Hi [[ session.user.profile.firstName ]]

Considering IoT, Think Security

Who'd have thought security professionals would be spending time thinking about kettles? The explosion in connected things including light bulbs, printers, industrial controls and, yes, kettles, all of which are connected to enterprise networks is exciting. But it has created more exposed entry points leaving your network more vulnerable to attack. For every secured device, there are probably another two with no inbuilt security.

Laurence Pitt, Global Security Director at Juniper Networks discusses what you should look for and how you can take control and secure these devices.
Recorded Jun 14 2018 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Laurence Pitt, Global Security Strategy Director at Juniper Networks
Presentation preview: Considering IoT, Think Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ask The Experts: Part 1 Using Automation to fight automation Recorded: Jun 21 2018 3 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher
    Laurence Pitt, Security Strategy Director at Juniper Networks discuss how cyber criminals are using automation to stay ahead of security experts preventative measures. They're using automation to create malware, resulting in an increasingly regular number of security breaches. Laurence also discusses the need for businesses to automate the simpler aspects of their security processes, to free up time for human intelligence to spot behavioral abnormalities.
  • Considering IoT, Think Security Recorded: Jun 14 2018 39 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    Who'd have thought security professionals would be spending time thinking about kettles? The explosion in connected things including light bulbs, printers, industrial controls and, yes, kettles, all of which are connected to enterprise networks is exciting. But it has created more exposed entry points leaving your network more vulnerable to attack. For every secured device, there are probably another two with no inbuilt security.

    Laurence Pitt, Global Security Director at Juniper Networks discusses what you should look for and how you can take control and secure these devices.
  • Rethinking Security Models Recorded: Jun 13 2018 23 mins
    Lee Fisher, Head of Security Business EMEA, Juniper Networks
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Data Breaches, Identity & Security Recorded: Jun 6 2018 45 mins
    Amar Singh (CMA) | Barry Scott (Centrify) | Nick Bilogorskiy (Juniper Networks) | Raef Meeuwisse
    Data breaches are on the rise, affecting millions of people around the world. With personal information exposed to cyber criminals and up for sale, the impact of a breach can continue to haunt its victims for months, and even years to come.

    Join top security experts for this interactive Q&A panel as they discuss:
    - The current (broken) state of security and the role identity plays in cyber-attacks
    - Zero trust framework: Guiding principles and paradigms
    - The massive rethink underway that redefines security to follow identity
    - What you can do today to adopt a Zero Trust model and reduce risk through the power of next-gen access
    - Recommendations for prevention of data breaches

    Panelists:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Barry Scott, CTO – EMEA, Centrify
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Stages to GDPR Compliance Stage 1 - Implementing a GDPR Program Recorded: May 15 2018 4 mins
    Gitte Bendzulla, General Counsel at Juniper
    Gitte Bendzulla, Juniper Networks’ General Counsel for EMEA is back to discuss the first stage of Juniper’s compliance journey and covers constructing a GDPR program and team to identify the risk factors within the GDPR assessment process. For further insight into Juniper’s journey to GDPR, visit the content hub at http://www.juniperemea.net/gdpr
  • Stages to GDPR Compliance Stage 2 - Design of Operational Controls Recorded: May 15 2018 4 mins
    Gitte Bendzulla General Counsel at Juniper
    In this latest video, Gitte Bendzulla, Juniper Networks’ General Counsel for EMEA talks about the design of operational controls and how this can lead to a smoother and consistent road to GDPR compliance in the long term. For further insight into Juniper’s journey to GDPR, visit the content hub at http://www.juniperemea.net/gdpr
  • WannaCry. What you want to know Recorded: May 14 2018 24 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    On Friday 12th May, 2017, WannaCry happened.

    Over 200,000 computers in 150 countries were hit by this ransomware attack, it grew at an entirely unprecedented rate around the world and is now seen as one of the largest cyberattacks in history.

    What happened, and why is WannaCry significant? What could have prevented it, and what can be done to prevent, or reduce future ransomware attacks?

    Laurence Pitt, Global Security Strategy Director at Juniper, will explain all this as well as help you to understand a bit more about where ransomware comes from and why it’s such a common attack.
  • Security - the Essential Component to Your GDPR Strategy Recorded: May 8 2018 3 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    Cybersecurity with data protection ensures an early warning of a breach and allows maximum time for remediation. Juniper Networks looks at how a Software Defined Secure Network can help change your thinking from network security to Security From Your Network. For further insight into Juniper’s journey to GDPR, visit the content hub at http://www.juniperemea.net/gdpr
  • Cryptocurrency Malware: Tips to Avoid Ransomware & Data Loss Recorded: Apr 24 2018 48 mins
    Asher Langton - Security Researcher - Juniper Networks
    With exponential growth in ransomware during the last two years, we're all asking how to stay safe. In this presentation you will learn more about the different types of attack which are used to extort money, along with guidance on how to avoid them.
  • [Live Interview from RSA] Nick Bilogorskiy on RSA and Emerging Cyber Threats Recorded: Apr 18 2018 22 mins
    Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks and ITSP Magazine
    Join Nick Bilogorskiy, Cybersecurity Strategist at Juniper Networks in conversation with ITSP Magazine as they discuss everything RSA and the latest cyber threats and trends.
  • [CPE Credit Panel] Emerging Threats & Cyber Defense Recorded: Apr 18 2018 52 mins
    Chris Roberts (Acalvio) | Nick Bilogorskiy (Juniper Networks) | Dan Lohrmann (Security Mentor) | Joseph Carson (Thycotic)
    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into the evolving cyber threat landscape with CISOs and top security experts. The panel will examine the latest cyber attack trends and provide recommendations for defending enterprises and SMBs.

    Join top cyber security experts for an interactive Q&A roundtable discussion on the biggest threats targeting organizations in 2018:
    - Lessons from recent cyber attacks and breaches
    - What keeps CISOs up at night
    - Biggest cyber security challenges and how to overcome them

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Dan Lohrmann, Chief Strategist & Chief Security Officer, Security Mentor
    - Joseph Carson, Chief Security Scientist, Thycotic

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
  • Tackling the Final Leg of your GDPR Journey Recorded: Apr 10 2018 37 mins
    Laurence Pitt, Global Security Strategy Director & Steven Jacques Consulting Engineer
    At Juniper, we’re deep into our journey to GDPR compliance and we meet lots of enterprise customers working towards the same objective. So, how are their GDPR efforts shaping up?

    There are three recurring challenges we see our customers encountering:

    1. “GDPR defines best practices for data-governance, so how do we understand the data we hold and how it is being used?” You need robust data collection, analysis, correlation, and auditing capabilities. We’ll tell you how you can achieve this.

    2. “In the event of a data breach occurring, how can I quickly secure it and notify the regulator within 72 hours?” Having end-to-end visibility and security across your network is the start point. We’ll explain how.

    3. How do I keep my business protected from the sheer volume of threats? We’ll discuss how you can simplify your security strategy to free up resources.

    We’ll take you through a detailed discussion using real-life customer scenarios that bring to life actionable solutions to each scenario.

    If you are responsible for GDPR in your organization, this webinar is unmissable.
  • Tackling the Final Leg of your GDPR Journey Recorded: Mar 30 2018 5 mins
    Laurence Pitt, Steve Jacques
    There are three recurring challenges we see our customers encountering in their GDPR journey. Find out what they are and how to tackle them. Watch the promo or register now.
  • Data: Don't Let Your Greatest Asset Become a Liability Recorded: Mar 21 2018 42 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    A discussion around the role and the evolution of data. We will also cover the importance of protecting data throughout its lifecycle.

    We will look at:
    - Fundamental changes in the way we live, work and communicate
    - How we have become highly reliant on data, so it means more to us
    - The increasing value of data and why we need to protect it

    Presenter: Laurence Pitt, Global Security Strategy Director at Juniper Networks
  • The State of Cyber Resiliency in the Age of Attacks Recorded: Mar 20 2018 61 mins
    Dave Klein (GuardiCore) | Craig Dods (Juniper) | Troy Vennon (Columbus Collaboratory) | Jeannie Warner (WhiteHat Security)
    Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.

    Join this panel of experts as they discuss:
    - The biggest trends in cyber crime
    - Impact of Cryptocurrencies
    - Breaches and preventing future fraud and cyber attacks
    - Advancements in security technology
    - Why security awareness training should be a key part of your overall data protection strategy

    Speakers:
    - Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
    - Craig Dods, Chief Architect for Security, Juniper Networks' Strategic Verticals
    - Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
    - Jeannie Warner, Security Manager, WhiteHat Security
  • How Juniper Supports i3D.net’s GDPR Journey Recorded: Mar 1 2018 2 mins
    Stefan Ideler, Chief Technology Officer at i3D.net
    Stefan Ideler, Chief Technology Officer at i3D.net, describes how important data security is in the GDPR climate and how their deployed Juniper SDSN solution provides robust network protection.
  • Juniper's Advanced Threat Prevention Recorded: Feb 27 2018 53 mins
    Franklyn Jones VP of Security Marketing Juniper Networks and Juan Perez Consulting Engineer Specialist Juniper Networks
    Juniper recently acquired Cyphort, a software security firm that offers advanced threat detection, analytics, and mitigation platform. This webinar will provide an introduction to the Cyphort Advanced Threat Detection Technology which will be rebranded to Juniper Advanced Threat Appliance allowing for both cloud-based and on premise-based advanced threat protection.

    All attendees will walk away with a high-level understanding of Cyphort, such as:
    - Components of the Cyphort solution
    - Understanding of deployment and operation in network
    - Security and productivity problems Cyphort solves for customers
    - Market opportunities for VARs
    - Market research validating the industry need for Cyphort

    What You Will Learn:
    - How Cyphort will strengthen Juniper’s security portfolio for the ultimate security platform for both on-premises and cloud
    - The seven questions to ask CISO's and Security Analysts
    - How combining Detection, Analytics and Automation gives CISO’s and Security teams exactly what they want
  • Ponemon Research: Reducing Cybersecurity Costs & Risk Through Automation Recorded: Feb 27 2018 39 mins
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute; Laurence Pitt, Global Security Strategy, Juniper Networks
    Recent research, conducted by the Ponemon Institute, into cyber automation technologies revealed that cyber automation reduces the hours spent dealing with security exploits and as a result can save organizations an average of more than $2.3 million annually.

    Over 1,500 IT security practitioners, globally, were surveyed. The research looked at how organizations are deploying cyber automation technologies such as artificial intelligence and machine learning; their cost-effectiveness and other benefits of automation.

    Attend this webinar to find out more about:

    - How your peers are deploying cyber automation technologies
    - The benefits of adopting security tools with Automation
    - Why automation is the answer
    - Attendees to the webinar will get a copy of the full research report.
  • Security and the Changing Value of our Data Recorded: Jan 18 2018 43 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.

    Because of this changing value, data must be secured and protected – kept away from people who might pose a threat to its integrity and value. In this world of instantly available information a news leak informed by real data is something that can quickly reduce the value of a product, or even damage the revenue and reputation of your business.

    Endpoint-based technologies can help to prevent an attack, but this is a defensive posture - we need to move and become more proactive. Understanding the data you have makes it easier to know what is ‘normal’, in turn this makes it easier to recognize unusual behavior of devices and data which might indicate a threat has breached the network. The faster you are able to see this, the faster you can react – ensuring maximum time possible to mitigate the potential damage.
  • No Humans Allowed - IoT and the New Security Challenge Recorded: Jul 11 2017 47 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher
    Means, motive, and opportunity; the three things a potential hacker needs to succeed. And hackers all over the world must see the Internet-of-Things as an enticing prospect to launch attacks into new environments at a scale not previously seen.

    It is thought that 40% of the benefits of IoT will only be realized when true interconnectivity and interoperability are established. Open standards and open platforms are designed to make this easier but they also open up the potential for threats to enter the system and be transported across the system.

    So, if the very system that delivers the benefits also poses a threat, why not use that same system to deliver a new kind of security? A security that sees the network, and every device on it, intelligently work together, assuring your organization minimizes risk and exposure to attack.

    By joining our webinar, hosted by Lee Fisher and Laurence Pitt you will:
    1.Hear about the new kind of business models needed for successful IoT
    2.Understand how IoT presents new opportunities, at scale, for hackers
    3.Understand how IoT provides the means for hackers to scale attacks
    4.Hear a new approach to security that treats every device as a potential security enabler
Juniper Networks
Juniper Networks

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Considering IoT, Think Security
  • Live at: Jun 14 2018 5:00 pm
  • Presented by: Laurence Pitt, Global Security Strategy Director at Juniper Networks
  • From:
Your email has been sent.
or close