Getting Through the Compliance Maze with NAC

Diana Kelly, IANS Faculty Advisor and Founder of SecurityCurve; Jeff Bradberry – BrightPoint - Manager, IT Security
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NER, FFIEC, HIPAA/HITECH and PCI-DSS are the new normal. To stay in compliance, IT teams need to be able to keep up with updates and changes to existing mandates and be prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement tools that apply and support multiple facets across different compliance specifications. Network Access Control (NAC) supports numerous critical security and protection functions across multiple mandates.

This interactive expert / user session, led by IANS faculty advisor Diana Kelly of Security curve with end user participant Jeff Bradberry of BrightPoint, will examine NAC and real-world compliance use cases. Using ForeScout CounterACT as an example, attendees will discover:

- How NAC works
- Key NAC functions that apply to compliance processes and specifications
- Real-world use cases; considerations, controls, activities and processes; and
- How NAC specifically maps to top commercial, regulatory and federal mandates.
May 22 2012
41 mins
Getting Through the Compliance Maze with NAC
Join us for this summit:
  • Channel
  • Channel profile
Up Down
  • Securing Mobile Devices with NAC and MDM Recorded: Nov 18 2013 43 mins
    How can an enterprise mobilize their workforce with the latest handheld devices and mobile apps, while preserving security? The combination of mobile device management (MDM) and network access control (NAC) provides one of the most flexible approaches, combining both security and operational efficiency. Join Don Coop, Product Manager for SAP Afaria, and Jack Marsal, Director of Solution Marketing at ForeScout, to learn how to easily solve the mobile security puzzle with SAP and ForeScout:
    Mobile device implementation and control considerations
    Network Access Control 101
    How ForeScout and SAP team together to provide total mobile device visibility and control
  • Resolving IT-GRC control challenges in the frenetic enterprise Recorded: Feb 19 2013 74 mins
    Security and governance are not natural bedfellows - but they need to be drawn together to achieve best practice standards, and, of course, regulatory compliance.

    The reality is that modern network, device, user, application and access dynamics are challenge for any IT security professional.

    You've probably built-out process and controls to address these issues - you also invested heavily in network and host-based security, systems management, SIEM and other security mechanisms. But the reality is that new threats and state changes will cause you security headaches.

    This Webinar can help you...

    During this 60-minute expert session, you'll:

    Learn where Network Access Control (NAC) sits in the enterprise security mix...

    Understand how NAC can help you close real-time security and compliance gaps - and automate IT responses...

    Gain an insight into common IT Governance Risk & Compliance (GRC) assumptions and exposures...

    Develop a strategy to reduce access and endpoint integrity exposures...

    Learn about real-world NAC implementations...
  • Making the GRC Grade – How to Realize Continuous Compliance Recorded: Dec 11 2012 34 mins
    All compliance frameworks reference endpoint integrity, host defenses, and access control. You’ve invested in host-based security, systems management, and SIEM in order to reduce malware, data leakage, and other security exposures. But what innovative approaches can you use to not only improve your organization’s GRC grade but also achieve continuous compliance?

    This session shares a reference solution for continuous compliance based on smart integrations between McAfee security management and ForeScout’s automated security control platform. This expert / practitioner session will cover:

    • Common endpoint compliance gaps
    • NAC integration with host-based security and policy management systems
    • Extending correlation rules to enable endpoint remediation
    • How to create a closed-loop endpoint security and compliance program
  • NAC-as-a-Service: What, Why and How Recorded: Oct 18 2012 62 mins
    Driven by business requirements for greater network resource accessibility, increased security automation and the demand to secure “bring your own device” (BYOD) and “choose your own device (CYOD), the next IT security service opportunity set for growth is network access control (NAC). What are the real-world reasoning, considerations and opportunity with regards to expanding security managed/hosted services with NAC. This expert/practitioner panel will discuss the value, options and impact of adding NAC to your service portfolio.
    Topics include:
    - What is NAC, why NAC, why now
    - What is the business value for the customer and service provider
    - What are common NAC service, deployment and implementation options
    - What are key SLA development and operational process considerations
    - How to package NAC, price out the service and combine with other security services
  • Getting Through the Compliance Maze with NAC Recorded: May 22 2012 41 mins
    Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NER, FFIEC, HIPAA/HITECH and PCI-DSS are the new normal. To stay in compliance, IT teams need to be able to keep up with updates and changes to existing mandates and be prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement tools that apply and support multiple facets across different compliance specifications. Network Access Control (NAC) supports numerous critical security and protection functions across multiple mandates.

    This interactive expert / user session, led by IANS faculty advisor Diana Kelly of Security curve with end user participant Jeff Bradberry of BrightPoint, will examine NAC and real-world compliance use cases. Using ForeScout CounterACT as an example, attendees will discover:

    - How NAC works
    - Key NAC functions that apply to compliance processes and specifications
    - Real-world use cases; considerations, controls, activities and processes; and
    - How NAC specifically maps to top commercial, regulatory and federal mandates.
ForeScout Network Access Control Solution
ForeScout CounterACT for Network Access Control is an automated security control platform that lets you see and control everything on your network–all devices, all operating systems, all applications, all users. ForeScout CounterACT lets employees and guests remain productive on your network while you protect critical network resources and sensitive data.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Getting Through the Compliance Maze with NAC
  • Live at: May 22 2012 5:00 pm
  • Presented by: Diana Kelly, IANS Faculty Advisor and Founder of SecurityCurve; Jeff Bradberry – BrightPoint - Manager, IT Security
  • From:
Your email has been sent.
or close
You must be logged in to email this