Reaping the Benefits of Continuous Monitoring and Mitigation At Pioneer Investments
- Wednesday, June 18th, 2014 at 3:00 PM (15:00:00 EDT/US Eastern)
- John Pescatore and Ken Pfeil
You can now attend the webcast using your mobile device!
A forward thinking security team responsible for operations and compliance checks was searching for a network security solution that would provide intelligence across users, devices and applications, enforce granular policy control, and enable control interoperability. The network security solution they implemented from ForeScout allowed them to gain visibility and apply specific policies at both the client and network levels, enhance control integration among different tools, and reduce costs by saving man hours versus looking at multiple security devices - demonstrating an immediate return on investment. "Phenomenal" interoperability and technical support was an added bonus.
John Pescatore joined SANS as director of emerging technologies in January 2013, bringing with him over 35 years of experience in computer, network and information security. Prior to SANS, he was Gartner's lead security analyst for more than 13 years, working with Global 5000 corporations, government agencies and major technology and service providers. In 2008, John was named one of the top 15 most influential people in security and has frequently testified before Congress on issues relating to cybersecurity.
Ken Pfeil is the CISO at Pioneer Investments responsible for global security operations and compliance. He is seasoned CSO and IT veteran with experience spanning over two decades with companies such as Microsoft, Dell, Avaya, Identix, and Merrill Lynch. In 1998, he founded "The NT Toolbox" and oversaw all operations until its acquisition by GFI Software in 2002. He served as a technical contributor and subject matter expert for CompTIA's Security+ certification, ISSA's International Privacy Advisory Board covering GLBA, and Microsoft's MCSE Exam and course curriculum "Designing Security for Windows 2000". He also contributed vulnerability analysis content at Windows and .Net Magazine's "Security Administrator" publication. He is the coauthor of the books "Hack Proofing Your Network - 2nd Edition", "Stealing the Network - How to Own the Box", and a contributing author of "Security Planning and Disaster Recovery" ,"Network Security - The Complete Reference" and "Network Security Assessment: From Vulnerability to Patch" and Microsoft's "Best Practices for Enterprise Security" whitepaper series.