Hi [[ session.user.profile.firstName ]]

Legislation

  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Recorded: Oct 1 2019 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Recorded: Sep 30 2019 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • Digital Transformation Discussion with Forcepoint Connectivity and Security
    Digital Transformation Discussion with Forcepoint Connectivity and Security
    Jim Fulton, Forcepoint Solution Director & David LePage, Forcepoint Solution Engineering Manager Recorded: Aug 21 2019 64 mins
    Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed organizations are re-architecting their networks and security to move their most valuable data and applications to the cloud, in order to give their users much richer, faster, less expensive access than ever before. Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. 

    How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Many are now using internet technologies for connect all of their users to cloud-based applications more productively and cost-effectively than ever before.

    Included in this session:

    • How to accelerate the adoption of productivity-enhancing SaaS/cloud apps
    • How to overcome MPLS limitations including costs and issues with speed
    • How to quickly add security to direct-to-cloud SD-WAN deployment to keep intruders out and protect use of web content and cloud apps
    • How to streamline operations by integrating connectivity and security across thousands of sites in the cloud and on-premises from one console
    • Demonstrations of Forcepoint SD-WAN Connectivity, Securing Internet Access and Use, Operating at Scale to Drive Better Business Outcomes
  • 30 Ideas In 30 Minutes, Creative Ways To Foster an Emotionally Connected Culture
    30 Ideas In 30 Minutes, Creative Ways To Foster an Emotionally Connected Culture
    Tanya Fish - Strategy Advisor - ITA Group Inc. Recorded: Jul 30 2019 51 mins
    The workplace is quickly becoming society’s social hub and, for some, the only way to commune. But the quality of those interactions is often lacking, leading to an overwhelming epidemic of loneliness. This loneliness—and its detrimental side effects, including declining physical and psychological health—impacts employees, both at work and in their personal lives.

    Join us for a fast-paced exploration of how you can infuse opportunities for high-quality connection points throughout the employee experience. We’ll share insights about this alarming trend, discuss how it’s impacting the health and wellbeing of your workforce and—most importantly—share a variety of ideas that your organization can immediately implement.

    You’ll learn:
    • Why social relationships are crucial for maintaining strong physical and psychological wellbeing
    • How building meaningful connections among employees promotes workplace satisfaction and productivity
    • New ideas for facilitating meaningful team member interaction in a variety of workplace environments
    • Lessons learned from others who have successfully created highly-connected cultures
    • How to anticipate—and manage—c-suite objections to the added investment for these activities.
    • How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
  • New Research to Elevate and Transform Employee Engagement Efforts
    New Research to Elevate and Transform Employee Engagement Efforts
    Erica Carranza, Ph.D. VP of Consumer Psychology Chadwick Martin Bailey & Christina Zurek Insights & Strategy Leader ITA Recorded: Jul 11 2019 51 mins
    Enriching compensation packages is an effective but expensive way to engage individual employees, and as recent research has revealed, many of the most common employee wellness and engagement initiatives are not yielding their promised impact. What are these initiatives missing?

    Join us to learn more about the results of a landmark study that seeks to answer this question by uncovering what engagement initiatives must accomplish for employees—on a psychological level—to be effective.

    Using scientific insight into human motivation and advanced analytic techniques, we will share several key findings from our research, including:
    •How tapping in to five critical psychological benefits can provide a framework for true, sustainable engagement
    •Why wellness and other popular programs aren’t delivering on the promise of employee engagement—and where organizations must focus instead
    •How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
  • Using Risk Analysis to Enhance Compliance
    Using Risk Analysis to Enhance Compliance
    Andras Cser, Vice President and Principal Analyst, Forrester Recorded: Jan 30 2019 20 mins
    For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.

    In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:

    - How your auditors are behaving
    - Why risk-based prioritization is the only way to find threats
    - The importance of context
    - Forrester’s recommendations and best practices

    Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Jan 22 2019 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Doug Landoll, CEO, Lantego Recorded: Jan 16 2019 35 mins
    Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.

    In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:

    - How to define cybersecurity success
    - Common approaches that fall short
    - Risk-based cybersecurity strategy planning

    Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
  • Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Phil Hochmuth, Program Director, Enterprise Mobility at IDC Recorded: Jan 14 2019 41 mins
    Lookout invited a special guest, Phil Hochmuth, Program Director, Enterprise Mobility at IDC to talk about the rising implications of employees accessing business data and apps with smartphones.

    On the agenda:

    - The latest research in enterprise mobility adoption

    - Security and the top challenges sourced by IDC

    - How mobile threat management fits into an enterprise endpoint security architecture
  • Comparing CASB Solutions from Microsoft and Forcepoint
    Comparing CASB Solutions from Microsoft and Forcepoint
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 46 mins
    CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.

    In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:

    - Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
    - Provide a detailed analysis of how both products compare over 13 key feature areas
    - Consider coverage of third-party apps beyond Office 365

    Attend this session to explore the best route to full Office 365 security.
  • The State of the CASB Market
    The State of the CASB Market
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 38 mins
    CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.

    In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:

    -Key cloud adoption concerns
    -Most valued CASB features
    -Levels of confidence in controlling data and maintaining compliance

    Attend this session to learn more about the need for and use of CASBs in today’s organizations.
  • Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions
    Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions
    Raffael Marty, VP of Research & Intelligence and colleagues Recorded: Nov 20 2018 7 mins
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely. This intersection of people interacting with data and technology will also drive cyber risk to all-time highs, according to new insights from Forcepoint researchers and data scientists.

    Watch this video as our Cyber Experts discuss their contributions to the 2019 Forcepoint Cybersecurity Predictions Report, including:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale
  • Answers to the World’s Scariest Employment Law Questions
    Answers to the World’s Scariest Employment Law Questions
    Mark Toth, Chief Legal Officer of ManpowerGroup™ North America, and Neil Alexander, of Littler Mendelson. Recorded: Oct 31 2018 62 mins
    Join ManpowerGroup for a complimentary webinar designed to reduce your employment law nightmares.
    In this engaging and interactive webinar, Mark Toth of ManpowerGroup and guest Neil Alexander of Littler Mendelson will answer the world’s most terrifying employment law questions. Mark and Neil will not only address the questions that keep you awake at night but also ensure that you get all the latest employment law news on everything from hiring to firing and beyond.

    After this fast-paced hour, you’ll walk away with:
    -Answers to difficult legal questions
    -Up-to-the-minute information on the latest employment law developments
    -Tips and tools on everything from hiring to firing
    -Practical solutions based on real-life examples

    Your host is Mark Toth, Chief Legal Officer of ManpowerGroup™ North America, a former partner in a major employment law firm, and widely known for his ability to present legal and HR issues in a uniquely entertaining style.

    Special guest Neil Alexander, of Littler Mendelson, has represented companies in employment disputes all across the U.S. for the last 25 years. Neil’s practice focus includes unfair competition disputes, whistle blower and retaliation claims, ADA and FMLA disputes, wrongful termination claims and allegations of harassment or discrimination.

    ManpowerGroup is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRMSCPSM. This program is valid for 1 PDC for the SHRM-CPSM or SHRM-SCPSM. For more information about certification or recertification, please visit www.shrmcertification.org

    This webinar is approved for 1 HRCI credit. The use of the HRCI seal confirms that this activity has met HR Certification Institute’s® (HRCI®) criteria for recertification credit pre-approval.
  • The Evolution of Mobile Threat Actors
    The Evolution of Mobile Threat Actors
    Michael Flossman, Head of Threat Intelligence, Lookout Recorded: Jul 19 2018 37 mins
    Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

    Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
  • Mobile Phishing, the biggest unsolved problem in cybersecurity
    Mobile Phishing, the biggest unsolved problem in cybersecurity
    Lookout Recorded: Jun 13 2018 1 min
    It only takes one errant tap to compromise a mobile device. This short video clip highlights the threats and how inconspicuous a phishing attack on a mobile device can be. You will also be able to download our latest whitepaper to understand mobile phishing facts that will help you make informed decisions on how to protect corporate data.
  • GDPR compliance on mobile devices, how secure is your organization?
    GDPR compliance on mobile devices, how secure is your organization?
    Aaron Cockerill, Chief Strategy Officer, Lookout Recorded: May 29 2018 50 mins
    Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.

    On the agenda:
    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    Did you know?

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
  • Subject Access Rights: GDPR Implementation Guide
    Subject Access Rights: GDPR Implementation Guide
    Brian Philbrook, Privacy Counsel at OneTrust | Dr Andreas Splittgerber, Partner, Reed Smith Recorded: May 23 2018 66 mins
    The GDPR grants data subjects new rights including: data portability, access to their data, erasure or “the right to be forgotten”, and rectification. For data controllers, there are specific record-keeping requirements around the time to respond, the ability to request an extension, the requirement to validate the identity, and securely transmitting the response to the individual.

    Join us for this educational web conference to hear about the new rights of data subjects and how organizations can use privacy management software to streamline and automate requests, validation, and notification processes.

    About the presenters:

    Brian Philbrook serves as Privacy Counsel at OneTrust where he provides guidance on global privacy regulations to assist compliance efforts and drive product innovation. Philbrook also conducts training and workshops on the GDPR and contributes to various publications and web-conferences on a regular basis. Prior to OneTrust, Philbrook served on the Privacy Team for RxAnte, a leading predictive analytics and clinical services company committed to improving medication use. He also worked as an extern on the IAPP’s training and publications teams. Philbrook earned his JD from the University of Maine School of Law, where he was the first recipient of the Certificate in Information Privacy Law.

    Dr Andreas Splittgerber is a partner in the Munich office of Reed Smith and member of the IP, Tech & Data Group.

    Andreas specialises in IT law, data protection/privacy, social media law and internet law (Germany and EU). He is passionate about technology and privacy and thought-leader when it comes to legally evaluating new technologies (e.g. internet of things, artificial intelligence).
  • What are the full spectrum of mobile risks in 2018?
    What are the full spectrum of mobile risks in 2018?
    Burak Agca - System Engineer Recorded: Feb 28 2018 35 mins
    Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.

    With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.

    Register to today's webinar to learn about:
    - The threat landscape
    - The evolution of mobile threats
    - How does that impact your organization?
    - How other organizations are doing?
    - The impact of a breach post GDPR
    - How to protect your enterprise data?

    Live Q&A session at the end.
  • The Evolving Mobile Threat Landscape
    The Evolving Mobile Threat Landscape
    Mike Murray, VP of Security Intelligence at Lookout Recorded: Feb 22 2018 18 mins
    For nearly two decades, Mike has focused on high-end security research, first as a researcher and penetration tester and then building and leading teams of highly skilled security professionals. He previously led Product Development Security at GE Healthcare, where he built a global team to secure the Healthcare Internet of Things. Prior to that, he co-founded The Hacker Academy and MAD Security, and has held leadership positions at companies including nCircle Network Security, Liberty Mutual Insurance and Neohapsis.
  • Spectrum of Mobile Risk
    Spectrum of Mobile Risk
    Lookout Recorded: Feb 7 2018 3 mins
    Short advertorial showing the potential risks and consequences of a company's mobile phone being hacked.
  • Threat intelligence briefing: Advanced Persistent Threat targeting mobile device
    Threat intelligence briefing: Advanced Persistent Threat targeting mobile device
    Michael Murray - VP of Research and Response, Lookout Recorded: Jan 26 2018 32 mins
    Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal, a campaign attributed to the cyber-warfare arm of the Lebanese General Security Directorate.

    This actor is prolific and has engaged in widespread APT-style attack campaigns around the world — with mobile devices as the primary target.

    This joint research effort has obtained hundreds of gigabytes of exfiltrated data across thousands of victims in over 21 countries. Stolen data include enterprise intellectual property and personally-identifiable information.

    Register to the webinar to find out:

    - the latest details about Dark Caracal, the first globally-active mobile APT
    - whether your organisation has been impacted
    - the steps you should take to protect data on mobile devices.

    Speakers
    Michael Flossman Security Researcher, Lookout
    Eva Galperin Eva Galperin Director of Cybersecurity, EFF
  • Finding risks to GDPR compliance in a mobile-first world
    Finding risks to GDPR compliance in a mobile-first world
    Aaron Cockerill, Chief Strategy Officer, Lookout Recorded: Dec 20 2017 50 mins
    Many organizations are now racing against the May 25, 2018 GDPR enforcement deadline to extend security controls to personal data in their control. The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    In today's webinar Aaron and Kabir will cover:

    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    OUR SPEAKERS
    Kabir Barday, CEO, OneTrust
    Aaron Cockerill, Chief Strategy Officer, Lookout


    INTERESTING FACTS:

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, and employee data while on their mobile device.
  • CISO Top Security Priorities: Why Visibility Into Mobile Risk Is Critical
    CISO Top Security Priorities: Why Visibility Into Mobile Risk Is Critical
    Aaron Cockerill - Chief Strategy Officer, Lookout Recorded: Dec 18 2017 29 mins
    According to a recent survey, 75% of today’s security professionals believe their organizations need to increase visibility into mobile risks.

    With a spectrum of issues facing the mobile enterprise – including targeted attacks, disruptive malware, and noncompliant data-leaking apps – it is critical to understand the full range of threats and vulnerabilities, especially as organizations begin to prepare for GDPR compliance.

    Watch the webinar to:

    - Get visibility into the full spectrum of mobile risk and the latest security intelligence

    - Dive into IDG’s “Security Priorities 2017” latest research to hear about what is at the top of the CISOs agenda

    - Hear real-world scenarios about what organizations are doing today to secure their mobile devices

    - Learn how to protect personal data on mobile to prepare for GDPR compliance in May 2018


    SPEAKERS
    Bob Bragdon - SVP & Publisher, IDG/CSOonline.com
    Aaron Cockerill - Chief Strategy Officer, Lookout
  • 2018 Security Predictions
    2018 Security Predictions
    Bob Hansmann, Director, Security Technologies, Forcepoint Recorded: Nov 30 2017 53 mins
    New security challenges in 2018

    Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

    Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

    You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
  • The Total Economic Impact of Forcepoint Web Security And Email Security Cloud
    The Total Economic Impact of Forcepoint Web Security And Email Security Cloud
    Bob Hansmann, Director, Security Technologies, Forcepoint & Jon Erickson, VP, TEI, Forrester Recorded: Sep 26 2017 25 mins
    Today’s technology decisions require “next-level” business case justification. Forrester’s Total Economic Impact™ framework identifies all factors that affect a significant technology investment decision. For this commissioned study, Forrester Consulting recently examined inputs from a Forcepoint Web Security Cloud and Email Security Cloud client to determine the benefits, costs, flexibility and risks. The results are notable.

    This webcast outlines a three-year impact, including:
    • 122% ROI
    • $895,000 benefits
    • $492,000 NPV
    • 6 month payback

    Join this webcast to understand the framework and how Forcepoint delivers value.
There are currently no upcoming webinars or videos.