Hi [[ session.user.profile.firstName ]]

RSA in the Rearview Mirror 2019

If you don’t get to stop by the Skybox booth at RSAC2019 — or you’re hungry for more — join our post-conference recap. Skybox® Security Technical Director Cliff Chase will cover:

-Trends that shaped this year’s conference
-Insights on challenges and successes from attendees’ security programs
-A demo of Skybox’s top features that debuted at RSAC2019

And just like at the Skybox booth, webinar attendees will be entered to win their choice of free beer for a year or an Ember Travel Mug! The lucky winners will be announced at the end of the webinar. Don’t miss out!
Recorded Mar 21 2019 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Cliff Chase, Technical Director North America, Skybox Security
Presentation preview: RSA in the Rearview Mirror 2019

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Signal in the Noise: Vulnerability Prioritization with Skybox Recorded: Sep 26 2019 31 mins
    Ronit Markovitz, Product Manager, Skybox Security
    Register for the webinar to learn how Skybox® Security is simplifying vulnerability management to give you quick insight and help you focus on your most critical risks.

    Skybox Product Manager Ronit Markovitz will discuss the latest capabilities from Skybox including:
    •Simplified risk scores to gauge and track risks of vulnerabilities, assets and asset groups
    •Customization of risk scores to emphasize exposure, exploitability or other factors in vulnerability prioritization
    •Asset weighting to give extra attention to business-critical assets
    •MITRE ATT&CK dashboard to understand risks in your network from an adversary’s perspective
  • Firewall Optimization and Cleanup Recorded: Aug 28 2019 58 mins
    Greg Singh, Technical Marketing Engineer, Skybox Security
    Due to the rapid pace of change and the sheer scale of today’s networks, many devices have never had the benefit of an orderly, well-managed change process. As a result, firewall rulesets have often grown organically, messily and in ways that differ from designed policy, decreasing performance and increasing the cyber risk of the organization.

    In this webinar we will explore Skybox’s firewall optimization and cleanup capabilities in our latest web UI. Register to learn:

    • Why analytics-driven automation is fundamental to improve firewall auditing and management, and what’s needed in an analytics-driven automation solution
    • How Skybox can support a systematic approach to continuously improve firewall performance and defense posture
    • How to use Skybox to ensure the security designed in policy is implemented and adhered to in your network
    • How Skybox’s powerful toolset and new, intuitive UI helps organizations quickly get a handle on security and performance issues in their multi-vendor firewall fleet
  • Securing the Hybrid Environment Recorded: Aug 26 2019 33 mins
    Michelle Johnson Cobb, Chief Marketing Officer, Skybox Security
    For many organizations, the challenge of cloud security isn’t purely a cloud problem. As efforts are underway to migrate workloads to the cloud, highly complex infrastructures have taken shape spanning on-prem and multi-cloud networks. To effectively protect these hybrid environments, organizations need to take a holistic approach to their security, understand their interconnections and dependencies, and ensure that security and compliance standards are being met anywhere in the network.

    Register for the webinar to secure your migration to the cloud and see the benefits of unifying security management across your hybrid environment.

    In this webinar, you’ll learn:

    -Why breaking down data silos between on-prem and multi-cloud networks is fundamental to good cyber hygiene — not to mention security team sanity
    -How data correlation can be used to detect vulnerabilities in cloud environments without an active scan
    -How the single-pane-of-glass view of your attack surface to supports secure cloud migrations
    -How attack surface modeling and analysis illuminates paths between and within networks, vulnerability exposures, misconfigurations, policy violations and more
    -What processes of hybrid security management can be offloaded to automation and what ingredients are needed to make that automation an effective risk-fighting tool
  • To Automate or Not to Automate Is Not the Question - Where and How Is Recorded: Aug 22 2019 37 mins
    Michael D. Osterman, Principal Analyst, Osterman Research
    Organizations worldwide are on a journey of automating security processes, but questions remain.

    Seems like these days everyone in security is talking about automation, artificial intelligence (AI) and machine learning (ML). However, what are organizations actually doing? What percentage of core security processes are fully or partially automated? And, where do security leaders see the greatest business impact?

    Join Michael D. Osterman, principal analyst of Osterman Research, as he explores the findings of a new global survey sponsored by Skybox Security on automation in cybersecurity. And, learn from Skybox what the foundation of any automation program should be.

    •What are the key business drivers of automation in security?
    •Where are the challenges and problems security leaders are trying to solve?
    •Where are security teams automating most and what is the business impact?
    •How is migration to the cloud affecting automation of security policy?
    •How many are actually using AI?
    •How can this data help you in your journey toward automation?
  • Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense Recorded: Aug 20 2019 56 mins
    Terry Olaes, Sales Engineering Lead, Central US Skybox Security
    Critical infrastructure — from energy production to manufacturing to public utilities — is becoming a more prevalent attack vector for nation-state threat actors as well as the common cybercriminal. These attackers are frequently exploiting the interconnectedness of IT and operational technology (OT) networks, finding their foothold in the disconnect between their security management.

    In response, many organizations are looking to unify and align their IT-OT security programs to better understand and tackle cyber risks in both environments. In this session, Skybox Security SE Terry Olaes will cover what challenges to expect in this an endeavor, and how to use comprehensive visibility and contextual intelligence to overcome them.

    In this webinar, you will learn:
    - What are the inherent risks to OT security and how the continued integration with IT impact risk in both environments
    - What are the key concerns for IT and OT security teams and how can they can align to improve security throughout the organization
    - Which elements and capabilities needed to gain seamless visibility of on-prem, cloud and OT networks
    - How to use modeling and analytics to put risk in the context of your attack surface and effectively prioritize response
  • Fighting Blind: Why Vulnerability Management Demands More Than Scan-and-Patch Recorded: Aug 14 2019 48 mins
    Alastair Williams, EMEA Technical Director, Skybox Security
    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to their host’s place in the network, meaning efforts can be wasted on remediating already protected vulnerabilities while ignoring those left exposed to attack.

    To have a real impact on lowering your risk of cyberattack, organizations need to centralize and analyze data from their entire attack surface to narrow focus on the vulnerabilities most likely to be used in a cyberattack.

    In this webinar, you will learn:
    -What scanners miss in discovery, prioritization, remediation and oversight processes and how to fill in the gaps
    -How the intersection of your assets, networks, business and the threat landscape impact vulnerability risk
    -Why context-based approaches target remediation at your riskiest vulnerabilities and help identify patching alternatives
    -Insights from Skybox’s 2018 Vulnerability and Threat Trends Report mid-year update

    Join Alastair Williams, EMEA technical director for Skybox Security, as he explores how to get more value out of your data, visualize your attack surface and centralize vulnerability management to systematically reduce your risk of cyberattack.
  • Life After May 25: Sustainable GDPR Compliance With Visibility and Automation Recorded: Aug 12 2019 45 mins
    Peter Hughes, Technical Director, Sales, Skybox Security
    Deadline day for the European Union’s General Data Protection Regulation (GDPR) has been looming large for security programs around the world. But is your organization ready to efficiently and effectively maintain compliance beyond May 25?

    Join Skybox Security for the BrightTALK webinar on simplifying compliance management with comprehensive attack surface visibility and automation.

    In this webinar, you’ll learn:
    • How network modeling provides fundamental visibility to understand what data is at risk and what resources you have to protect it
    • Which automated processes will have the greatest benefit on reducing an organization’s data security risk
    • How combining visibility and automation can systematically tighten access and improve security process efficiency and impact
    • The benefits of visibility and automation in compliance-related use cases such as firewall auditing, change management, rule life cycle management, vulnerability management and more
  • More, More, More: Targeting Risk With Context-Aware Vulnerability Management Recorded: Aug 8 2019 32 mins
    Sean Pike, program vice president of security products, IDC
    Vulnerability management is about more than scanning, severity levels and patching. To have a real impact on lowering your risk of cyberattack, you need to centralize and analyze data from your entire attack surface. This type of approach means using more data sources in vulnerability discovery, more context in prioritization, more options in remediation and more accountability in oversight..

    In this webinar you will learn:

    What data sources are needed for accurate, comprehensive vulnerability data on demand

    Why relying on scanners alone leaves blind spots in discovery, prioritization, remediation and oversight processes

    How to contextualize vulnerability data from asset, network, business and threat perspectives

    Why context-based approaches target remediation at your riskiest vulnerabilities

    How to use network context to find patching alternatives

    Join Sean Pike, program vice president of security products at IDC, and Skybox Security’s Global Director of Technical Product Marketing Sean Keef in a webinar that explores how to get more value out of your data and take vulnerability management from scan-and-patch to a systematic, risk-fighting program.
  • Using Queryable Infrastructure To Understand Vulnerability Risk Recorded: Aug 6 2019 37 mins
    Josh Zelonis, senior analyst, Forrester
    Vulnerability scan data can only provide insight into the existence of vulnerabilities in your infrastructure. To prioritize remediation efforts, it’s essential to have additional information about the impacted assets and the environment in which they exist. Building “queryable infrastructure” allows you to have a real-time snapshot of which vulnerable assets are exposed or are adequately protected by compensating controls. The addition of threat intelligence feeds further helps to narrow focus, as knowing how a vulnerability can be exploited will reveal which systems are most likely to be attacked.

    In this webinar you will learn:

    What blind spots can be left by scanning and how to fill in the holes

    Why it’s important for vulnerability management solutions to be vendor agnostic and able to merge and centralize data

    How to use queryable infrastructures in vulnerability management processes

    How automation simplifies the maintenance of a queryable infrastructure and risk-based vulnerability analysis

    Join Skybox Security Global Director of Technical Product Marketing Sean Keef and featured speaker Josh Zelonis, Forrester senior analyst, in a webinar that considers why “queryable infrastructure” is crucial to effective, informed vulnerability management.
  • Managing Security In Hybrid IT-OT Environments Recorded: Jul 31 2019 39 mins
    Peter Hughes, Technical Director, Skybox Security
    The cyberthreat to critical infrastructure — from utilities to energy production, transportation, manufacturing and more — is very real. Operational technology (OT) is becoming a more prevalent attack vector for nation–state threat actors as well as the common cybercriminal. And attackers of all sorts are frequently exploiting the interconnectedness of IT and OT networks.

    In this session, we will cover:

    The evolution of OT security challenges and the major threats looking to exploit them

    The inherent characteristics of OT networks that complicate incorporating them under traditional IT security programs

    How OT connectivity with IT affects risks to both networks with real–world examples of successful cyberattacks on connected environments

    The security management use cases supported by comprehensive visibility and business benefits
  • 2019 Vulnerability and Threat Trends: Mid-Year Update Recorded: Jul 31 2019 23 mins
    Sivan Nir, Threat Intelligence Team Leader, Skybox Research Lab
    Vulnerabilities don’t exist in a vacuum. The risk they pose to your organization depends on a variety of factors both internal and external that are in a near–constant state of change. Keeping up with that change is vital to limiting your organization’s risk of attack.

    Register for the webinar that explores the findings of the mid-year update to Skybox Security’s 2019 Vulnerability and Threat Trends Research Report, analyzing the vulnerabilities, exploits and threats in play over the previous year.

    Sivan Nir, threat intelligence team leader of the Skybox Research Lab who compiles the report, will cover:

    •An overview of the vulnerabilities published in the first half of 2019 and what they say about the security industry and the threat landscape
    •The biggest vulnerabilities you need to watch out for
    •What’s behind the “trading places” game between ransomware and cryptomining
    •The steady increase in risk to operational technology
    •Vulnerability management strategies to stay safe in light of these trends
  • Easy Does It: Simplifying Cyber Risk Management with Skybox 10 Recorded: Jun 26 2019 31 mins
    Sean Keef, Director of Product Marketing, Skybox Security
    Complexity is one of the biggest challenges in enterprise cybersecurity today. That’s why Skybox Security’s latest version gives you the solutions you need to cut through the noise and focus action where it’s needed most.
    Register for the webinar to see what’s new in Skybox v10:

    •Skybox Vulnerability Control web client debut, with customizable dashboards and widgets and simplified deployment
    •Risk scoring for vulnerabilities, assets and groups to better prioritize remediation and track risk reduction over time
    •New views in Skybox Firewall and Network Assurance to support threat hunters and process-driven users
    •Expanded support for hybrid environments — clouds and containers and operational technology security platforms
    •See the web-based Access Analyzer feature

    Simplify vulnerability management, gain critical risk insight to your infrastructure and endpoints, and establish your single source of truth — all in one platform.
  • Rule Recertification with Skybox Change Manager Recorded: Apr 4 2019 54 mins
    Greg Singh, Technical Marketing Engineer, Skybox Security
    Additions and changes to firewall rules and objects are commonplace to keep up with the needs of business. But there’s often a lack of attention given to existing rules and objects that could be leaving your organization exposed to undue risk.

    -In this webinar, we’ll explore the recertification and deprovisioning workflows in Skybox Change Manager to automate management of the entire rule life cycle:
    -Assign owners to each rule to ensure nothing falls through the cracks
    -Limit access to needed services for a required timeframe to keep firewalls optimized and compliant
    -Regularly review network access to maintain tight controls while enabling the business
    -Integrate Skybox with third-party ticketing systems to enhance existing workflows
  • RSA in the Rearview Mirror 2019 Recorded: Mar 21 2019 48 mins
    Cliff Chase, Technical Director North America, Skybox Security
    If you don’t get to stop by the Skybox booth at RSAC2019 — or you’re hungry for more — join our post-conference recap. Skybox® Security Technical Director Cliff Chase will cover:

    -Trends that shaped this year’s conference
    -Insights on challenges and successes from attendees’ security programs
    -A demo of Skybox’s top features that debuted at RSAC2019

    And just like at the Skybox booth, webinar attendees will be entered to win their choice of free beer for a year or an Ember Travel Mug! The lucky winners will be announced at the end of the webinar. Don’t miss out!
  • Rule and Object Creation with Skybox Change Manager Recorded: Feb 26 2019 60 mins
    Greg Singh, Global Product Marketing Engineer, Skybox Security
    Change is the only constant. Nowhere is this more apparent in enterprise cybersecurity than in the endless need for firewall changes.

    Due to the complexity of these changes, there’s plenty of opportunity for security, compliance and optimization issues. Network paths, related devices, security policies, vulnerability exposures — all need to be fully assessed before a change is made in order to avoid such issues.

    In this webinar, we’ll look at how Skybox Change Manager simplifies and secures the change process:

    -Replace spreadsheets and manual analysis with intelligently automated workflows
    -Proactively assess changes for policy violations and vulnerability exposures
    -Implement changes as intended and reconcile every change with the original ticket
    -Maintain a complete audit trail for compliance reporting
  • 2019 Vulnerability and Threat Trends Recorded: Feb 12 2019 34 mins
    Sivan Nir, Senior Analyst, Skybox Research Lab
    Vulnerabilities don’t exist in a vacuum

    This webinar explores the findings of Skybox Security’s 2019 Vulnerability and Threat Trends Research Report, analyzing the vulnerabilities, exploits and threats in play over the previous year.

    Sivan Nir, senior analyst of the Skybox Research Lab who compiles the report, will cover:

    -What’s driving record-breaking CVE numbers for two years in a row, and how do vulnerability management programs find the signal in the noise
    -Why 2018 was the year of the cryptominer, and why this malware family holds a threat not just to your compute power but to your business
    -How cloud migration, operational technology and a fragmented supply chain are expanding the attack surface — and how you can shrink it
  • Ensuring Continuous Compliance: A Look Inside Skybox’s Latest Web UI Features Recorded: Jan 23 2019 56 mins
    Greg Singh, Technical Marketing Engineer, Skybox Security
    In this webinar, we’ll explore Skybox’s three compliance engines, and demo these features in our latest web UI, to see how analytics-driven automation can reduce the compliance management burden.
  • Locking Down Vulnerabilities Recorded: Jan 15 2019 31 mins
    Sean Keef, Global Director of Technical Product Marketing, Skybox Security
    Managing vulnerabilities is sometimes considered the secret sauce of keeping companies secure.

    First, of course, companies need to know what they have and where they have it. That's a bigger challenge than you think, considering your "resources" might not actually be something you can access, such as a cloud infrastructure.

    Next is distinguishing what is and is not a vulnerability. Once you identify a vulnerability, then comes the magic part: knowing which vulnerabilities need to be addressed immediately and which can be set aside for later.

    This 20/20 webcast will look at how companies can determine what and where each device is located — be it in the cloud or on prem — where and how in those devices or platform the security vulnerabilities present themselves, and most important, how to determine the priority for what needs to be addressed now and what can wait until later.
  • Firewall Optimization and Cleanup Recorded: Dec 5 2018 59 mins
    Greg Singh, Technical Marketing Engineer, Skybox Security
    Due to the rapid pace of change and the sheer scale of today’s networks, many devices have never had the benefit of an orderly, well-managed change process. As a result, firewall rulesets have often grown organically, messily and in ways that differ from designed policy, decreasing performance and increasing the cyber risk of the organization.

    In this webinar we will explore Skybox’s firewall optimization and cleanup capabilities in our latest web UI. Register to learn:

    • Why analytics-driven automation is fundamental to improve firewall auditing and management, and what’s needed in an analytics-driven automation solution
    • How Skybox can support a systematic approach to continuously improve firewall performance and defense posture
    • How to use Skybox to ensure the security designed in policy is implemented and adhered to in your network
    • How Skybox’s powerful toolset and new, intuitive UI helps organizations quickly get a handle on security and performance issues in their multi-vendor firewall fleet
  • Securing the Hybrid Environment Recorded: Oct 23 2018 34 mins
    Michelle Johnson Cobb, Chief Marketing Officer, Skybox Security
    For many organizations, the challenge of cloud security isn’t purely a cloud problem. As efforts are underway to migrate workloads to the cloud, highly complex infrastructures have taken shape spanning on-prem and multi-cloud networks. To effectively protect these hybrid environments, organizations need to take a holistic approach to their security, understand their interconnections and dependencies, and ensure that security and compliance standards are being met anywhere in the network.

    Register for the webinar to secure your migration to the cloud and see the benefits of unifying security management across your hybrid environment.

    In this webinar, you’ll learn:

    -Why breaking down data silos between on-prem and multi-cloud networks is fundamental to good cyber hygiene — not to mention security team sanity
    -How data correlation can be used to detect vulnerabilities in cloud environments without an active scan
    -How the single-pane-of-glass view of your attack surface to supports secure cloud migrations
    -How attack surface modeling and analysis illuminates paths between and within networks, vulnerability exposures, misconfigurations, policy violations and more
    -What processes of hybrid security management can be offloaded to automation and what ingredients are needed to make that automation an effective risk-fighting tool
Skybox Security
Skybox arms security leaders with the broadest set of solutions for cybersecurity management. By integrating with more than 100 networking and security technologies, the Skybox™ Security Suite provides the context needed for informed and timely action, combining attack vector analytics and advanced threat intelligence to continuously analyze vulnerabilities in your environment and correlate them with exploits in the wild. This gives the insight needed to improve and automate security operations in vulnerability and threat management and firewall and security policy management.

Established in 2002, Skybox is a privately held company with worldwide sales and support teams serving an international customer base of Global 2000 enterprises and government agencies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: RSA in the Rearview Mirror 2019
  • Live at: Mar 21 2019 6:00 pm
  • Presented by: Cliff Chase, Technical Director North America, Skybox Security
  • From:
Your email has been sent.
or close