Featured
Mapping to DoD Zero Trust Capabilities: A Practical Guide
John Smith, CEO and Founder, LiveAction; Bassam Khan, VP of Product and Technical Marketing Engineering, Gigamon
The DoD Cybersecurity Reference Architecture is emerging as one of the key Zero Trust Architecture models for both government agencies and commercial enterprises. It is a detailed – and practical – architecture that clearly outlines the steps toward implementing Zero Trust.
Please join Executive and Zero Trust Thought Leaders, Live Action CEO and Co-Founder, John Smith, and Bassam Khan, Vice President of Product and Technical Marketing, as they discuss:
- How to meet Network, Orchestration/Automation and Visibility/Analytics requirements
- How to manage encrypted data
- The importance of Lateral or East-West visibility in Zero Trust
All episodes
-
The Key Role of Network Visibility for Zero Trust
John Kindervag Creator of Zero Trust, Guest Speaker & Ian Farquhar, Field CTO - Gigamon
Join Gigamon’s Ian Farquhar and John Kindervag, the “Creator of Zero Trust” to discuss the lost tenet of Zero Trust; access, inspection and analysis of all network traffic. In 2012 John called it “data access network”, or DAN, today it’s network visibility and elimination of blind spots and why EDRs are not enough, Logs are fragile and are not enough, Span ports are “so last century”, and Blind spots must be eradicated.
-
Forrester – the Power of Visibility in Addressing Today’s Threat Landscape
Tope Olufon, Senior Analyst - Forrester
Gigamon’s guest, Forrester security analyst, Tope Olufon, discusses the threat landscape and how we can deal with it in very practical terms, using deep observability techniques, visibility into encrypted traffic, and focusing on the network layer.
-
Zero Trust Security: Truth vs. Fiction
Ian Farquhar, Security CTO - Gigamon
As organizations progress along their Zero Trust journey, many start to pursue approaches which pivot around particular capabilities: endpoint, identity, firewalls. Often these orgs are paying back some technical debt in doing so, and the vendors who benefit are cheering on this investment. But is this a truly sensible approach? Is this Zero Trust truth, or Zero Trust fiction? How can we plan our Zero Trust journey to reap the benefits Zero Trust can give?
-
Operationalizing Zero Trust with Deep Observability
John Quezada, Sr. Solutions Engineer, Public Sector - Gigamon
Gigamon Deep Observability ensures your tools and Zero Trust policy engine have access to all network-based communications in your organization. For any effective Zero Trust implementation, full network visibility and elimination of blind spots is implicitly assumed.
-
Operationalizing Zero Trust: What It Really Takes
Ian Farquhar, Security CTO - Gigamon
Has a vendor ever told you “Buy us and your Zero Trust journey is complete?” They either don’t understand Zero Trust or think you don’t. In this session, Gigamon Security CTO Ian Farquhar will discuss what it really takes to operationalize Zero Trust. Hear about minimizing implicit trust, implementing constant risk and posture assessments, and how to orchestrate security responses driven by risk determination. Ian will also discuss how to introduce these concepts to improve overall security posture.
-
Securing Your Borders: Evolving Each Layer of Your Security Program
Chaim Mazal, Chief Security Officer & Martyn Crew, Sr. Director Product Marketing - Gigamon
Security is more complicated than ever. Most organizations still have traditional networks, traditional datacenter assets, and employees inside the network. All those resources must be protected by iterating and innovating on the tried-and-true methods. Watch this webinar to learn how Gigamon uses innovative solutions to lock down the layers of your environment.
- Is layered security meaningful in a hybrid world?
- Is a single security model possible?
- How is Gigamon evolving our own IT against this background? -
Zero Trust in An Encrypted World
Stephen Goudreault, Cloud Security Evangelist - Gigamon
Regardless of which Zero Trust model you are utilizing, there are some universal solutions that will be common amongst them. Threat actors are observed using the same tactics and techniques over and over again. In this presentation, we will briefly examine two top models and then explore what that means on a practical level. We will broadly look at some traditional network visibility solutions and challenge some of the norms around these systems. Do they really solve the problem in the best way in a world where everything is encrypted and threat actors hide in plain sight?
Key takeaways:
- Can classic tools such as logging really solve for the visibility gap?
- How to deal with the encryption/decryption paradox?
- What method can solve for lateral visibility? -
See Concealed Threat Activity Before Encryption with Precryption
Ryan Mahoney, Product Marketing Director - Gigamon
Threat actors conceal lateral movement and other activity within encrypted communications, making it incredibly difficult to detect. Gigamon Precryption™ technology is a breakthrough approach to eliminating this blind spot in hybrid cloud infrastructure while achieving TLS 1.3 compliance. Precryption offers plaintext visibility into encrypted communications before the payload is encrypted -- no decryption required. Join us to learn how this technology works and hear about four key use cases.
What you’ll learn:
- What is Precryption technology is and why is it different?
- How does Precryption eliminate blind spots and thwart cybercrime?
- How does Precryption help security teams achieve TLS 1.3 compliance, boost DNS security, and extend Zero Trust Architecture into the hybrid cloud? -
Precryption™ – the New Decryption
Mark Jow, Director Sales Engineering - Gigamon & Tim Christie, Senior Regional Director - Gigamon
In this engaging session, our expert speakers, Tim Christie, and Mark Jow, will unveil the revolutionary Gigamon Precryption™ technology.
Discover how Precryption eliminates the biggest blind spot in modern hybrid cloud infrastructure: With Precryption, you'll gain plaintext visibility into all encrypted communications without the need for decryption.
-
RiskyBiz Podcast : Precryption™
Ryan Mahoney, Product Marketing Director - Gigamon
In this Risky Business News podcast interviewer,Tom Uren, talks to Ryan Mahoney, Product Director at Giamon. The TLS 1.3 encryption standard makes passive network monitoring inside your network difficult without break and inspect cortortions. Listen to learn more about the Gigamon Precryption Solution.
-
Shedding Light on Encrypted Lateral Traffic: Precryption™ Unveiled
Bassam Khan, VP of Product & Technical Marketing Engineering - Gigamon
Encrypted lateral traffic: Is there a bigger blind spot? We can only search where the light shines, not where we lost that proverbial key. The shadows today’s hybrid-cloud digital infrastructure provides a hiding space for both threat actors and pesky app troubleshooting issues.
Do any of these apply to your organization?
- Lack of network traffic visibility into east-west, lateral virtual traffic, including container pod-pod or client-server communications.
- No practical way to decrypt that traffic, especially TLS 1.3.
- Current SIEMs and observability tools cannot see and run analytics on unmanaged host communications.
- Tools cannot ingest network packets because of capability, capacity, and cost challenges.
- App owners resist agents in their apps and workloads.You will get a behind the curtain look at this new technology and see a demo of emerging real-life use cases that are just now coming to light. Join us for a view into the future of security and operations.
-
Architecting Your Zero Trust Journey
Michael Dickman, CPO at Gigamon, Will Townsend, Vice President and Principal Analyst, Moor Insights & Strategy
Zero Trust was introduced nearly 15 years ago, but misconceptions and uncertainty around definition, process, and strategy continue to hinder many Zero Trust initiatives. Security and IT leaders are grappling with modern and legacy environments that all need to be considered as organizations build their “Zero Trust plane” while flying it. But the time is now.
Join this discussion with Will Townsend from Moor Insights and Strategy and Michael Dickman from Gigamon as they review the critical principles around Zero Trust and key considerations for implementing Zero Trust in complex environments.
In this 30-minute GigaChat, they’ll cover:
- The definition of Zero Trust and the only NIST principles you need to know
- Why data — not just identity — must be central to Zero Trust
- The challenges and opportunities with Zero Trust in the cloud
- Real world examples of how organizations are successfully implementing Zero Trust today -
Gigamon Analyst Connection: 5 Pragmatic Tips for Preventing Ransomware
Alan Weckel, Co-Founder and Analyst, 650 Group; Michael Dickman, Chief Product Officer, Gigamon
Making security systems more effective with less cost
Ransomware is a devastating cyberthreat that continues to grow and wreak havoc throughout all industries. CISOs have a deep desire to protect against every threat they possibly can, and eliminate every potential blind spot, but rarely have unlimited budget, time, and people to do so. In this webinar, hear from Michael Dickman, Chief Product Officer at Gigamon, and Alan Weckel, Co-Founder and Analyst at the 650 Group, about how you can uplevel your defense against ransomware while keeping costs in check.
- Hear best practices for making Security investments go further, achieving better signal-to-noise while managing tooling costs
- Walk away understanding how to detect encrypted lateral movement from a threat actor
- Take SIEMs, NDRs, IDSs, and Firewalls to the next level -
Policy, Perspective, and Progress Toward Zero Trust
Melinda Rogers, Chief Information Officer, Department of Justice
Cybersecurity is a critical priority at the Department of Justice (DOJ), where we are committed to both enhancing cybersecurity and fighting cybercrime. The agency is in the midst of a three-year IT strategic plan that includes its journey to zero trust, and in this keynote address, DOJ Chief Information Officer and Deputy Assistant Attorney General Melinda Rogers will highlight DOJ’s progress toward zero trust thus far. She’ll discuss the importance of industry partnerships and offer insights into next steps for zero trust adoption and how to strengthen cyber resilience to secure government into the future.
-
Practical and Achievable: Real-World Advice on Zero Trust
Gigamon, Cybersecurity and Infrastructure Security Agency, Department of Health and Human Services, Blackwood, DOJ, WWT
Agencies must manage significant technical and organizational risks as they pursue zero trust, including legacy system integration, technical blind spots, and stagnant budgets and staffing levels. In this panel discussion, industry thought leaders will offer practical advice to help agencies with limited resources maximize impact and minimize risk as they move to a Zero Trust architecture.
-
At the Intersection of IT and OT, Bridging the Zero Trust Gap
Gigamon, United States Postal Service, NASA, National Renewable Energy Laboratory, and Idaho National Laboratory
Critical infrastructure and industrial organizations depend on operational technology (OT) to execute, monitor, and control physical processes. In today’s threat environment, IT is needed to configure and manage OT devices and collect data about OT operations to ensure enterprise-wide cybersecurity. As organizations work to implement Zero Trust, the necessary intersection of IT and OT introduces complexity and opportunity. This cross-industry panel will discuss the organizational and technical changes required to implement Zero Trust across IT and OT and their challenges and successes along the way.
Presenters:
[Moderator] John Quezada, Senior Solutions Engineer and SE Manager, Public Sector Civilian, Gigamon
Heather Dyer, Vice President, Chief Information Security Officer, United States Postal Service
Dr. Mark Stanley, Cybersecurity Advisor Architect and Zero Trust Lead, National Aeronautics and Space Administration
Juan Torres, Associate Laboratory Director, Energy Systems Integration, National Renewable Energy Laboratory
Zach Tudor, Associate Laboratory Director, National and Homeland Security, Idaho National Laboratory -
Zero Trust in Multi-cloud Environments
Gigamon, Department of Homeland Security, Office of Personnel Management and BAE
As agencies forge ahead in their cloud security and resilience journeys, they must consider what gaps have been filled and what remain to cover. Many turn to frameworks such as the five pillars of Zero Trust in CISA’s Zero Trust Maturity Model. In this panel, agency leaders will share how they incorporate these pillars – identity, devices, network, data, and applications and workloads – into their everyday cloud security frameworks, and where they see the most important remaining gaps and risks across hybrid infrastructure.
Presenters:
[Moderator] Michael Dickman, Chief Product Officer, Gigamon
Beth Cappello, Deputy Chief Information Officer, Department of Homeland Security
Guy Cavallo, Chief Information Officer, Office of Personnel Management
Peder Jungck, Vice President and General Manager, BAE -
Network Visibility is the Foundation of Zero Trust
Michael Dickman, Chief Product Officer, Gigamon
“Gaining complete visibility into the network is like lighting up the whole street. When it comes to implementing Zero Trust, this is the best place to start”.
-- John Kindervag, Creator of Zero TrustAs organizations come to terms with the complexity of designing and implementing Zero Trust policies, procedures and the technologies required to support them, they realize the importance of having visibility into everything that’s happening on the network. This need for visibility is also recognized in the latest iterations of the CISA and DoD Zero Trust models. Gigamon is the visibility foundation for many of today’s most demanding Zero Trust implementations. Join Michael Dickman, Chief Product Officer at Gigamon, to discuss key, real-world Zero Trust issues including:
What are the key visibility attributes needed for Zero Trust success?
Do logs provide the visibility you need?
How do you verify and establish trust in your Zero Trust implementation?
-
Build a Unified, Comprehensive Zero Trust Solution
Rubrik, Cribl, Center for Naval Analyses, Forescout Technologies, Trellix
No agency wants to rip and replace existing solutions that support Zero Trust goals. Integration of existing and complementary capabilities is key to the creation of a unified Zero Trust solution that spans on-premises and cloud infrastructure, applications, and services across the five Zero Trust pillars and three cross-cutting capabilities. In this panel discussion, industry experts will outline how they come together to help agencies fully leverage existing solutions to achieve an ‘assume breach’ mindset, enterprise-wide visibility, and a comprehensive Zero Trust reference architecture.
Presenters:
[Moderator] Travis Rosiek, Public Sector Chief Technology Officer, Rubrik
Kam Amir, Director of Technical Alliances, Cribl
Rizwan Jan, Vice President, Chief Information Officer, Center for Naval Analyses
Tim Jones, Regional Vice President of Systems Engineering, Federal, Forescout Technologies, Inc.
Jason White, Senior Solutions Architect and Technical Strategist, Public Sector, Trellix -
Mapping to DoD Zero Trust Capabilities: A Practical Guide
John Smith, CEO and Founder, LiveAction; Bassam Khan, VP of Product and Technical Marketing Engineering, Gigamon
The DoD Cybersecurity Reference Architecture is emerging as one of the key Zero Trust Architecture models for both government agencies and commercial enterprises. It is a detailed – and practical – architecture that clearly outlines the steps toward implementing Zero Trust.
Please join Executive and Zero Trust Thought Leaders, Live Action CEO and Co-Founder, John Smith, and Bassam Khan, Vice President of Product and Technical Marketing, as they discuss:
- How to meet Network, Orchestration/Automation and Visibility/Analytics requirements
- How to manage encrypted data
- The importance of Lateral or East-West visibility in Zero Trust