Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Ways Orca Security and AWS Establish Zero Trust in the Cloud Ty Murphy, Director of Product Marketing at Orca Security & Dudi Matot, Security Segment Lead at AWS Establishing a Zero-Trust program is a critical strategy to help security teams govern security across cloud and on-premise environments. As an AWS So... February 16, 2023 7:00pm Putting Zero Trust into Action to Secure the Hybrid Workforce Mike Crouse, Director, Enterprise User & Data Protection, Forcepoint | Heath Mullins, Senior Analyst, Forrester A fireside chat with guest speaker, Forrester Senior Analyst Heath Mullins As we transition from a remote to a fully mobile, hybrid workforce, organi... February 15, 2023 9:00am Data Protection in a Multi-Cloud World Deborah Watson, Resident CISO, Proofpoint & Jonathan Care, Contractor and Former Gartner Analyst, Proofpoint Data protection remains the top concern for most CISOs according to the Voice of the CISO 2022 Report. And organizations use a variety of SaaS, web ap... 2 months ago | 66 mins Future Insights 2023 Simon Wiseman, Chief Technology Officer, Forcepoint & Alexandra Willsher, GSI Technical Consultant, Forcepoint What threats will enterprises and government organizations face in 2023? Join us for a fireside chat discussing the Future Insights 2023 series, wher... 2 weeks ago | 64 mins 5 Steps to Simplifying Zero Trust with SASE Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Join Corey Kiesewetter as he discusses the benefits of a single-vendor SASE solution and how the CASB, ZTNA, SWG, DLP and Secure SD-WAN components can... 3 weeks ago | 23 mins The Real Cost of Bad Software Quality in the U.S. in 2022 Herb Krasner, CISQ Advisory Board Member and Mike McGuire, Solutions Manager at Synopsys Tune in to learn more about “The Cost of Poor Software Quality in the US: A 2022 Report” that was recently published by CISQ. The 2020 edition of th... 2 months ago | 51 mins Protect Against Modern Active Directory Attacks Patrick Doherty (Vice President Sales Identity Protection), Matthew McDermott (Sales Engineer) The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization... February 28, 2023 10:00am Data Security Questions E1: Is My Sensitive Data is in the Wrong Region? Christopher Webber The Open Raven team shows how to determine if sensitive data resides in the wrong geographic region. 1 hour ago | 5 mins Data Security Questions E2: How Do I Discover Shadow Data and Take Action? Christopher Webber & Bryan Jones The Open Raven team shows how to discover shadow data and take action. 1 hour ago | 9 mins Data Security Questions E3: How Do I Find and Secure Developer Secrects? Andy Singer & Bryan Jones The Open Raven team discusses the security problems posed by exposed or unencrypted developer secrets, how to discover and classify them, and how to a... 1 hour ago | 10 mins Load more