Using Network Segmentation and Microsegmentation to Improve Enterprise Defense

When an online attacker penetrates your cyber defenses, he or she may take on the guise of an authorized user, making it possible to move laterally within your IT environment to steal information without detection. One growing strategy for limiting this lateral movement is network segmentation, which can restrict access to critical systems and help limit the damage caused by an online attacker. In this Dark Reading webinar, experts discuss methods for using network segmentation and microsegmentation as part of your organization's strategy for limiting the effects of an online compromise.

Available:
On Demand
Duration:
1h 00min

When you attend this webinar, you will learn:

  • the pitfalls to avoid with microsegmentation
  • tips for kickstarting a network segmentation practice
  • best practices for using network segmentation to complement your other security controls, like perimeter defenses and access management

Featured Speakers

  • David Klein
    David Klein
    Senior Director, Engineering & Architecture
    Guardicore

    Dave Klein is the Senior Director of Technical Evangelism for Guardicore. With more than 21 years of real-world cybersecurity experience, he works with Guardicore teams, customers and industry thought leaders to address the challenges of securing modern hybrid cloud environments..

    Dave encourages CISOs faced with securing their organizations to adopt security solutions and best practices that work easily and seamlessly across heterogeneous hybrid cloud environments. Dave has spoken on a wide variety of cybersecurity topics including incident response plans, micro-segmentation, data center hygiene, crytpojacking, hybrid cloud adoption, PCI compliance, stages of the cyber security kill chain, interactions between the physical and cyber worlds as it relates to the radicalization and arming of domestic terrorists, and using cyber forensics in real-world criminal cases.

    Prior to Guardicore, Dave was the Engineering Manager for Forcepoint's Federal Sector where he helped to defend US agencies against Insider and Advanced Persistent Threats. Dave also worked with other vendors, government and private sector entities on the NIST response to Presidential Policy Directive 21 on Critical Infrastructure Security and Resilience. Before joining Forcepoint, Dave was a security leader at Cisco Systems and McAfee.

  • Gal Shpantzer
    Gal Shpantzer
    Independent Security Professional

    Gal Shpantzer has over 15 years of experience as an independent security professional and is a trusted advisor to CISOs of large corporations, technology and pharma startups, Ivy League universities and non-profits/NGOs. Since 2014, Gal has focused on emerging threats to availability as well as confidentiality (ransomware and destructive attacks). Gal has been involved in multiple SANS Institute projects since 2002, including co-editing the SANS Newsbites, revising the E-Warfare course and presenting on cyberstalking, CAPTCHAs, endpoint security and hardware roots of trust. In 2009, he founded and led the privacy subgroup of the NIST Smart Grid cybersecurity task group, resulting in the privacy chapter of NIST IR 7628. He is a co-author of the Managing Mobile Device Security chapter in the 6th ed. Vol 4 of the Information Security Management Handbook (2010) with the late Dr. Eugene Schultz, and is a technical editor of an upcoming O'Reilly book on defensive security (2017). Gal collaborated with Dr. Christophe Veltsos to present the ongoing Security Outliers project, focusing on the role of culture in risk management at RSA, CSI, BSides and Baythreat conferences. Most recently, he was involved as a subject matter expert in the development of the U.S. Department of Energy’s Electric Sector Cybersecurity Capability Maturity Model (ESC2M2) in 2012, and is launching the Incident Response Execution Standard project late 2016. Gal was also involved in the Infosec Burnout research project and co-presented on this topic at BSides-Las Vegas and RSA.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By