Hi [[ session.user.profile.firstName ]]

Legislation

  • Exploring SASE and the Future of Network Security.
    Exploring SASE and the Future of Network Security.
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint Recorded: Aug 12 2020 32 mins
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • SASE Summit: Blueprint for Secure Access Service Edge (SASE) Success
    SASE Summit: Blueprint for Secure Access Service Edge (SASE) Success
    Nico Popp, Chief Product Officer, Forcepoint Recorded: Aug 11 2020 22 mins
    Implementing a true Secure Access Service Edge (SASE) architecture is a daunting task and it’s not a one size fits all approach. Nico Popp, Chief Product Officer, Forcepoint, brings the fifth and final step to adopting a SASE approach–the blueprint you need to succeed.
    Step 5 in the series continues with a practical view on:

    - How a SASE architecture is used to connect your users and protect your data
    - Actionable steps for you to build a true SASE architecture
    - How to evaluate and improve a SASE platform
    - Advice on how to leverage existing investments and a strategy for where to invest
  • SASE Summit: Becoming More Risk Aware by Understanding User Behavior
    SASE Summit: Becoming More Risk Aware by Understanding User Behavior
    Homayun Yaqub, Senior Director of Strategy, Forcepoint Recorded: Aug 11 2020 24 mins
    Today’s decentralized workforce offers an unprecedented risk landscape. Employees interact with enterprise data from anywhere. Attackers are getting in, and insider threats are on the rise.

    Join Kimberly Finnigan Zink, Esq., Global Information Security Compliance Officer, GlobalFoundries and Homayun Yaqub, Senior Director of Strategy, Forcepoint for Step 4 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how behavior-centric analytics can differentiate between a trusted employee and a bad actor impersonating one.
  • SASE Summit: Data Protection in a Multi-Cloud Environment
    SASE Summit: Data Protection in a Multi-Cloud Environment
    Eric Jackson, Vice President, Product Management, Forcepoint & Keith Vallance, Head of Product, Boldon James Recorded: Aug 11 2020 27 mins
    The traditional approach to data security does not encourage business productivity while still falling short when it comes to preventing data exfiltration.

    Join Keith Vallance, Head of Product, Boldon James and Eric Jackson, VP & GM, User and Data Protection, Forcepoint for Step 3 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how user risk can help to get maximum from a data protection solution in a multi-cloud environment accessed by an increasingly mobile and remote workforce.
  • SASE Summit: Secure Access for a Remote Work Environment
    SASE Summit: Secure Access for a Remote Work Environment
    Florent Fortune, VP and GM Network and Edge Protection, Forcepoint & John Peterson, Chief Product Officer, Ericom Recorded: Aug 11 2020 24 mins
    Transitioning overnight to working remotely (not just checking email) has shaken many organizations.

    You’ve given people access to the apps they need, but will it scale for the long term?

    Join John Peterson, Chief Product Officer, Ericom and Florent Fortune, VP & GM, Network and Edge Protection, Forcepoint for Step 2 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how you can securely provide access to apps everywhere, without the pain traditionally associated with VPNs including these three takeaways:

    1. Ensure that your team is browsing the web safely while staying productive
    2. Protect your team from malware, ransomware, and zero-day threats
    3. Protect employees from web-borne threats while working from home
  • SASE Summit: Connectivity in a Borderless World – The New Edge
    SASE Summit: Connectivity in a Borderless World – The New Edge
    Nico Fischbach, Global Chief Technology Officer, Forcepoint & Elie Abouzeid, Vice President, Information Security, DentaQuest Recorded: Aug 11 2020 18 mins
    With your people working outside traditional offices and your data moving into cloud apps, more business is taking place outside the traditional enterprise boundary than inside. Your people are now your new perimeter.

    Step 1 in the foundation of a Secure Access Service Edge (SASE) approach starts with bringing a human-centric approach to cyber security. Join Elie Abouzeid, Vice President, Information Security, DentaQuest and Nico Fischbach Global, CTO, Forcepoint and explore new approaches to secure connectivity that can accelerate your digital transformation to the cloud.
  • SASE Summit: A CEO's Perspective
    SASE Summit: A CEO's Perspective
    Matt Moynahan, CEO, Forcepoint Recorded: Aug 11 2020 11 mins
    In this opening keynote to our Secure Access Service Edge (SASE) Summit, Forcepoint CEO Matt Moynahan, reflects on how the necessity for organizations to rapidly switch to remote working has shown what is possible.

    This is an opportunity for security teams to rethink their strategy for today’s new business reality and implement a model that put users and data at the centre.

    Join Matt as he shares his vision for revolutionising cyber security.
  • SASE Summit: Stepping up to SASE
    SASE Summit: Stepping up to SASE
    Dr. Chris Boorman, VP, Marketing, EMEA & APAC, Forcepoint & Dave Barnett, Dir Edge Protection Solutions, Forcepoint Recorded: Aug 10 2020 20 mins
    In this webinar we kick-off our Secure Access Service Edge (SASE) Summit; a virtual event for cybersecurity professionals who are interested in learning how to implement a true SASE architecture.

    Join Dr. Chris Boorman, Vice-President of International Marketing and Dave Barnett, Director of Edge Protection solutions, as they discuss this revolutionary approach to securing the cloud and preview the 5 Sessions that will give you a blueprint for SASE success:

    Step 1: Connectivity in a Borderless World - The New Edge
    Step 2: Secure Access for a Remote Work Environment
    Step 3: Data Protection in a Multi-Cloud Environment
    Step 4: Becoming More Risk Aware by Understanding User Behavior
    Step 5: Blueprint for SASE Success
  • Security for AWS Environments with Forcepoint.
    Security for AWS Environments with Forcepoint.
    Taze Miller Partner Solutions Architect, Amazon Web Services & Karlene Berger, Sr. Director, Product Marketing, Forcepoint Recorded: Jul 29 2020 15 mins
    As the race to move workloads and innovation into the cloud continues, security teams are often playing catch up. Forcepoint has partnered with Amazon Web Services to increase and modernize security within these environments.

    In this joint webinar, Taze Miller from AWS will share security use cases, and Karlene Berger will share how Forcepoint has invested in integrations. Together, Forcepoint and AWS can deliver an integrated view of security that can drive productivity while minimizing risk for your AWS environment.
  • Get the Most out of Your Forcepoint Web Security Solutions.
    Get the Most out of Your Forcepoint Web Security Solutions.
    Colette Tomasiak, Sr. Product Marketing Manager & Yuval Sarig, Manager Sales Engineering Recorded: Jul 22 2020 26 mins
    Join us to find out how you can get the most out of your current Forcepoint Web Security solutions.To better understand security gaps, potential risks, and help secure your users and your data as your organization shifts to working from home instead of from the office.

    We’ll talk about:

    -Existing features and capabilities that enable your workforce to work securely across the globe
    -Gaining visibility to user behavior and cloud applications so you can control and adapt your policies, and improve your overall security posture
    -Best practices and tips on adjusting policies to better accommodate the merger of work and home
  • Why Managing your Mobile Endpoints is not Securing your Mobile Endpoints
    Why Managing your Mobile Endpoints is not Securing your Mobile Endpoints
    Chris Hazelton Director, Product Marketing and Security Solutions Recorded: Jul 21 2020 37 mins
    With employees accessing sensitive business data from mobile devices, many organizations deploy Mobile Device Management (MDM) believing this protects them from cybersecurity threats.

    Your mobile employees are now prime targets for phishing, application, and other threats that management tools cannot protect against. Learn how to protect your users, your corporate data, and your organization from the latest cybersecurity threats.

    Register to this webinar to learn about:

    - The strengths and weaknesses of mobile device management (MDM).
    - What threats mobile management tools are blind to.
    - How to apply dynamic security protections for all mobile users of cloud data.
  • Why Managing your Mobile Endpoints is not Securing your Mobile Endpoints
    Why Managing your Mobile Endpoints is not Securing your Mobile Endpoints
    Chris Hazelton Director, Product Marketing and Security Solutions Recorded: Jul 21 2020 37 mins
    With employees accessing sensitive business data from mobile devices, many organizations deploy Mobile Device Management (MDM) believing this protects them from cybersecurity threats.

    Your mobile employees are now prime targets for phishing, application, and other threats that management tools cannot protect against. Learn how to protect your users, your corporate data, and your organization from the latest cybersecurity threats.

    Register to this webinar to learn about:

    - The strengths and weaknesses of mobile device management (MDM).
    - What threats mobile management tools are blind to.
    - How to apply dynamic security protections for all mobile users of cloud data.
  • Navigating the Confusion Around Zero-Trust
    Navigating the Confusion Around Zero-Trust
    Ashish Malpani, Sr. Director Product Marketing, Forcepoint & John Grady, ESG Analyst Cybersecurity Recorded: Jul 15 2020 39 mins
    Today’s security leaders believe that network security is becoming more complex with the adoption of cloud, IoT devices, and remote workforce. Organizations are struggling to adopt new security architectures like Zero Trust and looking for technological solutions rather than business outcomes.

    Implementing Zero Trust needs to focus on understanding user context and intent and evolving network security to protect the new edge while ensuring consistent data security.

    Attend this webinar to learn more about the practical implementation of Zero Trust from John Grady (ESG), as he shares insights based on an extensive survey.
  • COVID-19 - Top 10 Cybersecurity Trends
    COVID-19 - Top 10 Cybersecurity Trends
    Nico Popp, Chief Product Officer, Forcepoint Recorded: Jul 14 2020 21 mins
    We’re over half-way through 2020 and we’ve arguably witnessed some of the most dramatic changes to the working environment for a generation. With so many of us now working from home, security practices have rapidly adapted to protect the new world.

    In this webinar, Forcepoint’s Chief Product Officer Nico Popp, looks back over the last 6 months to deliver his top 10 emerging cybersecurity trends in 2020, including:

    -The end of hardware?
    - Alternatives to never-ending patches
    - Replacing the VPN with ZTNA/PA (Zero-Trust Network Access)
    - The move to SASE (Secure Access Service Edge)

    Join Nico and get his perspective on the trends that are helping shape the future of cybersecurity.
  • Driving Transformation - Reinventing Cybersecurity and Motorsport
    Driving Transformation - Reinventing Cybersecurity and Motorsport
    Matt Moynahan, Chief Executive Officer at Forcepoint & Lucas Di Grassi, Founding Driver of Formula E and Chairman of Roborace Recorded: Jul 8 2020 36 mins
    While every industry struggles with the spectre of future obsolescence, some are slower than others to embrace change. The emergence of the digital era has created a need for agility and forward-thinking vision to drive transformation across every industry today.

    Different industries are powering the future in fascinating ways. Autonomous racing and green energy are defining the next generation in motorsport, while understanding human behaviour and delivering automated and adaptive risk response have become essential components of modern cybersecurity.

    Join Matt Moynahan, Chief Executive Officer for Forcepoint and Lucas di Grassi, Founding Driver of Formula E and Chairman of Roborace for an insightful conversation on;

    - Driving transformation within storied industries ripe for disruption
    - What it takes to be a champion for change on the local and global levels
    - The explosion of data and the criticality in securing data for business and within our day-to-day lives
  • The Best Practices for Data Protection for a Remote Workforce
    The Best Practices for Data Protection for a Remote Workforce
    Ankur Chadda, Sr. Solutions Manager, Forcepoint & Christopher Porter, Sales Engineer, Forcepoint Recorded: Jul 1 2020 25 mins
    With the majority of workers going remote, does your data protection strategy still hold?

    Join us as we go over the best practices to increase security effectiveness for your existing Forcepoint Data Loss Prevention solution. You’ll come away with insights on how to tackle challenges facing data protection in today's realities.

    We’ll talk about:

    •Best practices and tips on adjusting your strategy and policies to better increase security effectiveness for your merging remote workforce
    •Existing features and capabilities that enable your workforce to work securely while remote
    •Improving your overall security posture and other factors your organization should be prepared for
  • The Current and Future State of Cybersecurity
    The Current and Future State of Cybersecurity
    Elizabeth Nann, Exec Dir. of Global Consumer Insights WSJ Intelligence & Carl Leonard, Principal Security Analyst, Forcepoint Recorded: Jun 18 2020 30 mins
    What would the ideal cybersecurity system look like if IT & business leaders could design it from the ground up?

    In this C-Suite Report by The Wall Street Journal Intelligence and sponsored by Forcepoint, 200 CEOS and CISOs were polled on the current and future state of cybersecurity.

    CEOs and CISOs view cybersecurity differently.

    Read this report for actionable insight on what cybersecurity looks like today vs. what it will look like in the future—and the obstacles, risks, and technologies in between.

    Here are some of our findings:

    - Less than half of CEOs have an updated cybersecurity strategy
    - 71% of CEOs report losing sleep over the next breach
    - Only 46% of leaders regularly review their cybersecurity strategies
  • Extend Data Protection to the Cloud with CASB & Office365
    Extend Data Protection to the Cloud with CASB & Office365
    Eran Amir, Consulting Sales Engineer, EMEA Recorded: Jun 10 2020 22 mins
    Nearly half of all corporate data is stored in the cloud. As employees utilize cloud apps for convenience or to improve productivity, more data flows to the cloud via unsanctioned apps and personal devices.

    Your cybersecurity strategy should address the sprawl of Shadow IT and its risk to users & data. In this webinar, we’ll outline the importance of data protection in the cloud, specifically for Office 365 apps. Here are some things you’ll learn:


    •The three pillars of data protection
    •How to protect data accessed from endpoints and personal devices
    •How Forcepoint can help secure O365
    •The 5 main cloud risk problems
    •Common use cases for Forcepoint CASB
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Recorded: Jun 9 2020 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Recorded: Jun 9 2020 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • The Current and Future State of Cybersecurity
    The Current and Future State of Cybersecurity
    Elizabeth Nann, Exec Dir. of Global Consumer Insights WSJ Intelligence & Carl Leonard, Principal Security Analyst, Forcepoint Recorded: Jun 3 2020 30 mins
    The stark reality is that attackers today have a +90% success rate. It’s not a matter of “if” but “when” they will breach your network. There has never been a greater opportunity or impetus to get cybersecurity right than this moment in time. Your business literally depends on it. But how do you navigate the path forward when there are growing disparities today between CEOs and CISOs on the most effective cybersecurity path forward?

    Join Elizabeth Nann, Executive Director of Consumer Insights for Wall Street Journal and Carl Leonard, Principal Security Analyst at Forcepoint for an insightful discussion on key findings from the report and implications for both the industry and your business today.

    Highlights of the discussion will include;

    - Overcoming a lack of common vocabulary between CEOs and CISOs in communicating cyber risks and business impacts
    - Navigating disparities in CEOs proactive approach and CISOs reactive approach to cybersecurity
    - And, why, despite claiming vendor fatigue, CISOs use more than 50 security vendors on average today and more than 62% report they want even more
  • Phishing Threats in a Mobile-Enabled World
    Phishing Threats in a Mobile-Enabled World
    Chris Hazelton, Director Security Solutions, Lookout Recorded: Jun 2 2020 37 mins
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • Phishing Threats in a Mobile-Enabled World
    Phishing Threats in a Mobile-Enabled World
    Chris Hazelton, Director Security Solutions, Lookout Recorded: Jun 2 2020 37 mins
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • Exploring SASE and the Future of Network Security
    Exploring SASE and the Future of Network Security
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint Recorded: May 27 2020 32 mins
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout Recorded: May 26 2020 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Security for AWS Environments with Forcepoint.
    Security for AWS Environments with Forcepoint.
    Taze Miller Partner Solutions Architect, Amazon Web Services & Karlene Berger, Sr. Director, Product Marketing, Forcepoint Aug 25 2020 7:00 am UTC 15 mins
    As the race to move workloads and innovation into the cloud continues, security teams are often playing catch up. Forcepoint has partnered with Amazon Web Services to increase and modernize security within these environments.

    In this joint webinar, Taze Miller from AWS will share security use cases, and Karlene Berger will share how Forcepoint has invested in integrations. Together, Forcepoint and AWS can deliver an integrated view of security that can drive productivity while minimizing risk for your AWS environment.