-wide device discovery, identification and profiling, particularly for medical devices
• Passive device profiling and dynamic controls for heterogeneous networks that address long-standing obstacles to successful segmentation practices,
• Why a confident, "no-regrets" approach can now be taken and how implementation timelines are being cut by 10x
Recorded Sep 4 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Lyle Kelly, Sr. SE, Forescout; Tom Finn, Dir. Bus Dev, & Chris Thompson, SE Dir., Medigate
Presentation preview: Advance Your Healthcare Delivery Organization’s Network Segmentation Practices

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Sécurité Zero Trust pour les appareils IoT Dec 3 2020 10:00 am UTC 55 mins
    Philippe Mathon, Systems Engineer, Forescout Technologies
    La mise en œuvre d’une approche Zero Trust n’est pas chose facile compte tenu du nombre croissant d’appareils IoT et OT connectés aux réseaux d’entreprise.

    Selon Gartner, « près de 20 % des entreprises ont subi au moins une attaque ciblant des appareils IoT (Internet des objets) au cours des trois dernières années ». (Gartner, 2019)

    Pour limiter le risque de compromission, les équipes de sécurité doivent protéger proactivement les appareils IoT au moyen de mesures adaptées.

    Découvrez à quoi pourrait ressembler l’implémentation d’une approche Zero Trust pour les appareils IoT de votre entreprise.

    Participez à notre webinar, au cours duquel les thèmes suivants seront abordés :
    • Identification et classification des appareils IoT
    • Création de zones de confiance pour tous les appareils connectés à votre réseau
    • Application de politiques basées sur le principe du moindre privilège
    • Surveillance continue des activités anormales
    • Orchestration et automatisation des interventions
  • Zero Trust Security for IoT Devices Dec 3 2020 9:00 am UTC 34 mins
    Rich Agar, Systems Engineer, Forescout Technologies
    Achieving full Zero Trust enforcement can be challenging, considering the growing number of IoT and OT devices on corporate networks.

    Gartner states that “nearly 20% of organizations observed at least one Internet of Things (IoT)-based attack in the past three years.” (Gartner, 2019)

    To minimize the risk of a breach, security teams must ensure the right measures are put in place to proactively protect IoT devices.

    Find out what implementing a Zero Trust approach for IoT devices could look like for you.

    Join our webinar to learn how you can:
    • Identify and classify IoT devices
    • Create trust zones for all the devices on your network
    • Enforce least privilege policies
    • Continuously monitor for anomalous activity
    • Orchestrate and automate responses
  • Seguridad Zero Trust para dispositivos IoT Dec 2 2020 10:00 am UTC 63 mins
    Arturo Guillén, Systems Engineer, Forescout Technologies
    Implementar una estrategia de confianza cero o desconfianza total, lo que se conoce como "Zero Trust", puede ser difícil, sobre todo si tenemos en cuenta el aumento del número de dispositivos IoT y OT en las redes empresariales.

    Según Gartner en un informe del 2019, "casi el 20 % de las empresas han sufrido al menos un ataque basado en el Internet de las cosas (IoT) en los tres últimos años".

    Para minimizar el riesgo de una fuga de datos, los equipos de seguridad deben garantizar que se adopten las medidas adecuadas para proteger de manera proactiva los dispositivos IoT.

    Descubra cómo sería la implementación de una estrategia Zero Trust para sus dispositivos IoT.

    Únase a nuestro seminario web para aprender a:
    • Identificar y clasificar los dispositivos IoT
    • Crear zonas de confianza para todos los dispositivos de su red
    • Aplicar una política de limitación de privilegios al mínimo
    • Supervisar continuamente la actividad para detectar anomalías
    • Organizar y automatizar las respuestas
  • Sicurezza Zero Trust per i dispositivi IoT Dec 2 2020 9:00 am UTC 54 mins
    Stefano Innocenti, Channel Systems Engineer, Forescout Technologies
    L’implementazione di un approccio Zero Trust non è semplice, considerando il crescente numero di dispositivi IoT e OT collegati alle reti aziendali.

    Secondo Gartner “quasi il 20% delle aziende ha subito almeno un attacco basato contro dispositivi IoT (Internet of Things) negli ultimi tre anni.” (Gartner 2019).

    Per ridurre il rischio di una violazione, i team della sicurezza devono proteggere proattivamente i dispositivi IoT con misure adeguate.

    Scopri come potrebbe essere l’implementazione di un approccio Zero Trust per i dispositivi IoT della tua azienda.

    Partecipa al nostro webinar nel corso del quale saranno affrontati i seguenti argomenti:
    • Identificazione e classificazione dei dispositivi IoT
    • Creazione di zone di fiducia per tutti i dispositivi collegati alla tua rete
    • Applicazione di policy basate sul principio del privilegio minimo
    • Monitoraggio costante delle attività anomale
    • Orchestrazione e automazione degli interventi
  • Zero-Trust-Sicherheit für IoT-Geräte Dec 1 2020 8:00 am UTC 52 mins
    Daniel Künzli, Pre-sales Engineer, Forescout Technologies
    Durch die wachsende Zahl von IoT- und OT-Geräten in Unternehmensnetzwerken ist eine vollständige Durchsetzung von Zero-Trust-Sicherheit häufig schwierig.

    Laut Gartner haben „fast 20 % aller Unternehmen in den vergangenen drei Jahren mindestens einen IoT-basierten Angriff verzeichnet.“ (Gartner, 2019)

    Um das Risiko einer Sicherheitsverletzung zu verringern, müssen Sicherheitsteams geeignete Maßnahmen ergreifen, mit denen IoT-Geräte proaktiv geschützt werden.
    Erfahren Sie, wie Sie den Zero-Trust-Ansatz für IoT-Geräte in Ihrem Unternehmen implementieren können.

    Nehmen Sie an unserem Webinar mit folgenden Themen teil:
    • Erkennen und Klassifizieren von IoT-Geräten
    • Erstellen von vertrauenswürdigen Zonen für alle Geräte in Ihrem Netzwerk
    • Durchsetzen von Least-Privilege-Richtlinien
    • Permanente Überwachung auf ungewöhnliche Aktivitäten
    • Koordinieren und Automatisieren von Reaktionsmaßnahmen
  • Automatically and Continuously Secure IoT at Global Scale Recorded: Nov 18 2020 47 mins
    Andrew Silberman, CyberArk, Constantine Kipnis, Forescout, Chris Rouland, Phosphorus, and Earle Ady, Phosphorus
    Nearly every device these days can be used to connect to the internet – and to your network. A high percentage of IoT devices still use default credentials and have firmware that’s many years old, providing easy pathways for attackers to breach the network and exfiltrate data.

    Until now, staying on top of the number of networked IoT devices used by humans and applications has been a tall order requiring vigilance and a LOT of manual work. CyberArk, Forescout and Phosphorus are changing that. During this webinar, these security leaders will show you how to:

    • Continuously discover and assess all IoT devices connecting to your network
    • Automatically onboard IoT devices and credentials for centralized lifecycle management and security
    • Rapidly detect and respond to IoT risk and credential threats
    • Continuously control network and system access for all devices and users
  • Maximize Return on Your Security Investments With Security Orchestration Apps Recorded: Oct 28 2020 58 mins
    Gitesh Shah, Senior Product Manager, Forescout Technologies Inc.
    Unlock the potential of your existing security solutions with eyeExtend Connect Apps – Forescout’s recent product offering. eyeExtend Connect Apps helps you easily integrate your IT and security management technologies with the Forescout platform to gain superior device intelligence on Enterprise of Things (EoT) assets and accelerate threat response by orchestrating security workflows.

    Attend this webinar to learn more on:
    • The evolution of Forescout’s OIM product
    • Easy-to-build, consume and sharable apps
    • How to build orchestration apps for any custom- or home-grown applications, security tools and management systems with open APIs
    • Leveraging the available app ecosystem
  • The State of IoT Cybersecurity Recorded: Oct 13 2020 31 mins
    Daniel dos Santos, Security Researcher, Forescout Technologies
    While companies rush to deploy IoT devices to address operational and functional gaps, cybercriminals match or exceed that pace with attacks targeting these devices. Forescout’s research team analyzed data on over 8 million devices to come up with an eagle-eye view of the risks IoT devices pose.

    Join our research analyst to learn:
    • What devices introduce the greatest risk to an organization
    • Which industries appear to have greater control of their devices
    • An expert’s advice on an effective path forward for securing IoT devices

    Which device is your weakest link?
  • Defending the Enterprise of Things - Discussion Panel Recorded: Oct 7 2020 46 mins
    Geoffrey Moore, Michael DeCesare, Greg Clark, Dave DeWalt, and Enrique Salem
    It was only a few years ago that organizations began to recognize the rising threat posed by billions of newly connected Internet of Things devices. Today, this device explosion has become a massive challenge, with managed systems, unmanaged IoT devices and operational technologies all connecting to corporate networks.

    The modern enterprise has become an Enterprise of Things with a continually expanding risk surface that creates new openings for cyberattacks if not properly secured.

    Join a discussion hosted by Geoffrey Moore, advisor and author of Zone to Win, with top industry experts as they discuss the latest threats targeting the Enterprise of Things and the critical need to secure it.

    Discussion topics include:
    • Active defense for securing the Enterprise of Things
    • Cybersecurity resilience strategies for protecting organizations and people
    • Where CISOs and CIOs should focus resources to improve their security strategy
  • Securing your Enterprise in a post Covid-19 World Recorded: Sep 30 2020 20 mins
    Ahmed Abdelmotaleb, System Engineer - METAR at Forescout Technologies
    With the new security challenges of the increasing connected devices, enterprises have been facing a seismic shift in the remote workforce during and after Covid-19. Unmanaged device growth is vastly outpacing managed devices. These devices do not authenticate using traditional methods when they connect to the network. Hence, they cannot be identified via the authentication process.

    Modern NAC spans a range of essential capabilities – from identification, posture and compliance assessments, and monitoring of connected devices all the way to automated responses. A modern NAC approach can improve your security hygiene by preventing unauthorized, rogue and impersonating devices from connecting to your network.

    Join this webinar to learn about ways to help you:
    • Discover, classify and inventory all devices
    • Assess security posture and enforce compliance
    • Control access across heterogeneous networks
  • Banking on Security: Malware and the Financial Sector Recorded: Sep 24 2020 39 mins
    David Wolf, Principal Security Researcher, Forescout Technologies
    Financial service organizations have experienced massive growth of new IoT, OT and remote devices within their network over the last five years. While device growth has optimized much of the financial services industry, it has also expanded the attack service of networks and exposed the financial services sector to new risk.

    Forescout Research Labs recently conducted deep analysis of 100 large financial service networks with over 8,500 virtual local area networks (VLANs) and nearly 900,000 devices with the aim of better understanding this topic.
  • NAC moderno Recorded: Sep 22 2020 50 mins
    Ricardo Hernández, Forescout Technologies
    El número de dispositivos no gestionados supera ampliamente al de dispositivos gestionados. Estos dispositivos no se autentican mediante los métodos tradicionales cuando se conectan a la red. Por lo tanto, no pueden identificarse con el proceso de autenticación.

    El control de acceso a la red (NAC) moderno ofrece una amplia variedad de funciones esenciales que van desde la identificación, las evaluaciones de estado y el cumplimiento, hasta la supervisión de los dispositivos conectados y las respuestas automatizadas. Un enfoque moderno del control de acceso a la red (NAC) puede mejorar su higiene de seguridad, impidiendo que se conecten a su red dispositivos no autorizados, no fiables o que suplantan a otros. Además, en su Guía de mercado NAC de 2020, Gartner recomienda que las organizaciones "adapten los proyectos de NAC a cualquier iniciativa de seguridad Zero Trust".

    Únase a este seminario web para descubrir cómo:
    • Identificar, clasificar e inventariar todos los dispositivos
    • Evaluar el estado de seguridad y cumplimiento de normativas
    • Controlar el acceso entre redes heterogéneas
  • Modern NAC for Modern Networks Recorded: Sep 22 2020 35 mins
    Keith Gilbert, Systems Engineer, Forescout Technologies
    Unmanaged device growth is vastly outpacing managed devices. These devices do not authenticate using traditional methods when they connect to the network. Hence, they cannot be identified via the authentication process.

    Modern NAC spans a range of essential capabilities – from identification, posture and compliance assessments, and monitoring of connected devices all the way to automated responses. A modern NAC approach can improve your security hygiene by preventing unauthorized, rogue and impersonating devices from connecting to your network. In addition, in its 2020 NAC Market Guide, Gartner recommends that organisations, “align NAC projects with any Zero Trust security initiative”.

    Join this webinar to learn about ways to help you:
    • Discover, classify and inventory all devices
    • Assess security posture and enforce compliance
    • Control access across heterogeneous networks
  • Modernes NAC im modernen Unternehmen Recorded: Sep 22 2020 39 mins
    Christian Rippel, Presales Engineer, Forescout Technologies
    Die Anzahl nicht verwalteter Geräte wächst exponentiell. Diese Geräte authentifizieren sich beim Verbinden mit dem Netzwerk nicht mithilfe herkömmlicher Methoden und können daher beim Authentifizierungsprozess nicht identifiziert werden.

    Moderne NAC-Lösungen bieten unverzichtbare Funktionen wie Identifizierung, Einstufung der Sicherheitslage und Konformität sowie Überwachung aller verbundener Geräte bis hin zu automatisierten Problembehebungsmaßnahmen.

    Ein moderner NAC-Ansatz kann Ihre Sicherheitsmaßnahmen verbessern, indem er unberechtigten, nicht autorisierten Geräten die Verbindung mit dem Netzwerk verweigert. Im Sinne der Empfehlung des NAC-Marktleitfadens für 2020 von Gartner empfiehlt es sich, NAC-Projekte mit allen Zero-Trust-Sicherheitsinitiativen abzustimmen.

    Erfahren Sie in diesem Webinar, wie Sie diese Vorteile für sich nutzen können:
    • Erkennung, Klassifizierung und Bestandserfassung aller per IP-Adresse verbundener Geräte
    • Einstufung der Sicherheitslage und Einhaltung von Konformitätsrichtlinien
    • Zugriffskontrolle in heterogenen Unternehmensnetzwerken
  • Soluzioni NAC tradizionali e moderne a confronto Recorded: Sep 22 2020 56 mins
    Stefano Innocenti, Channel Systems Engineer, Forescout Technologies
    Il numero di dispositivi non gestiti sta superando abbondantemente il numero di quelli gestiti. Quando si connettono alla rete, i dispositivi non gestiti non possono essere autenticati con metodi tradizionali pertanto, sfuggono al tradizionale processo di autenticazione.

    La moderna tecnologia NAC, cioè di controllo degli accessi alla rete, copre un'ampia gamma di funzionalità essenziali rivolte ai dispositivi, come l'identificazione, la valutazione dello stato di sicurezza e conformità, il monitoraggio dei dispositivi connessi fino alle risposte automatizzate. Una moderna strategia di controllo degli accessi alla rete concorre a migliorare lo stato di sicurezza globale impedendo l'ingresso in rete di dispositivi non autorizzati, inaffidabili o che si spacciano per legittimi. Tra l'altro, nella sua guida al Mercato NAC per il 2020 Gartner raccomanda alle aziende di "allineare i progetti NAC a qualsiasi iniziativa di sicurezza Zero Trust".

    Partecipa a questo webinar per scoprire nuovi metodi per:
    • Scoprire, classificare e inserire in un inventario tutti i dispositivi connessi
    • Valutare lo stato di sicurezza e imporre la conformità
    • Controllare gli accessi in reti eterogenee
  • NAC moderne contre NAC traditionnel Recorded: Sep 22 2020 41 mins
    Cédric Antoine, Systems Engineer, Forescout Technologies
    Le nombre d’appareils non gérés dépasse largement celui des appareils gérés. Ces appareils, lorsqu’ils se connectent au réseau, ne s’authentifient pas à l’aide des méthodes traditionnelles. Par conséquent, ils échappent à l’identification du processus d’authentification.

    Les solutions NAC modernes offrent un large éventail de fonctionnalités essentielles : identification, évaluation du niveau de sécurité et de conformité, surveillance des appareils connectés, automatisation des actions d’intervention. Une stratégie basée sur un NAC moderne peut améliorer vos pratiques de sécurité en empêchant les appareils non autorisés, non approuvés et faussement légitimes de se connecter à votre réseau. En outre, dans son Guide 2020 du marché des solutions de contrôle d’accès au réseau, Gartner recommande aux entreprises « d’aligner leurs projets NAC sur leurs éventuelles initiatives de sécurité Zero Trust ».

    Rejoignez ce webinaire pour apprendre comment vous pouvez :
    • découvrir, classifier et répertorier tous les appareils ;
    • évaluer leur niveau de sécurité et vous assurer qu’ils sont conformes ;
    • contrôler l’accès aux réseaux hétérogènes.
  • Reduce Risk w/Automated Enterprise Asset Intel & Context-Aware Incident Response Recorded: Sep 16 2020 56 mins
    Karl Klaessig, Dir. Product Mktg, Security Operations, ServiceNow and Shawn Taylor, Sr. SE, Forescout Technologies
    In today’s era of aggressive digital transformation, how can you maintain continuous asset accountability and streamline security workflows as the IT, IoT and OT connected device landscape rapidly grows and changes? Environments like healthcare, industrial, utilities, manufacturing and critical infrastructure must always address this need while also ensuring the integrity of business and security operations, otherwise risk significant financial losses or more dangerous perils. In this webinar, we will discuss how to achieve the following without operational disruption or re-designing your network.
    • Maintain continuous IT, IoT & OT asset accuracy
    • Automate policy/compliance enforcement and incident response
    • Dynamically control network access and segmentation
  • Seguridad Zero Trust para dispositivos IoT Recorded: Sep 15 2020 64 mins
    Arturo Guillén, Systems Engineer, Forescout Technologies
    Implementar una estrategia de confianza cero o desconfianza total, lo que se conoce como "Zero Trust", puede ser difícil, sobre todo si tenemos en cuenta el aumento del número de dispositivos IoT y OT en las redes empresariales.

    Según Gartner en un informe del 2019, "casi el 20 % de las empresas han sufrido al menos un ataque basado en el Internet de las cosas (IoT) en los tres últimos años".

    Para minimizar el riesgo de una fuga de datos, los equipos de seguridad deben garantizar que se adopten las medidas adecuadas para proteger de manera proactiva los dispositivos IoT.

    Descubra cómo sería la implementación de una estrategia Zero Trust para sus dispositivos IoT.

    Únase a nuestro seminario web para aprender a:
    • Identificar y clasificar los dispositivos IoT
    • Crear zonas de confianza para todos los dispositivos de su red
    • Aplicar una política de limitación de privilegios al mínimo
    • Supervisar continuamente la actividad para detectar anomalías
    • Organizar y automatizar las respuestas
  • Zero-Trust-Sicherheit für IoT-Geräte Recorded: Sep 15 2020 53 mins
    Daniel Künzli, Pre-sales Engineer, Forescout Technologies
    Durch die wachsende Zahl von IoT- und OT-Geräten in Unternehmensnetzwerken ist eine vollständige Durchsetzung von Zero-Trust-Sicherheit häufig schwierig.

    Laut Gartner haben „fast 20 % aller Unternehmen in den vergangenen drei Jahren mindestens einen IoT-basierten Angriff verzeichnet.“ (Gartner, 2019)

    Um das Risiko einer Sicherheitsverletzung zu verringern, müssen Sicherheitsteams geeignete Maßnahmen ergreifen, mit denen IoT-Geräte proaktiv geschützt werden.
    Erfahren Sie, wie Sie den Zero-Trust-Ansatz für IoT-Geräte in Ihrem Unternehmen implementieren können.

    Nehmen Sie an unserem Webinar mit folgenden Themen teil:
    • Erkennen und Klassifizieren von IoT-Geräten
    • Erstellen von vertrauenswürdigen Zonen für alle Geräte in Ihrem Netzwerk
    • Durchsetzen von Least-Privilege-Richtlinien
    • Permanente Überwachung auf ungewöhnliche Aktivitäten
    • Koordinieren und Automatisieren von Reaktionsmaßnahmen
  • Sicurezza Zero Trust per i dispositivi IoT Recorded: Sep 15 2020 55 mins
    Stefano Innocenti, Channel Systems Engineer, Forescout Technologies
    L’implementazione di un approccio Zero Trust non è semplice, considerando il crescente numero di dispositivi IoT e OT collegati alle reti aziendali.

    Secondo Gartner “quasi il 20% delle aziende ha subito almeno un attacco basato contro dispositivi IoT (Internet of Things) negli ultimi tre anni.” (Gartner 2019).

    Per ridurre il rischio di una violazione, i team della sicurezza devono proteggere proattivamente i dispositivi IoT con misure adeguate.

    Scopri come potrebbe essere l’implementazione di un approccio Zero Trust per i dispositivi IoT della tua azienda.

    Partecipa al nostro webinar nel corso del quale saranno affrontati i seguenti argomenti:
    • Identificazione e classificazione dei dispositivi IoT
    • Creazione di zone di fiducia per tutti i dispositivi collegati alla tua rete
    • Applicazione di policy basate sul principio del privilegio minimo
    • Monitoraggio costante delle attività anomale
    • Orchestrazione e automazione degli interventi
Webcasts for Network Security Professionals
Your organization has become an Enterprise of Things (EoT). PCs, mobile devices, cloud workloads and other traditional IT systems. Agentless IoT and OT devices. Device diversity is thriving at the cost of security as your users connect from all over the map – literally.

Every thing that touches your enterprise network exposes you to potential risk. You must see it and secure it.

Get to know Forescout. Learn more about our products, hear about new cyber security trends and see how Forescout helps you address these.

We offer the only solution that actively defends the Enterprise of Things at scale. Register for our webinars or visit our website for more information: www.forescout.com

Webinar languages include English, German, French, Italian and Spanish.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Advance Your Healthcare Delivery Organization’s Network Segmentation Practices
  • Live at: Sep 4 2020 5:25 pm
  • Presented by: Lyle Kelly, Sr. SE, Forescout; Tom Finn, Dir. Bus Dev, & Chris Thompson, SE Dir., Medigate
  • From:
Your email has been sent.
or close