Endpoint Security , Governance & Risk Management , Internet of Things Security

Network Segmentation: Building a Mature Security Model

Forescout's Steve Mond on Developing Better Network Defenses
Steven Mond, principal architect for segmentation and cloud, Forescout Technologies

Digital transformation, IoT deployments and government regulations are creating new security challenges, especially for financial institutions. Steven Mond of Forescout explains how a mature network segmentation strategy can help address those challenges.

See Also: Live Webinar | A Buyers' Guide: What to Consider When Assessing a CASB

In a video interview with Information Security Media Group, Mond discusses several key points that will be addressed in an upcoming series of virtual roundtables on this subject, including:

  • Overcoming the obstacles to developing a mature network segmentation strategy;
  • How IoT devices change an organization's approach to network segmentation;
  • The challenges financial services firms face when creating a network segmentation plan.

Mond, principal architect for segmentation and cloud, Forescout Technologies, has over 20 years of experience in financial services, cybersecurity architecture and enterprise technologies, delivering enterprise outcomes across cyber intelligence, segmentation, cloud, endpoint, regulatory compliance, application and infrastructure resilience. He has been an active contributor to intelligence sharing communities, including FS-ISAC committees, working groups and conferences.

About the Author

Scott Ferguson

Scott Ferguson

Managing Editor, GovInfoSecurity, ISMG

Ferguson is the managing editor for the GovInfoSecurity.com media website at Information Security Media Group. He's been covering the IT industry for more than 13 years. Before joining ISMG, Ferguson was editor-in-chief at eWEEK and director of audience development for InformationWeek. He's also written and edited for Light Reading, Security Now, Enterprise Cloud News, TU-Automotive, Dice Insights and DevOps.com.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.