Hi [[ session.user.profile.firstName ]]

Legislation

  • 2020 Cybersecurity Predictions
    2020 Cybersecurity Predictions
    Raffael Marty, Head of Forcepoint X-Labs & Carl Leonard, Principal Security Analyst, Forcepoint Recorded: Dec 12 2019 50 mins
    Join Forcepoint’s Head of X-Labs, Raffael Marty, and Principal Security Analyst, Carl Leonard, as they discuss our top 5 Cybersecurity Predictions for 2020. In this webinar they will discuss:

    - The evolution of Deepfake media applied to cybersecurity
    - Data theft at the speed of 5G
    - What it means to be “Cloud Smart” but remain “Cloud Dumb”
    - Making data protection and privacy legislation work for you
    - Moving ‘left of breach’: from indicators of compromise to indicators of behaviour

    Watch this webinar and gain valuable insights for the year ahead.
  • Secure Cloud in a Direct-to-Cloud World
    Secure Cloud in a Direct-to-Cloud World
    Ankur Chadda, Sen. Product Marketing Manager, Forcepoint Recorded: Dec 11 2019 32 mins
    Now that direct-to-cloud connectivity is a reality, cloud applications have become a mainstay for organizations. Still, security is seen as the biggest concern when organizations consider cloud services. The key question is: how do you make sure you have a consistent security strategy across all your cloud services that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable?

    Join this session to learn how you can gain deep visibility and control on critical data stored and accessed on-premises or in the cloud to enable your cloud security strategy.
  • EMEA: 2020 Cybersecurity Predictions
    EMEA: 2020 Cybersecurity Predictions
    Raffael Marty, Head of Forcepoint X-Labs & Carl Leonard, Principal Security Analyst, Forcepoint Recorded: Dec 3 2019 50 mins
    Join Forcepoint’s Head of X-Labs, Raffael Marty, and Principal Security Analyst, Carl Leonard, as they discuss our top 5 Cybersecurity Predictions for 2020. In this webinar they will discuss:

    - The evolution of Deepfake media applied to cybersecurity
    - Data theft at the speed of 5G
    - What it means to be “Cloud Smart” but remain “Cloud Dumb”
    - Making data protection and privacy legislation work for you
    - Moving ‘left of breach’: from indicators of compromise to indicators of behaviour

    Watch this webinar and gain valuable insights for the year ahead.
  • Believe there are no threats from mobile endpoints?
    Believe there are no threats from mobile endpoints?
    Jeroen Wijdogen, Enterprise Security Sales Engineer Recorded: Nov 28 2019 27 mins
    Employees work differently now, accessing enterprise data from mobile devices in airports, on public transport and the local coffee shop. Cyber opportunists have taken note, focusing attacks on iOS and Android devices via phishing, apps, device, and network.

    According to the Verizon Mobile Security Index 2019, “33% of companies admitted to having suffered a compromise involving a mobile device and the majority of those affected said that the impact was major.”

    It’s not that the threats aren’t there, it’s that most organisations don’t have visibility into them.

    Watch this webinar to learn:

    - What mobile threats your organisation needs to protect against
    - Why your security strategy needs to adapt to the mobile world
    - How to reduce the risk of a data breach from mobile endpoints with Lookout
  • Protect Your Hybrid IT Environment with Direct-To-Cloud Connectivity & Security
    Protect Your Hybrid IT Environment with Direct-To-Cloud Connectivity & Security
    Robert Lesieur – Solutions Marketing, Forcepoint & Colette Tomasiak – Senior Product Marketing Manager, Forcepoint Recorded: Nov 27 2019 18 mins
    Distributed organizations in industries like retail, banking, healthcare and insurance will move to public cloud for their productivity apps. But research says their back-office applications will likely remain on private cloud or traditional infrastructure. This hybrid world creates complexity in solving the singular goal of protecting users and data, wherever they are.

    Join us to explore the capabilities available today in Forcepoint Web Security and the role it can play in simplifying and securing your hybrid IT environment.

    Key takeaways from this webinar include:
    • Understand the implications of modern IT on security.
    • Discover how a change in approach can make security easier and cheaper.
    • Solve more of the hybrid IT security puzzle without spending another dime.
  • Managing Risk During Digital Transformation
    Managing Risk During Digital Transformation
    Duncan Brown, Chief Security Strategist, Forcepoint & Venkat Ramakrishnan, Director, Harman Connected Services Recorded: Nov 13 2019 25 mins
    In this webinar, Duncan Brown talks ‘digital transformation brass tacks’ with Venkatachalam Ramakrishnan.

    Drawing upon Venkat's vast experience in managing digital transformation programs for several multi-national organizations, they discuss:

    - the impact of data growth
    - common factors that have compromised success
    - best practice advice
  • Managing Your Business Digital Transformation & Related Cyber Risk in Australia
    Managing Your Business Digital Transformation & Related Cyber Risk in Australia
    Alvin Rodrigues, Snr Director, Security Strategist, Forcepoint & Kenny Yeo, Head of APAC Cyber Security, Frost & Sullivan Recorded: Nov 7 2019 48 mins
    Digital transformation promises enormous benefits for organisations, such as increased productivity, faster market growth, higher profitability, greater collaboration, and more.

    However, according to the latest Frost and Sullivan study commissioned by Forcepoint, organisations who do not incorporate “security-by-design” right at the beginning of their business digital transformation projects struggle to realise these benefits. How has your organisation’s digital transformation been impacted by heightened cyberattacks and quickly evolving regulatory compliances?

    In this webinar, we will:
    - Share the study findings and insights specific to Australia
    - Discuss strategies at an executive level to manage digital transformation cybersecurity risks
  • Accelerating Digital Transformation with Direct-to-Cloud Connectivity & Security
    Accelerating Digital Transformation with Direct-to-Cloud Connectivity & Security
    Jim Fulton, Forcepoint Solution Marketing Director Recorded: Nov 6 2019 35 mins
    Digital transformation is driving change across the world, creating new opportunities to boost business productivity while cutting the costs of infrastructure and operations. Increasingly distributed organizations are re-architecting their networks and security to move their most valuable data and applications to the cloud in order to give their users much richer, faster, less expensive access than ever before. Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. 
      
    How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Many are now using internet technologies for connect all of their users to cloud-based applications more productively and cost-effectively than ever before.


    In this session we will cover;
    • How to accelerate the adoption of productivity-enhancing SaaS/cloud apps
    • How to overcome MPLS limitations including costs and issues with speed
    • How to quickly add security to direct-to-cloud SD-WAN deployment to keep intruders out and protect use of web content and cloud apps
    • How to streamline operations by integrating connectivity and security across thousands of sites in the cloud and on-premises from one console
  • Talking Risk with The Lost CISO
    Talking Risk with The Lost CISO
    Duncan Brown, Chief Security Strategist, Forcepoint & Thom Langford, CISO Recorded: Nov 6 2019 27 mins
    Forcepoint's Chief Security Strategist, Duncan Brown is joined by guest Thom Langford, who describes himself as a recovering CISO having worked in many global organizations.

    In this webinar, Thom shares his wealth of experience in dealing with risk, including:

    - Understanding the biases the stop us from accurately perceiving risk
    - How should you communicate risk in a way the business understands?
    - Dealing with "Black Swans" - unexpected incidents that are obvious in hindsight
  • Answers to the World’s Scariest Employment Law Questions
    Answers to the World’s Scariest Employment Law Questions
    Mark Toth, Chief Legal Officer, ManpowerGroup North America Recorded: Oct 31 2019 60 mins
    Join ManpowerGroup for a complimentary webinar designed to reduce your employment law nightmares.

    In this engaging and interactive webinar, Mark Toth of ManpowerGroup will answer the world’s most terrifying employment law questions. Mark will not only address the questions that keep you awake at night but also ensure that you get all the latest employment law news on everything from hiring to firing and beyond.

    After this fast-paced hour, you’ll walk away with:

    -Answers to difficult legal questions
    -Up-to-the-minute information on the latest employment law developments
    -Tips and tools on everything from hiring to firing
    -Practical solutions based on real-life examples

    Your host Mark Toth is a recognized expert in the ever-changing world of work. He has been interviewed as a workplace expert by The Wall Street Journal, Newsweek, Business Week, 60 Minutes, The National Law Journal and many others. Mark has been the highest-rated speaker at several conferences and was named one of the ten most intriguing people in the staffing industry by Staffing Review Magazine and one of the top 100 most influential people in staffing by Staffing Industry Analysts. He is a past Chair and current board member of the American Staffing Association and serves on the board of the World Employment Confederation. He is also a Certified Senior Professional in Human Resources, as well as a Certified Staffing Professional and a member of the American and Wisconsin Bar Associations.

    ManpowerGroup is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRMSCPSM. This program is valid for 1 PDC for the SHRM-CPSM or SHRM-SCPSM. For more information about certification or recertification, please visit www.shrmcertification.org
  • 5 Challenges to Securing Remote Offices
    5 Challenges to Securing Remote Offices
    Rob Lesieur, Director Prd. Marketing, Alvin Rodrigues, Snr. Security Strategist & Robert Mechler, Security Strategist Recorded: Oct 30 2019 39 mins
    Organizations are executing a digital transformation strategy that promises greater productivity, lower costs, reduced risk and streamlined compliance. There are key security considerations that must be addressed to ensure success in achieving these outcomes. In this webinar, security strategists will discuss:

    - Oversharing sensitive files in the public cloud
    - Keeping the bad actors away in a complex IT environment
    - Hub+spoke network performance problems
    - SaaS App Usage Consistency & Investment Protection
    - Protection for roaming users
  • Digital Transformation Through the lens of the CRO
    Digital Transformation Through the lens of the CRO
    Duncan Brown, Chief Security Strategist, Forcepoint & Michelle Griffey, Chief Risk Officer, Communisis Recorded: Oct 23 2019 26 mins
    Implementing a successful digital transformation strategy is a challenge for many business leaders; not least the Chief Risk Officer (CRO). How do they support the organization in embracing the cloud without exposing themselves to unacceptable risk... whilst avoiding becoming the department of ‘NO’?

    In this session, Forcepoint’s Chief Security Strategist Duncan Brown, is joined by guest CRO, Michelle Griffey from Communisis. They discuss her experiences and recommendations in positively enabling her organization to embrace the cloud.
  • Four Myths around Cloud Adoption
    Four Myths around Cloud Adoption
    Duncan Brown, Chief Security Strategist, Forcepoint & Adam Louca, Chief Security Technologist, Softcat Recorded: Oct 16 2019 49 mins
    In this session, Forcepoint’s Chief Security Strategist, Duncan Brown is joined by Softcat’s Chief Security Technologist to dispel four common misconceptions around digital transformation, including:

    - There is less visibility in the cloud
    - Organizations are less responsible for security when data is in the cloud
    - Compliance issues stop organizations using the cloud
    - Cloud migration will create business continuity risks
  • Digital Transformation Discussion with Forcepoint Connectivity and Security
    Digital Transformation Discussion with Forcepoint Connectivity and Security
    Jim Fulton, Forcepoint Solution Director & David LePage, Forcepoint Solution Engineering Manager Recorded: Aug 21 2019 64 mins
    Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed organizations are re-architecting their networks and security to move their most valuable data and applications to the cloud, in order to give their users much richer, faster, less expensive access than ever before. Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. 

    How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Many are now using internet technologies for connect all of their users to cloud-based applications more productively and cost-effectively than ever before.

    Included in this session:

    • How to accelerate the adoption of productivity-enhancing SaaS/cloud apps
    • How to overcome MPLS limitations including costs and issues with speed
    • How to quickly add security to direct-to-cloud SD-WAN deployment to keep intruders out and protect use of web content and cloud apps
    • How to streamline operations by integrating connectivity and security across thousands of sites in the cloud and on-premises from one console
    • Demonstrations of Forcepoint SD-WAN Connectivity, Securing Internet Access and Use, Operating at Scale to Drive Better Business Outcomes
  • 30 Ideas In 30 Minutes, Creative Ways To Foster an Emotionally Connected Culture
    30 Ideas In 30 Minutes, Creative Ways To Foster an Emotionally Connected Culture
    Tanya Fish - Strategy Advisor - ITA Group Inc. Recorded: Jul 30 2019 51 mins
    The workplace is quickly becoming society’s social hub and, for some, the only way to commune. But the quality of those interactions is often lacking, leading to an overwhelming epidemic of loneliness. This loneliness—and its detrimental side effects, including declining physical and psychological health—impacts employees, both at work and in their personal lives.

    Join us for a fast-paced exploration of how you can infuse opportunities for high-quality connection points throughout the employee experience. We’ll share insights about this alarming trend, discuss how it’s impacting the health and wellbeing of your workforce and—most importantly—share a variety of ideas that your organization can immediately implement.

    You’ll learn:
    • Why social relationships are crucial for maintaining strong physical and psychological wellbeing
    • How building meaningful connections among employees promotes workplace satisfaction and productivity
    • New ideas for facilitating meaningful team member interaction in a variety of workplace environments
    • Lessons learned from others who have successfully created highly-connected cultures
    • How to anticipate—and manage—c-suite objections to the added investment for these activities.
    • How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
  • New Research to Elevate and Transform Employee Engagement Efforts
    New Research to Elevate and Transform Employee Engagement Efforts
    Erica Carranza, Ph.D. VP of Consumer Psychology Chadwick Martin Bailey & Christina Zurek Insights & Strategy Leader ITA Recorded: Jul 11 2019 51 mins
    Enriching compensation packages is an effective but expensive way to engage individual employees, and as recent research has revealed, many of the most common employee wellness and engagement initiatives are not yielding their promised impact. What are these initiatives missing?

    Join us to learn more about the results of a landmark study that seeks to answer this question by uncovering what engagement initiatives must accomplish for employees—on a psychological level—to be effective.

    Using scientific insight into human motivation and advanced analytic techniques, we will share several key findings from our research, including:
    •How tapping in to five critical psychological benefits can provide a framework for true, sustainable engagement
    •Why wellness and other popular programs aren’t delivering on the promise of employee engagement—and where organizations must focus instead
    •How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
  • Secure Cloud in a Direct-to-Cloud World
    Secure Cloud in a Direct-to-Cloud World
    Ankur Chadda, Sen. Product Marketing Manager, Forcepoint Recorded: Jul 10 2019 32 mins
    Now that direct-to-cloud connectivity is a reality, cloud applications have become a mainstay for organizations. Still, security is seen as the biggest concern when organizations consider cloud services. The key question is: how do you make sure you have a consistent security strategy across all your cloud services that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable?

    Join this session to learn how you can gain deep visibility and control on critical data stored and accessed on-premises or in the cloud to enable your cloud security strategy.
  • Protect Your Hybrid IT Environment with Direct-To-Cloud Connectivity & Security
    Protect Your Hybrid IT Environment with Direct-To-Cloud Connectivity & Security
    Robert Lesieur – Solutions Marketing, Forcepoint & Colette Tomasiak – Senior Product Marketing Manager, Forcepoint Recorded: Jun 19 2019 18 mins
    Distributed organizations in industries like retail, banking, healthcare and insurance will move to public cloud for their productivity apps. But research says their back-office applications will likely remain on private cloud or traditional infrastructure. This hybrid world creates complexity in solving the singular goal of protecting users and data, wherever they are.

    Join us to explore the capabilities available today in Forcepoint Web Security and the role it can play in simplifying and securing your hybrid IT environment.

    Key takeaways from this webinar include:
    • Understand the implications of modern IT on security.
    • Discover how a change in approach can make security easier and cheaper.
    • Solve more of the hybrid IT security puzzle without spending another dime.
  • Using Risk Analysis to Enhance Compliance
    Using Risk Analysis to Enhance Compliance
    Andras Cser, Vice President and Principal Analyst, Forrester Recorded: Jan 30 2019 20 mins
    For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.

    In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:

    - How your auditors are behaving
    - Why risk-based prioritization is the only way to find threats
    - The importance of context
    - Forrester’s recommendations and best practices

    Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Jan 22 2019 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Doug Landoll, CEO, Lantego Recorded: Jan 16 2019 35 mins
    Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.

    In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:

    - How to define cybersecurity success
    - Common approaches that fall short
    - Risk-based cybersecurity strategy planning

    Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
  • Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Phil Hochmuth, Program Director, Enterprise Mobility at IDC Recorded: Jan 14 2019 41 mins
    Lookout invited a special guest, Phil Hochmuth, Program Director, Enterprise Mobility at IDC to talk about the rising implications of employees accessing business data and apps with smartphones.

    On the agenda:

    - The latest research in enterprise mobility adoption

    - Security and the top challenges sourced by IDC

    - How mobile threat management fits into an enterprise endpoint security architecture
  • Comparing CASB Solutions from Microsoft and Forcepoint
    Comparing CASB Solutions from Microsoft and Forcepoint
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 46 mins
    CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.

    In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:

    - Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
    - Provide a detailed analysis of how both products compare over 13 key feature areas
    - Consider coverage of third-party apps beyond Office 365

    Attend this session to explore the best route to full Office 365 security.
  • The State of the CASB Market
    The State of the CASB Market
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 38 mins
    CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.

    In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:

    -Key cloud adoption concerns
    -Most valued CASB features
    -Levels of confidence in controlling data and maintaining compliance

    Attend this session to learn more about the need for and use of CASBs in today’s organizations.
  • Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions
    Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions
    Raffael Marty, VP of Research & Intelligence and colleagues Recorded: Nov 20 2018 7 mins
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely. This intersection of people interacting with data and technology will also drive cyber risk to all-time highs, according to new insights from Forcepoint researchers and data scientists.

    Watch this video as our Cyber Experts discuss their contributions to the 2019 Forcepoint Cybersecurity Predictions Report, including:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale
  • Mobile Security and the  Future of Work
    Mobile Security and the Future of Work
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Dec 19 2019 10:00 am UTC 22 mins
    Learn more about risks and challenges supporting mobile users from guest speaker IDC’s Phil Hochmuth, Program Vice President, Enterprise Mobility as he discusses:

    - Key drivers for how cloud and mobility are improving employee productivity
    - How organizations are preparing for digital transformation
    - What challenges organizations are facing across security, integration, and costs
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats


    SPEAKERS
    Phil Hochmuth
    IDC, Program Vice President, Enterprise Mobility
  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Jan 7 2020 10:00 am UTC 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • Top 5 Cloud Security Risks
    Top 5 Cloud Security Risks
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Dave Barnett, Head of CASB, EMEA, Forcepoint Jan 7 2020 4:00 pm UTC 14 mins
    There’s a lot of hype and hope surrounding cloud service adoption in business.

    The hype isn’t unwarranted, as the benefits of cloud computing are well documented. But, with the hype comes a certain amount of hope and expectation—that can be easily frustrated if the risks to users and data aren’t dealt with from the outset of the programme.

    In this video webinar, security evangelist Chris Boorman and Head of CASB, Dave Barnett, share the cloud security trends they are seeing and call out the top five risks to security as businesses move into the cloud.
  • Protecting Data Everywhere
    Protecting Data Everywhere
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Dave Barnett, Head of CASB, EMEA, Forcepoint Jan 9 2020 8:00 am UTC 8 mins
    One of the biggest challenges faced by organisations as users and data move rapidly between on-premise and cloud environments is maintaining effective data protection control.

    In this video webinar, security evangelist Chris Boorman and Head of CASB, Dave Barnett, look at the powerful combination that an integrated web gateway, CASB and Data Loss Prevention solution offers businesses seeking to protect data everywhere without damaging the user experience.
  • Mobile Phishing – Myths and facts facing every modern enterprise
    Mobile Phishing – Myths and facts facing every modern enterprise
    Marielle Hagblad, Lookout Mobile Security Engineer Jan 9 2020 10:00 am UTC 38 mins
    Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is because phishing is both different and more problematic on the mobile device.

    As a result, mobile users are three times more likely to fall for phishing scams.

    In this webinar, our security expert Marielle Hagblad will shed a light on the risks of mobile phishing and the facts that will help you make informed decisions to protect corporate data.

    Myths or Facts?
    - Existing phishing protection covers mobile devices.
    - Phishing attacks only occur on email.

    Join this webinar to find out.
  • The Changing Perimeter
    The Changing Perimeter
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint Jan 14 2020 4:00 pm UTC 10 mins
    The traditional security perimeter to the organisation has shifted considerably having come under stress from digital transformation projects. Business information is increasingly living within hybrid cloud environments and users require access to this data everywhere in order to remain productive.

    In this video webinar, security evangelist Chris Boorman and Director of Product Marketing Mike Smart, look at the new world of Edge protection. They analyse how and why networking and security services are combining to offer more flexible protection for users and data everywhere.
  • Protecting the Edge with Forcepoint
    Protecting the Edge with Forcepoint
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint Jan 16 2020 8:00 am UTC 9 mins
    The traditional security perimeter is no longer! Organisations are adopting cloud services and mobile working and looking for better ways to protect their distributed office environments.

    Join security evangelist, Chris Boorman, and Director of Product Marketing Mike Smart as they look at the new world of Edge protection and how Forcepoint combines networking and security services to offer flexible protection for users and data everywhere.