Get powerful HR legislation insights that will help you safeguard your business and workforce. Connect with thought leaders and colleagues to get the most up-to-date knowledge on legislations you need to be aware of.
Jim Fulton, Forcepoint Solution Director & David LePage, Forcepoint Solution Engineering ManagerRecorded: Aug 21 201964 mins
Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed organizations are re-architecting their networks and security to move their most valuable data and applications to the cloud, in order to give their users much richer, faster, less expensive access than ever before. Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies.
How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Many are now using internet technologies for connect all of their users to cloud-based applications more productively and cost-effectively than ever before.
Included in this session:
• How to accelerate the adoption of productivity-enhancing SaaS/cloud apps
• How to overcome MPLS limitations including costs and issues with speed
• How to quickly add security to direct-to-cloud SD-WAN deployment to keep intruders out and protect use of web content and cloud apps
• How to streamline operations by integrating connectivity and security across thousands of sites in the cloud and on-premises from one console
• Demonstrations of Forcepoint SD-WAN Connectivity, Securing Internet Access and Use, Operating at Scale to Drive Better Business Outcomes
Tanya Fish - Strategy Advisor - ITA Group Inc.Recorded: Jul 30 201951 mins
The workplace is quickly becoming society’s social hub and, for some, the only way to commune. But the quality of those interactions is often lacking, leading to an overwhelming epidemic of loneliness. This loneliness—and its detrimental side effects, including declining physical and psychological health—impacts employees, both at work and in their personal lives.
Join us for a fast-paced exploration of how you can infuse opportunities for high-quality connection points throughout the employee experience. We’ll share insights about this alarming trend, discuss how it’s impacting the health and wellbeing of your workforce and—most importantly—share a variety of ideas that your organization can immediately implement.
• Why social relationships are crucial for maintaining strong physical and psychological wellbeing
• How building meaningful connections among employees promotes workplace satisfaction and productivity
• New ideas for facilitating meaningful team member interaction in a variety of workplace environments
• Lessons learned from others who have successfully created highly-connected cultures
• How to anticipate—and manage—c-suite objections to the added investment for these activities.
• How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
Erica Carranza, Ph.D. VP of Consumer Psychology Chadwick Martin Bailey & Christina Zurek Insights & Strategy Leader ITARecorded: Jul 11 201951 mins
Enriching compensation packages is an effective but expensive way to engage individual employees, and as recent research has revealed, many of the most common employee wellness and engagement initiatives are not yielding their promised impact. What are these initiatives missing?
Join us to learn more about the results of a landmark study that seeks to answer this question by uncovering what engagement initiatives must accomplish for employees—on a psychological level—to be effective.
Using scientific insight into human motivation and advanced analytic techniques, we will share several key findings from our research, including:
•How tapping in to five critical psychological benefits can provide a framework for true, sustainable engagement
•Why wellness and other popular programs aren’t delivering on the promise of employee engagement—and where organizations must focus instead
•How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
Andras Cser, Vice President and Principal Analyst, ForresterRecorded: Jan 30 201920 mins
For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.
In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:
- How your auditors are behaving
- Why risk-based prioritization is the only way to find threats
- The importance of context
- Forrester’s recommendations and best practices
Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
Aaron Cockerill, Chief Strategy OfficerRecorded: Jan 22 201929 mins
What is currently happening the world of security?
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.
During this webinar Aaron Cockrill, CSO at Lookout will talk about:
- What does a post-perimeter world mean to enterprise security?
- Why mobility changes the enterprise security paradigm?
- How to protect data when accessed from outside the corporate perimeter?
- What are the current and emerging threats?
* Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
Doug Landoll, CEO, LantegoRecorded: Jan 16 201935 mins
Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.
In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:
- How to define cybersecurity success
- Common approaches that fall short
- Risk-based cybersecurity strategy planning
Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
Mike Osterman, CEO, Osterman ResearchRecorded: Dec 13 201846 mins
CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.
In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:
- Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
- Provide a detailed analysis of how both products compare over 13 key feature areas
- Consider coverage of third-party apps beyond Office 365
Attend this session to explore the best route to full Office 365 security.
Mike Osterman, CEO, Osterman ResearchRecorded: Dec 13 201838 mins
CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.
In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:
-Key cloud adoption concerns
-Most valued CASB features
-Levels of confidence in controlling data and maintaining compliance
Attend this session to learn more about the need for and use of CASBs in today’s organizations.
Raffael Marty, VP of Research & Intelligence and colleaguesRecorded: Nov 20 20187 mins
Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely. This intersection of people interacting with data and technology will also drive cyber risk to all-time highs, according to new insights from Forcepoint researchers and data scientists.
Watch this video as our Cyber Experts discuss their contributions to the 2019 Forcepoint Cybersecurity Predictions Report, including:
- How attacks on industrial IoT could lead to widespread power outages
- When credential theft moves to cloning your face to bypass biometric authentication
- What happens in a world incentivized to commit intellectual property theft at scale
Mark Toth, Chief Legal Officer of ManpowerGroup™ North America, and Neil Alexander, of Littler Mendelson.Recorded: Oct 31 201862 mins
Join ManpowerGroup for a complimentary webinar designed to reduce your employment law nightmares.
In this engaging and interactive webinar, Mark Toth of ManpowerGroup and guest Neil Alexander of Littler Mendelson will answer the world’s most terrifying employment law questions. Mark and Neil will not only address the questions that keep you awake at night but also ensure that you get all the latest employment law news on everything from hiring to firing and beyond.
After this fast-paced hour, you’ll walk away with:
-Answers to difficult legal questions
-Up-to-the-minute information on the latest employment law developments
-Tips and tools on everything from hiring to firing
-Practical solutions based on real-life examples
Your host is Mark Toth, Chief Legal Officer of ManpowerGroup™ North America, a former partner in a major employment law firm, and widely known for his ability to present legal and HR issues in a uniquely entertaining style.
Special guest Neil Alexander, of Littler Mendelson, has represented companies in employment disputes all across the U.S. for the last 25 years. Neil’s practice focus includes unfair competition disputes, whistle blower and retaliation claims, ADA and FMLA disputes, wrongful termination claims and allegations of harassment or discrimination.
ManpowerGroup is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRMSCPSM. This program is valid for 1 PDC for the SHRM-CPSM or SHRM-SCPSM. For more information about certification or recertification, please visit www.shrmcertification.org
This webinar is approved for 1 HRCI credit. The use of the HRCI seal confirms that this activity has met HR Certification Institute’s® (HRCI®) criteria for recertification credit pre-approval.
Michael Flossman, Head of Threat Intelligence, LookoutRecorded: Jul 19 201837 mins
Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.
Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
It only takes one errant tap to compromise a mobile device. This short video clip highlights the threats and how inconspicuous a phishing attack on a mobile device can be. You will also be able to download our latest whitepaper to understand mobile phishing facts that will help you make informed decisions on how to protect corporate data.
Aaron Cockerill, Chief Strategy Officer, LookoutRecorded: May 29 201850 mins
Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.
By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.
On the agenda:
- Why mobile is a problem for GDPR compliance
- Understanding the threats & risks to GDPR compliance from mobile
- Finding & stopping mobile threats to GDPR compliance
Did you know?
84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.
31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.
63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
Brian Philbrook, Privacy Counsel at OneTrust | Dr Andreas Splittgerber, Partner, Reed SmithRecorded: May 23 201866 mins
The GDPR grants data subjects new rights including: data portability, access to their data, erasure or “the right to be forgotten”, and rectification. For data controllers, there are specific record-keeping requirements around the time to respond, the ability to request an extension, the requirement to validate the identity, and securely transmitting the response to the individual.
Join us for this educational web conference to hear about the new rights of data subjects and how organizations can use privacy management software to streamline and automate requests, validation, and notification processes.
About the presenters:
Brian Philbrook serves as Privacy Counsel at OneTrust where he provides guidance on global privacy regulations to assist compliance efforts and drive product innovation. Philbrook also conducts training and workshops on the GDPR and contributes to various publications and web-conferences on a regular basis. Prior to OneTrust, Philbrook served on the Privacy Team for RxAnte, a leading predictive analytics and clinical services company committed to improving medication use. He also worked as an extern on the IAPP’s training and publications teams. Philbrook earned his JD from the University of Maine School of Law, where he was the first recipient of the Certificate in Information Privacy Law.
Dr Andreas Splittgerber is a partner in the Munich office of Reed Smith and member of the IP, Tech & Data Group.
Andreas specialises in IT law, data protection/privacy, social media law and internet law (Germany and EU). He is passionate about technology and privacy and thought-leader when it comes to legally evaluating new technologies (e.g. internet of things, artificial intelligence).
Burak Agca - System EngineerRecorded: Feb 28 201835 mins
Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.
With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.
Register to today's webinar to learn about:
- The threat landscape
- The evolution of mobile threats
- How does that impact your organization?
- How other organizations are doing?
- The impact of a breach post GDPR
- How to protect your enterprise data?