Endpoint Security , Governance & Risk Management , Internet of Things Security

Network Segmentation: Building a Mature Security Model

Forescout's Steve Mond on Developing Better Network Defenses
Steven Mond, principal architect for segmentation and cloud, Forescout Technologies

Digital transformation, IoT deployments and government regulations are creating new security challenges, especially for financial institutions. Steven Mond of Forescout explains how a mature network segmentation strategy can help address those challenges.

See Also: Improving Operational Resilience Through OT and IoT Visibility and Security

In a video interview with Information Security Media Group, Mond discusses several key points that will be addressed in an upcoming series of virtual roundtables on this subject, including:

  • Overcoming the obstacles to developing a mature network segmentation strategy;
  • How IoT devices change an organization's approach to network segmentation;
  • The challenges financial services firms face when creating a network segmentation plan.

Mond, principal architect for segmentation and cloud, Forescout Technologies, has over 20 years of experience in financial services, cybersecurity architecture and enterprise technologies, delivering enterprise outcomes across cyber intelligence, segmentation, cloud, endpoint, regulatory compliance, application and infrastructure resilience. He has been an active contributor to intelligence sharing communities, including FS-ISAC committees, working groups and conferences.


About the Author

Scott Ferguson

Scott Ferguson

Former Managing Editor, GovInfoSecurity, ISMG

Ferguson was the managing editor for the GovInfoSecurity.com media website at Information Security Media Group. Before joining ISMG, he was editor-in-chief at eWEEK and director of audience development for InformationWeek. He's also written and edited for Light Reading, Security Now, Enterprise Cloud News, TU-Automotive, Dice Insights and DevOps.com.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.