Hi [[ session.user.profile.firstName ]]

Case Study: Australian National University | 2020 Virtual Roundtable

After finding themselves in a data breach in late 2018, the renowned Australian National University (ANU) published an extensive transparent report, outlining the timeline of events and the level of sophistication behind the hack.

A 2020 global intelligence threat report by NTT, found the education sector attracted 38% of all attacks last year and was the 2nd most attacked industry after government.

This rise of attacker techniques combining ransomware and data exfiltration illustrates that defense against either approach in isolation is insufficient. Compounded with the complexity of University environments, this also makes an endpoint-only approach unviable.

Join us for an exclusive fireside chat with the CISO of ANU, Suthagar Seevaratnam, as we discuss some of the changes they've made post-incident and what they see as their next steps to improve cybersecurity resiliency in today’s ever-evolving threat landscape.
Recorded Oct 2 2020 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Suthagar Seevaratnam | ANU CISO
Presentation preview: Case Study: Australian National University | 2020 Virtual Roundtable

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Helping Telcos On Their Network Journey Recorded: Apr 28 2021 57 mins
    Jeremy Cowan VanillaPlus, Patrick Kelly Analyst Appledore Research, Ryan Mahoney PM Director & Matt Percival SP EMEA Gigamon
    As you evolve, expand, or transform your network, it’s time to get ahead of monitoring your subscriber’s needs for exponential growth in network-traffic and data, and increased risk of threats. Whether you are adopting 5G, NFV or going through another transition, you will be considering how you can provide innovative services to improve user experience, reduce risk and decrease cost per subscriber now and into the future.
    Network transformation will place great demands upon network visibility and security as the core challenge for service providers lies in transitioning to a virtualised, service-based architecture whilst minimising risks and costs.
    We will talk about how Gigamon is working with leading network providers globally to help them run fast, stay secure and optimise their networks as they take their journey into the future.
    Register for this webinar and:
    • Learn how to break the cost curve of network visibility – as networks grow, tool costs can grow in direct proportion.
    • Discover how to extend the life of your network performance and security tools without sacrificing quality.
    • Learn about some of Gigamon’s unique packet reduction techniques.
    • With the future in virtualised network environments - find out why visibility within is critical and must be considered in the design phase.
    • Whomever your vendor of choice and whatever your probing offering, learn how intelligent Network Packet Broking brings increased operational value, performance and decreased cost.
  • Zero Trust a UK CISO Summit presentation Recorded: Mar 29 2021 20 mins
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP
    With Organisations’ workforces forced into remote working with COVID and the upcoming flexibility of working being proposed by 5G, the Zero Trust Architecture [ZTA] model for securing Data and Applications is very much at the forefront of Security Professional’s thinking. In its most basic form, ZTA is based on a variable policy determined by observation; with Visibility at the foundation of observation join Gigamon in discussing strategies for achieving the Visibility required to underpin any successful ZTA implementation, thereby empowering organisations to correctly determine the right policy at the right time and ensuring secure and seamless operations.

    Key Take-Aways:
    Achieving the Visibility required to underpin a successful Zero Trust implementation.
    Determining the right policy at the right time.
    Ensuring secure and seamless operations.
  • The Imminent Impact of TLS 1.3 on Network Security Controls Recorded: Mar 17 2021 56 mins
    David Holmes, Senior Analyst, Forrester Rami Rammaha, Senior Product Marketing Manager, Gigamon
    Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.

    The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organisation’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.

    You’ll learn:
    • What changes are coming and how they impact network visibility
    • Which tools are at risk of going dark in the new world
    • How long architects have to turn the lights back on
    • How IT security can mitigate the impact of what’s coming
    • Where DNS security is headed
  • Detecting Tor in Your Network Recorded: Feb 2 2021 61 mins
    Ollie Sheridan, Gigamon Principal Engineer; Brandon Dunlap, Moderator
    Tor, "The Onion Router", is a protocol for anonymously browsing the Internet as well as ".onion" sites that are only accessible via the Tor Network (and is largely seen as bad news for a network). While the origins of Tor were noble, bad actors and criminals have used and abused the Tor network as a means to undertake illegal activities, safe in the knowledge that catching them in the act is, at very best, extremely difficult. Join Gigamon and (ISC)2 as we explore:

    • The history and origins of Tor
    • How the Tor network is constructed
    • How Tor can be detected on your network
    • Ideas and strategies to capturing the network traffic required to know of Tor's presence
    • Securing your network against Tor usage
  • Insights From The CyberEdge COVID-19 Impact Report Recorded: Jan 12 2021 57 mins
    Steve Piper – Founder and CEO of CyberEdge Group + Martyn Crew – Dir Industry Solutions, Gigamon
    Join us for a conversation with Steve Piper, Founder & CEO of CyberEdge Group. Steve will share insights from the Group's latest research report: The Impact of COVID-19 on Enterprise IT Security Teams.

    Hear what the research says about:
    * the impact of the work-from-home movement
    * pandemic-related IT challenges
    * the health of security budgets
    * staffing issues, training, and more
  • Network Visibility in Today’s Complex World Recorded: Dec 22 2020 58 mins
    Jim Mandelbaum, Senior Security Engineer at Gigamon
    Having visibility into your network, what’s on it and how it’s preforming, is critical to any sized organization. The use of network monitoring tools like SPAN and TAP can certainly help, as can Network Aggregation and Packet Brokers.

    Join Gigamon and (ISC)² as we dive into visibility topics such as:
    · Data de-duplication
    · Slicing
    · Masking
    · TLS decryption
    · Inline and out-of-band tools
    · Virtual and cloud environments
  • Exploring Innovations in Networking Recorded: Dec 15 2020 32 mins
    Bassam Khan, VP of Product and Technical Marketing Engineering at Gigamon
    In case you haven’t noticed, the enterprise network is changing and changing fast. Traditional physical routers, switches and firewalls are quickly being replaced by their software-defined counterparts. Networks are moving to the cloud and spanning the world.
    How is the enterprise going to not only leverage the latest network innovations but also try to keep pace?
    How will you manage, monitor, and troubleshoot the ever-more-complex network of the future?
    What are the latest solutions available to help make the job easier?
    Join us for this ActualTech Media replay to get those questions answered and more.

    In this webinar, you will:
    - Learn key trends that are reshaping the networking landscape
    - Discover how you can gain complete network visibility to improve security, ensure performance and prevent problems before they happen
  • The Secrets to Pole Position in F1 and Network Security Recorded: Nov 26 2020 64 mins
    David Coulthard & Bob Constanduros and Ollie Sheridan, Principal Security Solutions Engineer, CISSP
    Join F1 star David Coulthard, leading F1 sports commentator Bob Constanduros and Gigamon experts for a unique session on optimising Network Detection and Response (NDR) and other security tools with uncompromised network visibility. Provide your InfoSec and IT teams with the fuel to race towards a winning performance.

    Full visibility of internal mechanics and external surroundings is crucial for F1 drivers racing on circuits at break-neck speed. Protecting your IT infrastructure is no different. Without clear visibility of ALL relevant traffic, deploying NDRs or any other security tool is so resource-intensive and time-consuming, it can take InfoSec teams away from detecting and hunting threats.

    Learn more about network security optimisation, Gigamon solutions and hear how customers are optimising their NDR investment. The final lap will see David Coulthard taking live questions from the audience and being interviewed by Bob Constanduros who has covered over 670 Grand Prix’s and interviewed multiple F1 legends throughout his career.
  • How to Gain Visibility and Boost Security in Public Cloud Hosted Operations Recorded: Nov 26 2020 50 mins
    John Gudmundson Head of Technical Product Marketing, Gigamon and Lee Carass Solution Architect, Trend Micro
    Public Clouds are on the ascent. To ensure comprehensive security with superior performance you need full packet and application visibility. As such environments are also very dynamic and complex, automation is critical to success.

    Today, to acquire and forward traffic to various security and monitoring tools you must laboriously install agents on each compute node for every tool or potentially utilise native traffic mirroring services. Neither of these approaches provide you the full control nor detailed insights into network flows.

    There is a better way. Learn how next-gen Network Packet Brokers collaborate with cloud orchestration tools to automatically provision virtual TAPs to obtain all traffic. Next, app flows are identified, optimally processed and distributed to security tools such as anti-malware from Trend Micro. Network efficiency rises, user security enhanced, and tool effectiveness improved.
  • Here Be Dragons: The Double-Edged Sword That Is TLS Recorded: Nov 17 2020 60 mins
    Ian Farquhar, Consulting Sales Engineer at Gigamon
    TLS is becoming ubiquitous, but it’s a double-edged sword. On the one side, organizations can mitigate risk vectors using this protocol. On the flipside is the misuse of TLS by threat actors trying to hide their activities and prevent your security monitoring infrastructure from detecting their activities. How do you benefit from TLS, but avoid the risks? Is decrypting everything the right approach? And if so, where? What about non-decrypting approaches to threat detection, like JA3? TLS 1.3 was a significant change, what do I need to know about it? Join Gigamon and (ISC)2 to get answers to these questions and more.

    Watch this webinar to learn the answer to this question, plus:
    · Whether or not decrypting everything the right approach
    · How non-decrypting approaches to threat detection, such as JA3, compare
    · What you need to know about TLS 1.3
  • 5 Reasons You Don't Need New Budget to Buy Gigamon Recorded: Oct 22 2020 38 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    It’s not always easy to get approval to invest in the solutions you need, especially in these uncertain times. Let us help. Gigamon solutions enable you to save money in your tools budget so you can re-use that money to drive high impact digital transformation initiatives.

    Attend the live webinar to learn how to:
    • Reduce duplicate traffic on your network by 50%
    • Filter out low risk, irrelevant traffic and focus on high-risk traffic

    • Minimize the number of new tools you’ll need as your data volumes increase
    • Use existing tools on upgraded, faster networks
  • Securing Financial Services in the Age of Digital Transformation Recorded: Oct 14 2020 23 mins
    Martyn Crew – Director, Industry Solutions, Gigamon
    The old cliché "you can't protect against what you can't see" holds as true for cybersecurity as for physical security. Financial Services organisations have been at the forefront of digital transformation and have realised that, without the right planning and tools, security can become a casualty in this process.

    View this webinar and join the discussion involving these issues and ways that Financial Services organisations can protect themselves and their customers in the digital transformation process.
  • Is Encrypting Everything A Good Idea? Recorded: Oct 13 2020 63 mins
    Ollie Sheridan, Principal Sales Engineer, Security, Gigamon (EMEA); Brandon Dunlap, Moderator
    A recent trend in the IT Industry has been to encrypt communications with more and more protocols now running over TLS ("SSL"). Major browser vendors are providing a means to not only encrypt the DNS requests being made by clients but also the SNI within a TLS connection. Are we as an industry losing sight of our goals with this approach and are producing a potential issue where we are hindering rather than helping ourselves in this endeavour? Join Gigamon and (ISC)2 October 13, 2020 at 1:00 p.m. BST for a discussion of the pros and cons of encrypting this data, with an emphasis on TLS as a transport. We will also examine the motivations of organisations to provide these services and how a Threat Actor can take (and in fact has taken) advantage of another hole we've inadvertently made in our countermeasures. Also discussed will be the steps we can take to keep ahead of this and the financial ramifications that ubiquitous encryption can have on security countermeasures.
  • Case Study: Australian National University | 2020 Virtual Roundtable Recorded: Oct 2 2020 57 mins
    Suthagar Seevaratnam | ANU CISO
    After finding themselves in a data breach in late 2018, the renowned Australian National University (ANU) published an extensive transparent report, outlining the timeline of events and the level of sophistication behind the hack.

    A 2020 global intelligence threat report by NTT, found the education sector attracted 38% of all attacks last year and was the 2nd most attacked industry after government.

    This rise of attacker techniques combining ransomware and data exfiltration illustrates that defense against either approach in isolation is insufficient. Compounded with the complexity of University environments, this also makes an endpoint-only approach unviable.

    Join us for an exclusive fireside chat with the CISO of ANU, Suthagar Seevaratnam, as we discuss some of the changes they've made post-incident and what they see as their next steps to improve cybersecurity resiliency in today’s ever-evolving threat landscape.
  • Network Resilience for a Remote Workforce Recorded: Sep 30 2020 43 mins
    Romaine Fouchereau, IDC Research Manager, Frank Rubio, Gigamon & Joe Bombagi, Riverbed
    How the convergence of network and security tools can help your organisation to securely deliver business continuity without sacrificing user experience

    2020 saw one of the biggest shifts in the way organisations work and operate, as most of their workforce working from home has now become the new normal. This is putting new strains on the network, but also creating more issues for the IT and security teams as the workforce still need to access applications and data securely.

    Join this webinar as speakers from IDC, Riverbed and Gigamon discuss how IT and security leaders can keep delivering network resilience and performance, security and a solid user experience for their organisation.

    You will learn:
    •What the trends are in Europe from IDC's latest research
    •What organisations can do to handle new business priorities
    •How to handle secure remote access at scale
    •How to maintain network visibility
    •Which tools can be used to keep the network secure
    •How to optimise bandwidth usage and performance
  • How to Stay Relevant in a Fast Changing Infrastructure Recorded: Sep 1 2020 72 mins
    Martyn Crew, Gigamon + Greg Jablonsky, CTO at Bonadio Group + Sean Mack, CIO & CISO at Wiley
    In times of great transition or crisis, it’s leaders we turn to. Today is no different. Watch this webinar with Argyle to learn what IT leaders are doing to regain control over their network and what you can do going forward.

    Learn how IT leaders must work to:
    • Prevent network bottlenecks in a work-from-home environment
    • Address the specific security risks of personal device usage
    • Collaborate to maintain visibility, security and performance

    Speakers / Panelists:
    Martyn Crew, Director of Solutions Marketing at Gigamon
    Greg Jablonsky, Chief Technology Officer at the Bonadio Group
    Sean Mack, Chief Information Officer and CISO at Wiley
  • Turn Network Data Into a High-Octane Fuel That Powers Security Recorded: Aug 25 2020 55 mins
    Eric Hanselman, Chief Analyst at 451 Research + Shehzad Merchant, CTO at Gigamon
    Join Eric Hanselman, Chief Analyst at 451 Research, and Shehzad Merchant, CTO at Gigamon, as they discuss the latest ideas and best practices to extract meaningful data to secure your infrastructure.

    The webinar will cover:
    • Inherent challenges of new architectures
    • Why the future is increasingly moving toward hybrid IT environments
    • What makes network data “high-octane?”
    • How best to leverage your network as a context-rich source of truth

    You’ll learn where this data exists, how it can be accessed and how to refine it into powerful security analytics. In today’s unprecedented enterprise landscape this isn’t just smart, it’s an imperative.
  • Securing the Next Normal of Financial Services Workplaces Recorded: Aug 18 2020 20 mins
    Shehzad Merchant, CTO + Martyn Crew, Director Solutions Marketing, Gigamon
    Wondering how to secure a fluid workforce and which tools to use? Want to understand what the greatest new areas of risk are for Financial Services? Watch this video Q&A to get answers.

    In addition to sharing insights into what the Next Normal will look like, how to maintain business continuity and crucial factors organizations might be overlooking, Shehzad Merchant, Chief Technology Officer at Gigamon, will answer questions like these:
    • How to manage a fluid workplace that dynamically shifts between on- and off-prem work
    • Which tools and technologies to use to secure your workforce
    • How to help DevOps scale apps dynamically without scaling up the attack surface

    Presented by:
    Shehzad Merchant, Chief Technology Officer at Gigamon
    Martyn Crew, Director of Solutions Marketing at Gigamon
  • Network Management Is Critical, Even When Employees Are Working From Home Recorded: Aug 11 2020 42 mins
    Michael Osterman, Principal Analyst at Osterman Research + Bassam Khan, VP of Product & Tech Marketing, Gigamon
    For anyone tasked with managing an organization’s network, this webinar with Osterman Research offers insights into critical issues network managers need to address to gain visibility and secure their network traffic. Current events have only made this harder.

    You’ll learn:
    • How organizations are adapting to the new work-from-home phenomenon
    • The critical issues you need to address to gain visibility into your network operations to optimize and secure network traffic
    • How to address drastic changes to network usage and adapt as quickly as possible

    Presented by:
    Michael Osterman, Principal Analyst at Osterman Research
    Bassam Khan, Vice President of Product and Tech Marketing at Gigamon
  • Network Visibility in a Kubernetes Environment Recorded: Jul 14 2020 63 mins
    Ollie Sheridan, Principal Sales Engineer, Security, (EMEA); Brandon Dunlap, Moderator
    IT, cloud and security architects are responsible for addressing the following questions before they can successfully deploy applications in containers with Kubernetes-based orchestration and ensure the resultant traffic is optimally processed and distributed:

    · How can I get visibility into inter-container traffic as containers are ephemeral and constantly in-motion?
    · Can I ensure scalable visibility as deployed apps grow and can span hundreds of microservices each?

    · What if the underlying network architecture changes with a different virtual switch methodology?

    · Is there a way to automate the configured policies across thousands of containers in real-time?

    Not addressing these considerations slows down the transition to container-based applications, limits the use of datacenter automation and leaves the organization vulnerable to potential security breaches, with potential impact to reputation and brand. Join Gigamon and (ISC)2 on July 14, 2020 at 1:00PM BST for answers to these and other questions as we dive into containers and network visibility.
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Case Study: Australian National University | 2020 Virtual Roundtable
  • Live at: Oct 2 2020 5:00 pm
  • Presented by: Suthagar Seevaratnam | ANU CISO
  • From:
Your email has been sent.
or close