Hi [[ session.user.profile.firstName ]]

2018 Security Predictions

New security challenges in 2018

Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
Live online Nov 30 7:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bob Hansmann, Director, Security Technologies, Forcepoint
Presentation preview: 2018 Security Predictions

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 2018 Security Predictions Nov 30 2017 7:00 pm UTC 60 mins
    Bob Hansmann, Director, Security Technologies, Forcepoint
    New security challenges in 2018

    Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

    Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

    You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
  • Human Centric Cloud Security Recorded: Oct 24 2017 29 mins
    Shan Zhou, VP Security Engineering, Forcepoint CASB
    As traditional cybersecurity perimeters dissolve, the HUMAN POINT – the intersection of users, data & networks, and where your data is BEST protected – is what remains.

    Most of your employees have adopted the cloud. And while your BYOD policy has increased productivity and lowered operating costs, cloud-based apps like Office 365, Dropbox and Salesforce need protection to prevent account-centric threats, meet compliance requirements and protect critical data. How can companies maintain their productive pace while maintaining regulatory and security controls?

    Join Shan Zhou, Sr. Director of CASB Sales Engineering at Forcepoint,, as he shares with you an overview and tool that help answer:
    • What are the gaps in cloud app security and how does CASB address them?
    • How do you understand the normal rhythm of users’ behavior?
    • How do you respond to risks in real-time?
    • Are there assessments currently in place that can help me identify individuals within my organization that pose the most risk, security incidents and overall risk?
  • 2017 US State of Cybercrime: The Reality of Today’s Security Risks Recorded: Sep 27 2017 36 mins
    Dr. Richard Ford, Chief Scientist, Forcepoint - Bob Bragdon, SVP/Publisher, CSO at IDG Enterprise
    Excerpts from the US State of Cybercrime Survey, conducted by CSO, US Secret Service, Carnegie Mellon University CERT, and Forcepoint
  • Data Security & Office 365—Stop Chasing Data Recorded: Sep 26 2017 35 mins
    Brian Moran, Director, Data & Insider Threat, Forcepoint
    Data security is a never-ending battle to keep up with the latest regulations and protect intellectual property from targeted attacks and accidental exposure—all while adapting to evolving IT environments of cloud applications. Understandably, most enterprises want to meet their compliance demands and data protection needs with integrated, built-in DLP features that come with cloud applications like Office 365. Most take the seemingly logical approach to chase the data in your Office 365, other cloud apps and IT systems—find it, catalogue it, control it. But this ignores the biggest threat to data security—your people. By ignoring how your people interact with the data, who touches it and who has access to it, data protection teams limit their perspective to IT systems and don’t actually reduce the risk of data loss. Data security shouldn’t start and stop with the data. By focusing on your people and how they interact with the data, data security teams can deliver actual data protection that eases the burden of compliance, identifies risk based on user behavior and stops data loss by applying the appropriate control based on user risk and sensitivity of the data.
  • The Total Economic Impact of Forcepoint Web Security And Email Security Cloud Recorded: Sep 26 2017 25 mins
    Bob Hansmann, Director, Security Technologies, Forcepoint & Jon Erickson, VP, TEI, Forrester
    Today’s technology decisions require “next-level” business case justification. Forrester’s Total Economic Impact™ framework identifies all factors that affect a significant technology investment decision. For this commissioned study, Forrester Consulting recently examined inputs from a Forcepoint Web Security Cloud and Email Security Cloud client to determine the benefits, costs, flexibility and risks. The results are notable.

    This webcast outlines a three-year impact, including:
    • 122% ROI
    • $895,000 benefits
    • $492,000 NPV
    • 6 month payback

    Join this webcast to understand the framework and how Forcepoint delivers value.
  • Why and How to Secure Cloud Apps While Keeping Employees Productive Recorded: Sep 26 2017 22 mins
    Shan Zhou, Sr. Director, CASB Engineering, Forcepoint
    Cloud apps such as Dropbox, Box, Salesforce, Office 365 and Google Apps enhance productivity and collaboration between teams, but IT professionals have difficulty taking away access to these apps once users start relying on them. Taking them away is not the solution; instead, you should understand how to leverage the cloud’s operational benefits and cost advantages while simultaneously providing your IT team with visibility into cloud app usage.

    Using CASB (Cloud Access Security Broker) technology, organizations gain visibility into cloud app usage, identify high-risk activities and enforce policy and controls for cloud apps to prevent account-centric threats, meet compliance requirements and protect data.

    Join Shan Zhou, Sr. Director of CASB Engineering at Forcepoint, for an overview on CASB and as he addresses:

    • What are the gaps in cloud app security and how does CASB address them?
    • How do you identify the risky applications your employees are using?
    • What are the key CASB features to consider when implementing it into your environment?
  • A Predictive "PreCrime" Approach Requires a Human Focus Recorded: Sep 26 2017 36 mins
    Dr. Richard Ford, Chief Scientist, Forcepoint
    In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Precrime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed.

    In this webcast, we will examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
  • WannaCry & Petya - Where do we go from here? Recorded: Sep 26 2017 30 mins
    Carl Leonard, Principal Security Analyst, Forcepoint Security Labs & Neil Addleton, Security Advisor, South Australia Health
    One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Our security experts examine the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.

    During the session, Carl Leonard and Neil Addleton will discuss the latest on WannaCry, Petya, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:

    - Which ransomware should you defend against?
    - Should you pay the ransom?
    - What can you do to protect your data and network? (research-based)
    - How is your organization using the Cloud in a risky way, putting your data more at risk?
  • Evaluating CASB - Five Use Cases to Consider Recorded: Sep 26 2017 21 mins
    Aaron Smith, Sr. Product Marketing Manager, Cloud Security, Forcepoint
    Your organization has a cloud-first imperative. You know that traditional, perimeter defenses will not protect employees using cloud applications. This webcast discusses five emerging use cases and how to address them while keeping employees, partners, and clients productive.

    - Discovery of Shadow IT
    - Managing any vs. all cloud applications
    - Securing users anywhere
    - Protecting the data, wherever it flows
    - UEBA in the cloud - it's more important than you think
  • Safely Embracing the Cloud - Forcepoint CASB Overview Recorded: Aug 10 2017 35 mins
    Shan Zhou, Sr. Director of CASB Engineering
    To protect data in the cloud, your security teams need visibility into how users engage with sanctioned and unsanctioned cloud applications. Cloud Access Security Brokers provide the ability to monitor and control how your users interact with data in the cloud.

    Learn about Forcepoint CASB while we review your options for safely embracing cloud apps.
  • Are You Prepared for Ransomware? Recorded: May 18 2017 47 mins
    Carl Leonard, Principal Security Analyst at Forcepoint
    One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Carl Leonard, Principal Security Analyst at Forcepoint, examines the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.

    During the session, Carl will discuss the latest on WannaCry, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:

    - Which ransomware should you defend against?
    - Should you pay the ransom?
    - What can you do to protect your data and network? (research-based)
    - How is your organization using the Cloud in a risky way, putting your data more at risk?


    About the Presenter:
    Carl Leonard is a Principal Security Analyst within Forcepoint’s Security Labs team. He is responsible for enhancing threat protection and threat monitoring technologies at Forcepoint, in collaboration with the company’s global Security Labs teams. Focusing on protecting companies against the latest cyberattacks that can lead to data theft, Carl advises customers on the state of the threat landscape and how to enhance their security posture. Carl is an active international spokesperson and an expert speaker, regularly contributing to externally-facing blogs and research papers. Carl has over 10 years of experience in the security research arena.
  • Top 5 Risk Mitigations in a Cloud-First World Recorded: May 11 2017 71 mins
    Adrian Sanabria, Neil Thacker
    Join this exclusive Forcepoint™ webcast on the Top 5 Risk Mitigations in a Cloud-First World. As applications and data become cloud-based, IT security professionals must prepare their future architecture and risk management programs for a cloud-first world.
    In this webcast we will examine:
    The perception that cloud data centers are more secure than legacy data centers
    Freedom of data – managing the flow of data from endpoint to Cloud and vice-versa
    Cloud security – combining application and data security controls for contextual insight
    Access control – policy enforcement with applied monitoring, visibility and analytics
    Behavior analysis – how to detect threats from external and inside threats
    Join security experts from 451 Research and Forcepoint for an in-depth, interactive discussion on these challenges and more.
  • Why Go to the Cloud with Forcepoint? Recorded: May 11 2017 33 mins
    Miguel Ramos
    The Cloud is here: cloud adoption is growing, organizations have “cloud-first” mandates for information technology initiatives, and Software as a Service (SaaS) usage is exploding. While you may already be utilizing the benefits of many cloud services, this webcast will help you examine Forcepoint’s options for moving your web and email security to the Cloud.
Protect your people everywhere they work
Forcepoint protects networks from the most advanced threats while saving valuable time and resources. Forcepoint Web Security Cloud & Forcepoint Email Security Cloud are built on shared TRITON architecture and Forcepoint’s Advanced Classification Engine (ACE), allowing for hassle-free maintenance and software updates to ensure the highest level of protection.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2018 Security Predictions
  • Live at: Nov 30 2017 7:00 pm
  • Presented by: Bob Hansmann, Director, Security Technologies, Forcepoint
  • From:
Your email has been sent.
or close