State and Local Cybersecurity Threats: Weathering the Storm

Presented by

Shannon Lawson, CISO, City of Phoenix / Dr. Mike Lloyd, CTO, RedSeal / Brad Schwab, Sr. Security Solutions, RedSeal

About this talk

The more state and local agencies practice data sharing to increase transparency, accelerate and improve accuracy, the higher probability of unintended exposures, opening them to data breaches, malware and worse, ransomware attacks. How do agencies proactively recognize exposures, secure infrastructures mitigate risks and stay compliant? More and more agencies realize they are not immune and can’t see around corners. They need a solid solution that allows them to know exactly what’s on their network, how it’s connected and what specifically is at risk. Join RedSeal and Shannon Lawson, CISO, City of Phoenix, as we explore how a state and local agency earned toward hardening their environment from attacks: - What resources they had across all their infrastructure environments? - If any of the resources were unintentionally exposed to the internet? - What access is possible within and between environments? - Did their deployments meet security best practices? - How to validate their network segmentation policies? - Are they remediating the riskiest vulnerabilities first? Speakers: Shannon Lawson, CISO, City of Phoenix Dr. Mike Lloyd, CTO, RedSeal Brad Schwab, Senior Security Solutions Consultant, RedSeal
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (23)
Subscribers (2629)
By focusing on cybersecurity fundamentals, RedSeal helps government agencies and Global 2000 companies measurably reduce their cyber risk. With RedSeal’s cyber terrain analytics platform and professional services, enterprises improve their resilience to security events by understanding what’s on their networks and how it’s all connected. RedSeal verifies that network devices are securely configured; validates network segmentation policies; and continuously monitors compliance with policies and regulations. It also prioritizes mitigation based on each vulnerability’s associated risk.