Hi [[ session.user.profile.firstName ]]

Live Video Panel - Creating a Winning Security Strategy for 2020

Join security experts as they review the past 12 months and discuss security strategies, solutions and tools for success in 2020 and beyond.

Discussion topics will include:

- The key factors CISOs should consider for their cybersecurity strategy
- The current and future threatscape
- Platform Security for 2020
- Technological solutions that make CISOs' lives easier
- How organizations are coping with the shortage of qualified security workforce
- How CISOs can better communicate their strategy to the board

Panellists
Richard Agnew - VP EMEA - Code42
Ray Ford, Founding DPO, GDPR Associates
Rita Bhowan, IT Security Manager, The Law Society

Moderator to be Mark Chaplin, Principal, ISF

Security Strategy, CISO, Cyber Security, IT Security, Best Practices, Skills shortage, Network Security, Cyber Defence, Breach Prevention, Data Security, Email Security, Vulnerabilities, Cloud Security
Recorded Dec 2 2019 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Richard Agnew, Code42 | Ray Ford, GDPR Associates | Rita Bhowan, The Law Society
Presentation preview: Live Video Panel - Creating a Winning Security Strategy for 2020

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Video Panel - Data Protection Done Right Recorded: Dec 2 2019 45 mins
    Allan Boardman, ISACA | Richard Agnew, Code42 | Steve Wright, Privacy Culture Ltd | Bill Mew, Mew Era Consulting
    As the number of data privacy laws and regulations increases globally, organizations need to take a proactive approach to data privacy and security, rather than reactive.

    Join this interactive panel of industry experts to learn more about:

    - How to bake privacy and security into your processes
    - Best Practices for achieving regulation compliance
    - How to mitigate risk with data loss protection technologies and solutions
    - Are we closer to a Privacy-and-Security-by-Design reality
    - How to protect your organization from insider threats
    - Recommendations for Improving Data Management and ensuring Data Protection

    Panellists
    Richard Agnew - VP EMEA - Code42
    Steve Wright, CEO and Partner, Privacy Culture Limited
    Bill Mew, Founder and Owner, Mew Era Consulting

    Moderated by Allan Boardman, CGEIT Certification Committee Member, ISACA


    Data Protection, Data Breach, Regulations, Compliance, Proactive Security, Data Privacy Security Strategy, GDPR, Data Governance, IT Security, Breach Prevention, Risk Management
  • Live Video Panel - Creating a Winning Security Strategy for 2020 Recorded: Dec 2 2019 45 mins
    Richard Agnew, Code42 | Ray Ford, GDPR Associates | Rita Bhowan, The Law Society
    Join security experts as they review the past 12 months and discuss security strategies, solutions and tools for success in 2020 and beyond.

    Discussion topics will include:

    - The key factors CISOs should consider for their cybersecurity strategy
    - The current and future threatscape
    - Platform Security for 2020
    - Technological solutions that make CISOs' lives easier
    - How organizations are coping with the shortage of qualified security workforce
    - How CISOs can better communicate their strategy to the board

    Panellists
    Richard Agnew - VP EMEA - Code42
    Ray Ford, Founding DPO, GDPR Associates
    Rita Bhowan, IT Security Manager, The Law Society

    Moderator to be Mark Chaplin, Principal, ISF

    Security Strategy, CISO, Cyber Security, IT Security, Best Practices, Skills shortage, Network Security, Cyber Defence, Breach Prevention, Data Security, Email Security, Vulnerabilities, Cloud Security
  • Ask the Expert - Interview with Richard Agnew - VP EMEA - Code42 Recorded: Dec 2 2019 14 mins
    Paige Bidgood & Richard Agnew, VP EMEA, Code42
    Join this interactive interview with Richard Agnew - VP EMEA - Code42

    Code42 is the leader in data loss protection. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response – all without lengthy deployments, complex policy management or blocking user productivity. Because the solution collects and indexes every version of every file, it offers total visibility and recovery of data – wherever it lives and moves. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees.

    Richard brings a broad base of sales and management experience to Code42, gained through years leading regional teams within internationally recognised brands such as Veeam, NetApp, and Dell. Outside of work, Richard is an avid cyclist who competes in a number of local organised cycling events.
  • Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering Recorded: Jun 5 2019 47 mins
    Raef Meeuwisse| Carl Leonard, Forcepoint | John Scott, Bank of England | Adenike Cosgrove, Proofpoint | Richard Agnew, Code42
    External and internal threats continue to pose a challenge for security professionals worldwide. How are businesses preparing against attacks like phishing, ransomware, and social engineering?

    Join security experts from the industry to learn more about:
    - The most prevailing cyber threats businesses face in 2019
    - Lessons from cyber attacks and strategies for protecting against them
    - Solutions for faster breach detection and response
    - Why network visibility is key
    - Recommendations for improving enterprise security

    Panellists
    Richard Agnew, VP EMEA, Code42
    Carl Leonard, Principal Security Analyst, Forcepoint
    John Scott, Head of Security Education, Bank of England
    Adenike Cosgrove, Cybersecurity Strategist, Proofpoint

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Ask the Data Protection Expert: Next-Gen Policy Free Data Loss Protection Recorded: Jun 5 2019 9 mins
    Paige Bidgood & Richard Agnew, VP EMEA, Code42
    It's time to rethink data loss prevention. Today's progressive, employee-focused, idea-rich organizations are looking for new, less restrictive ways to protect their data.

    Watch this interactive 1-2-1 discussion where Richard Agnew, VP EMEA will share insights from the field including;

    How Code42 differs from legacy DLP vendors and why it is beneficial for Code42 customers
    How Code42 is addressing insider threats in cybersecurity
    Why organisations should consider adding Code42 to their security technology stack
    Why visibility is key in addressing the new threats organisations are facing in 2019

    Code42 Next-Gen DLP collects, indexes and analyzes all files and file activity, giving our customers full visibility to everywhere their data lives and moves — from endpoints to the cloud. With that kind of oversight, security teams can quickly and easily monitor, investigate, preserve and recover data without the complex classification rules and policies that ultimately block employee collaboration and productivity. Native to the cloud, Code42 Next-Gen DLP works without expensive hardware requirements and deploys in a matter of days. Today, more than 50,000 organizations worldwide rely on Code42 to protect their data from loss.
  • Accounting for the Endpoint in Your GDPR Strategy Recorded: Feb 15 2018 45 mins
    Josh Evans, product manager, Code42; Abhik Mitra, product marketing manager, Code42
    The EU General Data Protection Regulation (GDPR) deadline of May 2018 is fast approaching! In the midst of preparing for the new regulation, it is equally important to understand how to provide visibility into endpoint data generated by your knowledge workers, and how to protect it.

    In this live webinar, Code42’s Josh Evans, product manager, and Abhik Mitra, product marketing manager, will discuss how Code42 addresses the endpoint gap and enables your GDPR strategy.
  • How to Detect Risks and Respond in Real-Time Recorded: Feb 13 2018 25 mins
    Charles Weatherhead, principal systems engineer
    Today, companies struggle to detect data exfiltration or theft because they aren’t equipped with the necessary tools to collect, analyze and detect risky file movements. It’s an issue that currently costs the average company $4.3 million a year and unfortunately, this is a growing trend that promises to only get worse.

    In this webinar, Charles Weatherhead, principal systems engineer, will discuss and show Code42’s Security Center, a solution that turns endpoint data into real-time security insights. You will learn how to:

    -Proactively monitor situations of data exfiltration
    -Immediately respond to suspicious data anomalies
    -Block a suspicious insider from accessing a laptop and/or the network
  • How to Protect Your Data Without Holding Users Back Recorded: Feb 2 2018 30 mins
    Michelle Killian, Code42, staff information security analyst; Adam Anderson, 3D Results, Director of IT and Security
    Your mobile employees have valuable ideas and client data on their machines. In fact, as much as 70% of employee-created company data lives on laptops. But in the event of the inevitable cyberattack, traditional ring-fenced security models are unable to protect this data effectively or recover it quickly without slowing down or otherwise burdening your employees.

    In our webinar, hear how Adam Andersen, Director of IT and Security at 3D Results, found a way to protect his company’s IP without compromising end-user freedom. You’ll learn how to:

    Detect legitimate threats
    Help users bounce back from any data loss issue fast, no matter where they work
    Focus on detection and response, because successful attacks and data loss can’t be prevented every time
  • Inside Threat: The Evolution of Attack Patterns Recorded: Sep 20 2017 42 mins
    Rick Orloff, chief security officer, Code42; Fernando Montenegro, senior analyst, 451 Research
    Insider threat refers to an employee or contractor who misuses his/her authorized network access to carry out nefarious activity. Today, sophisticated hackers are compromising user credentials and moving silently within an organization’s digital infrastructure under the guise of an employee profile—an inside threat. Security teams must prepare to recover from both.

    Join Fernando Montenegro, 451 Research senior analyst, and Rick Orloff, chief security officer at Code42 as they:

    - Discuss the burgeoning concept of inside threat
    - Explain how to identify the “malicious actors” without wrongfully implicating employees
    - Share the proactive steps you can take to quickly recover from any data breach incident
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience Recorded: Mar 23 2017 37 mins
    Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • 3 Proven Workflows for A Successful Windows 10 Migration Recorded: Mar 22 2017 28 mins
    Aimee Simpson, Product Marketing Manager, Code42
    Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

    *The facts on enterprise adoption of Windows 10
    *Planning considerations for your Windows 10 migration project
    *Three distinct approaches to performing device replacements—and the pros and cons associated with each

    About the speaker:

    Aimee Simpson, Product Marketing Manager – Code42
    Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
  • Building a Blueprint for an Insider Threat Program Recorded: Mar 16 2017 58 mins
    Jadee Hanson, Dir of Security, Code 42; Joji Montelibano, Rockwell; Chris Walcutt, Black & Veatch; Brandon Dunlap (Moderator)
    While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.
  • Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Data Recovery Recorded: Oct 26 2016 48 mins
    John Kindervag Vice President, Principal Analyst, Forrester Research & Arek Sokol Systems Engineer, Code42
    Sponsored by Code42 - More than 45% of businesses were hit with ransomware attacks in the past year. Cybercriminals are rapidly evolving attack methodologies and issuing increasingly higher demands. With no end in sight, organizations are at significant risk for data loss. At the same time, IT security policies, anti-malware protection and end users that lack the ability to recognize sophisticated scams make ransomware inevitable.

    Join this live webcast and learn about the prevalence of ransomware in the enterprise and best practices for safeguarding your data against attackers.

    Viewers will learn:
    - Why ransomware is a burgeoning business and who is being targeted
    - Best practices & recommendations to reduce risk and assure continuous data protection and recovery
    - How modern endpoint backup protects your end-user data and enables rapid recovery without paying the ransom
  • Cybersecurity in 2016: Results from the Cyberthreat Defense Report Recorded: Apr 20 2016 47 mins
    Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42
    The CyberEdge 2016 Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a November 2015 survey of 1,000 IT security decision makers and practitioners, the CDR delivers insight IT security teams can use to compare their perceptions, priorities and security postures to that of their peers.

    Join Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42 to review the results from the 2016 Cyberthreat Defense Report and:

    •Understand why 62 percent of organizations expect to be breached this year.
    •Learn which cyber threats are of the utmost concern to the enterprise in 2016.
    •Explore how Code42 CrashPlan endpoint backup helps safeguard your most important asset–data!
  • Defend Your Data from the Dark Side Recorded: Mar 23 2016 22 mins
    David Payne, VP Global Systems Engineering at Code42
    Join Code42 for an on-demand webinar to learn how protecting endpoint data can give IT the ability to overcome nearly every situation the "dark side" can conjure. Specifically you'll hear how Code42 can help you:

    • Protect every version of every file forever, with no limits on file size, type or number of files

    • Shorten time to recovery and restore files to any device or iOS at any time

    • Rapidly mitigate incidents by quickly identifying the data on compromised devices
  • Minimizing Data Threats: How to Protect Your Most Precious Resource Recorded: Mar 15 2016 25 mins
    David Lingenfelter, CSA Mobile Working Group Co-Chair
    According to Netskope, the average organization has 730 cloud apps in use, and 90.8% aren't enterprise-ready.* This puts the corporate data you're charged with securing at risk. And as workers continue to use consumer-grade cloud apps to share, access and create corporate data, it's clear that these threats aren't going away. So how can enterprise IT proactively mitigate these risks and protect the integrity of its most precious resource?

    Watch this on-demand webinar, featuring Co-Chair of the Cloud Security Alliance (CSA)'s Mobile Working Group David Lingenfelter, to learn:

    •Key considerations for minimizing the inherent risks embedded within mobile computing
    •Critical vulnerabilities associated with the introduction of IoT in the enterprise, and best practices for mitigation
    •How the CSA's Cloud Controls Matrix (CCM) provides enterprise IT with a framework for global, implementation-ready controls to prevent and manage cloud-centric information-security risks
Code42 is the idea security company
We believe every single idea has value and we secure every version of every file ever created. We give you what other security software can’t – total data visibility & recovery wherever that data lives and moves, so IT & Security teams can tackle the most time consuming stuff a lot faster.

For more information, visit code42.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live Video Panel - Creating a Winning Security Strategy for 2020
  • Live at: Dec 2 2019 11:30 am
  • Presented by: Richard Agnew, Code42 | Ray Ford, GDPR Associates | Rita Bhowan, The Law Society
  • From:
Your email has been sent.
or close