Hi [[ session.user.profile.firstName ]]

Forcepoint - Insider Threat Data Protection

  • Date
  • Rating
  • Views
  • Operationalizing a Practical Insider Threat Program
    Operationalizing a Practical Insider Threat Program Brandon Swafford Recorded: Jul 14 2017 30 mins
    When the phrase “insider threat” comes to mind, most automatically think of fraud, sabotage and theft; it’s natural to do so, as malicious insider threats make regular headlines.

    The truth is that 68% of all insider threats are attributed to accidental users, who unintentionally put their organizations at risk because of a user error or lack of training. Insiders are really anyone that works with sensitive data inside the network.

    In Operationalizing a Practical Insider Threat Program, we’ll review:

    -Requirements for building an insider threat program
    -An overview of the stakeholders and investigative best practices
    -Real world examples of an insider threat program in action

    FEATURED PRESENTER

    Brandon Swafford, CTO of Data & Insider Threat Security, Forcepoint

    Brandon Swafford has more than 12 years of experience in legal investigations and security, including hedge funds where he built security technology and the U.S. Intelligence Community as a Cyber Counterintelligence consultant and analyst. Within the intelligence community, Brandon covered several classified agencies and worked closely with the National Insider Threat Task Force and National Counterintelligence Executive. In addition, Brandon provided insider threat analysis and investigation consulting to the International Monetary Fund in Washington, D.C.
  • How CISO's Tackle Insider Threat Data Protection
    How CISO's Tackle Insider Threat Data Protection Doug Copley, Barry Caplin Recorded: Jun 14 2017 59 mins
    78% of employees pose critical threats to your security, says a study from the Ponemon Institute (1). Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day.

    According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best enable your teams to access the data they need while keeping it safe?

    Hear how a real-world CISO plans, implements and manages an insider threat program. Find out how you enable employees to use disruptive, transformative technology while keeping sensitive data safe. Gain practical insights into planning and implementing an Insider Threat program, including employee education and adoption and executive sponsorship.

    (1) “Privileged User Abuse & The Insider Threat,” Ponemon Institute 2014.
  • GDPR Compliance and its Impact on Security and Data Protection Programs
    GDPR Compliance and its Impact on Security and Data Protection Programs Mike Osterman, Mike Smart Recorded: Jun 14 2017 54 mins
    In 2018, the General Data Protection Regulation (GDPR) will require EU organizations to meet strict standards and processes to protect personal data. Non-compliance with the GDPR can cost you a fortune, but being in compliance can save you one. Recent estimates put business savings at about €2.3 billion annually.

    Join Mike Osterman (Osterman Research) and Mike Smart (Forcepoint Product & Solutions Director, EMEA) as they discuss how to become GDPR compliant by implementing organizational and technical solutions.
    This on-demand webcast will explore GDPR security responsibilities and obligations, including:

    -Data subject consent
    -Data discovery, cataloguing and classifying
    -Pseudonymization
    -Data breach identification and notification
    -Cloud storage and sharing services
  • GDPR- A Guidance Review Prior to Countdown
    GDPR- A Guidance Review Prior to Countdown Rosemary Jay, Neil Thacker Recorded: Jun 14 2017 69 mins
    As we enter into the final 12 months before the GDPR becomes applicable, take this opportunity to set urgency as to how your organisation must be prepared for the new regulation from experts in data protection and privacy law.

    Rosemary Jay, Senior Consultant Attorney from Hunton & Williams, provided guidance and outlook shared from supervisory authorities across the EU to the Article 29 Working Party. Additionally, Forcepoint Deputy CISO Neil Thacker discussed how organisations can use technology to help meet the requirements of the GDPR.

    This interactive webcast explored ways to:

    -Comply with offering individuals rights to access their personal data, respond to Subject Access Requests, and the Right to Erasure/be Forgotten

    -Explore organisational and technical controls that are considered adequate by the supervisory authorities

    -Demonstrate organisational accountability to: inventory, map, manage and control data flows and respond to data incidents
  • Nine Steps to Building Your Insider Threat Program Webcast
    Nine Steps to Building Your Insider Threat Program Webcast Bob Slocum Recorded: Jun 13 2017 62 mins
    78% of employees pose critical threats to your security, says a study from the Ponemon Institute. Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best enable your teams to access the data they need while keeping it safe?

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

Embed in website or blog