Hi [[ session.user.profile.firstName ]]

Understanding the Limitations of Microsoft O365 Security

Microsoft Office 365 includes native security at various levels, depending on your license. But is that enough? Osterman Research discovered that over 73% of organizations will choose to either supplement or replace native Office 365 security with third-party solutions by 2019.

In this 30-minute session, CEO and founder Mike Osterman will discuss their findings and what’s driving these organizations’ decisions, including:

- Organizations’ key priorities for securing O365
- Barriers to adoption and full migration of users
- Identifying key third-party solutions like Email Security, CASB, and DLP that can help mitigate security gaps and lower TCO

Presenter: Mike Osterman, CEO and Founder, Osterman Research
Recorded Feb 27 2019 26 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Osterman (Osterman Research)
Presentation preview: Understanding the Limitations of Microsoft O365 Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Implementing Zero-Trust in the Enterprise Apr 29 2020 3:00 pm UTC 30 mins
    Dr Chase Cunningham, Principal Analyst, Forrester | Nico Popp, Chief Product Officer, Forcepoint
    The disconnect between security, operations and business is now a 30-year old story that is on the verge of being rewritten.Our presenters, Forrester Principal Analyst Dr. Cunningham and Forcepoint’s Chief Product Officer will exchange their views and strategies.

    Attend this session and you will discover:

    - Use cases that tell us why Zero Trust matters
    - What the reality looks like when you weed out the theory and break down the perimeters
    - How to implement Zero-Trust in enterprise environments
  • Forcepoint Exchange Live Panel 2 Apr 29 2020 2:00 pm UTC 45 mins
    Mekonnen Kassa, Microsoft, Nico Popp, Forcepoint and Paul Garvey, Forcepoint’s EMEA VP, Sales
    This live panel discussion will look at how partnering can solve evolving security challenges. Panelists include Mekonnen Kassa, Microsoft, Nico Popp, Forcepoint and Paul Garvey, Forcepoint’s EMEA VP, Sales.

    During this session we explore the roles of different organisations in tackling evolving security challenges and contributing to business success.

    Moderated by Mike Smart, Director of Product Marketing, Forecpoint
  • Make sense of SASE Apr 29 2020 12:00 pm UTC 32 mins
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • Voice of the CTO: The Future of Cloud Security Apr 29 2020 11:00 am UTC 32 mins
    Nicolas Fischbach, Global CTO, Forcepoint
    While digital transformation delivers many benefits to organisations and users, it also introduces various challenges - such as a proliferation of unique applications to manage and monitor.

    Forcepoint CTO Nico Fischbach shares the shape of things to come within the technological landscape:

    - A rational approach to the tech stack
    - Converged security that does more thanks to behaviour-based algorithms
    - The growing role of SASE in cloud transformation
  • Meeting Customer Needs in the Future Apr 29 2020 10:00 am UTC 30 mins
    Mekonnen Kassa, Director of Cloud Security Engineering Customer Experience, Microsoft
    Innovation for most businesses in the foreseeable future will be largely driven by the cloud. Hear from customer experience expert Mekonnen Kassa how Microsoft, in partnership with specialist vendors including Forcepoint, is transforming the customer experience:

    - Facilitating the move from on-premise to cloud-first
    - Enabling the customer to leverage and optimise technology investments
    - Protecting core business priorities and assets
  • Forcepoint Exchange Live Panel 1 Apr 28 2020 2:00 pm UTC 45 mins
    William Beer, HB Advisory | James Wilde, Forcepoint | Dr. Jessica Barker, Cygenta | Andy Wall, Office of National Statistics
    Join William Beer for a live panel discussion with Forcepoint Exchange speakers answering your questions received during the virtual summit.

    Moderator:
    William Beer, Managing Partner, HB Advisory

    Panelists:
    James Wilde, User Protection Strategist, Forcepoint
    Dr. Jessica Barker, CEO and Chair of ClubCISO, Cygenta
    Andy Wall, CISO, Office of National Statistics
  • Cloud security – It's Just Tin Apr 28 2020 1:00 pm UTC 30 mins
    Andy Wall, CISO, Office of National Statistics | William Beer, Managing Partner, HB Advisory
    Data counts among the vital assets sitting in all organisations and every business requires a data strategy that fits with overarching business goals. With petabytes of data to govern at the Office of National Statistics, CISO Andy Wall’s approach is enlightening and includes:

    - Establishing a security programme and adapted policies
    - Propelling new strategies and overcoming inertia
    - Driving ownership of specific datasets
  • Human Bias for Cybersecurity Today Apr 28 2020 12:00 pm UTC 30 mins
    Dr. Jessica Barker, CEO and Chair of ClubCISO – Cygenta | William Beer, Managing Partner, HB Advisory
    Dr Jessica Barker talks about her own route into cyber security, and provides breaking insights into the way people behave in a hyper-connected environment.

    In this session, we’ll explore:

    - The concept of human bias in the context of cybersecurity
    - Why the human element has to be an integral part of any multi-layered defence strategy
    - Whether or not CISOs need to become human behaviour experts in the future
  • Humans are the New Perimeter: Rethinking Edge Protection Apr 8 2020 2:00 pm UTC 16 mins
    Jim Fulton, Solution Director, Forcepoint
    With data and applications moving beyond the traditional enterprise edge into the cloud, your people are now your perimeter—breaking old approaches to security along the way.

    Learn how SASE security delivered from the cloud is changing how your people and your business, safe while reducing complexity and costs.
  • Increasing the security of your remote workforce Apr 8 2020 3:30 am UTC 45 mins
    Nick Savvides, Senior Director of Strategic Business, Forcepoint APAC
    Amidst the challenges that are escalating across the globe, the cogs in your organization must keep turning and both business and life need to keep moving forward.

    Here at Forcepoint, we recognize the concerns of your employees who are trying to balance between delivering quality of work while maintaining health through minimizing human interaction.

    Join our LIVE webcast where Nick Savvides will highlight tips and advice on how to increase the security of your remote workforce and improve the protection your company data and IP.
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy Recorded: Apr 1 2020 33 mins
    Doug Landoll, CEO, Lantego
    Effective governance requires a proactive approach. So when creating a cybersecurity strategy, it’s best to address the primary issue–risk–head on.



    Watch this webcast to learn:

    - How to define cybersecurity success

    - Steps you can take now to help avoid compliance issues later

    - Common approaches that fall short
  • Securing your remote workforce and keeping your enterprise safe Recorded: Apr 1 2020 34 mins
    Colette Tomasiak, Senior Product Manager, Forcepoint & Jim Fulton, Solution Director, Forcepoint
    Teams need to be able to do work anywhere and thanks to mobile devices and cloud-based applications, they can. It’s a dynamic that enables productivity, agility and innovation–while testing the security of users, data and devices.

    This webcast highlights the challenges and visibility gaps that cybersecurity teams face, and what they can do to mitigate risk in today’s hyper-connected world.

    • Easily connect to internal systems and data – securely
    • Exercise account protections across managed and unmanaged endpoints
    • Identify abnormal activity early on and enforce policies proactively
    • Use behavioral insights to minimize risk
  • ESG: Take the safer road: best practices in SaaS Application Security Recorded: Mar 25 2020 38 mins
    Doug Cahill, Senior Analyst, Cybersecurity, ESG
    In today’s environment of shared-responsibility security, you can’t–and shouldn’t–rely solely on the built-in security features of your many SaaS apps. By implementing certain standards, you can bolster security across your cloud environment.



    Watch this webcast to gain more insights into:

    - Challenges related to securing cloud apps

    - The shadow IT reality

    - CASB-specific best practices for cloud app security
  • Keeping Remote Workers Safe and Your Work Secure Recorded: Mar 25 2020 35 mins
    Carl Leonard, Principal Security Analyst, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint
    Organizations are pivoting to remote work enablement models at an unprecedented scale. As global organizations navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority.

    Join security strategists Carl Leonard and Mike Smart as they share six security tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes remote. Discussion will include;

    - Securing your employee from malicious web content
    - Securing your sensitive data from leaving your organization
    - Securing your Cloud application and the sensitive data on the cloud
    - Securing your application from remote access
  • Forrester: Mastering Policy Setting in the Cloud Recorded: Mar 18 2020 25 mins
    Andras Cser, Vice President, Principal Analyst serving Security & Risk Professionals, Forrester
    While the benefits of the cloud are many, there are trade-offs, too. When your data resides in the cloud, you’re giving up some ownership and control of that data. Still, with the right policies in place, it’s possible to ensure security and compliance.

    Watch this webcast to gain more insights into:

    - Protecting cloud data across SaaS, IaaS, and PaaS
    - The importance of automation
    - Pros and cons of different architectural approaches
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy Recorded: Mar 16 2020 34 mins
    Doug Landoll, CEO, Lantego
    Effective governance requires a proactive approach. So when creating a cybersecurity strategy, it’s best to address the primary issue–risk–head on.



    Watch this webcast to learn:

    - How to define cybersecurity success

    - Steps you can take now to help avoid compliance issues later

    - Common approaches that fall short
  • ESG: Take the safer road: best practices in SaaS Application Security Recorded: Mar 16 2020 39 mins
    Doug Cahill, Senior Analyst, Cybersecurity, ESG
    In today’s environment of shared-responsibility security, you can’t–and shouldn’t–rely solely on the built-in security features of your many SaaS apps. By implementing certain standards, you can bolster security across your cloud environment.



    Watch this webcast to gain more insights into:

    - Challenges related to securing cloud apps

    - The shadow IT reality

    - CASB-specific best practices for cloud app security
  • Security Tips for Employees Who Work from Home (Cantonese) Recorded: Mar 12 2020 24 mins
    William Tam, Director of Sales Engineering, APAC
    The coronavirus is disrupting our way of life in Hong Kong. Despite of this, the cogs in your business are still turning and both business and life need to keep moving forward.

    Here at Forcepoint, we recognize the fear and concerns of your employees who are trying to balance between delivering quality of work while maintaining health through minimizing human interaction.

    To enable your employees to work from home without compromising the security of your company's assets, Forcepoint would like to share a few common cybersecurity challenges and tips in this webcast:

    •Securing your employee from malicious web content
    •Securing your sensitive data from leaving your organization
    •Securing your Cloud application and the sensitive data on the cloud
    •Securing your application from remote access

    The webcast will be presented in Cantonese.
  • Protecting the Edge with Forcepoint Recorded: Jan 16 2020 9 mins
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint
    The traditional security perimeter is no longer! Organisations are adopting cloud services and mobile working and looking for better ways to protect their distributed office environments.

    Join security evangelist, Chris Boorman, and Director of Product Marketing Mike Smart as they look at the new world of Edge protection and how Forcepoint combines networking and security services to offer flexible protection for users and data everywhere.
  • The Changing Perimeter Recorded: Jan 14 2020 10 mins
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint
    The traditional security perimeter to the organisation has shifted considerably having come under stress from digital transformation projects. Business information is increasingly living within hybrid cloud environments and users require access to this data everywhere in order to remain productive.

    In this video webinar, security evangelist Chris Boorman and Director of Product Marketing Mike Smart, look at the new world of Edge protection. They analyse how and why networking and security services are combining to offer more flexible protection for users and data everywhere.
Connect and protect your mobile, global workforce
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Understanding the Limitations of Microsoft O365 Security
  • Live at: Feb 27 2019 4:00 pm
  • Presented by: Mike Osterman (Osterman Research)
  • From:
Your email has been sent.
or close