Cybersecurity audits are no one’s idea of a good time. They can be time-consuming and frustrating – for both auditor and client.
Based on hours of research with auditors, RedSeal has developed insights and practical solutions to get you through your audits quickly and successfully.
Join RedSeal Chief Product Officer, Kurt Van Etten and Vice President of Professional Services Ramesh Kaza on December 8, 2020 as they discuss:
- Common challenges and delays auditors face in getting the information they need
- How RedSeal can help you quickly provide needed information and evidence
- Examples of howe RedSeal has helped organizations verify inventory and access and provide required proof – across multiple cloud environments.
RecordedDec 8 202050 mins
Your place is confirmed, we'll send you email reminders
RedSeal can help ServiceNow customers be confident that their network inventories are complete, and access is what they intended – even across multiple cloud and on-premises environments.
What’s more, RedSeal allows ServiceNow IT Service Management users to prioritize vulnerabilities by the risk they pose in a specific network.
Join us on Thursday, February 4th to see how RedSeal enriches ServiceNow ITSM to:
Ensure you have a complete inventory of your network devices and cloud resources
Identify any unintended access
Accurately prioritize your vulnerabilities by the risk they pose to your network
Expedite change management
Ramesh Kaza, RedSeal VP of Professional Services and Kurt Van Etten, RedSeal Chief Product Officer
Cybersecurity audits are no one’s idea of a good time. They can be time-consuming and frustrating – for both auditor and client.
Based on hours of research with auditors, RedSeal has developed insights and practical solutions to get you through your audits quickly and successfully.
Join RedSeal Chief Product Officer, Kurt Van Etten and Vice President of Professional Services Ramesh Kaza on December 8, 2020 as they discuss:
- Common challenges and delays auditors face in getting the information they need
- How RedSeal can help you quickly provide needed information and evidence
- Examples of howe RedSeal has helped organizations verify inventory and access and provide required proof – across multiple cloud environments.
Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
What do you do when you find yourself responsible for the security of a network you don’t know? Without an understanding of what’s on a network and how it’s set up, you can’t protect it.
This is something that happens to all of us:
• You join a new organization
• Knowledgeable people leave
• Your organization merges with or acquires another
• A new network management company comes in
Join RedSeal’s two CTOs – Dr. Mike Lloyd and Wayne Lloyd – to get their thoughts on the best and quickest way to understand and protect a network you take over.
Noam Syrkin, Sr. Tech Marketing Engineer // Brad Schwab, Sr. Solutions Consultant // Chris Lucas, Sales Director
As we move into the cloud, most of us realize that cloud security is complex. We have clouds from multiple vendors that connect to on premise systems. It is difficult to answer what should be simple questions about what is there and how it’s set up.
This webinar will show how RedSeal can help answer five fundamental questions:
- What do you have in your cloud(s)?
- Does your cloud deployment meet best practices?
- Have you validated that network segmentation policies are properly implemented across clouds?
- What access is possible? What is internet facing?
- Are your cloud vulnerabilities prioritized by risk to your network?
Are your corporate assets and remote workforce protected as you deploy Meraki devices?
A misconfiguration in any one of your Meraki devices can unintentionally expose corporate assets to unauthorized users – or provide an unmonitored path for data exfiltration.
Join us to see how you can have visibility into Meraki devices and their connections -- across hybrid cloud and on-premise environments — from each device to your data centers.
We’ll provide practitioner examples of misconfigurations, the risk they created, and how to remediate them quickly.
You’ll learn how you can:
- Discover new and existing Meraki devices
- Investigate to determine if they’re securely configured and comply with organizational policies
- Act to remediate and mitigate risks
Wayne Lloyd, RedSeal Federal CTO and Mike Lloyd, RedSeal CTO
Our national Cyber Protection Teams (CPTs) are taking U.S. cyber defense beyond our borders. As part of a Defend Forward program, they’re being invited into the networks of other nations to find and shine a light on malware – so we can all be protected from it.
But while they’re defending forward, there is a role for all of us on the home front. There are things we can do to protect our networks and keep our cyber teams in the fight.
Join RedSeal’s CTOs Wayne Lloyd and Dr. Mike Lloyd as they discuss Defend Forward and how we can be our own cyber protection team back at home.
Identifying the right vulnerabilities is a real challenge.
Scanner data generates tens of thousands (maybe even hundreds of thousands) of vulnerability results, sometimes scattered between different vendors (Rapid7, Qualys, Tenable, and more) and makes it a ‘whack-a-mole’ activity.
A proper vulnerability management plan should be able to identify the top vulnerabilities to patch or find the exact path an attacker can take. But to divert, contain or block intruder access requires information like:
- Where are the assets located and if/how could they be accessed?
- If the asset is compromised, what else does the attacker get access to?
- Does the compromised asset have internet access?
In this August 24th webinar, learn how customers use RedSeal to help them:
- Prioritize asset vulnerabilities based on network context
- Identify areas that scanners miss and their causes
- Consolidate vulnerability scan data from multiple sources
Allan Friedman, Director of Cybersecurity Initiatives, Department of Commerce / Wayne Lloyd, Federal CTO, RedSeal
This SNG Live Virtual session "Securing the Supply Chain" brings together federal cybersecurity leaders for a conversation on how they continue to mature their cybersecurity defenses, protect a remote workforce and what the best strategies are for staying ahead of adversaries.
Speakers:
- Allan Friedman, Director of Cybersecurity Initiatives, NTIA, Department of Commerce
- Wayne Lloyd, Federal CTO, RedSeal
- Greg Otto, Editor-in-Chief, CyberScoop
Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
The cloud presents an approach to DevOps affectionately called “pets vs. cattle,” which forces a different cybersecurity strategy. As with all change, the pets vs. cattle approach creates opportunities and risks of doing it wrong.
Join us on July 20th to hear CTOs Dr. Mike Lloyd and Wayne Lloyd discuss this approach. They’ll share their different perspectives as they cover:
1. What “pets vs. cattle” means.
2. If it’s a net benefit or a curse for cybersecurity
3. Mistakes can you make when implementing it
Doug Dexter, Sr. Network Security Engineer and former customer // Noam Syrkin, Sr. Technical Marketing Engineer
Even though most breaches are caused by oversights in basic cybersecurity hygiene, complex, hybrid multi-cloud environments make cybersecurity fundamentals really challenging. Even taking inventory of a network, ensuring your devices are securely configured, and knowing that you’re scanning everything you intended aren’t easy. RedSeal can help.
Join us for a webinar on Tuesday, February 11th as we share real-world customer stories of how we help with:
- Inventory control and secure device configurations
- Visibility into network inventory
- Identifying password and device configuration issues
- Enhancing value from vulnerability scanners
- Identifying unscanned areas you think are being scanned.
- Prioritizing vulnerabilities based not only on severity and asset value, but on accessibility.
Watch and listen as RedSeal’s Chief Product Officer, Kurt Van Etten gives an overview of RedSeal’s platform and the advantages it provides.
He illustrates how RedSeal supports the cybersecurity fundamentals — so you can see what’s on your network, how it’s connected, and the associated risk.
Most of us get device information from a variety of sources, which is difficult to correlate. What’s more, they don’t answer important network context questions like where the asset is, what it’s exposed to, provides access to or what would happen if it is not properly configured.
Compliance with most policies and mandates requires you consolidate this information to know:
- What devices are on your network
- Where hosts are located your network
- How the devices are configured
- How your network is interconnected
Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO
Join us for the inaugural broadcast of Between Two CTOs: Lloyd vs. Lloyd, an informal discussion of current issues in cybersecurity.
This 20-minute discussion will focus on “Lessons for cybersecurity from the pandemic.”
Our speakers are two of the most engaging people we know:
- (Dr.) Mike Lloyd, RedSeal CTO. His career has focused on modeling complex systems, beginning with epidemiology and moving to networks. He provides a unique perspective on our current situation.
- Wayne Lloyd, RedSeal Federal CTO. He’s a long time federal government cybersecurity practitioner, with a background working for…well, we can’t tell you that
Dr. Edward G. Amoroso / Jeffrey M. Vinson, Sr / Kurt Van Etten
Learn from experts how advanced network modeling tools reduce security risk and achieve the highest levels of information technology compliance in the healthcare industry.
Moderator:
Dr. Edward G. Amoroso
CEO, Tag Cyber
Former AT&T CISO
Participants:
Jeffrey M. Vinson, Sr
Sr. VP & CISO, Harris Health System
Debra Baker, Technical Program Manager // Landon Brock, Product Manager
RedSeal consolidates and reconciles all your host information so that you can be in compliance with most policies and mandates. Join us on Tuesday, April 7th for our RedSeal webinar “Hosts: Understanding Your Inventory to Pass Compliance” to learn how RedSeal can help.
Doug Dexter, Sr. Network Security Engineer and former customer // Noam Syrkin, Sr. Technical Marketing Engineer
Even though most breaches are caused by oversights in basic cybersecurity hygiene, complex, hybrid multi-cloud environments make cybersecurity fundamentals really challenging. Even taking inventory of a network, ensuring your devices are securely configured, and knowing that you’re scanning everything you intended aren’t easy. RedSeal can help.
Join us for a webinar on Tuesday, February 11th as we share real-world customer stories of how we help with:
- Inventory control and secure device configurations
- Visibility into network inventory
- Identifying password and device configuration issues
- Enhancing value from vulnerability scanners
- Identifying unscanned areas you think are being scanned.
- Prioritizing vulnerabilities based not only on severity and asset value, but on accessibility.
While they are prioritized and clear, you need to figure out exactly how to incorporate them into your network.
Join RedSeal Product Manager Rashmi Verma and Senior Network Security Engineer Doug Dexter to learn how RedSeal’s platform can help you implement key aspects of CIS Controls. You’ll learn how:
- A network model, including inventory and access, can be a foundation for implementing the controls
- You can effectively manage tracking and enforcement of the controls
- Technical checks and reporting can quickly prove that you’re meeting the controls
The best practice for understanding your endpoints is a single data source, one common network picture combining all that data.
Join RedSeal Senior Technical Marketing Engineer Noam Syrkin to see how you can benefit from one, unified source of endpoint information that also shows how each endpoint connects to your network.
You’ll see how you can:
- Identify parts of your network your vulnerability scanners don’t reach
- Accurately prioritize vulnerability remediation based on actual risk to your network
- Combine endpoint data to get a more complete picture of your cyber terrain
How do you protect your infrastructure when it’s in different, separately managed environments? Most of us struggle to understand security risks and evaluate the impact of change across disparate network environments.
Join RedSeal Senior Technical Marketing Engineer Noam Syrkin and take away valuable best practices for validating and managing your organization’s security in your hybrid multi-cloud environment.
We’ll discuss how to use RedSeal so that you can:
Understand your cyber terrain across all physical, software-defined network, and cloud environments
- Know what assets are at risk, wherever they are
- Model access policies to make sure you have no unintended access to valuable assets
- Evaluate the security impact of network changes
RedSeal Chief Product Officer Kurt Van Etten shows you how – every day – you can:
- Know what you have. Learn how to continuously check your network and endpoint inventory.
- Know that you comply with regulations and policies. Learn how to model and continuously validate your segmentation policies across all your network environments, including AWS, Azure, VMware NSX and Cisco ACI.
- Know your network risk. Learn how to accurately measure and prioritize risk based on where an attacker could reach.
RedSeal helps you master the cybersecurity fundamentals.
By focusing on cybersecurity fundamentals, RedSeal helps government agencies and Global 2000 companies measurably reduce their cyber risk. With RedSeal’s cyber terrain analytics platform and professional services, enterprises improve their resilience to security events by understanding what’s on their networks and how it’s all connected. RedSeal verifies that network devices are securely configured; validates network segmentation policies; and continuously monitors compliance with policies and regulations. It also prioritizes mitigation based on each vulnerability’s associated risk.
Help Your Auditors Help YouRamesh Kaza, RedSeal VP of Professional Services and Kurt Van Etten, RedSeal Chief Product Officer[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]50 mins