Hi [[ session.user.profile.firstName ]]

2018 Security Predictions

New security challenges in 2018

Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
Recorded Nov 30 2017 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bob Hansmann, Director, Security Technologies, Forcepoint
Presentation preview: 2018 Security Predictions

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Accelerating Digital Transformation with Direct-to-Cloud Connectivity & Security Recorded: Jun 5 2019 35 mins
    Jim Fulton, Forcepoint Solution Marketing Director
    Digital transformation is driving change across the world, creating new opportunities to boost business productivity while cutting the costs of infrastructure and operations. Increasingly distributed organizations are re-architecting their networks and security to move their most valuable data and applications to the cloud in order to give their users much richer, faster, less expensive access than ever before. Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. 
    How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Many are now using internet technologies for connect all of their users to cloud-based applications more productively and cost-effectively than ever before.

    In this session we will cover;
    • How to accelerate the adoption of productivity-enhancing SaaS/cloud apps
    • How to overcome MPLS limitations including costs and issues with speed
    • How to quickly add security to direct-to-cloud SD-WAN deployment to keep intruders out and protect use of web content and cloud apps
    • How to streamline operations by integrating connectivity and security across thousands of sites in the cloud and on-premises from one console
  • Ask the Cloud Security Expert: How to Protect your Critical Data in the Cloud Recorded: Jun 4 2019 19 mins
    Dave Barnett, Forcepoint EMEA | Alex Hilton, Cloud Industry Forum
    Effectively protecting critical data in the cloud is a key challenge for today's data-driven businesses.

    Join this interactive 1-2-1 discussion where Cloud Access Security Broker (CASB), Dave Barnett will share insights on;

    - Why and how today organisations are protecting data in the cloud.
    - What are the main risks inherent in the adoption of cloud services?
    - Where the key challenges are in protecting data in the Cloud?
    - What to look for when selecting cloud security for your organisation

    Moderated by Alex Hilton, Chief Executive, Cloud Industry Forum
  • Livestream Video - Multi-Cloud Security and Compliance Recorded: Jun 4 2019 46 mins
    John Meakin, GSK | Patrick Grillo, Fortinet | Dave Barnett, Forcepoint EMEA | James Hughes, Rubrik
    The cloud strategy of today's enterprise spans across multiple clouds and hundreds of applications. Point security solutions no longer work, so enterprises are turning toward a more orchestrated approach to achieving security and compliance in the cloud.

    Join cloud and security leaders in an interactive discussion to learn about:
    - Key security and compliance challenges associated with a multi-cloud strategy
    - Recommendations for managing and automating security across multiple clouds and applications
    - The future of cloud
    - Improving enterprise security in an ever-changing threat landscape

    James Hughes, Field CTO, Rubrik
    Dave Barnett, Head of CASB, Forcepoint EMEA
    Patrick Grillo, Senior Director - Security Solutions, Fortinet
    John Meakin, Group Chief Information Security Officer, GlaxoSmithKline (GSK)

    Moderated by Alex Hilton, Chief Executive, Cloud Industry Forum
  • Transforming Cloud Connectivity & Security in Distributed Networks Recorded: Mar 27 2019 35 mins
    Jim Fulton, Director Product Marketing, Forcepoint
    Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.
    In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
  • Understanding the Limitations of Microsoft O365 Security Recorded: Feb 27 2019 26 mins
    Mike Osterman (Osterman Research)
    Microsoft Office 365 includes native security at various levels, depending on your license. But is that enough? Osterman Research discovered that over 73% of organizations will choose to either supplement or replace native Office 365 security with third-party solutions by 2019.

    In this 30-minute session, CEO and founder Mike Osterman will discuss their findings and what’s driving these organizations’ decisions, including:

    - Organizations’ key priorities for securing O365
    - Barriers to adoption and full migration of users
    - Identifying key third-party solutions like Email Security, CASB, and DLP that can help mitigate security gaps and lower TCO

    Presenter: Mike Osterman, CEO and Founder, Osterman Research
  • 2019 Forcepoint Cybersecurity Predictions Recorded: Feb 13 2019 49 mins
    Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security Analyst
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your enterprise and the primary source of security breaches driving cyber risk to all-time highs.

    In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we could have ever imagined.

    Join our webcast now, where we’ll examine topics such as:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale

    Join Forcepoint's Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security Analyst, for a webcast discussing the most pressing cybersecurity issues – and what you can do to protect against them.
  • Using Risk Analysis to Enhance Compliance Recorded: Jan 30 2019 20 mins
    Andras Cser, Vice President and Principal Analyst, Forrester
    For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.

    In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:

    - How your auditors are behaving
    - Why risk-based prioritization is the only way to find threats
    - The importance of context
    - Forrester’s recommendations and best practices

    Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy Recorded: Jan 16 2019 35 mins
    Doug Landoll, CEO, Lantego
    Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.

    In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:

    - How to define cybersecurity success
    - Common approaches that fall short
    - Risk-based cybersecurity strategy planning

    Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
  • Comparing CASB Solutions from Microsoft and Forcepoint Recorded: Dec 13 2018 46 mins
    Mike Osterman, CEO, Osterman Research
    CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.

    In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:

    - Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
    - Provide a detailed analysis of how both products compare over 13 key feature areas
    - Consider coverage of third-party apps beyond Office 365

    Attend this session to explore the best route to full Office 365 security.
  • The State of the CASB Market Recorded: Dec 13 2018 38 mins
    Mike Osterman, CEO, Osterman Research
    CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.

    In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:

    -Key cloud adoption concerns
    -Most valued CASB features
    -Levels of confidence in controlling data and maintaining compliance

    Attend this session to learn more about the need for and use of CASBs in today’s organizations.
  • Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions Recorded: Nov 20 2018 7 mins
    Raffael Marty, VP of Research & Intelligence and colleagues
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely. This intersection of people interacting with data and technology will also drive cyber risk to all-time highs, according to new insights from Forcepoint researchers and data scientists.

    Watch this video as our Cyber Experts discuss their contributions to the 2019 Forcepoint Cybersecurity Predictions Report, including:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale
  • See SD-WAN with Enterprise Scale and Security in Action Recorded: Oct 5 2018 45 mins
    David LePage, Systems Architect & Jim Fulton, Solution Director, Forcepoint
    Our networks are bigger and more complex than ever, but the charge remains the same: connecting many locations and protecting many devices. Forcepoint offers the most scalable SD-WAN solution, combined with the industry’s top-rated next-gen firewall—all managed at enterprise scale from a single policy-based console.

    In this webcast, we will demo Forcepoint SD-WAN and you will learn how to:

    - Manage enterprise-grade connectivity and protection
    - Streamline compliance across all devices
    - Reduce complexity and cost
  • Take the Safer Road: Best Practices in SaaS Application Security Recorded: Aug 15 2018 40 mins
    Doug Cahill (ESG)
    For most SaaS developers, security features aren’t top of mind. Because there are no real standard practices yet, the risks presented by the myriad SaaS applications varies widely.

    In this session, ESG Senior Analyst Doug Cahill, will discuss some best practices and the risks presented by a lack of standards, including:

    - Challenges securing cloud applications
    - The Shadow IT Reality
    - Cloud App Security
    - Implementing Cloud App Security Best Practices with a CASB
  • Cloud Security Foundations Recorded: Aug 15 2018 33 mins
    Doug Cahill (ESG)
    Cloud access security brokers (CASB) provide visibility and control for cloud applications (SaaS, PaaS, and IaaS), and an increasingly important part of a CASB solution is to extend data loss protection for data stored in the cloud.

    In this session, ESG Senior Analyst Doug Cahill, will discuss cloud trends and how deploying enterprise-class DLP and CASB solutions together can provide key value for your business, including:

    - Cloud Adoption Trends
    - Who is the “user”?
    - Understanding The Shared Responsibility Security Model
    - The Role of DevOps in Cloud Security
    - The Rise of the Cloud Security Architect
  • Mastering Policy Setting and Control in the Cloud Recorded: Aug 15 2018 28 mins
    Andras Cser (Forrester)
    Extending the necessary control and policies in the cloud can be a daunting task for many enterprise customers. But with the right tools in place, it doesn’t have to be that way.

    Join guest presenter Forrester Vice President, Principal Analyst serving Security and Risk professionals, Andras Cser as he shares their recommendations for securing data and mastering policy setting. In this 30-minute session, Andras will discuss:

    - The need to protect SaaS data… AND across the IaaS and PaaS platforms
    - The importance of automation
    - The pros and cons of the architectural approaches

    Presenter: Andras Cser, Vice President, Principal Analyst serving Security and Risk professionals, Forrester
  • Maximize your Office 365 Investment with Forcepoint Recorded: May 23 2018 47 mins
    Mike Smart, Product & Solutions Director, Forcepoint
    Driving Office 365 adoption is an important goal - 87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance and poor user experience caused by network architecture limitations and constraints.

    Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite.

    * Enhance Microsoft's integrated cloud security and regain visibility & protection against advanced attacks and data loss
    * Extend compliance consistently into the Microsoft ecosystem and beyond
    * Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk
    * Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud

    Join us as we explore these use cases and demonstrate how Forcepoint protects Office 365 and your expanding cloud environment.
  • The Top 5 Security Lessons Learned from Transitioning to the Cloud Recorded: May 23 2018 50 mins
    Carla Arend, Arun Singh, Nico Fischbach
    Join IDC Senior Program Director for Cloud, Carla Arend, Salesforce Director for Security Customer Engagement, Arun Singh and Forcepoint Global CTO, Nico Fischbach for a discussion on security and a cloud-first strategy.

    This 50-minute webinar addresses the top five information security lessons IT professionals have learned while transitioning to the cloud.

    The topics covered include:
    * Multi-cloud adoption: exposing challenges for security architectures
    * Cloud application visibility and control
    * Cloud-first and GDPR implications
    * Data management and DLP in the cloud
    * Leveraging User and Entity Behavior Analytics (UEBA) for protection"
  • How a Security Company Secures its Own Cloud Recorded: May 23 2018 33 mins
    Meerah Rajavel & Dr. Richard Ford
    Driving Office 365 adoption is an important goal—87% of IT professionals say it’s a top priority -- yet, few have fully migrated their users and apps, with security, regulatory and resource challenges often the cause. Security companies too, face these same fundamental challenges. As a recent Office 365 adopter, Forcepoint has first-hand experience securely migrating users to the cloud.

    Join Forcepoint’s CIO and Chief Scientist as they share learnings, surprises and insights from our own migration.

    Presented by;
    * Meerah Rajavel, CIO, Forcepoint
    * Dr. Richard Ford, Chief Scientist, Forcepoint
  • Is Threat-Centric Security Running so Fast just to Stand Still? Recorded: May 23 2018 39 mins
    Antti Reijonen, Dr. Richard Ford & David Coffey
    A traditional threat-centric approach focuses on prevention and detection of attacks that exploit vulnerabilities in the software. The cloud environment abolishes the “walls” that helped us feel more protected. Cloud application security requires a new user-centric approach that respects the dynamic nature of users and how they interact with data, enabling organizations to recognize and respond to real risks.

    You will learn:

    * How user-centric security is different than traditional threat-centric security
    * How organizations can make the transition to user-centric security
    * Forcepoint’s vision for securing the organization in the future

    Presented by:
    * Antti Reijonen, VP of Cloud Solutions, Forcepoint
    * Dr. Richard Ford, Chief Scientist, Forcepoint
    * David Coffey, VP of Cloud Security R&D, Forcepoint
  • Securing Your Cloud Applications Recorded: May 21 2018 38 mins
    Ankur Chadda, Sr. Product Marketing Manager, Forcepoint
    The Art of Managing Risk - Making the Invisible, Visible

    Today, the average enterprise customer uses over 1,000 cloud applications, including SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service), or even homegrown cloud applications. To mitigate security risks, IT leaders need to ensure assets housed in these cloud environments are secure.

    According to a recent Forcepoint security survey, 56% of business decision-makers stated that it’s difficult or very difficult to promote innovation through a move to cloud while maintaining corporate security and governance.

    The art of managing cloud application risk today is critically centered on making the invisible visible, while also applying the necessary control and governance. Watch this webcast to learn how Forcepoint CASB, along with DLP for Cloud Applications and Web Security solutions, can help with:

    - Discovery – insight into what cloud apps are being used by employees
    - Enforcement – automated threat prevention and context-aware policy enforcement
    - Risk Assessment – contextual risk of applications, users, and security configurations
Connect and protect your mobile, global workforce
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2018 Security Predictions
  • Live at: Nov 30 2017 7:00 pm
  • Presented by: Bob Hansmann, Director, Security Technologies, Forcepoint
  • From:
Your email has been sent.
or close