Hi [[ session.user.profile.firstName ]]

Achieve Real-time Visibility and Control of Your Hybrid Cloud

Cloud infrastructure brings the same risks and threats as an on-premises environment, but with a twist: the rate of expansion. Cloud services and applications spin up, deploy and provision faster than you can say “IaaS” and it’s inevitable that you’ll miss critical security controls.

Join us for this webinar to learn the steps you need to take to confidently embrace the cloud without compromising security.

We will discuss how you can:

•Reduce the visibility gap into your hybrid environment
•Spin up, deploy and provision faster while maintaining a strong security posture
•Automate risk analysis and change management
•Assess your risk in real-time
•Validate configuration requirements
Recorded May 8 2019 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tim Woods, VP Technology Alliances, FireMon
Presentation preview: Achieve Real-time Visibility and Control of Your Hybrid Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Don't Be the Next Healthcare Headline - Automate Mindfully to Lower Network Risk Recorded: Oct 17 2019 57 mins
    Keith Brennan, Director - Field Engineering
    Data Breach.

    Just reading that can give the most seasoned security professional a hair-raising moment. We now know, a single medical record fetches 10x the price of a credit card record on the black market. As scary as this sounds, it’s probably just the opening round in a topic that may have even more far reaching implications in the future.

    What happens if/when hacker behavior impacts patient outcomes? We’ve seen a raft of ransomware attacks in healthcare lately. Timely access to accurate information in this age of healthcare digital transformation is not just about reputation and loss of records anymore. Or when the patient information, inevitably, becomes richer, likely involving individual DNA genetics and customized treatments based on that? How important will it be then to safeguard the patient’s information?

    In this dynamic threat landscape, healthcare organizations now find themselves struggling to secure assets and environments that were initially deployed without security in mind. As a result, four main security challenges have emerged and FireMon helps organizations address them:

    · Lack of network visibility: what you can’t see, you can’t protect
    · Risk in adopting new technologies / devices / applications
    · Limitations on vulnerability analysis and remediation
    · Lack of control over security policies


    Join FireMon for this timely webinar designed to help security leaders accurately understand their profile and learn how to ensure security policies mitigate risk and close gaps in compliance through continuous, adaptive policy enforcement.
  • Automation: One Giant Leap for Security Recorded: Sep 25 2019 59 mins
    Tim Woods, VP, Technical Alliance, FireMon
    Learn how to use automation to increase speed AND security in your organization. IT and security organizations are under pressure to deliver unprecedented business agility, but regulatory requirements and cyberattacks are growing fast. How do you choose between speed and security?

    During this live webinar, cybersecurity expert Tim Woods, VP Technical Alliance from FireMon gives you innovative ways to move at velocity without sacrificing security. This webinar will cover:

    •Automated responses for triggers like new apps or services, routine changes to apps or services, or new security threats
    •Use cases for policy management automation (e.g., automating gold standard best practices, global overarching rules, and rapid approval processes for faster deployments)
    •How automation help you leverage innovation while reducing security and compliance risk
  • Drive Innovation with a Strong Security Posture Recorded: Sep 25 2019 36 mins
    Elisa Lippincott, Director of Product Marketing, FireMon
    Learn how to balance speed + security in your organization. Businesses today must move at digital speeds. Going head-to-head with digital native competitors, enterprises have to evolve rapidly in areas ranging from time to market to product quality and features to business model innovation.

    This puts intense pressure on IT and security organizations—often burdened with legacy systems—to deliver unprecedented business agility. At the same time, regulatory requirements are growing almost as fast as cyberattacks and cyberthreats. How do you balance the risk of not getting new application services or changes to market fast enough against the risk of a breach?

    FireMon gives IT and security teams innovative ways to move at velocity without sacrificing an iota of security. FireMon uses automation that fits into your existing models and processes, so you can make incremental changes internally while your business acts disruptively in the marketplace.

    In this webinar, we’ll cover:
    •Automated responses for triggers such as a new app or service, routine changes in an app or a service, or new security threats
    •Use cases for automation in policy management (e.g., automating gold standard best practices, global overarching rules, and rapid approval processes to ensure speed of deployment)
    •How automation can help you leverage innovation without introducing security and compliance risk
  • 5 Ways to Make Your SOAR Initiatives Take Flight Recorded: Aug 22 2019 44 mins
    Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions
    This is a must-attend webinar for anyone responsible for management of SOAR solutions in their organization. During the webinar you'll hear from Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions, as he shares his presentation from Black Hat USA 2019 on how to add command to your SOAR initiatives.

    Security Operations Centers wield a vast arsenal of tools to secure their assets. To get the most out of those tools, SOAR solutions start you down the right path. But if you want your SOAR solutions to truly take off, you need the ability to gather data in real time, analyze the data for patterns, trends and alerts, and respond instantly using automation. In this webinar, we'll dive deeper into automation and share five ways to make your SOAR initiatives take flight.
  • [PANEL] Cloud Security Common Sense Tips & Tools Recorded: Jul 25 2019 60 mins
    Tim Woods (FireMon) | Ed Moyle (Prelude Institute)
    Organizations are increasing their spend on cloud security solutions (up to $12.7 billion by 2023). What are the biggest challenges for businesses when it comes to securing the cloud, the solutions they are increasingly turning to, and the best practices needed to improve security overall?

    Join this panel of experts to learn more about the current state of cloud and what organizations are doing to secure it. Attendees will learn about:

    - Moving to the multi-cloud
    - What's the deal with Infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
    - Compliance challenges and how to overcome them
    - Common sense tips for cloud security
    - Recommended tools and solutions
    - Words of wisdom from the experts

    Speakers:
    - Tim Woods, VP Technology Alliances, FireMon
    - Ed Moyle, General Manager and Chief Content Officer, Prelude Institute
  • From Security Bottleneck to Business Enabler Recorded: Jul 23 2019 59 mins
    Tim Woods, VP Technology Alliances, FireMon
    Security’s influence on organizational structure is accelerating exponentially. In today’s network security environment, moving to a hybrid cloud infrastructure is a critical step needed to drive innovation and ensure competitive advantage. As application development takes the driver’s seat, security cannot stall progress it must come along for the ride.

    During this presentation, Vice President of Technology Alliances, Tim Woods, will discuss how thought leaders are migrating to the hybrid cloud and how they leverage Palo Alto firewalls and automation with FireMon to streamline flexibility, scalability, centralized policy management, and automation. Woods will give an overview of initiatives to shift security to a business enabler:

    •Lay the groundwork to support high-availability in on-premise and virtual environments
    •Removing rule redundancy and ensure automation for recertification
    •Audit and compliance management/reporting of security policies – PCI, SOX, etc.

    Woods will also offer tips on how enterprises can plan for unique challenges when transitioning to a hybrid cloud environment, and how the integrated FireMon and Palo Alto Networks solution make it easy to on-board firewalls, reduce network complexity and avoid chaos.
  • Removing the "NO!" from innovation Recorded: Jul 16 2019 30 mins
    Paul Anderson, VP Solutions, GPC | Josh Williams, Senior Sales Engineer
    In the digital age, many see the risk of not getting new application services or changes to market fast enough equal to or greater than the risk of a costly breach. While most security teams don’t want to put the ‘no’ in innovation, they are challenged to keep up with a significant increase in change requests, number of devices to manage and the stress of improving SLAs allowing modern app developers the ability to release new services in a timely fashion.

    To get ahead, enterprises must orchestrate security processes and automate mundane security tasks. When you talk about security automation, it means different things to different people. Does this mean that organizations should automate everything immediately? And, even if they want to: could they?

    Automation of global security policy management gives security teams parity with the speed of business innovation. In this webcast we will cover:

    - Triggers of automation (response to: 1) a new app or service, 2) routine changes in an app or a service, 3) a new security threat)
    - Use cases for automation in policy management (e.g., automating gold standard best practices or global overarching rules, and rapid approval processes to ensure speed of deployment)
    - How an automated global security policy management framework can help organizations leverage innovation without introducing security and compliance risk
  • 5 Steps to Keep Network Security Enforcement Points Secure and Up-To-Date Recorded: Jul 11 2019 86 mins
    Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com, Tim Woods, Vice President Technology Alliances, FireMon
    The only constant is change. Product deployments come and go and get moved as a result of data center reorganizations, mergers & acquisitions and migration to the cloud – and even retromigrations from cloud to on-prem.

    Every time this happens it’s very easy for new risk to be created in your network.

    If you want to avoid the fate of companies like Equifax, Target and many others, one of the crucial steps is proper network segmentation on the inside of your network – let alone connection to public clouds and virtual networks in the cloud.

    But a properly segmented, global network security policy is difficult. And keeping that policy up-to-date is even more difficult. In this webinar, we’ll explore how to address this risky burden.

    Whenever you deploy or move a technology, product or workload here’s what you need to do:

    1. Identify new network connections required
    2. Understand the actual traffic requirements – especially in terms of protocols
    3. Determine who needs to communicate with the workload and in which directions. By who, we mean sets of users, regions, datacenters, segments, application servers, etc.
    4. What are the security differentials between the communicating entities?
    5. Are additional enforcement points required?


    We will drill down into each of these steps and then Tim Woods and Josh Williams from FireMon will show you how the Global Policy Controller gives you a birds-eye view of your entire hybrid network by bringing every enforcement point and its arcane configuration onto a single pane of glass, driven by your actual intent.
  • How To Gain Comprehensive Visibility and Security for Your Hybrid Environment Recorded: May 22 2019 48 mins
    Reggie Best, President of Lumeta Solutions, FireMon | Ed Young, Product Manager of Lumeta Solutions, FireMon
    Maintaining continuous security and compliance requires comprehensive visibility across your hybrid environment. You need to adapt and scale your security measures as your environment grows, as your hybrid environment shifts, or as new threats are detected. But without a true understanding of the scope of your assets and where all of your workloads reside, your efforts will be futile.

    Learn how FireMon’s Lumeta CloudVisibility can extend comprehensive network and endpoint discovery with real-time infrastructure visibility, change monitoring, and leak-path detection for your migration to the hybrid cloud across your on-premises, virtual, software-defined, cloud and hybrid environments.
  • Achieve Real-time Visibility and Control of Your Hybrid Cloud Recorded: May 8 2019 47 mins
    Tim Woods, VP Technology Alliances, FireMon
    Cloud infrastructure brings the same risks and threats as an on-premises environment, but with a twist: the rate of expansion. Cloud services and applications spin up, deploy and provision faster than you can say “IaaS” and it’s inevitable that you’ll miss critical security controls.

    Join us for this webinar to learn the steps you need to take to confidently embrace the cloud without compromising security.

    We will discuss how you can:

    •Reduce the visibility gap into your hybrid environment
    •Spin up, deploy and provision faster while maintaining a strong security posture
    •Automate risk analysis and change management
    •Assess your risk in real-time
    •Validate configuration requirements
  • How to Prove Your Firewalls Actually Do What You Intend Recorded: May 2 2019 90 mins
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
    In this real training for free webinar, we will explore what it takes to test your firewalls and prove they actually do what you intend. We aren’t talking about a simple pentest or vulnerability scan from the Internet. And in this session, I’ll explain why that is insufficient.

    Here’s some of what we’ll cover:

    Identifying the various zones on your network that put boundaries on traffic.

    Choosing the target zones to test and the vantage points to test from. With firewalls testing, the vantage point is just as important as the target. But with a network of any size you can’t really hope to test every combination of test and vantage point – it’s not a so-called NP-Complete problem but the impact is the same – you have to be satisfied with results from a finite amount of effort, so prioritization is important.

    Tools to speed up firewall testing.

    How to test firewall policy without touching the actual hosts behind the firewall.

    Understanding and avoiding false test results caused by dependencies on host configuration external to the firewall policy.
  • Close the Door on Endpoint Security Threats with Detection & Response Recorded: Apr 30 2019 39 mins
    Ed Young, Product Manager - Lumeta, FireMon | Pedro Haworth, Head of Technology, Security Innovation Alliance, McAfee
    Today's security teams struggle with the challenges created by continuously evolving networks and threats. We'll demonstrate how using McAfee® ePolicy Orchestrator® (McAfee ePO™) software and Lumeta Spectre together gives IT organizations the real-time visibility they need to proactively identify, manage, and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile, and physical networks.
  • Managing Security for the Multi-Cloud Recorded: Mar 6 2019 46 mins
    Dave Klein (Guardicore), Tim Woods (FireMon), Tom McAndrew (Coalfire), Praveen Jain (Cavirin)
    "Enterprises today are leveraging multiple clouds and thousands of applications. What are the security and compliance risks associated with a multi-cloud strategy?

    Join cloud and security leaders in an interactive discussion to learn about:
    - The current state of cloud
    - Security risks and recommendations
    - Managing and automating security across multiple clouds and applications
    - What to expect in 2019
    - Recommendations for improving enterprise cloud security"
  • 5 Steps to Comprehensively Mapping Your Attack Surface Recorded: Feb 28 2019 88 mins
    Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com | Scott Custer, Senior Solutions Architect, FireMon
    You need to understand all the potential pathways malicious traffic could possibly take through your network – including obscure and indirect paths that don’t immediately look risky or valuable to an attacker. Moreover, you need to be able to juxtapose that network topology and path analysis with your host level security vulnerabilities.

    In this real training for free session, we will examine 5 steps for accomplishing this:

    Validate address space
    Quantify edges of network
    Perform path analysis
    Conduct host/device census
    Identify device/host level vulnerabilities
    Join us to explore all of these steps and then how to juxtapose and overlay all of this information into a comprehensive, multi-dimensional attack surface.

    FireMon is the perfect sponsor for this event and Scott Custer will show you how their unique technology, Lumeta, provides real-time visibility, vulnerability indicators, and risk identification enabling cloud, network, and security teams to find and secure unknown, rogue and shadow IT, network infrastructure, and endpoints.
  • Secure Your Journey to the Hybrid Cloud Recorded: Feb 22 2019 56 mins
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
  • Consistency is Key with Cloud Security Recorded: Jan 17 2019 38 mins
    Elisa Lippincott, Director of Product Marketing
    When it comes to cloud security, consistency is everything – your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

    Cloud security breaches have not been the result of brilliant criminal masterminds. Rather, they have been the result of self-inflicted errors that are often caused by faulty migration and deployment practices – particularly when the right security personnel are excluded from the process.

    Attend this webinar to learn how to:
    •Avoid misconfiguring your own security controls
    •Ensure consistency in your cloud security implementation
    •Optimize your vulnerability management
  • Achieve NERC CIP Compliance with FireMon Recorded: Dec 10 2018 12 mins
    Robert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing
    Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.
  • AWS Network Security Deep Dive: Providing Network Protection for AWS Cloud Recorded: Nov 6 2018 97 mins
    Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com | Tim Woods, FireMon | Sanjay Raja, Lumeta
    Running workloads in the cloud makes provisioning and setup easier—just spin up a VM. But you might be surprised by how many firewalls you’ll end up with in the cloud if you follow best practices. Cloud providers are clear on this point. Amazon says, “Security and Compliance is a shared responsibility between AWS and the customer… The customer assumes responsibility and management of the guest operating system (including updates and security patches), other associated application software as well as the configuration of the AWS provided security group firewall.” In short, cloud security is in your court.
    In this deep dive into network security in the AWS cloud, some of the security features we’ll explore are:
    •Security groups — Act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level
    •Network access control lists — Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level
    •Flow logs — Capture information about the IP traffic going to and from network interfaces in your VPC
    •AWS WAF — Provides firewall protection for web applications (Web Application Firewall)
    •AWS Firewall Manager — Provides centralized management of AWS WAF
    •VPC Peering Connections — Enables networking connection between two VPCs so that you can route traffic between them
    •VPC Endpoints — Enables users to connect with AWS services that are outside the VPC through a private link
    •AWS VPN Connections — Allows you to connect your Amazon VPC to remote networks via VPN
    •AWS Direct Connect — Serves as a dedicated, private connection from a remote network to your VPC
    We will help you understand how networking security works within the Amazon cloud and with connections to the outside world. We will also discuss the need to keep all this straight, understood, consistent and configure to reflect your security intent accurately.
  • SCdemocast: Continuous Security for the Hybrid Enterprise Recorded: Oct 25 2018 30 mins
    Tim Woods - Vice President, Technology Alliances, FireMon
    The cloud is a notable business advantage, but it does bring numerous security concerns including: a lack of visibility across cloud or between on-premises and cloud environments, monitoring security controls and changes within cloud and multi-cloud environments, and maintaining compliance by monitoring cloud traffic for suspicious and non-compliant behavior. It becomes increasingly complex in hybrid environments because now you're managing security for on-premise, cloud, virtual, container environments, and more. The time commitment can feel staggering.

    It doesn't have to, however.

    Register for this webcast where we will show you the path to more effective cloud security in hybrid enterprises through a mix of:

    Vulnerability management: See how an attacker could exploit and prioritize your patches;
    Continuous compliance: Define your own cloud security controls and reduce the time spent on audit prep by making your cloud continuously audit-ready and adherent to the intentions and goals of the enterprise;
    Automation and orchestration: Ingest behavior details from your cloud, then command security controls to cloud systems from a single console. The idea is instant, worry-reducing cloud control.
  • Improve Visibility to Reduce Vulnerabilities and Protect Patient Data Recorded: Oct 11 2018 47 mins
    Sanjay Raja, CMO, Lumeta
    Cybercriminals target the data-rich healthcare industry disproportionately. Healthcare IT organizations, already burdened with budget constraints and the scarcity of technically proficient staff, must also contend with significant blind spots within their own networks. These blind spots occur everywhere, from endpoints into the cloud, and every blind spot increases the opportunity for attacks such as ransomware to be successful. Eliminating those blind spots requires healthcare organizations to identify all of their wired, wireless, mobile and medical devices in real-time. With comprehensive context available, organizations can help prevent breaches before, during and after an attack. Lumeta has been deployed at some of the largest enterprises and government agencies based on our ability to eliminate 100% of your IP network and connected device visibility gaps, improve your overall security posture, and reduce the risk of patient data theft.
Field-Tested | Cloud-Secured
FireMon delivers continuous security for hybrid enterprises through a powerful fusion of vulnerability management, continuous compliance and orchestration. Since creating the first-ever network security management solution, FireMon solutions have continued to deliver visibility into and control over complex network security infrastructure, policies and risk for more than 1,700 customers around the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Achieve Real-time Visibility and Control of Your Hybrid Cloud
  • Live at: May 8 2019 8:00 pm
  • Presented by: Tim Woods, VP Technology Alliances, FireMon
  • From:
Your email has been sent.
or close