Join Forcepoint experts as they discuss the key ingredients of a truly effective insider threat programme.
Find out how real-time security intelligence is used to warn you if users have been hijacked, gone rogue or are just making mistakes.
See how policy-driven risk scoring can identify your riskiest users and give you the context required to determine if further forensic investigation is necessary.
Gain practical insights into:
- best practices for implementing an Insider Threat programme
- the technology required to do the job
- winning executive sponsorship
RecordedJul 14 201659 mins
Your place is confirmed, we'll send you email reminders
Mike Smart, Forcepoint & Michael Osterman, President, Osterman Research, Inc.
Whilst an EU regulation, the GDPR is applicable to any global organisation that collects EU citizens’ personal data. Forcepoint’s Mike Smart will introduce Mike Osterman, from Osterman Research, who will discuss how compliance can be successfully achieved through addressing both organisational and technical responses.
This presentation features content from Mike Osterman’s whitepaper, "GDPR Compliance and Its Impact on Security and Data Protection Programs.
Neil Thacker Deputy CISO Forcepoint and Mike Smart Director - Product & Solutions Forcepoint
Join Forcepoint experts as they discuss the key ingredients of a truly effective insider threat programme.
Find out how real-time security intelligence is used to warn you if users have been hijacked, gone rogue or are just making mistakes.
See how policy-driven risk scoring can identify your riskiest users and give you the context required to determine if further forensic investigation is necessary.
Gain practical insights into:
- best practices for implementing an Insider Threat programme
- the technology required to do the job
- winning executive sponsorship
Carl Leonard, Principal Security Analyst, Forcepoint
The 2016 Global Threat Report reveals a never-before identified, powerful botnet that can cause far-reaching technical, operational and financial complications for your organisation.
Watch the webcast, as Forcepoint experts give guidance on protecting against this and other threats, keeping your business moving forward.
Learn more about:
- How threats are evolving in capability while traditional security perimeters dissolve.
- How to avoid becoming an inadvertent insider threat.
Forcepoint’s first-hand case study on protecting a cybersecurity company during an acquisition.
This is a must-attend webcast for those considering a move to the Cloud, acquiring new companies or just remaining competitive.
Mike Smart, Products and Solutions, Forcepoint EMEA
Migrating to Office 365? It’s a smart move for most enterprise level organisations.
But migrating to a public cloud platform with incomplete DLP leaves you vulnerable to data leakage, compliance issues and other security challenges you may not even see.
Discussion topics include:
- Web and email DLP hosted in the Azure Cloud
- Securing Office 365 applications such as OneDrive, Outlook and SharePoint
- Securing SharePoint Online and other Web applications such as Box
Neil Thacker, Information Security & Strategy Officer, Forcepoint EMEA
Do you know what your most effective security posture looks like?
How are you measuring your security success against both inside and outside threats?
Discussion topics include:
- Positioning your cyber defences against today’s threats and beyond
- Data noise, ‘alert fatigue’ and the case for advanced analytics
- The Forcepoint vision for safeguarding users, data and networks
Live interactive webcasts - addressing the infosec issues of the day
Join the Forcepoint team throughout 2016 as we discuss the security issues of the day in a series of powerful, thought-provoking and interactive webcasts.
Protecting Data In The Age Of Insider ThreatsNeil Thacker Deputy CISO Forcepoint and Mike Smart Director - Product & Solutions Forcepoint[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]59 mins