Hi [[ session.user.profile.firstName ]]

The Power of Continuous Compliance: Eversource Success Story

Compliance with industry regulations is no longer a check-in-the-box exercise. Organizations are working to embed policy compliance into processes and frameworks to protect themselves not just from penalties, but also from cyber threats.
Join this Webinar to learn how Eversource, the largest energy delivery company in New England, is using Tufin to achieve continuous compliance with NERC CIP, and how you can ensure regulatory compliance, relieve audit preparation, and increase productivity. Don't miss the expert guidance from G2 Deployment Advisors on how dynamic, customizable process automation can ensure continuous compliance with corporate policies and industry regulations.
Recorded May 23 2017 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
George Dialectakis, CISSP, IT Consultant, Eversource&Dave Goodman,Founder & Director of Engineering, G2 Deployment Advisors
Presentation preview: The Power of Continuous Compliance: Eversource Success Story

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top 2018 Cyberattacks and How to Avoid Them in 2019 Dec 18 2018 4:00 pm UTC 60 mins
    Joe Schreiber, Technical Director, Business Development, Tufin
    Breached. Hacked. Cyberattack. These are all words that dominated headlines in 2018.

    While we all know that the attacks that prompted these headlines were largely avoidable in hindsight, we also know that enforcing security policy across the legacy physical network is challenging. Furthermore, the Cloud First Policy and the adoption of containers introduce new risks to organizations and raise new security concerns that need to be anticipated.

    Join us on December 18 for a webinar with Joe Schreiber, Technical Director of Business Development, to learn from the mistakes of others in 2018 and how to avoid making them – and the headlines – in 2019. We’ll draw from his 20+ years of experience including security operations and incident response.

    Key topics include how to:
    •Develop and deploy an enforceable security policy
    •Clear time for proactive security initiatives
    •Mitigate the inherent risk of DevOps’ CI/CD agility
    •Contain malware outbreaks
    •Anticipate security risks of containers
  • From DevOps to DevSecOps: Cloud and Security in 2019 and Beyond Recorded: Nov 28 2018 48 mins
    Tim Sandage (AWS), Reuven Harrison (Tufin) Brian Johnson (DivvyCloud) and Constancio Fernandes (Symantec)
    Join this live panel discussion with experts at AWS re:Invent 2018 for an in-depth look at the future of cloud, application security, and transitioning from DevOps to DevSecOps.

    Tune into this interactive Q&A session with world renowned Cloud, DevOps, and Security leaders while they discuss the following:

    - The challenges organizations are facing on how they can culturally come together
    - How security can be an integral part of the DevOps practice to solve these challenges
    - DevOps growth from mid-market to enterprise
    - Challenges with using traditional security tools/processes and collaboration through automation
    - Fostering shared responsibility among Security and DevOps

    This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.

    Tim Sandage, Sr. Security Partner Strategist, AWS
    Reuven Harrison, CTO & Co-Founder, Tufin
    Brian Johnson, CEO, DivvyCloud
    Constancio Fernandes, Senior Director Development, Symantec
  • Ask the Expert: How DevOps Improves Business Agility Recorded: Nov 28 2018 23 mins
    Lindi Horton, Director Cloud Security Products and Services, Secureworks and Reuven Harrison, CTO & Co-Founder, Tufin
    Join this one-on-one interview with Reuven Harrison, CTO and Co-Founder of Tufin, for an in-depth discussion on DevOps and DevSecOps in 2019.

    Reuven will be answering questions live and discussing the following:

    - What is your definition of DevOps and why is it different for different organizations?
    - What is the rate at which DevOps is being adopted?
    - Is DevSecOps just DevOps with Security sprinkled in, or is there more to it than that?
    - How can your organization respond to DevSecOps needs?
    - What are some of the most common issues when shifting to DevSecOps?

    This on-camera interview will be recorded directly from AWS re:Invent in Las Vegas! Tune in from the comfort of your desk and get all of your DevOps questions answered.
  • Webinar: Netzwerksegmentierung – Methoden und Vorteile Recorded: Nov 15 2018 33 mins
    Christian Giebner, Presales Engineer, Tufin & Christian Giebner, Presales Engineer, Tufin
    ist Ihre Netzwerktopologie flacher als die Schleswig-Holsteinische-Gebirgslandschaft?

    Wir können Sie dabei unterstützen Ihr Netzwerk in effektive Sicherheitszonen aufzuteilen und haben eine Lösung, welche die Einschränkungen der Kommunikation zwischen den Zonen, Hersteller- und Plattformunabhängig, sicherstellt.

    Besuchen Sie das Webinar am 15. November um 9:00 Uhr, vom Presales Engineer Christian Giebner, erfahren Sie die Methoden und Vorteile einer praktikablen Netzwerksegmentierung und lernen Sie:
    •Warum eine einheitliche Segmentierungsrichtlinie essentiell für die Sicherheitsrichtlinienverwaltung ist
    •Wie Sie Sicherheitszonen definieren und die Interzonenkommunikation gestalten
    •Wie Sie effektiv Ihre Segmentierungsrichtlinie pflegen und durchsetzen

    Registrieren Sie sich jetzt!
  • Webinar: From Risk to Action: Security Automation and Orchestration Recorded: Oct 24 2018 40 mins
    Idan Moyal, CTO and Co-Founder, Reposify, Jay Spann, SOAR Evangelist, Swimlane & Vikram Venkatasubramanian Director, BD
    How do you protect your network?

    It’s getting more and more difficult to identify, analyze, and mitigate vulnerabilities and threats.

    Join security experts from Tufin, Reposify and Swimlane on October 24 as we discuss ways to tighten your security posture by leveraging a policy-centric approach, including:

    Mitigating vulnerabilities from known and unknown assets at the network edge and beyond the firewall
    Automating incident response playbooks based on rich topology and policy data
    Updating the security policy baseline in response to specific threats
    Register today for a better understanding of how to enforce security policy throughout all your security operations.
  • Firewall Regelwerke ausmisten mit Tufin Recorded: Sep 27 2018 27 mins
    Joachim Nossek , Presales Engineer, Tufin & Thorsten Geissel Senior Systems Engineer DACH,Tufin
    Ist Ihr Firewall Regelwerk schwerer zu lesen als die Assembler Code?

    Tufin kann Ihnen helfen ein bestehendes Firewall Regelwerk aufzuräumen und von nicht mehr benötigten Regeln und Objekten zu befreien.

    Wir zeigen Ihnen exklusiv welche Werkzeuge Ihnen helfen Transparenz und Compliance sicherzustellen.

    Treffen Sie unseren Systems Engineer Thorsten Geissel in einer Online-Sitzung um mehr über die Best Practices bezüglich der Bereinigung von Firewall Regelwerken zu erfahren:

    •Automatische Entfernung von doppelten oder verdeckten Regeln
    •Effektives Entfernen von Servern, die nicht mehr im Einsatz sind

    Melden Sie sich heute noch an und tragen den Termin in Ihren Kalender ein!
  • IT Security’s Offering to Cloud: Enable DevOps with Automated Security Recorded: Sep 26 2018 41 mins
    Colby Dyess, Director Cloud Marketing & Dan Rheault, Sr. Product Marketing Manager, Tufin
    DevOps teams often operate outside the purview of IT security, but security is still necessary in the cloud. IT security can ensure that DevOps teams retain their agility and maintain strong security using automation. By integrating security through automation, the security watchdog now becomes the trusted advisor, helping DevOps enable the business.

    Join this webinar on September 26 to hear Tufin experts Colby Dyess and Dan Rheault discuss how information security operations teams integrate security into a dynamic delivery process. We will cover how to:
    •Find commonalities between information security and cloud teams
    •Gain visibility into cloud security
    •Assess risk within the cloud by leveraging a policy-driven approach
    •Enforce security in CI/CD without impeding application delivery
    Register now to learn how automation enables organizations to align cloud and DevOps with security policies.
  • It's Now Or Later: Best Practices for Scheduling Security Changes Recorded: Sep 5 2018 45 mins
    Hadas Lahav, Senior Product Manager,Automation, Tufin and Maya Malevich,Director of Product Marketing, Tufin
    What is the change schedule your organization standardized on? Do you strictly schedule changes into change windows to avoid outages, or do you process changes as they are requested to increase agility?
    In this Webinar we review different change scheduling best practices and provide use case examples from actual customers.

    Join Hadas Lahav, senior product manager and automation expert, and Maya Malevich, director product marketing, on September 5, to learn about:

    Industry best practices for change scheduling
    Practical scheduling approaches of leading organizations
    Centrally configuring change windows and urgent changes for better agility and control
    Register now to determine the right approach for your environment!
  • What’s New in Tufin Orchestration Suite R18-2 Recorded: Aug 29 2018 30 mins
    Hadas Lahav, Senior Product Manager, Automation, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin
    Are you ready to take your weekends back? Tufin Orchestration Suite R18-2 GA enables you to schedule the provisioning of policy changes to your change window! This is a unique feature providing a new way to achieve operational maturity through automation.

    Please join us to learn more about how to configure change windows to achieve policy-driven change automation and about enhanced support for:
    •Check Point in-line policy
    •A new way to commit urgent changes
    •Dynamic on-boarding and removal of AWS VPCs

    Register now to gain fewer long nights and better consistency in your schedule with R18-2 GA.
  • Webinar: An Actionable Plan for Segmenting Your Network Recorded: Jul 25 2018 50 mins
    Erez Tadmor,Sr. Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin
    A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.

    Our advice: organizations must go back to the basics to accomplish this crucial project.

    This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
    •Common pitfalls to avoid
    •How to start segmenting your network today
    •Tips for applicable enforcement
    •Q&A from the attendees
  • 5 Clear Signs You Need to Automate Network Security Operations Recorded: Jun 27 2018 36 mins
    Hadas Lahav, Senior Product Manager,Automation, Tufin and Karen Crowley, Sr. Product Marketing Manager, Tufin
    Why automate? Why now? Automation is critical to digital transformation, essential for reducing the attack surface and mandatory to ensuring continuous compliance.

    Join this webinar “5 Clear Signs You Need to Automate Network Security Operations” to learn:

    * How to securely speed up the network change process
    * Best practices to getting started with automation
    * Guidelines to meet the goal of Zero-Touch Automation

    We will review the use cases to begin automating network security operations and explain why it’s mandatory to focus on policy-based change automation.
    Register now!
  • State of Network Security: New Research from ESG’s Jon Oltsik Recorded: Jun 8 2018 44 mins
    Jon Oltsik, Senior Principal Analyst, ESG and Karen Crowley, Senior Product Marketing Manager,Tufin
    State of Network Security: New Research from ESG and the Implications for IT The Enterprise Security Group (ESG) recently ran a research survey on the state of network security. The survey, commissioned by Tufin, presents compelling results that require network security teams to plan ahead, such as: 86% of IT decision makers responded that automating network security operations is critical or very important for their organization, and yet 65% of them are still using manual processes to implement or modify network security controls.

    Join ESG’s Senior Principal Analyst Jon Oltsik and Tufin’s Senior Product Marketing Manager Karen Crowley as they review the research and share insights into securing today’s hybrid networks.

    Topics will include:
    •Primary Drivers that have increased the complexity of security operations
    •How Cloud services and SDN are impacting organizations
    •The move to DevOps and microservices and their impact
  • Cisco ASA to Firepower Migration: A Simplified Solution Recorded: May 23 2018 24 mins
    Joe Schreiber, Technical Director, Business Development, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin
    Are you a Cisco ASA customer eager to migrate to Firepower next generation policy? You are not alone!

    Watch this webinar to learn about a migration solution that leverages policy optimization and automation for the most efficient adoption of Cisco Firepower. The solution is based on Tufin proprietary technology and on a longstanding relationship with Cisco. Tufin policy search and analysis capabilities simplify policy browsing and selection, while an API-to-API integration streamlines the selected policy migration from ASA to Firepower.

    Don’t miss this session presented by Dan Rheault, Product Marketing and Joe Schreiber, Technical Business Development, as they uncover the added value of Tufin automated migration solution:
    •Optimize rule sets prior to migration
    •Align rule sets to Firepower Access Control Groups
    •Ensure the most efficient migration process with automation
  • Automation on Fire: Tufin New Release Update for R18-1 Recorded: Apr 26 2018 45 mins
    Hadas Lahav, Senior Product Manager,Automation, Tufin and Maya Malevich,Director of Product Marketing, Tufin
    Are you using automation from Tufin yet? Are you still wondering how automation can make your life easier?

    Join Hadas Lahav, Product Management lead for automation, and Maya Malevich, Director Product Marketing, to learn about the latest and greatest in Tufin Orchestration Suite R18-1:
    •Automated process for rule recertification
    •End-to-end change automation for Cisco Firepower (and a new migration solution)
    •New automation triggers for advanced customizations
    •And much more…
  • GDPR: Network Security Life Post May 25th, 2018 Recorded: Apr 25 2018 18 mins
    Dan Rheault Sr. Product Marketing Manager, Tufin
    May 25th, 2018 marks the date on which organizations must have identified and applied the required changes to meet the mandates of GDPR. Organizations must also update their networking and security processes to ensure that new violations are not introduced even after compliance is achieved. Regulatory compliance is no longer considered a snapshot of the network, but rather an ongoing processes that maintains continuous compliance and controls new risks.

    This webinar offers insight from multiple interviews with data privacy attorneys and CISOs on how they are approaching GDPR beyond the immediate compliance deadline.
  • Preparing and Protecting Your Network from an Automated Zero-Day Attack Recorded: Mar 28 2018 43 mins
    Joe Schreiber, Technical Director, Business Development, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin
    Attackers have embraced automation to launch attacks and expand their reach within your network. But ill-intentioned individuals aren’t alone in having automation in their toolkit. It’s time to fight automation with automation.

    How quickly you can respond to a zero-day attack largely depends on how proactively you secure your network. When attackers engineer malware to automatically detect vulnerabilities on your network, the way to prevent damage is to employ automation so you can react quickly and ensure its integrity.

    Join Tufin experts Dan Rheault and Joe Schreiber, also an established SOC professional, for an educational webinar that will discuss best practices to:

    •Secure the network through effective segmentation
    •Contain risk from zero-day attacks
    •Leverage automation to respond to security incidents
  • Application Connectivity Requests, Lost in Translation Recorded: Mar 7 2018 49 mins
    Erez Tadmor, Sr. Product Manager, Tufin & Maya Malevich,Director of Product Marketing, Tufin
    Ever encounter requests from application owners that are not aligned with your change templates?
    IT operations teams often experience communication gaps with application teams that may result in delays and productivity losses.

    Join Maya Malevich and Erez Tadmor as we discuss the current landscape and how application-driven automation will:
    •Bridge the language gaps between operations and applications ’ teams
    •Increase the speed and efficiency of processing changes
    •Improve security posture and enforce policy compliance
    •Ensure connectivity of business-critical applications

    This webinar is the third in the Tufin Automation Journey series.

    Register to start your journey!
  • Advancing Our Leadership in Automation with Tufin R17-3 Recorded: Jan 24 2018 22 mins
    Amnon Even-Zohar,Senior Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin
    Please join Tufin as we brief our customers on the release of Tufin Orchestration Suite™ R17-3, Advancing Our Leadership in Automation: Pioneering the Automation Journey to the SDN and More. We’ll cover the different facets of automation features in the release including automation and provisioning for VMware NSX, support for Check Point Identity Awareness Blade, and end-to-end group modification automation.

    Other items covered include:

    Policy optimization for Cisco Firepower
    Enhancements to topology to further support “what-if” analysis
    Policy Browser search enhancements
    Changes to cloud license enforcement
  • Case Study Webinar: Moving Network Operations into the Future Recorded: Jan 18 2018 48 mins
    Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE & Karen Crowley,Sr. Product Marketing Manager
    Join us on January 18th, 2018 for a lively discussion with Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE, the second largest utility provider in Germany.

    We will discuss RWE’s challenges and success in moving their network operations into the future without compromising security and compliance, including:
    • consolidating security and orchestrating connectivity across a hybrid network, including legacy firewalls and routers, next generation firewalls, and the AWS cloud platform
    • incorporating a cloud-first strategy and a heavy investment in DevOps to identify and address security violations in AWS, and allow application developers to spin up new applications without knowing IPs, protocols and ports
    • reclaiming visibility of their firewall configurations and moving from error-prone manual changes to automating the process
    • vastly improving workflows to improve audit preparation from a previously non-auditable change process

    Register now to gain amazing insight into how they have found success. We will wrap up with a live Q&A, so have your questions ready!
  • Technology Trends Impacting Network Security in 2018 Recorded: Dec 12 2017 38 mins
    Reuven Harrison, Tufin CTO and Joe Schreiber, Tufin Technical Director
    As enterprise networks continue to grow more complex and change before our eyes, and as security threats continue to grow in frequency and sophistication, organizations need to understand the technology trends that will be most prominent in 2018.

    Traditional IT security leaders and cloud architects alike will learn about ways to reduce risk and improve business agility in the coming year. We will discuss:
    •Our predictions for the trends we expect to see in 2018
    •What technology shifts we predict to influence network security
    •How the role of network security policy will affect these trends
Security Policy Orchestration Solutions
Tufin® is the leader in Network Security Policy Orchestration, serving more than half of the top 50 companies in the Forbes Global 2000. Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. Tufin reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries.

Find out more at www.tufin.com
Tufin blog SuiteTalk™ http://www.tufin.com/blog/
Twitter: http://twitter.com/TufinTech
Webinars http://www.tufin.com/resources/webinars/
YouTube https://www.youtube.com/user/Tufintech

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Power of Continuous Compliance: Eversource Success Story
  • Live at: May 23 2017 3:00 pm
  • Presented by: George Dialectakis, CISSP, IT Consultant, Eversource&Dave Goodman,Founder & Director of Engineering, G2 Deployment Advisors
  • From:
Your email has been sent.
or close