Hi [[ session.user.profile.firstName ]]

[Lessons for Cybersecurity from the Pandemic] Between Two CTOs: Lloyd vs. Lloyd

Join us for the inaugural broadcast of Between Two CTOs: Lloyd vs. Lloyd, an informal discussion of current issues in cybersecurity.

This 20-minute discussion will focus on “Lessons for cybersecurity from the pandemic.”

Our speakers are two of the most engaging people we know:
- (Dr.) Mike Lloyd, RedSeal CTO. His career has focused on modeling complex systems, beginning with epidemiology and moving to networks. He provides a unique perspective on our current situation.
- Wayne Lloyd, RedSeal Federal CTO. He’s a long time federal government cybersecurity practitioner, with a background working for…well, we can’t tell you that
Recorded Jun 4 2020 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
Presentation preview: [Lessons for Cybersecurity from the Pandemic] Between Two CTOs: Lloyd vs. Lloyd

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • When Fido Moos and Bessy Barks: Security in a Cloud-First World Jul 20 2020 6:00 pm UTC 30 mins
    Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
    The cloud presents an approach to DevOps affectionately called “pets vs. cattle,” which forces a different cybersecurity strategy. As with all change, the pets vs. cattle approach creates opportunities and risks of doing it wrong.

    Join us on July 20th to hear CTOs Dr. Mike Lloyd and Wayne Lloyd discuss this approach. They’ll share their different perspectives as they cover:

    1. What “pets vs. cattle” means.
    2. If it’s a net benefit or a curse for cybersecurity
    3. Mistakes can you make when implementing it
  • Securing Your Hybrid Multi-Cloud Network: The Practitioner View Recorded: Jul 7 2020 49 mins
    Doug Dexter, Sr. Network Security Engineer and former customer // Noam Syrkin, Sr. Technical Marketing Engineer
    Even though most breaches are caused by oversights in basic cybersecurity hygiene, complex, hybrid multi-cloud environments make cybersecurity fundamentals really challenging. Even taking inventory of a network, ensuring your devices are securely configured, and knowing that you’re scanning everything you intended aren’t easy. RedSeal can help.

    Join us for a webinar on Tuesday, February 11th as we share real-world customer stories of how we help with:

    - Inventory control and secure device configurations
    - Visibility into network inventory
    - Identifying password and device configuration issues
    - Enhancing value from vulnerability scanners
    - Identifying unscanned areas you think are being scanned.
    - Prioritizing vulnerabilities based not only on severity and asset value, but on accessibility.
  • Network Devices: Understanding Your Inventory to Pass Compliance Recorded: Jun 23 2020 36 mins
    Landon Brock, Product Manager // Jaime Colom, Sr. Security Consultant
    Most of us get device information from a variety of sources, which is difficult to correlate. What’s more, they don’t answer important network context questions like where the asset is, what it’s exposed to, provides access to or what would happen if it is not properly configured.

    Compliance with most policies and mandates requires you consolidate this information to know:

    - What devices are on your network
    - Where hosts are located your network
    - How the devices are configured
    - How your network is interconnected
  • [Lessons for Cybersecurity from the Pandemic] Between Two CTOs: Lloyd vs. Lloyd Recorded: Jun 4 2020 30 mins
    Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
    Join us for the inaugural broadcast of Between Two CTOs: Lloyd vs. Lloyd, an informal discussion of current issues in cybersecurity.

    This 20-minute discussion will focus on “Lessons for cybersecurity from the pandemic.”

    Our speakers are two of the most engaging people we know:
    - (Dr.) Mike Lloyd, RedSeal CTO. His career has focused on modeling complex systems, beginning with epidemiology and moving to networks. He provides a unique perspective on our current situation.
    - Wayne Lloyd, RedSeal Federal CTO. He’s a long time federal government cybersecurity practitioner, with a background working for…well, we can’t tell you that
  • Promoting Digital Resilience in Healthcare Recorded: May 12 2020 60 mins
    Dr. Edward G. Amoroso / Jeffrey M. Vinson, Sr / Kurt Van Etten
    Learn from experts how advanced network modeling tools reduce security risk and achieve the highest levels of information technology compliance in the healthcare industry.

    Moderator:
    Dr. Edward G. Amoroso
    CEO, Tag Cyber
    Former AT&T CISO

    Participants:
    Jeffrey M. Vinson, Sr
    Sr. VP & CISO, Harris Health System

    Kurt Van Etten
    Chief Product Officer, RedSeal
  • Hosts: Understanding Your Inventory to Pass Compliance Recorded: Apr 7 2020 36 mins
    Debra Baker, Technical Program Manager // Landon Brock, Product Manager
    RedSeal consolidates and reconciles all your host information so that you can be in compliance with most policies and mandates. Join us on Tuesday, April 7th for our RedSeal webinar “Hosts: Understanding Your Inventory to Pass Compliance” to learn how RedSeal can help.
  • Securing Your Hybrid Multi-Cloud Network: The Practitioner View Recorded: Feb 11 2020 50 mins
    Doug Dexter, Sr. Network Security Engineer and former customer // Noam Syrkin, Sr. Technical Marketing Engineer
    Even though most breaches are caused by oversights in basic cybersecurity hygiene, complex, hybrid multi-cloud environments make cybersecurity fundamentals really challenging. Even taking inventory of a network, ensuring your devices are securely configured, and knowing that you’re scanning everything you intended aren’t easy. RedSeal can help.

    Join us for a webinar on Tuesday, February 11th as we share real-world customer stories of how we help with:

    - Inventory control and secure device configurations
    - Visibility into network inventory
    - Identifying password and device configuration issues
    - Enhancing value from vulnerability scanners
    - Identifying unscanned areas you think are being scanned.
    - Prioritizing vulnerabilities based not only on severity and asset value, but on accessibility.
  • Best Practices for Implementing the CIS Top 20 Controls with RedSeal Recorded: Oct 29 2019 41 mins
    RedSeal Product Manager Rashmi Verma and Senior Network Security Engineer Doug Dexter
    While they are prioritized and clear, you need to figure out exactly how to incorporate them into your network.

    Join RedSeal Product Manager Rashmi Verma and Senior Network Security Engineer Doug Dexter to learn how RedSeal’s platform can help you implement key aspects of CIS Controls. You’ll learn how:

    - A network model, including inventory and access, can be a foundation for implementing the controls
    - You can effectively manage tracking and enforcement of the controls
    - Technical checks and reporting can quickly prove that you’re meeting the controls
  • Best Practices for Understanding the Endpoints in Your Cyber Terrain Recorded: Sep 17 2019 40 mins
    RedSeal Senior Technical Marketing Engineer Noam Syrkin
    The best practice for understanding your endpoints is a single data source, one common network picture combining all that data.

    Join RedSeal Senior Technical Marketing Engineer Noam Syrkin to see how you can benefit from one, unified source of endpoint information that also shows how each endpoint connects to your network.

    You’ll see how you can:

    - Identify parts of your network your vulnerability scanners don’t reach
    - Accurately prioritize vulnerability remediation based on actual risk to your network
    - Combine endpoint data to get a more complete picture of your cyber terrain
  • Best Practices Validating Security Across Your Hybrid Data Center Recorded: Aug 20 2019 43 mins
    RedSeal Senior Technical Marketing Engineer Noam Syrkin
    How do you protect your infrastructure when it’s in different, separately managed environments? Most of us struggle to understand security risks and evaluate the impact of change across disparate network environments.

    Join RedSeal Senior Technical Marketing Engineer Noam Syrkin and take away valuable best practices for validating and managing your organization’s security in your hybrid multi-cloud environment.

    We’ll discuss how to use RedSeal so that you can:

    Understand your cyber terrain across all physical, software-defined network, and cloud environments
    - Know what assets are at risk, wherever they are
    - Model access policies to make sure you have no unintended access to valuable assets
    - Evaluate the security impact of network changes
  • Best Practices in Risk and Compliance: The Every Day Audit Recorded: Jul 16 2019 42 mins
    RedSeal Chief Product Officer Kurt Van Etten
    RedSeal Chief Product Officer Kurt Van Etten shows you how – every day – you can:

    - Know what you have. Learn how to continuously check your network and endpoint inventory.
    - Know that you comply with regulations and policies. Learn how to model and continuously validate your segmentation policies across all your network environments, including AWS, Azure, VMware NSX and Cisco ACI.
    - Know your network risk. Learn how to accurately measure and prioritize risk based on where an attacker could reach.
  • Best Practices for Cloud Security Controls Recorded: Jun 6 2019 45 mins
    RedSeal Chief Product Officer Kurt Van Etten
    Do you know how effective your cloud security controls are?

    Join us to learn how to get one, unified model of all your environments so you can:

    - Validate that your cloud security policies work the way you intended
    - Investigate and prioritize vulnerabilities wherever they are in your network – public cloud, private cloud or physical assets
    - Accelerate incident investigation across different cloud and physical environments
RedSeal helps you master the cybersecurity fundamentals.
By focusing on cybersecurity fundamentals, RedSeal helps government agencies and Global 2000 companies measurably reduce their cyber risk. With RedSeal’s cyber terrain analytics platform and professional services, enterprises improve their resilience to security events by understanding what’s on their networks and how it’s all connected. RedSeal verifies that network devices are securely configured; validates network segmentation policies; and continuously monitors compliance with policies and regulations. It also prioritizes mitigation based on each vulnerability’s associated risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [Lessons for Cybersecurity from the Pandemic] Between Two CTOs: Lloyd vs. Lloyd
  • Live at: Jun 4 2020 5:30 pm
  • Presented by: Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
  • From:
Your email has been sent.
or close