Hi [[ session.user.profile.firstName ]]

101 Guide to Security Automation

If you are dealing with too many manual changes processes, burdening an overworked staff, this webinar is a must-attend for you. You’ll learn how to use security automation to reduce the opportunities for mistakes and misconfigurations by taking the drudge work off your staff and fast-tracking traditional SecOps.

Key takeaways:

Eliminate bottlenecks that plague traditional change processes
Decrease errors by standardizing more areas of their security
Support the dynamic demands of their agile/DevOps customers
Recorded Nov 13 2019 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tim Woods, VP, Technology Alliance, FireMon
Presentation preview: 101 Guide to Security Automation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Are Firewalls Dead? Not by a Long Shot - But We Need to Make Some Changes Recorded: Nov 19 2019 88 mins
    Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
    You hear about network boundaries being gone so much that it’s easy to start thinking firewalls are dead. But exploit after exploit shows the opposite is true. Here are examples:

    •BlueKeep and DejaBlue demonstrate that protocols like RDP have no business being exposed directly to the Internet.
    •Lateral movement exploits like that in the Equifax debacle show that more segmentation is needed so that a single unpatched server doesn’t result in your most important database going up in smoke
    •The Capital One data breach shows that cloud resources need firewall protection too – not just on prem

    Most web applications are two applications in one. 1) The single page or progressive app runs on the client with all its source code in clear text for bad guys to pursue and 2) the application API that goes between the client and back-end servers. But that can easily become an API for bad guys.

    Putting everything in the cloud and not designing network security into the architecture is like taking your on-prem network and putting all storage arrays and servers on the Internet and expecting each device and system to defend itself.

    In the webinar, we look at network security and the evolving role of the firewall. We will discuss two overall classes of firewalls:
    •Traffic policy enforcement points
    •Full-stack next-gen / deep-packet-inspection firewall products

    Those categories may cause you to widen your scope as to what constitutes a “firewall” because by #1’s definition, anything with a network ACL is a firewall.

    It’s an important distinction because what we need are more enforcement points and granularity in policy. That’s the premise behind the holy grail of zero trust and microsegmentation.

    But with more firewalls and rules on them, we risk making the #1 problem with firewalls even worse: misconfiguration.

    Just released, FireMon will review the 6th annual State of the Firewall report. This year’s report is highly illuminating and will reinforce many of my key points.
  • 2019 State of the Firewall Recorded: Nov 14 2019 55 mins
    Tim Woods, VP Technology Alliances & Elisa Lippincott, Director of Product Marketing
    Security pros have spoken and the results are in! Our sixth and largest 2019 State of the Firewall report is out! Be one of the first to learn what is driving your peers and dig into the results from our annual survey.

    In 2018, the industry responded and we learned:

    •94% reported that firewalls are critical as always or more critical than ever
    •53% have already partially or fully adopted public or hybrid cloud
    •64% reported that they still deal with manual change management processes

    What will the 2019 findings reveal? Our in-house experts Tim Woods, VP, Technology Alliances, and Elisa Lippincott, Director of Product Marketing, will cover the trends and challenges of network operations and security practitioners worldwide.

    Track the conversation on social using #SoFR19 and join FireMon for this timely webinar.
  • 101 Guide to Security Automation Recorded: Nov 13 2019 48 mins
    Tim Woods, VP, Technology Alliance, FireMon
    If you are dealing with too many manual changes processes, burdening an overworked staff, this webinar is a must-attend for you. You’ll learn how to use security automation to reduce the opportunities for mistakes and misconfigurations by taking the drudge work off your staff and fast-tracking traditional SecOps.

    Key takeaways:

    Eliminate bottlenecks that plague traditional change processes
    Decrease errors by standardizing more areas of their security
    Support the dynamic demands of their agile/DevOps customers
  • Don't Be the Next Healthcare Headline - Automate Mindfully to Lower Network Risk Recorded: Oct 17 2019 57 mins
    Keith Brennan, Director - Field Engineering
    Data Breach.

    Just reading that can give the most seasoned security professional a hair-raising moment. We now know, a single medical record fetches 10x the price of a credit card record on the black market. As scary as this sounds, it’s probably just the opening round in a topic that may have even more far reaching implications in the future.

    What happens if/when hacker behavior impacts patient outcomes? We’ve seen a raft of ransomware attacks in healthcare lately. Timely access to accurate information in this age of healthcare digital transformation is not just about reputation and loss of records anymore. Or when the patient information, inevitably, becomes richer, likely involving individual DNA genetics and customized treatments based on that? How important will it be then to safeguard the patient’s information?

    In this dynamic threat landscape, healthcare organizations now find themselves struggling to secure assets and environments that were initially deployed without security in mind. As a result, four main security challenges have emerged and FireMon helps organizations address them:

    · Lack of network visibility: what you can’t see, you can’t protect
    · Risk in adopting new technologies / devices / applications
    · Limitations on vulnerability analysis and remediation
    · Lack of control over security policies


    Join FireMon for this timely webinar designed to help security leaders accurately understand their profile and learn how to ensure security policies mitigate risk and close gaps in compliance through continuous, adaptive policy enforcement.
  • Automation: One Giant Leap for Security Recorded: Sep 25 2019 59 mins
    Tim Woods, VP, Technical Alliance, FireMon
    Learn how to use automation to increase speed AND security in your organization. IT and security organizations are under pressure to deliver unprecedented business agility, but regulatory requirements and cyberattacks are growing fast. How do you choose between speed and security?

    During this live webinar, cybersecurity expert Tim Woods, VP Technical Alliance from FireMon gives you innovative ways to move at velocity without sacrificing security. This webinar will cover:

    •Automated responses for triggers like new apps or services, routine changes to apps or services, or new security threats
    •Use cases for policy management automation (e.g., automating gold standard best practices, global overarching rules, and rapid approval processes for faster deployments)
    •How automation help you leverage innovation while reducing security and compliance risk
  • Drive Innovation with a Strong Security Posture Recorded: Sep 25 2019 36 mins
    Elisa Lippincott, Director of Product Marketing, FireMon
    Learn how to balance speed + security in your organization. Businesses today must move at digital speeds. Going head-to-head with digital native competitors, enterprises have to evolve rapidly in areas ranging from time to market to product quality and features to business model innovation.

    This puts intense pressure on IT and security organizations—often burdened with legacy systems—to deliver unprecedented business agility. At the same time, regulatory requirements are growing almost as fast as cyberattacks and cyberthreats. How do you balance the risk of not getting new application services or changes to market fast enough against the risk of a breach?

    FireMon gives IT and security teams innovative ways to move at velocity without sacrificing an iota of security. FireMon uses automation that fits into your existing models and processes, so you can make incremental changes internally while your business acts disruptively in the marketplace.

    In this webinar, we’ll cover:
    •Automated responses for triggers such as a new app or service, routine changes in an app or a service, or new security threats
    •Use cases for automation in policy management (e.g., automating gold standard best practices, global overarching rules, and rapid approval processes to ensure speed of deployment)
    •How automation can help you leverage innovation without introducing security and compliance risk
  • 5 Ways to Make Your SOAR Initiatives Take Flight Recorded: Aug 22 2019 44 mins
    Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions
    This is a must-attend webinar for anyone responsible for management of SOAR solutions in their organization. During the webinar you'll hear from Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions, as he shares his presentation from Black Hat USA 2019 on how to add command to your SOAR initiatives.

    Security Operations Centers wield a vast arsenal of tools to secure their assets. To get the most out of those tools, SOAR solutions start you down the right path. But if you want your SOAR solutions to truly take off, you need the ability to gather data in real time, analyze the data for patterns, trends and alerts, and respond instantly using automation. In this webinar, we'll dive deeper into automation and share five ways to make your SOAR initiatives take flight.
  • [PANEL] Cloud Security Common Sense Tips & Tools Recorded: Jul 25 2019 60 mins
    Tim Woods (FireMon) | Ed Moyle (Prelude Institute)
    Organizations are increasing their spend on cloud security solutions (up to $12.7 billion by 2023). What are the biggest challenges for businesses when it comes to securing the cloud, the solutions they are increasingly turning to, and the best practices needed to improve security overall?

    Join this panel of experts to learn more about the current state of cloud and what organizations are doing to secure it. Attendees will learn about:

    - Moving to the multi-cloud
    - What's the deal with Infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
    - Compliance challenges and how to overcome them
    - Common sense tips for cloud security
    - Recommended tools and solutions
    - Words of wisdom from the experts

    Speakers:
    - Tim Woods, VP Technology Alliances, FireMon
    - Ed Moyle, General Manager and Chief Content Officer, Prelude Institute
  • From Security Bottleneck to Business Enabler Recorded: Jul 23 2019 59 mins
    Tim Woods, VP Technology Alliances, FireMon
    Security’s influence on organizational structure is accelerating exponentially. In today’s network security environment, moving to a hybrid cloud infrastructure is a critical step needed to drive innovation and ensure competitive advantage. As application development takes the driver’s seat, security cannot stall progress it must come along for the ride.

    During this presentation, Vice President of Technology Alliances, Tim Woods, will discuss how thought leaders are migrating to the hybrid cloud and how they leverage Palo Alto firewalls and automation with FireMon to streamline flexibility, scalability, centralized policy management, and automation. Woods will give an overview of initiatives to shift security to a business enabler:

    •Lay the groundwork to support high-availability in on-premise and virtual environments
    •Removing rule redundancy and ensure automation for recertification
    •Audit and compliance management/reporting of security policies – PCI, SOX, etc.

    Woods will also offer tips on how enterprises can plan for unique challenges when transitioning to a hybrid cloud environment, and how the integrated FireMon and Palo Alto Networks solution make it easy to on-board firewalls, reduce network complexity and avoid chaos.
  • Removing the "NO!" from innovation Recorded: Jul 16 2019 30 mins
    Paul Anderson, VP Solutions, GPC | Josh Williams, Senior Sales Engineer
    In the digital age, many see the risk of not getting new application services or changes to market fast enough equal to or greater than the risk of a costly breach. While most security teams don’t want to put the ‘no’ in innovation, they are challenged to keep up with a significant increase in change requests, number of devices to manage and the stress of improving SLAs allowing modern app developers the ability to release new services in a timely fashion.

    To get ahead, enterprises must orchestrate security processes and automate mundane security tasks. When you talk about security automation, it means different things to different people. Does this mean that organizations should automate everything immediately? And, even if they want to: could they?

    Automation of global security policy management gives security teams parity with the speed of business innovation. In this webcast we will cover:

    - Triggers of automation (response to: 1) a new app or service, 2) routine changes in an app or a service, 3) a new security threat)
    - Use cases for automation in policy management (e.g., automating gold standard best practices or global overarching rules, and rapid approval processes to ensure speed of deployment)
    - How an automated global security policy management framework can help organizations leverage innovation without introducing security and compliance risk
  • 5 Steps to Keep Network Security Enforcement Points Secure and Up-To-Date Recorded: Jul 11 2019 86 mins
    Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com, Tim Woods, Vice President Technology Alliances, FireMon
    The only constant is change. Product deployments come and go and get moved as a result of data center reorganizations, mergers & acquisitions and migration to the cloud – and even retromigrations from cloud to on-prem.

    Every time this happens it’s very easy for new risk to be created in your network.

    If you want to avoid the fate of companies like Equifax, Target and many others, one of the crucial steps is proper network segmentation on the inside of your network – let alone connection to public clouds and virtual networks in the cloud.

    But a properly segmented, global network security policy is difficult. And keeping that policy up-to-date is even more difficult. In this webinar, we’ll explore how to address this risky burden.

    Whenever you deploy or move a technology, product or workload here’s what you need to do:

    1. Identify new network connections required
    2. Understand the actual traffic requirements – especially in terms of protocols
    3. Determine who needs to communicate with the workload and in which directions. By who, we mean sets of users, regions, datacenters, segments, application servers, etc.
    4. What are the security differentials between the communicating entities?
    5. Are additional enforcement points required?


    We will drill down into each of these steps and then Tim Woods and Josh Williams from FireMon will show you how the Global Policy Controller gives you a birds-eye view of your entire hybrid network by bringing every enforcement point and its arcane configuration onto a single pane of glass, driven by your actual intent.
  • How To Gain Comprehensive Visibility and Security for Your Hybrid Environment Recorded: May 22 2019 48 mins
    Reggie Best, President of Lumeta Solutions, FireMon | Ed Young, Product Manager of Lumeta Solutions, FireMon
    Maintaining continuous security and compliance requires comprehensive visibility across your hybrid environment. You need to adapt and scale your security measures as your environment grows, as your hybrid environment shifts, or as new threats are detected. But without a true understanding of the scope of your assets and where all of your workloads reside, your efforts will be futile.

    Learn how FireMon’s Lumeta CloudVisibility can extend comprehensive network and endpoint discovery with real-time infrastructure visibility, change monitoring, and leak-path detection for your migration to the hybrid cloud across your on-premises, virtual, software-defined, cloud and hybrid environments.
  • Achieve Real-time Visibility and Control of Your Hybrid Cloud Recorded: May 8 2019 47 mins
    Tim Woods, VP Technology Alliances, FireMon
    Cloud infrastructure brings the same risks and threats as an on-premises environment, but with a twist: the rate of expansion. Cloud services and applications spin up, deploy and provision faster than you can say “IaaS” and it’s inevitable that you’ll miss critical security controls.

    Join us for this webinar to learn the steps you need to take to confidently embrace the cloud without compromising security.

    We will discuss how you can:

    •Reduce the visibility gap into your hybrid environment
    •Spin up, deploy and provision faster while maintaining a strong security posture
    •Automate risk analysis and change management
    •Assess your risk in real-time
    •Validate configuration requirements
  • How to Prove Your Firewalls Actually Do What You Intend Recorded: May 2 2019 90 mins
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
    In this real training for free webinar, we will explore what it takes to test your firewalls and prove they actually do what you intend. We aren’t talking about a simple pentest or vulnerability scan from the Internet. And in this session, I’ll explain why that is insufficient.

    Here’s some of what we’ll cover:

    Identifying the various zones on your network that put boundaries on traffic.

    Choosing the target zones to test and the vantage points to test from. With firewalls testing, the vantage point is just as important as the target. But with a network of any size you can’t really hope to test every combination of test and vantage point – it’s not a so-called NP-Complete problem but the impact is the same – you have to be satisfied with results from a finite amount of effort, so prioritization is important.

    Tools to speed up firewall testing.

    How to test firewall policy without touching the actual hosts behind the firewall.

    Understanding and avoiding false test results caused by dependencies on host configuration external to the firewall policy.
  • Close the Door on Endpoint Security Threats with Detection & Response Recorded: Apr 30 2019 39 mins
    Ed Young, Product Manager - Lumeta, FireMon | Pedro Haworth, Head of Technology, Security Innovation Alliance, McAfee
    Today's security teams struggle with the challenges created by continuously evolving networks and threats. We'll demonstrate how using McAfee® ePolicy Orchestrator® (McAfee ePO™) software and Lumeta Spectre together gives IT organizations the real-time visibility they need to proactively identify, manage, and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile, and physical networks.
  • Managing Security for the Multi-Cloud Recorded: Mar 6 2019 46 mins
    Dave Klein (Guardicore), Tim Woods (FireMon), Tom McAndrew (Coalfire), Praveen Jain (Cavirin)
    "Enterprises today are leveraging multiple clouds and thousands of applications. What are the security and compliance risks associated with a multi-cloud strategy?

    Join cloud and security leaders in an interactive discussion to learn about:
    - The current state of cloud
    - Security risks and recommendations
    - Managing and automating security across multiple clouds and applications
    - What to expect in 2019
    - Recommendations for improving enterprise cloud security"
  • 5 Steps to Comprehensively Mapping Your Attack Surface Recorded: Feb 28 2019 88 mins
    Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com | Scott Custer, Senior Solutions Architect, FireMon
    You need to understand all the potential pathways malicious traffic could possibly take through your network – including obscure and indirect paths that don’t immediately look risky or valuable to an attacker. Moreover, you need to be able to juxtapose that network topology and path analysis with your host level security vulnerabilities.

    In this real training for free session, we will examine 5 steps for accomplishing this:

    Validate address space
    Quantify edges of network
    Perform path analysis
    Conduct host/device census
    Identify device/host level vulnerabilities
    Join us to explore all of these steps and then how to juxtapose and overlay all of this information into a comprehensive, multi-dimensional attack surface.

    FireMon is the perfect sponsor for this event and Scott Custer will show you how their unique technology, Lumeta, provides real-time visibility, vulnerability indicators, and risk identification enabling cloud, network, and security teams to find and secure unknown, rogue and shadow IT, network infrastructure, and endpoints.
  • Secure Your Journey to the Hybrid Cloud Recorded: Feb 22 2019 56 mins
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
  • Consistency is Key with Cloud Security Recorded: Jan 17 2019 38 mins
    Elisa Lippincott, Director of Product Marketing
    When it comes to cloud security, consistency is everything – your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

    Cloud security breaches have not been the result of brilliant criminal masterminds. Rather, they have been the result of self-inflicted errors that are often caused by faulty migration and deployment practices – particularly when the right security personnel are excluded from the process.

    Attend this webinar to learn how to:
    •Avoid misconfiguring your own security controls
    •Ensure consistency in your cloud security implementation
    •Optimize your vulnerability management
  • Achieve NERC CIP Compliance with FireMon Recorded: Dec 10 2018 12 mins
    Robert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing
    Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.
Field-Tested | Cloud-Secured
FireMon delivers continuous security for hybrid enterprises through a powerful fusion of vulnerability management, continuous compliance and orchestration. Since creating the first-ever network security management solution, FireMon solutions have continued to deliver visibility into and control over complex network security infrastructure, policies and risk for more than 1,700 customers around the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 101 Guide to Security Automation
  • Live at: Nov 13 2019 6:50 pm
  • Presented by: Tim Woods, VP, Technology Alliance, FireMon
  • From:
Your email has been sent.
or close