Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.
RecordedDec 10 201812 mins
Your place is confirmed, we'll send you email reminders
Chris Gardner, Principal Analyst, Forrester and Tim Woods, VP, Customer Technology Services, FireMon
IT and security teams know that automation is the key to optimizing operations and delivering faster, more reliable services and experiences both to the enterprise and its customers. But realizing the full potential of security automation requires both a disciplined automation framework and a flexible automation platform.
Register for our webinar to hear from:
Chris Gardner, a guest speaker from Forrester, who will help you gauge your journey and discover which core competencies you need to develop or strengthen to successfully transform your organization with automation.
Tim Woods from FireMon, who will share best-in-class solutions that support organizations along their entire automation journey to deliver maximum operational efficiency, process integration efficiency and next-gen transformation efficiency.
This webinar is a must-attend if you're looking to accelerate towards autonomous security using a powerful framework.
As your business grows, so does the pressure on your security team to do more. Automation is essential, but its not a panacea for the breadth and scope of todays threats.
Feedback from FireMon customers shows they know automation can help them. They believe that anywhere from 50 to 60 percent of recurring, cyclic tasks could be automated. Automation brings with it many connotations, and while the prospect of reducing the workload of security teams is no doubt appealing, its important to understand what automation can accomplish and what it cant.
This webinar will discuss 7 myths associated with Security Automation:
Automation is a substitute for warm seats
Automation is not orchestration
Everything should be automated
Automation is only for incident response
Automation equals better security
Automation is only for big organizations
You can set it and forget it
Join Tim Woods, VP of Technology Alliances at FireMon, to learn how to automate at your own pace and pick up tips to help your internal security teams.
The ActualTech Media LIVE Megacast featured in-person interviews with FireMon and other cloud-centric vendors, seeking to help organizations further accelerate their workload support efforts. You will hear how FireMon:
- Helps organizations straddle public and private cloud environments
- Improves organizational security
- Provides a single-pane-of-glass view to your network environment
- Helps organizations solve complex storage problems with cloud services, and much, much more.
Join Tim Woods, VP Technology Alliances, FireMon and Scott Lowe, CEO, ActualTech Media as they discuss how FireMon helps ensure your security has parity with the speed of your business.
Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
You hear about network boundaries being gone so much that it’s easy to start thinking firewalls are dead. But exploit after exploit shows the opposite is true. Here are examples:
•BlueKeep and DejaBlue demonstrate that protocols like RDP have no business being exposed directly to the Internet.
•Lateral movement exploits like that in the Equifax debacle show that more segmentation is needed so that a single unpatched server doesn’t result in your most important database going up in smoke
•The Capital One data breach shows that cloud resources need firewall protection too – not just on prem
Most web applications are two applications in one. 1) The single page or progressive app runs on the client with all its source code in clear text for bad guys to pursue and 2) the application API that goes between the client and back-end servers. But that can easily become an API for bad guys.
Putting everything in the cloud and not designing network security into the architecture is like taking your on-prem network and putting all storage arrays and servers on the Internet and expecting each device and system to defend itself.
In the webinar, we look at network security and the evolving role of the firewall. We will discuss two overall classes of firewalls:
•Traffic policy enforcement points
•Full-stack next-gen / deep-packet-inspection firewall products
Those categories may cause you to widen your scope as to what constitutes a “firewall” because by #1’s definition, anything with a network ACL is a firewall.
It’s an important distinction because what we need are more enforcement points and granularity in policy. That’s the premise behind the holy grail of zero trust and microsegmentation.
But with more firewalls and rules on them, we risk making the #1 problem with firewalls even worse: misconfiguration.
Just released, FireMon will review the 6th annual State of the Firewall report. This year’s report is highly illuminating and will reinforce many of my key points.
Tim Woods, VP Technology Alliances & Elisa Lippincott, Director of Product Marketing
Security pros have spoken and the results are in! Our sixth and largest 2019 State of the Firewall report is out! Be one of the first to learn what is driving your peers and dig into the results from our annual survey.
In 2018, the industry responded and we learned:
•94% reported that firewalls are critical as always or more critical than ever
•53% have already partially or fully adopted public or hybrid cloud
•64% reported that they still deal with manual change management processes
What will the 2019 findings reveal? Our in-house experts Tim Woods, VP, Technology Alliances, and Elisa Lippincott, Director of Product Marketing, will cover the trends and challenges of network operations and security practitioners worldwide.
Track the conversation on social using #SoFR19 and join FireMon for this timely webinar.
If you are dealing with too many manual changes processes, burdening an overworked staff, this webinar is a must-attend for you. You’ll learn how to use security automation to reduce the opportunities for mistakes and misconfigurations by taking the drudge work off your staff and fast-tracking traditional SecOps.
Eliminate bottlenecks that plague traditional change processes
Decrease errors by standardizing more areas of their security
Support the dynamic demands of their agile/DevOps customers
Just reading that can give the most seasoned security professional a hair-raising moment. We now know, a single medical record fetches 10x the price of a credit card record on the black market. As scary as this sounds, it’s probably just the opening round in a topic that may have even more far reaching implications in the future.
What happens if/when hacker behavior impacts patient outcomes? We’ve seen a raft of ransomware attacks in healthcare lately. Timely access to accurate information in this age of healthcare digital transformation is not just about reputation and loss of records anymore. Or when the patient information, inevitably, becomes richer, likely involving individual DNA genetics and customized treatments based on that? How important will it be then to safeguard the patient’s information?
In this dynamic threat landscape, healthcare organizations now find themselves struggling to secure assets and environments that were initially deployed without security in mind. As a result, four main security challenges have emerged and FireMon helps organizations address them:
· Lack of network visibility: what you can’t see, you can’t protect
· Risk in adopting new technologies / devices / applications
· Limitations on vulnerability analysis and remediation
· Lack of control over security policies
Join FireMon for this timely webinar designed to help security leaders accurately understand their profile and learn how to ensure security policies mitigate risk and close gaps in compliance through continuous, adaptive policy enforcement.
Learn how to use automation to increase speed AND security in your organization. IT and security organizations are under pressure to deliver unprecedented business agility, but regulatory requirements and cyberattacks are growing fast. How do you choose between speed and security?
During this live webinar, cybersecurity expert Tim Woods, VP Technical Alliance from FireMon gives you innovative ways to move at velocity without sacrificing security. This webinar will cover:
•Automated responses for triggers like new apps or services, routine changes to apps or services, or new security threats
•Use cases for policy management automation (e.g., automating gold standard best practices, global overarching rules, and rapid approval processes for faster deployments)
•How automation help you leverage innovation while reducing security and compliance risk
Elisa Lippincott, Director of Product Marketing, FireMon
Learn how to balance speed + security in your organization. Businesses today must move at digital speeds. Going head-to-head with digital native competitors, enterprises have to evolve rapidly in areas ranging from time to market to product quality and features to business model innovation.
This puts intense pressure on IT and security organizations—often burdened with legacy systems—to deliver unprecedented business agility. At the same time, regulatory requirements are growing almost as fast as cyberattacks and cyberthreats. How do you balance the risk of not getting new application services or changes to market fast enough against the risk of a breach?
FireMon gives IT and security teams innovative ways to move at velocity without sacrificing an iota of security. FireMon uses automation that fits into your existing models and processes, so you can make incremental changes internally while your business acts disruptively in the marketplace.
In this webinar, we’ll cover:
•Automated responses for triggers such as a new app or service, routine changes in an app or a service, or new security threats
•Use cases for automation in policy management (e.g., automating gold standard best practices, global overarching rules, and rapid approval processes to ensure speed of deployment)
•How automation can help you leverage innovation without introducing security and compliance risk
Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions
This is a must-attend webinar for anyone responsible for management of SOAR solutions in their organization. During the webinar you'll hear from Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions, as he shares his presentation from Black Hat USA 2019 on how to add command to your SOAR initiatives.
Security Operations Centers wield a vast arsenal of tools to secure their assets. To get the most out of those tools, SOAR solutions start you down the right path. But if you want your SOAR solutions to truly take off, you need the ability to gather data in real time, analyze the data for patterns, trends and alerts, and respond instantly using automation. In this webinar, we'll dive deeper into automation and share five ways to make your SOAR initiatives take flight.
Tim Woods (FireMon) | Ed Moyle (Prelude Institute)
Organizations are increasing their spend on cloud security solutions (up to $12.7 billion by 2023). What are the biggest challenges for businesses when it comes to securing the cloud, the solutions they are increasingly turning to, and the best practices needed to improve security overall?
Join this panel of experts to learn more about the current state of cloud and what organizations are doing to secure it. Attendees will learn about:
- Moving to the multi-cloud
- What's the deal with Infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
- Compliance challenges and how to overcome them
- Common sense tips for cloud security
- Recommended tools and solutions
- Words of wisdom from the experts
- Tim Woods, VP Technology Alliances, FireMon
- Ed Moyle, General Manager and Chief Content Officer, Prelude Institute
Security’s influence on organizational structure is accelerating exponentially. In today’s network security environment, moving to a hybrid cloud infrastructure is a critical step needed to drive innovation and ensure competitive advantage. As application development takes the driver’s seat, security cannot stall progress it must come along for the ride.
During this presentation, Vice President of Technology Alliances, Tim Woods, will discuss how thought leaders are migrating to the hybrid cloud and how they leverage Palo Alto firewalls and automation with FireMon to streamline flexibility, scalability, centralized policy management, and automation. Woods will give an overview of initiatives to shift security to a business enabler:
•Lay the groundwork to support high-availability in on-premise and virtual environments
•Removing rule redundancy and ensure automation for recertification
•Audit and compliance management/reporting of security policies – PCI, SOX, etc.
Woods will also offer tips on how enterprises can plan for unique challenges when transitioning to a hybrid cloud environment, and how the integrated FireMon and Palo Alto Networks solution make it easy to on-board firewalls, reduce network complexity and avoid chaos.
In the digital age, many see the risk of not getting new application services or changes to market fast enough equal to or greater than the risk of a costly breach. While most security teams don’t want to put the ‘no’ in innovation, they are challenged to keep up with a significant increase in change requests, number of devices to manage and the stress of improving SLAs allowing modern app developers the ability to release new services in a timely fashion.
To get ahead, enterprises must orchestrate security processes and automate mundane security tasks. When you talk about security automation, it means different things to different people. Does this mean that organizations should automate everything immediately? And, even if they want to: could they?
Automation of global security policy management gives security teams parity with the speed of business innovation. In this webcast we will cover:
- Triggers of automation (response to: 1) a new app or service, 2) routine changes in an app or a service, 3) a new security threat)
- Use cases for automation in policy management (e.g., automating gold standard best practices or global overarching rules, and rapid approval processes to ensure speed of deployment)
- How an automated global security policy management framework can help organizations leverage innovation without introducing security and compliance risk
Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com, Tim Woods, Vice President Technology Alliances, FireMon
The only constant is change. Product deployments come and go and get moved as a result of data center reorganizations, mergers & acquisitions and migration to the cloud – and even retromigrations from cloud to on-prem.
Every time this happens it’s very easy for new risk to be created in your network.
If you want to avoid the fate of companies like Equifax, Target and many others, one of the crucial steps is proper network segmentation on the inside of your network – let alone connection to public clouds and virtual networks in the cloud.
But a properly segmented, global network security policy is difficult. And keeping that policy up-to-date is even more difficult. In this webinar, we’ll explore how to address this risky burden.
Whenever you deploy or move a technology, product or workload here’s what you need to do:
1. Identify new network connections required
2. Understand the actual traffic requirements – especially in terms of protocols
3. Determine who needs to communicate with the workload and in which directions. By who, we mean sets of users, regions, datacenters, segments, application servers, etc.
4. What are the security differentials between the communicating entities?
5. Are additional enforcement points required?
We will drill down into each of these steps and then Tim Woods and Josh Williams from FireMon will show you how the Global Policy Controller gives you a birds-eye view of your entire hybrid network by bringing every enforcement point and its arcane configuration onto a single pane of glass, driven by your actual intent.
Reggie Best, President of Lumeta Solutions, FireMon | Ed Young, Product Manager of Lumeta Solutions, FireMon
Maintaining continuous security and compliance requires comprehensive visibility across your hybrid environment. You need to adapt and scale your security measures as your environment grows, as your hybrid environment shifts, or as new threats are detected. But without a true understanding of the scope of your assets and where all of your workloads reside, your efforts will be futile.
Learn how FireMon’s Lumeta CloudVisibility can extend comprehensive network and endpoint discovery with real-time infrastructure visibility, change monitoring, and leak-path detection for your migration to the hybrid cloud across your on-premises, virtual, software-defined, cloud and hybrid environments.
Cloud infrastructure brings the same risks and threats as an on-premises environment, but with a twist: the rate of expansion. Cloud services and applications spin up, deploy and provision faster than you can say “IaaS” and it’s inevitable that you’ll miss critical security controls.
Join us for this webinar to learn the steps you need to take to confidently embrace the cloud without compromising security.
We will discuss how you can:
•Reduce the visibility gap into your hybrid environment
•Spin up, deploy and provision faster while maintaining a strong security posture
•Automate risk analysis and change management
•Assess your risk in real-time
•Validate configuration requirements
Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
In this real training for free webinar, we will explore what it takes to test your firewalls and prove they actually do what you intend. We aren’t talking about a simple pentest or vulnerability scan from the Internet. And in this session, I’ll explain why that is insufficient.
Here’s some of what we’ll cover:
Identifying the various zones on your network that put boundaries on traffic.
Choosing the target zones to test and the vantage points to test from. With firewalls testing, the vantage point is just as important as the target. But with a network of any size you can’t really hope to test every combination of test and vantage point – it’s not a so-called NP-Complete problem but the impact is the same – you have to be satisfied with results from a finite amount of effort, so prioritization is important.
Tools to speed up firewall testing.
How to test firewall policy without touching the actual hosts behind the firewall.
Understanding and avoiding false test results caused by dependencies on host configuration external to the firewall policy.
Ed Young, Product Manager - Lumeta, FireMon | Pedro Haworth, Head of Technology, Security Innovation Alliance, McAfee
Today's security teams struggle with the challenges created by continuously evolving networks and threats. We'll demonstrate how using McAfee® ePolicy Orchestrator® (McAfee ePO™) software and Lumeta Spectre together gives IT organizations the real-time visibility they need to proactively identify, manage, and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile, and physical networks.
Dave Klein (Guardicore), Tim Woods (FireMon), Tom McAndrew (Coalfire), Praveen Jain (Cavirin)
"Enterprises today are leveraging multiple clouds and thousands of applications. What are the security and compliance risks associated with a multi-cloud strategy?
Join cloud and security leaders in an interactive discussion to learn about:
- The current state of cloud
- Security risks and recommendations
- Managing and automating security across multiple clouds and applications
- What to expect in 2019
- Recommendations for improving enterprise cloud security"
Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com | Scott Custer, Senior Solutions Architect, FireMon
You need to understand all the potential pathways malicious traffic could possibly take through your network – including obscure and indirect paths that don’t immediately look risky or valuable to an attacker. Moreover, you need to be able to juxtapose that network topology and path analysis with your host level security vulnerabilities.
In this real training for free session, we will examine 5 steps for accomplishing this:
Validate address space
Quantify edges of network
Perform path analysis
Conduct host/device census
Identify device/host level vulnerabilities
Join us to explore all of these steps and then how to juxtapose and overlay all of this information into a comprehensive, multi-dimensional attack surface.
FireMon is the perfect sponsor for this event and Scott Custer will show you how their unique technology, Lumeta, provides real-time visibility, vulnerability indicators, and risk identification enabling cloud, network, and security teams to find and secure unknown, rogue and shadow IT, network infrastructure, and endpoints.
FireMon delivers continuous security for hybrid enterprises through a powerful fusion of vulnerability management, continuous compliance and orchestration. Since creating the first-ever network security management solution, FireMon solutions have continued to deliver visibility into and control over complex network security infrastructure, policies and risk for more than 1,700 customers around the world.
Achieve NERC CIP Compliance with FireMonRobert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]11 mins