Hi [[ session.user.profile.firstName ]]

2018 Security Predictions

New security challenges in 2018

Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
Recorded Nov 30 2017 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bob Hansmann, Director, Security Technologies, Forcepoint
Presentation preview: 2018 Security Predictions

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • See SD-WAN with Enterprise Scale and Security in Action Recorded: Oct 5 2018 45 mins
    David LePage, Systems Architect & Jim Fulton, Solution Director, Forcepoint
    Our networks are bigger and more complex than ever, but the charge remains the same: connecting many locations and protecting many devices. Forcepoint offers the most scalable SD-WAN solution, combined with the industry’s top-rated next-gen firewall—all managed at enterprise scale from a single policy-based console.

    In this webcast, we will demo Forcepoint SD-WAN and you will learn how to:

    - Manage enterprise-grade connectivity and protection
    - Streamline compliance across all devices
    - Reduce complexity and cost
  • Take the Safer Road: Best Practices in SaaS Application Security Recorded: Aug 15 2018 40 mins
    Doug Cahill (ESG)
    For most SaaS developers, security features aren’t top of mind. Because there are no real standard practices yet, the risks presented by the myriad SaaS applications varies widely.

    In this session, ESG Senior Analyst Doug Cahill, will discuss some best practices and the risks presented by a lack of standards, including:

    - Challenges securing cloud applications
    - The Shadow IT Reality
    - Cloud App Security
    - Implementing Cloud App Security Best Practices with a CASB
  • Cloud Security Foundations Recorded: Aug 15 2018 33 mins
    Doug Cahill (ESG)
    Cloud access security brokers (CASB) provide visibility and control for cloud applications (SaaS, PaaS, and IaaS), and an increasingly important part of a CASB solution is to extend data loss protection for data stored in the cloud.

    In this session, ESG Senior Analyst Doug Cahill, will discuss cloud trends and how deploying enterprise-class DLP and CASB solutions together can provide key value for your business, including:

    - Cloud Adoption Trends
    - Who is the “user”?
    - Understanding The Shared Responsibility Security Model
    - The Role of DevOps in Cloud Security
    - The Rise of the Cloud Security Architect
  • Understanding the Limitations of Microsoft O365 Security Recorded: Aug 15 2018 26 mins
    Mike Osterman (Osterman Research)
    Microsoft Office 365 includes native security at various levels, depending on your license. But is that enough? Osterman Research discovered that over 73% of organizations will choose to either supplement or replace native Office 365 security with third-party solutions by 2019.

    In this 30-minute session, CEO and founder Mike Osterman will discuss their findings and what’s driving these organizations’ decisions, including:

    - Organizations’ key priorities for securing O365
    - Barriers to adoption and full migration of users
    - Identifying key third-party solutions like Email Security, CASB, and DLP that can help mitigate security gaps and lower TCO

    Presenter: Mike Osterman, CEO and Founder, Osterman Research
  • Mastering Policy Setting and Control in the Cloud Recorded: Aug 15 2018 28 mins
    Andras Cser (Forrester)
    Extending the necessary control and policies in the cloud can be a daunting task for many enterprise customers. But with the right tools in place, it doesn’t have to be that way.

    Join guest presenter Forrester Vice President, Principal Analyst serving Security and Risk professionals, Andras Cser as he shares their recommendations for securing data and mastering policy setting. In this 30-minute session, Andras will discuss:

    - The need to protect SaaS data… AND across the IaaS and PaaS platforms
    - The importance of automation
    - The pros and cons of the architectural approaches

    Presenter: Andras Cser, Vice President, Principal Analyst serving Security and Risk professionals, Forrester
  • Have You Outgrown Your Web Security? Recorded: Jun 12 2018 26 mins
    JK Lialias, Sr. Director, Cloud Security, Forcepoint
    In the past, web security mainly focused on blocking users’ access to potentially malicious web content. But the threat landscape is evolving and users are everywhere online, including cloud applications. Is your Web security solution keeping up?

    In this webcast, learn how Forcepoint Web Security provides the most advanced real-time threat defense to support the anywhere, anytime workforce. Understand how Forcepoint Web Security:

    • Helps increase productivity without adding needless complexity
    • Uses CASB to discover and secure data in cloud applications, along with DLP to prevent data loss
    • Empowers users to manage everything from one console, including shared policies and centralized reporting

    See why legacy vendors don’t even come close.
  • Maximize your Office 365 Investment with Forcepoint Recorded: May 23 2018 47 mins
    Mike Smart, Product & Solutions Director, Forcepoint
    Driving Office 365 adoption is an important goal - 87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance and poor user experience caused by network architecture limitations and constraints.

    Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite.

    * Enhance Microsoft's integrated cloud security and regain visibility & protection against advanced attacks and data loss
    * Extend compliance consistently into the Microsoft ecosystem and beyond
    * Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk
    * Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud

    Join us as we explore these use cases and demonstrate how Forcepoint protects Office 365 and your expanding cloud environment.
  • The Top 5 Security Lessons Learned from Transitioning to the Cloud Recorded: May 23 2018 50 mins
    Carla Arend, Arun Singh, Nico Fischbach
    Join IDC Senior Program Director for Cloud, Carla Arend, Salesforce Director for Security Customer Engagement, Arun Singh and Forcepoint Global CTO, Nico Fischbach for a discussion on security and a cloud-first strategy.

    This 50-minute webinar addresses the top five information security lessons IT professionals have learned while transitioning to the cloud.

    The topics covered include:
    * Multi-cloud adoption: exposing challenges for security architectures
    * Cloud application visibility and control
    * Cloud-first and GDPR implications
    * Data management and DLP in the cloud
    * Leveraging User and Entity Behavior Analytics (UEBA) for protection"
  • How a Security Company Secures its Own Cloud Recorded: May 23 2018 33 mins
    Meerah Rajavel & Dr. Richard Ford
    Driving Office 365 adoption is an important goal—87% of IT professionals say it’s a top priority -- yet, few have fully migrated their users and apps, with security, regulatory and resource challenges often the cause. Security companies too, face these same fundamental challenges. As a recent Office 365 adopter, Forcepoint has first-hand experience securely migrating users to the cloud.

    Join Forcepoint’s CIO and Chief Scientist as they share learnings, surprises and insights from our own migration.

    Presented by;
    * Meerah Rajavel, CIO, Forcepoint
    * Dr. Richard Ford, Chief Scientist, Forcepoint
  • Is Threat-Centric Security Running so Fast just to Stand Still? Recorded: May 23 2018 39 mins
    Antti Reijonen, Dr. Richard Ford & David Coffey
    A traditional threat-centric approach focuses on prevention and detection of attacks that exploit vulnerabilities in the software. The cloud environment abolishes the “walls” that helped us feel more protected. Cloud application security requires a new user-centric approach that respects the dynamic nature of users and how they interact with data, enabling organizations to recognize and respond to real risks.

    You will learn:

    * How user-centric security is different than traditional threat-centric security
    * How organizations can make the transition to user-centric security
    * Forcepoint’s vision for securing the organization in the future

    Presented by:
    * Antti Reijonen, VP of Cloud Solutions, Forcepoint
    * Dr. Richard Ford, Chief Scientist, Forcepoint
    * David Coffey, VP of Cloud Security R&D, Forcepoint
  • Securing Your Cloud Applications Recorded: May 21 2018 38 mins
    Ankur Chadda, Sr. Product Marketing Manager, Forcepoint
    The Art of Managing Risk - Making the Invisible, Visible

    Today, the average enterprise customer uses over 1,000 cloud applications, including SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service), or even homegrown cloud applications. To mitigate security risks, IT leaders need to ensure assets housed in these cloud environments are secure.

    According to a recent Forcepoint security survey, 56% of business decision-makers stated that it’s difficult or very difficult to promote innovation through a move to cloud while maintaining corporate security and governance.

    The art of managing cloud application risk today is critically centered on making the invisible visible, while also applying the necessary control and governance. Watch this webcast to learn how Forcepoint CASB, along with DLP for Cloud Applications and Web Security solutions, can help with:

    - Discovery – insight into what cloud apps are being used by employees
    - Enforcement – automated threat prevention and context-aware policy enforcement
    - Risk Assessment – contextual risk of applications, users, and security configurations
  • Detecting Evasive Malware - Forcepoint Advanced Malware Detection Recorded: Apr 12 2018 10 mins
    Ankur Chadda, Sr. Product Marketing Manager, Forcepoint
    It’s become increasingly difficult to identify the malware components of advanced threats, mostly due to the evolution of evasion tactics and technology by criminal and nation-state threat actors.

    Forcepoint Advanced Malware Detection (AMD) technology is unmatched in security efficacy. Even highly evasive threats are revealed through Deep Content Inspection of activity at multiple levels, dormant code, and other indicators often overlooked by other sandbox technologies.

    Join Sr. Product Marketing Manager for Cloud Security Ankur Chadda, as he explores how Forcepoint AMD’s added functionality goes beyond the traditional sandbox.

    *Forcepoint AMD is an optional integrated module for Forcepoint CASB, NGFW, Web and Email Security products.
  • 2018 Security Predictions Recorded: Nov 30 2017 53 mins
    Bob Hansmann, Director, Security Technologies, Forcepoint
    New security challenges in 2018

    Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

    Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

    You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
  • Rethinking Cybersecurity Recorded: Oct 25 2017 21 mins
    Aaron Smith, Sr Product Manager for CASB, Doug Barth, CEO Of Simply Direct
    As an organization’s data and applications disperse over multiple environments and platforms, the job of managing cybersecurity gets more complex. What strategies are IT decision makers pursuing to simplify the management process while simultaneously improving protection against cyber threats? During this webinar Aaron Smith, Sr Product Manager for CASB and Doug Barth, Founder of Gatepoint Research look at:
    > How concerned organizations are with cyber threats and how confident are they in their current security against various cyber threat scenarios
    > How invested are organizations with cloud-based applications
    > If organizations have a security solution strategy?
  • Human Centric Cloud Security Recorded: Oct 24 2017 29 mins
    Shan Zhou, VP Security Engineering, Forcepoint CASB
    As traditional cybersecurity perimeters dissolve, the HUMAN POINT – the intersection of users, data & networks, and where your data is BEST protected – is what remains.

    Most of your employees have adopted the cloud. And while your BYOD policy has increased productivity and lowered operating costs, cloud-based apps like Office 365, Dropbox and Salesforce need protection to prevent account-centric threats, meet compliance requirements and protect critical data. How can companies maintain their productive pace while maintaining regulatory and security controls?

    Join Shan Zhou, Sr. Director of CASB Sales Engineering at Forcepoint,, as he shares with you an overview and tool that help answer:
    • What are the gaps in cloud app security and how does CASB address them?
    • How do you understand the normal rhythm of users’ behavior?
    • How do you respond to risks in real-time?
    • Are there assessments currently in place that can help me identify individuals within my organization that pose the most risk, security incidents and overall risk?
  • 2017 US State of Cybercrime: The Reality of Today’s Security Risks Recorded: Sep 27 2017 36 mins
    Dr. Richard Ford, Chief Scientist, Forcepoint - Bob Bragdon, SVP/Publisher, CSO at IDG Enterprise
    Excerpts from the US State of Cybercrime Survey, conducted by CSO, US Secret Service, Carnegie Mellon University CERT, and Forcepoint
  • Data Security & Office 365—Stop Chasing Data Recorded: Sep 26 2017 35 mins
    Brian Moran, Director, Data & Insider Threat, Forcepoint
    Data security is a never-ending battle to keep up with the latest regulations and protect intellectual property from targeted attacks and accidental exposure—all while adapting to evolving IT environments of cloud applications. Understandably, most enterprises want to meet their compliance demands and data protection needs with integrated, built-in DLP features that come with cloud applications like Office 365. Most take the seemingly logical approach to chase the data in your Office 365, other cloud apps and IT systems—find it, catalogue it, control it. But this ignores the biggest threat to data security—your people. By ignoring how your people interact with the data, who touches it and who has access to it, data protection teams limit their perspective to IT systems and don’t actually reduce the risk of data loss. Data security shouldn’t start and stop with the data. By focusing on your people and how they interact with the data, data security teams can deliver actual data protection that eases the burden of compliance, identifies risk based on user behavior and stops data loss by applying the appropriate control based on user risk and sensitivity of the data.
  • The Total Economic Impact of Forcepoint Web Security And Email Security Cloud Recorded: Sep 26 2017 25 mins
    Bob Hansmann, Director, Security Technologies, Forcepoint & Jon Erickson, VP, TEI, Forrester
    Today’s technology decisions require “next-level” business case justification. Forrester’s Total Economic Impact™ framework identifies all factors that affect a significant technology investment decision. For this commissioned study, Forrester Consulting recently examined inputs from a Forcepoint Web Security Cloud and Email Security Cloud client to determine the benefits, costs, flexibility and risks. The results are notable.

    This webcast outlines a three-year impact, including:
    • 122% ROI
    • $895,000 benefits
    • $492,000 NPV
    • 6 month payback

    Join this webcast to understand the framework and how Forcepoint delivers value.
  • Why and How to Secure Cloud Apps While Keeping Employees Productive Recorded: Sep 26 2017 22 mins
    Shan Zhou, Sr. Director, CASB Engineering, Forcepoint
    Cloud apps such as Dropbox, Box, Salesforce, Office 365 and Google Apps enhance productivity and collaboration between teams, but IT professionals have difficulty taking away access to these apps once users start relying on them. Taking them away is not the solution; instead, you should understand how to leverage the cloud’s operational benefits and cost advantages while simultaneously providing your IT team with visibility into cloud app usage.

    Using CASB (Cloud Access Security Broker) technology, organizations gain visibility into cloud app usage, identify high-risk activities and enforce policy and controls for cloud apps to prevent account-centric threats, meet compliance requirements and protect data.

    Join Shan Zhou, Sr. Director of CASB Engineering at Forcepoint, for an overview on CASB and as he addresses:

    • What are the gaps in cloud app security and how does CASB address them?
    • How do you identify the risky applications your employees are using?
    • What are the key CASB features to consider when implementing it into your environment?
  • A Predictive "PreCrime" Approach Requires a Human Focus Recorded: Sep 26 2017 36 mins
    Dr. Richard Ford, Chief Scientist, Forcepoint
    In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Precrime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed.

    In this webcast, we will examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Protect your people everywhere they work
Forcepoint protects networks from the most advanced threats while saving valuable time and resources. Forcepoint Web Security Cloud & Forcepoint Email Security Cloud are built on shared TRITON architecture and Forcepoint’s Advanced Classification Engine (ACE), allowing for hassle-free maintenance and software updates to ensure the highest level of protection.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2018 Security Predictions
  • Live at: Nov 30 2017 7:00 pm
  • Presented by: Bob Hansmann, Director, Security Technologies, Forcepoint
  • From:
Your email has been sent.
or close