Hi [[ session.user.profile.firstName ]]

Legislation

  • Exploring SASE and the Future of Network Security
    Exploring SASE and the Future of Network Security
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint Recorded: May 27 2020 32 mins
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout Recorded: May 26 2020 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout Recorded: May 26 2020 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Implementing Zero-Trust in the Enterprise
    Implementing Zero-Trust in the Enterprise
    Nico Popp, Chief Product Officer, Forcepoint and guest speaker, Dr Chase Cunningham, VP, Principal Analyst, Forrester Recorded: May 13 2020 32 mins
    Perimeter security is no longer sufficient. The cloud adds complexity, fluidity, and nuance to network security. A zero-trust network helps keep your people and data safe by treating all networks as untrusted.

    Join us as Dr. Cunningham, Principal Analyst at Forrester, and Nico Popp, Forcepoint’s Chief Product Officer, discuss the disconnect between security, operations and business and offer insights on how to build and implement a zero-trust strategy.

    Attend this session and you’ll discover:

    • An actionable blueprint for adopting Zero Trust during the process of digital transformation
    • Use cases that highlight the importance of Zero Trust
    • How to implement Zero-Trust in enterprise environments
  • How Working from Home has changed Cybersecurity with CEO Matt Moynahan
    How Working from Home has changed Cybersecurity with CEO Matt Moynahan
    Matt Moynahan, CEO, Forcepoint | Eric Trexler, VP Sales - Global Government, Forcepoint | Arika Pierce, Co-host Recorded: May 7 2020 18 mins
    Forcepoint CEO Matt Moynahan, discusses how the Cybersecurity landscape has changed with the emergency work from home directives many companies are currently following.
  • Voice of the CTO: The Future of Cloud Security
    Voice of the CTO: The Future of Cloud Security
    Nicolas Fischbach, Global CTO, Forcepoint Recorded: May 6 2020 32 mins
    Gartner estimates that the worldwide public cloud services market will grow 17% in 2020, to total $266.4 billion. What does the increasingly crowded and mature market mean for cloud security? Join us as Forcepoint’s CTO Nico Fischbach discusses the changing face of cloud security, data protection, and behaviour analytics.

    You’ll leave this webinar with:
    • A comprehensive understanding of the evolution of the enterprise perimeter & how it impacts business risk
    • The basic principles for using the cloud to protect cloud access
    • An understanding of the growing role of SASE in cloud transformation
    • Information on how converged security works to protect the evolving enterprise architecture
  • Exploring SASE and the Future of Network Security
    Exploring SASE and the Future of Network Security
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint Recorded: Apr 29 2020 32 mins
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • Voice of the CTO: The Future of Cloud Security
    Voice of the CTO: The Future of Cloud Security
    Nicolas Fischbach, Global CTO, Forcepoint Recorded: Apr 29 2020 32 mins
    While digital transformation delivers many benefits to organisations and users, it also introduces various challenges - such as a proliferation of unique applications to manage and monitor.

    Forcepoint CTO Nico Fischbach shares the shape of things to come within the technological landscape:

    - A rational approach to the tech stack
    - Converged security that does more thanks to behaviour-based algorithms
    - The growing role of SASE in cloud transformation
  • Keeping Remote Workers Safe and Your Work Secure
    Keeping Remote Workers Safe and Your Work Secure
    Carl Leonard, Principal Security Analyst, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint Recorded: Apr 23 2020 35 mins
    Organizations are pivoting to remote work enablement models at an unprecedented scale. As global organizations navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority.

    Join security strategists Carl Leonard and Mike Smart as they share six security tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes remote. Discussion will include;

    - Securing your employee from malicious web content
    - Securing your sensitive data from leaving your organization
    - Securing your Cloud application and the sensitive data on the cloud
    - Securing your application from remote access
  • Best Practices for Providing Remote Access to Internal Apps and Networks
    Best Practices for Providing Remote Access to Internal Apps and Networks
    Jim Fulton, Solution Marketing Director & Klaus Majewski, Director, Technology Recorded: Apr 22 2020 45 mins
    One of the best ways to empower your remote workforce is to provide them with the freedom and flexibility to get their work done efficiently, and with minimal risk. Did you know your Forcepoint NGFW can give your remote team access to internal web applications via their browser—without any expensive software or complex licenses? Or that your admins can manage your internal network for free, using Forcepoint VPN?

    In this webinar, you’ll learn how to make the most out of your NGFW while your team works remotely. We’ll show you:

    - Two different ways to set up application access for users and network access for admins
    - Things to keep in mind as you set up the Forcepoint Next Gen Firewall (NGFW) VPN capabilities
    - Forcepoint resources available to admins to help secure your remote workforce
  • Humans are the New Perimeter: Rethinking Edge Protection
    Humans are the New Perimeter: Rethinking Edge Protection
    Jim Fulton, Solution Director, Forcepoint Recorded: Apr 8 2020 16 mins
    With data and applications moving beyond the traditional enterprise edge into the cloud, your people are now your perimeter—breaking old approaches to security along the way.

    Learn how SASE security delivered from the cloud is changing how your people and your business, safe while reducing complexity and costs.
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Doug Landoll, CEO, Lantego Recorded: Apr 1 2020 33 mins
    Effective governance requires a proactive approach. So when creating a cybersecurity strategy, it’s best to address the primary issue–risk–head on.



    Watch this webcast to learn:

    - How to define cybersecurity success

    - Steps you can take now to help avoid compliance issues later

    - Common approaches that fall short
  • COVID-19: Everything Employers Need to Know and Do Right Now
    COVID-19: Everything Employers Need to Know and Do Right Now
    Mark Toth, Chief Legal & Public Affairs Officer, ManpowerGroup North America Recorded: Apr 1 2020 61 mins
    COVID-19’s impacts are being felt across the globe and in nearly every aspect of life. Employers and employees are feeling the effects of the pandemic in new and uncertain ways that could change the way we do business forever. If you have questions about how all the new (and even the old) laws apply in this strange new world of work, you won’t want to miss this important presentation by ManpowerGroup North America Chief Legal & Public Affairs Officer Mark Toth.

    ManpowerGroup is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRMSCPSM. This program is valid for 1 PDC for the SHRM-CPSM or SHRM-SCPSM. For more information about certification or recertification, please visit www.shrmcertification.org
  • ESG: Take the safer road: best practices in SaaS Application Security
    ESG: Take the safer road: best practices in SaaS Application Security
    Doug Cahill, Senior Analyst, Cybersecurity, ESG Recorded: Mar 25 2020 38 mins
    In today’s environment of shared-responsibility security, you can’t–and shouldn’t–rely solely on the built-in security features of your many SaaS apps. By implementing certain standards, you can bolster security across your cloud environment.



    Watch this webcast to gain more insights into:

    - Challenges related to securing cloud apps

    - The shadow IT reality

    - CASB-specific best practices for cloud app security
  • Keeping Remote Workers Safe and Your Work Secure
    Keeping Remote Workers Safe and Your Work Secure
    Carl Leonard, Principal Security Analyst, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint Recorded: Mar 25 2020 35 mins
    Organizations are pivoting to remote work enablement models at an unprecedented scale. As global organizations navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority.

    Join security strategists Carl Leonard and Mike Smart as they share six security tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes remote. Discussion will include;

    - Securing your employee from malicious web content
    - Securing your sensitive data from leaving your organization
    - Securing your Cloud application and the sensitive data on the cloud
    - Securing your application from remote access
  • Security Tips for Employees Who Work from Home (Cantonese)
    Security Tips for Employees Who Work from Home (Cantonese)
    William Tam, Director of Sales Engineering, APAC Recorded: Mar 12 2020 24 mins
    The coronavirus is disrupting our way of life in Hong Kong. Despite of this, the cogs in your business are still turning and both business and life need to keep moving forward.

    Here at Forcepoint, we recognize the fear and concerns of your employees who are trying to balance between delivering quality of work while maintaining health through minimizing human interaction.

    To enable your employees to work from home without compromising the security of your company's assets, Forcepoint would like to share a few common cybersecurity challenges and tips in this webcast:

    •Securing your employee from malicious web content
    •Securing your sensitive data from leaving your organization
    •Securing your Cloud application and the sensitive data on the cloud
    •Securing your application from remote access

    The webcast will be presented in Cantonese.
  • Protect against phishing threats in a post-perimeter world
    Protect against phishing threats in a post-perimeter world
    Aaron Cockerill, Chief Strategy Officer, Lookout Recorded: Feb 3 2020 51 mins
    As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:

    - The latest tactics attackers are using to exfiltrate enterprise data
    - Why phishing is more problematic and successful on mobile
    - How to identify if an employee device has been phished
    - How to remain compliant by reducing cyber risk from mobile endpoints
  • Protect against phishing threats in a post-perimeter world
    Protect against phishing threats in a post-perimeter world
    Aaron Cockerill, Chief Strategy Officer, Lookout Recorded: Jan 27 2020 51 mins
    As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:

    - The latest tactics attackers are using to exfiltrate enterprise data
    - Why phishing is more problematic and successful on mobile
    - How to identify if an employee device has been phished
    - How to remain compliant by reducing cyber risk from mobile endpoints
  • Protecting the Edge with Forcepoint
    Protecting the Edge with Forcepoint
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint Recorded: Jan 16 2020 9 mins
    The traditional security perimeter is no longer! Organisations are adopting cloud services and mobile working and looking for better ways to protect their distributed office environments.

    Join security evangelist, Chris Boorman, and Director of Product Marketing Mike Smart as they look at the new world of Edge protection and how Forcepoint combines networking and security services to offer flexible protection for users and data everywhere.
  • The Changing Perimeter
    The Changing Perimeter
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint Recorded: Jan 14 2020 10 mins
    The traditional security perimeter to the organisation has shifted considerably having come under stress from digital transformation projects. Business information is increasingly living within hybrid cloud environments and users require access to this data everywhere in order to remain productive.

    In this video webinar, security evangelist Chris Boorman and Director of Product Marketing Mike Smart, look at the new world of Edge protection. They analyse how and why networking and security services are combining to offer more flexible protection for users and data everywhere.
  • Mobile Phishing – Myths and facts facing every modern enterprise
    Mobile Phishing – Myths and facts facing every modern enterprise
    Marielle Hagblad, Lookout Mobile Security Engineer Recorded: Jan 9 2020 38 mins
    Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is because phishing is both different and more problematic on the mobile device.

    As a result, mobile users are three times more likely to fall for phishing scams.

    In this webinar, our security expert Marielle Hagblad will shed a light on the risks of mobile phishing and the facts that will help you make informed decisions to protect corporate data.

    Myths or Facts?
    - Existing phishing protection covers mobile devices.
    - Phishing attacks only occur on email.

    Join this webinar to find out.
  • Protecting Data Everywhere
    Protecting Data Everywhere
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Dave Barnett, Head of CASB, EMEA, Forcepoint Recorded: Jan 9 2020 8 mins
    One of the biggest challenges faced by organisations as users and data move rapidly between on-premise and cloud environments is maintaining effective data protection control.

    In this video webinar, security evangelist Chris Boorman and Head of CASB, Dave Barnett, look at the powerful combination that an integrated web gateway, CASB and Data Loss Prevention solution offers businesses seeking to protect data everywhere without damaging the user experience.
  • Top 5 Cloud Security Risks
    Top 5 Cloud Security Risks
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Dave Barnett, Head of CASB, EMEA, Forcepoint Recorded: Jan 7 2020 14 mins
    There’s a lot of hype and hope surrounding cloud service adoption in business.

    The hype isn’t unwarranted, as the benefits of cloud computing are well documented. But, with the hype comes a certain amount of hope and expectation—that can be easily frustrated if the risks to users and data aren’t dealt with from the outset of the programme.

    In this video webinar, security evangelist Chris Boorman and Head of CASB, Dave Barnett, share the cloud security trends they are seeing and call out the top five risks to security as businesses move into the cloud.
  • 2020 Cybersecurity Predictions
    2020 Cybersecurity Predictions
    Raffael Marty, Head of Forcepoint X-Labs & Carl Leonard, Principal Security Analyst, Forcepoint Recorded: Dec 12 2019 50 mins
    Join Forcepoint’s Head of X-Labs, Raffael Marty, and Principal Security Analyst, Carl Leonard, as they discuss our top 5 Cybersecurity Predictions for 2020. In this webinar they will discuss:

    - The evolution of Deepfake media applied to cybersecurity
    - Data theft at the speed of 5G
    - What it means to be “Cloud Smart” but remain “Cloud Dumb”
    - Making data protection and privacy legislation work for you
    - Moving ‘left of breach’: from indicators of compromise to indicators of behaviour

    Watch this webinar and gain valuable insights for the year ahead.
  • Secure Cloud in a Direct-to-Cloud World
    Secure Cloud in a Direct-to-Cloud World
    Ankur Chadda, Sen. Product Marketing Manager, Forcepoint Recorded: Dec 11 2019 32 mins
    Now that direct-to-cloud connectivity is a reality, cloud applications have become a mainstay for organizations. Still, security is seen as the biggest concern when organizations consider cloud services. The key question is: how do you make sure you have a consistent security strategy across all your cloud services that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable?

    Join this session to learn how you can gain deep visibility and control on critical data stored and accessed on-premises or in the cloud to enable your cloud security strategy.
  • Phishing Threats in a Mobile-Enabled World
    Phishing Threats in a Mobile-Enabled World
    Chris Hazelton, Director Security Solutions, Lookout Jun 2 2020 12:00 am UTC 37 mins
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • Phishing Threats in a Mobile-Enabled World
    Phishing Threats in a Mobile-Enabled World
    Chris Hazelton, Director Security Solutions, Lookout Jun 2 2020 9:00 am UTC 37 mins
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • The Current and Future State of Cybersecurity
    The Current and Future State of Cybersecurity
    Elizabeth Nann, Exec Dir. of Global Consumer Insights WSJ Intelligence & Carl Leonard, Principal Security Analyst, Forcepoint Jun 3 2020 4:00 pm UTC 30 mins
    The stark reality is that attackers today have a +90% success rate. It’s not a matter of “if” but “when” they will breach your network. There has never been a greater opportunity or impetus to get cybersecurity right than this moment in time. Your business literally depends on it. But how do you navigate the path forward when there are growing disparities today between CEOs and CISOs on the most effective cybersecurity path forward?

    Join Elizabeth Nann, Executive Director of Consumer Insights for Wall Street Journal and Carl Leonard, Principal Security Analyst at Forcepoint for an insightful discussion on key findings from the report and implications for both the industry and your business today.

    Highlights of the discussion will include;

    - Overcoming a lack of common vocabulary between CEOs and CISOs in communicating cyber risks and business impacts
    - Navigating disparities in CEOs proactive approach and CISOs reactive approach to cybersecurity
    - And, why, despite claiming vendor fatigue, CISOs use more than 50 security vendors on average today and more than 62% report they want even more
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Jun 9 2020 12:00 am UTC 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Jun 9 2020 9:00 am UTC 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Extend Data Protection to the Cloud with CASB & Office365
    Extend Data Protection to the Cloud with CASB & Office365
    Eran Amir, Consulting Sales Engineer, EMEA Jun 10 2020 4:00 pm UTC 22 mins
    Nearly half of all corporate data is stored in the cloud. As employees utilize cloud apps for convenience or to improve productivity, more data flows to the cloud via unsanctioned apps and personal devices.

    Your cybersecurity strategy should address the sprawl of Shadow IT and its risk to users & data. In this webinar, we’ll outline the importance of data protection in the cloud, specifically for Office 365 apps. Here are some things you’ll learn:


    •The three pillars of data protection
    •How to protect data accessed from endpoints and personal devices
    •How Forcepoint can help secure O365
    •The 5 main cloud risk problems
    •Common use cases for Forcepoint CASB