Hi [[ session.user.profile.firstName ]]

Data Protection & Compliance

  • Date
  • Rating
  • Views
  • GDPR is Here. Now What?
    GDPR is Here. Now What?
    Karlene Berger, Solution Director, User & Data Security, Forcepoint Recorded: Jun 18 2018 19 mins
    The EU GDPR, one of the most important changes to data privacy regulation in 20 years, takes effect May 25, 2018. IF you haven’t prepared yet – don’t worry, you aren’t alone! Less than 50% of all organizations impacted will fully comply, according to Gartner*.

    Watch this very informative webcast to learn:

    •How you may either own or process data relevant to the regulation
    •Key requirements governing the overall regulation – why they are important and the operational impact on organizations
    •Using a NIST focused framework to help you prepare for compliance

    Whether you have a specific problem you are trying to solve or are just getting started, Forcepoint can help you stay prepared.

    *GDPR Clarity: 19 Frequently Asked Questions Answered, by Bart Willemsen, 29 August 2017
  • A Risk-Adaptive Approach to Dynamic Data Protection
    A Risk-Adaptive Approach to Dynamic Data Protection
    Bharath Vasudevan, Sr. Director, Product Marketing, Forcepoint Recorded: Jun 18 2018 15 mins
    Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats.

    Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, and industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
  • One Year After WannaCry - Has Anything Changed?
    One Year After WannaCry - Has Anything Changed?
    Carl Leonard, Principal Security Analyst, Forcepoint Recorded: Jun 12 2018 36 mins
    A Root Cause Analysis of Data Breaches

    The year of the data breach, the year of ransomware, the year of APT – these catchy name tags summarise a given year. This session will review the last 12 months and attempt to assign a name tag. The timing is impeccable. 12 months after WannaCry, a milestone ransomware event and a couple of weeks after GDPR enforcement, provides a prompt to reveal research into the root causes of real-world data breaches and what to learn from their failings.
  • Forcepoint UEBA - User & Entity Behavior Analytics
    Forcepoint UEBA - User & Entity Behavior Analytics
    Bharath Vasudevan, Sr Director, User and Data Security, Forcepoint Recorded: Mar 2 2018 24 mins
    Traditional tools fail to provide contextual information about insider risk ― critical in the era of continuous security breaches and mounting governmental demands for regulatory surveillance. Forcepoint UEBA is the leading platform integrating structured and unstructured data to provide holistic visibility into nuanced human activity, patterns and long-term trends that comprise human risk.

    Join Bharath Vasudevan, Senior Director for User and Data Security, as he discusses how Forcepoint UEBA protects sensitive client information, detects compromised accounts and enforces the continued improvement of an organization's internal security culture.
  • GDPR - Responding to a breach in a Timely Manner
    GDPR - Responding to a breach in a Timely Manner
    Mike Smart - Forcepoint, Chris Jones - Forcepoint Recorded: Nov 10 2017 47 mins
    Organizations will need to rapidly detect data incidents and efficiently orchestrate the appropriate response within the 72 hour breach response window. In this session, Forcepoint explores how technologies can support an organization’s breach response process.
  • Rethinking Data Security in a Zero Perimeter World
    Rethinking Data Security in a Zero Perimeter World
    Eric Ogren 451 Research and Bharath Vasudevan Forcepoint Recorded: Nov 8 2017 58 mins
    IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.

    Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
  • GDPR Product Mapping: The Need to Monitor, Manage and Control Personal Data Flow
    GDPR Product Mapping: The Need to Monitor, Manage and Control Personal Data Flow
    Mike Smart, Product & Solutions Director - Forcepoint Recorded: Nov 1 2017 41 mins
    Learn how Forcepoint solutions can assist you with your GDPR program

    In the second of a three-part series of short, live webcasts, Forcepoint provides insight and interpretation around the General Data Protection Regulation (GDPR), how it maps to relevant information security technology, and more specifically, how Forcepoint technology can help you prepare for the GDPR.

    It’s necessary to understand personal data flows in order to measure risk and apply controls: this is an important part of managing effective processing practices. Integrating multiple technologies is a key to success. In this session, Forcepoint will show how technologies like DLP can be used to provide visibility and orchestrate controls to enforce processing policies through the integration of other technologies.
  • Forcepoint  GDPR Product Mapping: Inventory of Personal Data
    Forcepoint GDPR Product Mapping: Inventory of Personal Data
    Mike Smart - Forcepoint, Chris Jones - Forcepoint Recorded: Oct 13 2017 58 mins
    Learn why organizations must ensure they understand what personal data they hold and where it exists across the organization. In this session, we will discuss data-centric technologies like DLP and examine how they help organizations to find personal data and understand risk.
  • The Global Impact of GDPR
    The Global Impact of GDPR
    Eduardo Ustaran - Hogan Lovells, Neil Thacker - Forcepoint Recorded: Oct 12 2017 64 mins
    A discussion on the Global implications of GDPR, with Hogan Lovells

    Join Hogan Lovells' Privacy and Data Protection Lawyer, Eduardo Ustaran and Forcepoint Deputy CISO Neil Thacker for a live webcast, as they discuss the global implications of the General Data Protection Regulation (GDPR).

    Whilst awareness of the GDPR is increasing, the broader impact is still misunderstood: any Global organization that holds or processes EU resident data will be subject to the regulation.

    In this webcast, they will discuss:

    - Which key principles of the GDPR regulation widely affect organizations
    - How prepared global organizations are to meet the May 2018 deadline
    - The latest information and guidance from the Article 29 Data Protection Working Party
    - What can be learned from organizations who are at an advanced stage in their GDPR preparations
    - The positive return to the organization from undertaking a GDPR readiness program
  • GDPR: Countdown to Day 0
    GDPR: Countdown to Day 0
    Dr. Adrian Davis CISSP, (ISC)2; Moyn Uddin, Cyber Counsel; Jonathan Armstrong, Cordery; Neil Thacker, Forcepoint Recorded: Sep 27 2017 54 mins
    The EU General Data Protection Regulation (GDPR) will go into effect on 25th May, 2018, requiring Global organizations to significantly address how they process and protect the personal data of EU citizens.

    Hosted by The International Information System Security Certification Consortium, this webcast focused on our most up-to-date findings on the GDPR, as well as key requirements to comply with the regulation.

    Topics for discussion included obligations to:
    • Maintain a personal data inventory
    • Map Data flow vs. Data Transfer Agreements
    • Respond to incidents
    •​ Notify authorities of data breaches

    Dr. Adrian Davis CISSP, Managing Director, EMEA, (ISC)2

    Moyn Uddin, Chief Cyber Risk Officer, Cyber Counsel

    Jonathan P. Armstrong, Partner, Cordery

    Neil Thacker, Information Security & Strategy Officer, Forcepoint

Embed in website or blog