Hi [[ session.user.profile.firstName ]]

Considering IoT, Think Security

Who'd have thought security professionals would be spending time thinking about kettles? The explosion in connected things including light bulbs, printers, industrial controls and, yes, kettles, all of which are connected to enterprise networks is exciting. But it has created more exposed entry points leaving your network more vulnerable to attack. For every secured device, there are probably another two with no inbuilt security.

Laurence Pitt, Global Security Director at Juniper Networks discusses what you should look for and how you can take control and secure these devices.
Recorded Jun 14 2018 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Laurence Pitt, Global Security Strategy Director at Juniper Networks
Presentation preview: Considering IoT, Think Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Harnessing Automation Against Advanced Threats Recorded: Sep 19 2018 35 mins
    Frank Jas, Distinguished Engineer, Juniper Networks
    So, you've finally taken the mantra "Assume breach" to heart and deployed a security solution that detects the advanced threats that slip past your perimeter. Now what? The onslaught of new threat alerts could quickly overwhelm your already overextended SOC team.

    In this session, we'll discuss the how security automation can help you pinpoint the exact location and severity of an advanced attack and how to deploy automation with an eye to the time and cost savings relative to your unique SOC workflow.
  • Ponemon: The Challenge of Building the Right Security Automation Architecture Recorded: Sep 6 2018 41 mins
    Larry Ponemon, Chairman and Founder, Ponemon Institute; Amy James, Director of Security Portfolio Marketing Juliper Networ
    Companies are facing decisions on how to implement automation into their Security Infrastructure. They are looking to understand how, when, and where to implement the right automation capabilities in order to improve productivity, reduce costs, scale to support cloud deployments, and ultimately strengthen the security posture of the business.

    Juniper collaborated with Ponemon and discussed this problem with over 2,000 Security Practitioners, to see how they are addressing:
    •The importance of security automation to cybersecurity
    •Implementation of security automation architecture
    •Challenges and barriers to security automation adoption

    During this webinar, we will review the findings and discuss how your company can apply them to existing plans or where to start putting a plan together.
  • Ask the Expert: Part 3 Turning Data into Wisdom Recorded: Aug 7 2018 2 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher
    Lee Fisher, Head of Security EMEA at Juniper Networks explains that before organisations can begin to harness machine learning and artificial intelligence in their operations, they first need data. A proliferation of devices and RFID tags has created an abundance of data, but Lee points out that organisations need to understand how to use this data to build knowledge and protect themselves by establishing a baseline of normal activity that will enable them to identify abnormal activity.
  • Ask the Expert: Part 2 It’s not what something is, it’s what it does Recorded: Jul 31 2018 3 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher
    Lee Fisher, Head of Security EMEA at Juniper Networks ask why some organisations take so long to respond to malware threats, even in cases where attacks are announced several months in advance. Security protocols are often built on the concept of time, giving security teams a head start to detect the threat in the future. Watch Lee discuss how this window of opportunity causes organisations to be less responsive, and what needs to be addresses to monitor the behaviour of malware.

    Part 1: https://www.brighttalk.com/webcast/16375/328243
  • Ask The Experts: Part 1 Using Automation to fight automation Recorded: Jul 24 2018 3 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher
    Laurence Pitt, Security Strategy Director at Juniper Networks discuss how cyber criminals are using automation to stay ahead of security experts preventative measures. They're using automation to create malware, resulting in an increasingly regular number of security breaches. Laurence also discusses the need for businesses to automate the simpler aspects of their security processes, to free up time for human intelligence to spot behavioral abnormalities.

    Part 2: https://www.brighttalk.com/webcast/16375/328257
  • Harnessing Cybersecurity Automation Recorded: Jul 17 2018 21 mins
    Holly Schipper, Product Marketing Manager, Cybersecurity. Juniper Networks
    An understaffed security workforce is struggling to protect your evolving enterprise from ever changing cyber threats. Automation could be the answer to hardening your security posture in these shifting sands. However, the task of implementing automation across such a diverse and continuously morphing environment presents a challenge.

    In this webinar, we will discuss the benefits, complexities and best practices of implementing security automation.
  • Ask the Expert: Part 6 How to Win the Game of Security Cat and Mouse Recorded: Jun 21 2018 3 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher
    Laurence Pitt, Security Strategy Director at Juniper Networks explains why a key challenge for many security organizations, is the time required to simply maintain a baseline of security. Becoming overwhelmed in activity can prevent security teams from improving existing processes, which creates an ideal environment for cyber criminals who are typically on the offense and have studied the security model's vulnerabilities. Laurence makes the case that organisations need to use their internal data to establish baselines in behaviour, as this information will not be available to attackers.
  • Ask the Exp: Part 5 Why is Digital James Bond Restricted to Looking at Log Files Recorded: Jun 21 2018 2 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher
    Laurence Pitt, Security Strategy Director at Juniper Networks asks how organisations can possibly deal with the shear volume of threats faced each month. He poses that while automation is an ideal method to combat automated malware threats, people also need to change their perception of the technology before it can be widely adopted. Instead of being seen as a threat to peoples jobs, Laurence points out that by automating simplistic tasks, security professionals can be freed up to focus on the more strategic elements of their role.
  • Ask the Exper: Part 4 We've Got the Tools, We're Just Not Using Them Effectively Recorded: Jun 21 2018 2 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher
    Laurence Pitt, Security Strategy Director at Juniper Networks addresses the growing range of security solutions in recent years. He argues that when adopted in tandem, multiple solutions can exist in silos, failing to communicate with each other and potentially failing to identify security threats. He also raises that while widely used SIM security solutions can defeat ransomware, they are often used appropriately as a reactive tool, rather than a proactive one.
  • Considering IoT, Think Security Recorded: Jun 14 2018 39 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    Who'd have thought security professionals would be spending time thinking about kettles? The explosion in connected things including light bulbs, printers, industrial controls and, yes, kettles, all of which are connected to enterprise networks is exciting. But it has created more exposed entry points leaving your network more vulnerable to attack. For every secured device, there are probably another two with no inbuilt security.

    Laurence Pitt, Global Security Director at Juniper Networks discusses what you should look for and how you can take control and secure these devices.
  • Rethinking Security Models Recorded: Jun 13 2018 23 mins
    Lee Fisher, Head of Security Business EMEA, Juniper Networks
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Data Breaches, Identity & Security Recorded: Jun 6 2018 45 mins
    Amar Singh (CMA) | Barry Scott (Centrify) | Nick Bilogorskiy (Juniper Networks) | Raef Meeuwisse
    Data breaches are on the rise, affecting millions of people around the world. With personal information exposed to cyber criminals and up for sale, the impact of a breach can continue to haunt its victims for months, and even years to come.

    Join top security experts for this interactive Q&A panel as they discuss:
    - The current (broken) state of security and the role identity plays in cyber-attacks
    - Zero trust framework: Guiding principles and paradigms
    - The massive rethink underway that redefines security to follow identity
    - What you can do today to adopt a Zero Trust model and reduce risk through the power of next-gen access
    - Recommendations for prevention of data breaches

    Panelists:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Barry Scott, CTO – EMEA, Centrify
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Stages to GDPR Compliance Stage 1 - Implementing a GDPR Program Recorded: May 15 2018 4 mins
    Gitte Bendzulla, General Counsel at Juniper
    Gitte Bendzulla, Juniper Networks’ General Counsel for EMEA is back to discuss the first stage of Juniper’s compliance journey and covers constructing a GDPR program and team to identify the risk factors within the GDPR assessment process. For further insight into Juniper’s journey to GDPR, visit the content hub at http://www.juniperemea.net/gdpr

    Stage 2 - Design of Operational Controls: https://www.brighttalk.com/webcast/16375/321645
  • Stages to GDPR Compliance Stage 2 - Design of Operational Controls Recorded: May 15 2018 4 mins
    Gitte Bendzulla General Counsel at Juniper
    In this latest video, Gitte Bendzulla, Juniper Networks’ General Counsel for EMEA talks about the design of operational controls and how this can lead to a smoother and consistent road to GDPR compliance in the long term. For further insight into Juniper’s journey to GDPR, visit the content hub at http://www.juniperemea.net/gdpr


    Stage 1 - Implementing a GDPR program: https://www.brighttalk.com/webcast/16375/321639
  • WannaCry. What you want to know Recorded: May 14 2018 24 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    On Friday 12th May, 2017, WannaCry happened.

    Over 200,000 computers in 150 countries were hit by this ransomware attack, it grew at an entirely unprecedented rate around the world and is now seen as one of the largest cyberattacks in history.

    What happened, and why is WannaCry significant? What could have prevented it, and what can be done to prevent, or reduce future ransomware attacks?

    Laurence Pitt, Global Security Strategy Director at Juniper, will explain all this as well as help you to understand a bit more about where ransomware comes from and why it’s such a common attack.
  • Security - the Essential Component to Your GDPR Strategy Recorded: May 8 2018 3 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    Cybersecurity with data protection ensures an early warning of a breach and allows maximum time for remediation. Juniper Networks looks at how a Software Defined Secure Network can help change your thinking from network security to Security From Your Network. For further insight into Juniper’s journey to GDPR, visit the content hub at http://www.juniperemea.net/gdpr
  • Cryptocurrency Malware: Tips to Avoid Ransomware & Data Loss Recorded: Apr 24 2018 48 mins
    Asher Langton - Security Researcher - Juniper Networks
    With exponential growth in ransomware during the last two years, we're all asking how to stay safe. In this presentation you will learn more about the different types of attack which are used to extort money, along with guidance on how to avoid them.
  • [Live Interview from RSA] Nick Bilogorskiy on RSA and Emerging Cyber Threats Recorded: Apr 18 2018 22 mins
    Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks and ITSP Magazine
    Join Nick Bilogorskiy, Cybersecurity Strategist at Juniper Networks in conversation with ITSP Magazine as they discuss everything RSA and the latest cyber threats and trends.
  • [CPE Credit Panel] Emerging Threats & Cyber Defense Recorded: Apr 18 2018 52 mins
    Chris Roberts (Acalvio) | Nick Bilogorskiy (Juniper Networks) | Dan Lohrmann (Security Mentor) | Joseph Carson (Thycotic)
    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into the evolving cyber threat landscape with CISOs and top security experts. The panel will examine the latest cyber attack trends and provide recommendations for defending enterprises and SMBs.

    Join top cyber security experts for an interactive Q&A roundtable discussion on the biggest threats targeting organizations in 2018:
    - Lessons from recent cyber attacks and breaches
    - What keeps CISOs up at night
    - Biggest cyber security challenges and how to overcome them

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Dan Lohrmann, Chief Strategist & Chief Security Officer, Security Mentor
    - Joseph Carson, Chief Security Scientist, Thycotic

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
  • RSA 2018: Attention Agents of Change: Are You Ready for Your Next Mission? Recorded: Apr 18 2018 21 mins
    Rami Rahim, Chief Executive Officer, Juniper Networks
    Agents of Change – you, me, all of us. We created and embraced the Internet, which now connects more than half of Earth’s population. Now it’s time to focus on innovations to prevent our adversaries from exploiting the Internet for personal and political gain. Once again, the effort requires Agents of Change – you, me, all of us. But what do we do? Join Rami Rahim, CEO of Juniper Networks, as he reflects back of what we’ve learned, then imagines a future where cyber security problems can be stopped before they start.

    *Video courtesy of RSA Conference
Juniper Networks
Juniper Networks simplifies the complexities of networking with products, solutions and services in the cloud era to transform the way we connect, work and live. We remove the traditional constraints of networking to enable our customers and partners to deliver automated, scalable, and secure networks that connect the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Considering IoT, Think Security
  • Live at: Jun 14 2018 5:00 pm
  • Presented by: Laurence Pitt, Global Security Strategy Director at Juniper Networks
  • From:
Your email has been sent.
or close