Hi [[ session.user.profile.firstName ]]

Best Practices for Implementing the CIS Top 20 Controls with RedSeal

While they are prioritized and clear, you need to figure out exactly how to incorporate them into your network.

Join RedSeal Product Manager Rashmi Verma and Senior Network Security Engineer Doug Dexter to learn how RedSeal’s platform can help you implement key aspects of CIS Controls. You’ll learn how:

- A network model, including inventory and access, can be a foundation for implementing the controls
- You can effectively manage tracking and enforcement of the controls
- Technical checks and reporting can quickly prove that you’re meeting the controls
Recorded Oct 29 2019 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
RedSeal Product Manager Rashmi Verma and Senior Network Security Engineer Doug Dexter
Presentation preview: Best Practices for Implementing the CIS Top 20 Controls with RedSeal

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Help Your Auditors Help You Dec 8 2020 7:00 pm UTC 60 mins
    Ramesh Kaza, RedSeal VP of Professional Services and Kurt Van Etten, RedSeal Chief Product Officer
    Cybersecurity audits are no one’s idea of a good time. They can be time-consuming and frustrating – for both auditor and client.

    Based on hours of research with auditors, RedSeal has developed insights and practical solutions to get you through your audits quickly and successfully.

    Join RedSeal Chief Product Officer, Kurt Van Etten and Vice President of Professional Services Ramesh Kaza on December 8, 2020 as they discuss:

    - Common challenges and delays auditors face in getting the information they need
    - How RedSeal can help you quickly provide needed information and evidence
    - Examples of howe RedSeal has helped organizations verify inventory and access and provide required proof – across multiple cloud environments.
  • Taking Over A Network Recorded: Nov 10 2020 33 mins
    Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
    What do you do when you find yourself responsible for the security of a network you don’t know? Without an understanding of what’s on a network and how it’s set up, you can’t protect it.

    This is something that happens to all of us:

    • You join a new organization
    • Knowledgeable people leave
    • Your organization merges with or acquires another
    • A new network management company comes in

    Join RedSeal’s two CTOs – Dr. Mike Lloyd and Wayne Lloyd – to get their thoughts on the best and quickest way to understand and protect a network you take over.
  • A 5 Step Plan for Multi-Cloud Security Recorded: Oct 28 2020 49 mins
    Noam Syrkin, Sr. Tech Marketing Engineer // Brad Schwab, Sr. Solutions Consultant // Chris Lucas, Sales Director
    As we move into the cloud, most of us realize that cloud security is complex. We have clouds from multiple vendors that connect to on premise systems. It is difficult to answer what should be simple questions about what is there and how it’s set up.

    This webinar will show how RedSeal can help answer five fundamental questions:

    - What do you have in your cloud(s)?
    - Does your cloud deployment meet best practices?
    - Have you validated that network segmentation policies are properly implemented across clouds?
    - What access is possible? What is internet facing?
    - Are your cloud vulnerabilities prioritized by risk to your network?
  • Deploying Meraki? Be Sure Your Devices Are Securely Connected Recorded: Sep 30 2020 42 mins
    Noam Syrkin, RedSeal Senior Tech Marketing Engineer and Brad Schwab, RedSeal Senior Solutions Consultant
    Are your corporate assets and remote workforce protected as you deploy Meraki devices?

    A misconfiguration in any one of your Meraki devices can unintentionally expose corporate assets to unauthorized users – or provide an unmonitored path for data exfiltration.

    Join us to see how you can have visibility into Meraki devices and their connections -- across hybrid cloud and on-premise environments — from each device to your data centers.

    We’ll provide practitioner examples of misconfigurations, the risk they created, and how to remediate them quickly.

    You’ll learn how you can:

    - Discover new and existing Meraki devices
    - Investigate to determine if they’re securely configured and comply with organizational policies
    - Act to remediate and mitigate risks
  • Defend Forward, But Protect Your Base Recorded: Sep 15 2020 33 mins
    Wayne Lloyd, RedSeal Federal CTO and Mike Lloyd, RedSeal CTO
    Our national Cyber Protection Teams (CPTs) are taking U.S. cyber defense beyond our borders. As part of a Defend Forward program, they’re being invited into the networks of other nations to find and shine a light on malware – so we can all be protected from it.

    But while they’re defending forward, there is a role for all of us on the home front. There are things we can do to protect our networks and keep our cyber teams in the fight.

    Join RedSeal’s CTOs Wayne Lloyd and Dr. Mike Lloyd as they discuss Defend Forward and how we can be our own cyber protection team back at home.
  • No Two Networks Devices Are Alike: Prioritize Based on Your Network Recorded: Aug 24 2020 53 mins
    Noam Syrkin, Sr. Tech Marketing Engineer // Brad Schwab, Sr. Solutions Consultant // Bill Burge, Sr. Solutions Consultant
    Identifying the right vulnerabilities is a real challenge.

    Scanner data generates tens of thousands (maybe even hundreds of thousands) of vulnerability results, sometimes scattered between different vendors (Rapid7, Qualys, Tenable, and more) and makes it a ‘whack-a-mole’ activity.

    A proper vulnerability management plan should be able to identify the top vulnerabilities to patch or find the exact path an attacker can take. But to divert, contain or block intruder access requires information like:

    - Where are the assets located and if/how could they be accessed?
    - If the asset is compromised, what else does the attacker get access to?
    - Does the compromised asset have internet access?

    In this August 24th webinar, learn how customers use RedSeal to help them:

    - Prioritize asset vulnerabilities based on network context
    - Identify areas that scanners miss and their causes
    - Consolidate vulnerability scan data from multiple sources
  • SNG Live - Securing the Supply Chain Recorded: Jul 27 2020 22 mins
    Allan Friedman, Director of Cybersecurity Initiatives, Department of Commerce / Wayne Lloyd, Federal CTO, RedSeal
    This SNG Live Virtual session "Securing the Supply Chain" brings together federal cybersecurity leaders for a conversation on how they continue to mature their cybersecurity defenses, protect a remote workforce and what the best strategies are for staying ahead of adversaries.

    Speakers:
    - Allan Friedman, Director of Cybersecurity Initiatives, NTIA, Department of Commerce
    - Wayne Lloyd, Federal CTO, RedSeal
    - Greg Otto, Editor-in-Chief, CyberScoop
  • When Fido Moos and Bessy Barks: Security in a Cloud-First World Recorded: Jul 20 2020 34 mins
    Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
    The cloud presents an approach to DevOps affectionately called “pets vs. cattle,” which forces a different cybersecurity strategy. As with all change, the pets vs. cattle approach creates opportunities and risks of doing it wrong.

    Join us on July 20th to hear CTOs Dr. Mike Lloyd and Wayne Lloyd discuss this approach. They’ll share their different perspectives as they cover:

    1. What “pets vs. cattle” means.
    2. If it’s a net benefit or a curse for cybersecurity
    3. Mistakes can you make when implementing it
  • Securing Your Hybrid Multi-Cloud Network: The Practitioner View Recorded: Jul 7 2020 49 mins
    Doug Dexter, Sr. Network Security Engineer and former customer // Noam Syrkin, Sr. Technical Marketing Engineer
    Even though most breaches are caused by oversights in basic cybersecurity hygiene, complex, hybrid multi-cloud environments make cybersecurity fundamentals really challenging. Even taking inventory of a network, ensuring your devices are securely configured, and knowing that you’re scanning everything you intended aren’t easy. RedSeal can help.

    Join us for a webinar on Tuesday, February 11th as we share real-world customer stories of how we help with:

    - Inventory control and secure device configurations
    - Visibility into network inventory
    - Identifying password and device configuration issues
    - Enhancing value from vulnerability scanners
    - Identifying unscanned areas you think are being scanned.
    - Prioritizing vulnerabilities based not only on severity and asset value, but on accessibility.
  • Who Is RedSeal? Recorded: Jul 1 2020 17 mins
    Kurt Van Etten, RedSeal Chief Product Officer
    Watch and listen as RedSeal’s Chief Product Officer, Kurt Van Etten gives an overview of RedSeal’s platform and the advantages it provides.

    He illustrates how RedSeal supports the cybersecurity fundamentals — so you can see what’s on your network, how it’s connected, and the associated risk.
  • Network Devices: Understanding Your Inventory to Pass Compliance Recorded: Jun 23 2020 36 mins
    Landon Brock, Product Manager // Jaime Colom, Sr. Security Consultant
    Most of us get device information from a variety of sources, which is difficult to correlate. What’s more, they don’t answer important network context questions like where the asset is, what it’s exposed to, provides access to or what would happen if it is not properly configured.

    Compliance with most policies and mandates requires you consolidate this information to know:

    - What devices are on your network
    - Where hosts are located your network
    - How the devices are configured
    - How your network is interconnected
  • [Lessons for Cybersecurity from the Pandemic] Between Two CTOs: Lloyd vs. Lloyd Recorded: Jun 4 2020 30 mins
    Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
    Join us for the inaugural broadcast of Between Two CTOs: Lloyd vs. Lloyd, an informal discussion of current issues in cybersecurity.

    This 20-minute discussion will focus on “Lessons for cybersecurity from the pandemic.”

    Our speakers are two of the most engaging people we know:
    - (Dr.) Mike Lloyd, RedSeal CTO. His career has focused on modeling complex systems, beginning with epidemiology and moving to networks. He provides a unique perspective on our current situation.
    - Wayne Lloyd, RedSeal Federal CTO. He’s a long time federal government cybersecurity practitioner, with a background working for…well, we can’t tell you that
  • Promoting Digital Resilience in Healthcare Recorded: May 12 2020 60 mins
    Dr. Edward G. Amoroso / Jeffrey M. Vinson, Sr / Kurt Van Etten
    Learn from experts how advanced network modeling tools reduce security risk and achieve the highest levels of information technology compliance in the healthcare industry.

    Moderator:
    Dr. Edward G. Amoroso
    CEO, Tag Cyber
    Former AT&T CISO

    Participants:
    Jeffrey M. Vinson, Sr
    Sr. VP & CISO, Harris Health System

    Kurt Van Etten
    Chief Product Officer, RedSeal
  • Hosts: Understanding Your Inventory to Pass Compliance Recorded: Apr 7 2020 36 mins
    Debra Baker, Technical Program Manager // Landon Brock, Product Manager
    RedSeal consolidates and reconciles all your host information so that you can be in compliance with most policies and mandates. Join us on Tuesday, April 7th for our RedSeal webinar “Hosts: Understanding Your Inventory to Pass Compliance” to learn how RedSeal can help.
  • Securing Your Hybrid Multi-Cloud Network: The Practitioner View Recorded: Feb 11 2020 50 mins
    Doug Dexter, Sr. Network Security Engineer and former customer // Noam Syrkin, Sr. Technical Marketing Engineer
    Even though most breaches are caused by oversights in basic cybersecurity hygiene, complex, hybrid multi-cloud environments make cybersecurity fundamentals really challenging. Even taking inventory of a network, ensuring your devices are securely configured, and knowing that you’re scanning everything you intended aren’t easy. RedSeal can help.

    Join us for a webinar on Tuesday, February 11th as we share real-world customer stories of how we help with:

    - Inventory control and secure device configurations
    - Visibility into network inventory
    - Identifying password and device configuration issues
    - Enhancing value from vulnerability scanners
    - Identifying unscanned areas you think are being scanned.
    - Prioritizing vulnerabilities based not only on severity and asset value, but on accessibility.
  • Best Practices for Implementing the CIS Top 20 Controls with RedSeal Recorded: Oct 29 2019 41 mins
    RedSeal Product Manager Rashmi Verma and Senior Network Security Engineer Doug Dexter
    While they are prioritized and clear, you need to figure out exactly how to incorporate them into your network.

    Join RedSeal Product Manager Rashmi Verma and Senior Network Security Engineer Doug Dexter to learn how RedSeal’s platform can help you implement key aspects of CIS Controls. You’ll learn how:

    - A network model, including inventory and access, can be a foundation for implementing the controls
    - You can effectively manage tracking and enforcement of the controls
    - Technical checks and reporting can quickly prove that you’re meeting the controls
  • Best Practices for Understanding the Endpoints in Your Cyber Terrain Recorded: Sep 17 2019 40 mins
    RedSeal Senior Technical Marketing Engineer Noam Syrkin
    The best practice for understanding your endpoints is a single data source, one common network picture combining all that data.

    Join RedSeal Senior Technical Marketing Engineer Noam Syrkin to see how you can benefit from one, unified source of endpoint information that also shows how each endpoint connects to your network.

    You’ll see how you can:

    - Identify parts of your network your vulnerability scanners don’t reach
    - Accurately prioritize vulnerability remediation based on actual risk to your network
    - Combine endpoint data to get a more complete picture of your cyber terrain
  • Best Practices Validating Security Across Your Hybrid Data Center Recorded: Aug 20 2019 43 mins
    RedSeal Senior Technical Marketing Engineer Noam Syrkin
    How do you protect your infrastructure when it’s in different, separately managed environments? Most of us struggle to understand security risks and evaluate the impact of change across disparate network environments.

    Join RedSeal Senior Technical Marketing Engineer Noam Syrkin and take away valuable best practices for validating and managing your organization’s security in your hybrid multi-cloud environment.

    We’ll discuss how to use RedSeal so that you can:

    Understand your cyber terrain across all physical, software-defined network, and cloud environments
    - Know what assets are at risk, wherever they are
    - Model access policies to make sure you have no unintended access to valuable assets
    - Evaluate the security impact of network changes
  • Best Practices in Risk and Compliance: The Every Day Audit Recorded: Jul 16 2019 42 mins
    RedSeal Chief Product Officer Kurt Van Etten
    RedSeal Chief Product Officer Kurt Van Etten shows you how – every day – you can:

    - Know what you have. Learn how to continuously check your network and endpoint inventory.
    - Know that you comply with regulations and policies. Learn how to model and continuously validate your segmentation policies across all your network environments, including AWS, Azure, VMware NSX and Cisco ACI.
    - Know your network risk. Learn how to accurately measure and prioritize risk based on where an attacker could reach.
  • Best Practices for Cloud Security Controls Recorded: Jun 6 2019 45 mins
    RedSeal Chief Product Officer Kurt Van Etten
    Do you know how effective your cloud security controls are?

    Join us to learn how to get one, unified model of all your environments so you can:

    - Validate that your cloud security policies work the way you intended
    - Investigate and prioritize vulnerabilities wherever they are in your network – public cloud, private cloud or physical assets
    - Accelerate incident investigation across different cloud and physical environments
RedSeal helps you master the cybersecurity fundamentals.
By focusing on cybersecurity fundamentals, RedSeal helps government agencies and Global 2000 companies measurably reduce their cyber risk. With RedSeal’s cyber terrain analytics platform and professional services, enterprises improve their resilience to security events by understanding what’s on their networks and how it’s all connected. RedSeal verifies that network devices are securely configured; validates network segmentation policies; and continuously monitors compliance with policies and regulations. It also prioritizes mitigation based on each vulnerability’s associated risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Implementing the CIS Top 20 Controls with RedSeal
  • Live at: Oct 29 2019 9:00 pm
  • Presented by: RedSeal Product Manager Rashmi Verma and Senior Network Security Engineer Doug Dexter
  • From:
Your email has been sent.
or close