Hi [[ session.user.profile.firstName ]]

Understanding the Limitations of Microsoft O365 Security

Microsoft Office 365 includes native security at various levels, depending on your license. But is that enough? Osterman Research discovered that over 73% of organizations will choose to either supplement or replace native Office 365 security with third-party solutions by 2019.

In this 30-minute session, CEO and founder Mike Osterman will discuss their findings and what’s driving these organizations’ decisions, including:

- Organizations’ key priorities for securing O365
- Barriers to adoption and full migration of users
- Identifying key third-party solutions like Email Security, CASB, and DLP that can help mitigate security gaps and lower TCO

Presenter: Mike Osterman, CEO and Founder, Osterman Research
Recorded Feb 27 2019 26 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Osterman (Osterman Research)
Presentation preview: Understanding the Limitations of Microsoft O365 Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Debunking 5 Myths of Secure SD-WAN Jan 18 2022 3:00 pm UTC 60 mins
    Alex Hilton, Cloud Industry Forum (CIF) | Ozgur Danisman, Forcepoint | Benoit Vedel, SITA
    According to IDC, the global SD-WAN infrastructure market will reach $5.25 billion in 2023 from $1.4 billion in 2018. There’s enough market buzz to support that. By now, almost everyone knows something about software-defined-wide-area networking (SD-WAN). SD-WAN is getting a lot of buzz over its MPLS counterpart, but every innovation in tech comes with certain misconceptions—it’s just part of the territory. So, what do you need to know to avoid the pitfalls and get started? In this discussion we dive into 5 common myths of SD-WAN including how SD-WAN: - Just replaces MPLS to save money - It takes the place of the internet - It eliminates the need for on-premises hardware - It comes with high availability, easy manageability, and excellent security - Security is built in Speakers: - Alex Hilton, Chief Executive at Cloud Industry Forum (CIF) - Ozgur Danisman, VP, EMEA Sales Engineering at Forcepoint - Benoit Vedel, Head of Infrastructure & Network Backbone at SITA
  • The State of SASE and 5 Steps to Success Dec 22 2021 9:30 am UTC 55 mins
    Alex Hilton, Chief Executive, Cloud Industry Forum & Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    More than 40% of enterprises will have strategies to adopt SASE by 2024, according to Gartner. This initiative has been hugely pushed forward due to the pandemic, with the focus now shifting to enabling people to work safely from anywhere.

    A Secure Access Service Edge (SASE) can improve and streamline how enterprises keep their workers, and clients’ data safe. However, there are multiple steps for professionals to consider when implementing their SASE strategies, from inspecting their network security to understanding user behaviour.

    With such a high-level interest for a relatively new approach to network security, it’s time to ask questions about the longevity of SASE, whether it was deployed correctly, and what solutions it will provide in the future?

    Join us to learn:
    - 5 steps to succeed with SASE
    - How cybersecurity professionals are successfully implementing their SASE architecture
    - How SASE adoption has been approached, and what these techniques mean in the long run
    - The future of SASE and secure access
  • Identity e Data Security: pronto alle nuove sfide poste dai cambiamenti attuali? Dec 16 2021 9:00 am UTC 41 mins
    Andrea Rigoni | Alessio Uva | Andrea Solaroli | Alessandro Biagini
    Secondo un recente sondaggio di McKinsey, una delle maggiori sfide che gli addetti alla sicurezza dovranno affrontare nei prossimi dodici mesi sarà la gestione e la protezione del dati di forza lavoro perlopiu remota : nove organizzazioni su dieci hanno bisogno di una sicurezza che protegga utenti, dati e privacy senza influire negativamente sulla produttività.

    Parleremo di:
    - Come identificare le principali iniziative per la sicurezza del lavoro a distanza e qual è la migliore per la tua azienda
    - Modalita efficaci per ridurre l’impatto degli attacchi ransomware
    - Prevenzione consapevole di un data breach
  • Preparing For SASE & Zero Trust Dec 15 2021 9:30 am UTC 56 mins
    Nick Savvides, Senior Director of Strategic Business, Forcepoint
    The shift to Secure Access Service Edge (SASE) as the security architecture of choice together with the adoption of Zero Trust, continues to gain momentum amongst organizations across the globe.
    Driven by network modernization and digital transformation projects, SASE and Zero Trust have become highly sought-after approaches to deliver agility and flexibility while increasing the security and protection of staff and critical business data, no matter where they reside.
    Are you ready to adopt these approaches? Are you prepared to make the change?
    Join me online where I’ll share insights into key network and security transformation considerations to prepare your network and business for SASE and Zero Trust. I’ll also offer valuable resources to take away and allow time for a Q&A session at the end, so have your questions ready for me on the day!
    SASE and Zero Trust offer a future-proof model for cybersecurity in today’s constantly evolving business world. I hope you can participate and will look forward to connecting with you.
    ~ Nick Savvides - Senior Director of Strategic Business, Forcepoint
  • Der beste Weg um Daten zu schützen Dec 14 2021 9:00 am UTC 25 mins
    David Berger, Account Manager, Forcepoint | Lars Kroll, Security Stratege, Kroll Strategieberatung
    Eine der größten Herausforderungen für Security Verantwortliche in den nächsten 12 Monaten wird der Schutz von Daten in hybriden Arbeitsumgebungen sein. McKinsey geht davon aus, dass neun von zehn Unternehmen in Zukunft klassische Büro- und Home-Office-Arbeitsplätze kombinieren werden.
    Um in dies zu ermöglichen, müssen IT-Abteilungen Daten und Privatsphäre schützen, ohne die Produktivität zu beeinträchtigen.
    Ein Data-First Ansatz ermöglicht es die Produktivität unabhängig vom Arbeitsort zu steigern, indem der Zugriff auf Daten und Anwendungen vereinheitlicht wird. Gleichzeitig minimiert der Ansatz das Risiko von Datenverlust.

    Wir sprechen über

    - Die wichtigsten Initiativen, um Hybride Arbeitsmodelle zu ermöglichen
    - Die größten Herausforderungen beim Schutz von Daten
    - Die Privatsphäre von Mitarbeitern in einer hybriden Arbeitsumgebung
  • Hibrit iş Gücü için Veri Koruması ve Etkileri Dec 9 2021 9:00 am UTC 52 mins
    Murat Bayraktar, Forcepoint | Gürkan Papila, Eczacıbaşı Holding | Murat Zaralı, Yıldız Holding
    McKinsey'in 2021 yılı küresel anketine göre, önümüzdeki on iki ay boyunca siber güvenlik uzmanlarının karşılaşacağı en büyük zorluklardan biri, fiziki sınırların ortadan kalktığı işgücünün kritik verilerini yönetmek ve korumak olacak. Ayrıca araştırmada on kuruluştan dokuzunun uzaktan ve yerinde çalışmayı birleştireceği belirtilmiş. Gartner’ın yaptığı diğer bir araştırmaya göre de, şirketlerin %75'inin COVID-19 sonrası bazı çalışanlarını kalıcı olarak uzaktan çalışmaya kaydırmayı planladığını ortaya koyuyor.
    Bu hibrit çalışma ortamına etkin bir şekilde uyum sağlamak için, kuruluşların iş üretkenliğini, verileri ve gizliliği olumsuz bir şekilde etkilemeden koruyan bir siber güvenlik altyapısına ihtiyacı var.

    Güvenli erişim sağlamak için kullanılan “Veri Odaklı” yaklaşım, üretkenliği artırır ve riski azaltır; verilerinize, uygulamalarınıza ve hizmetlerinize erişimi iyileştirmenize ve kullanıldığı her yerde verilerin güvenliğini sağlamanıza olanak tanır.

    Bu etkinlikte irdelenecek konular:

    - Uzaktan çalışma için temel siber güvenlik insiyatifleri nasıl belirlenir ve bunlardan hangisi sizin iş ortamınız için en iyisidir?
    - Fidye yazılımı saldırılarının etkisini azaltmak için en etkili insiyatif hangisidir?
    - Veri ihlallerinin önlenmesi konusunda karşılaşılan zorluklar ve çözümleri nelerdir?
    - Hibrit iş gücü ortamında veri gizliliğinin korunması ve 2022 yılı için regulasyonlara uyumluluk konusundaki temel gelişmeler nelerdir?

    Murat Bayraktar, Satış Mühendisliği Müdürü, Forcepoint
    Gürkan Papila, CIO, Eczacıbaşı Holding
    Murat Zaralı, Bilgi Güvenliği Direktörü, Yıldız Holding
  • Network Transformation Projects: Common Risks & How to Prevent Them Dec 8 2021 9:30 am UTC 58 mins
    Nick Savvides, Senior Director of Strategic Business, Forcepoint
    Many organizations are modernizing their networks; moving from MPLS to SD-WAN, dropping on-premises gateways and adopting cloud-based offerings, breaking out internet traffic, looking at VPN replacements. There are many benefits to modernizing, but there are risks, too. Organizations with complex networks and services often find themselves derailed by technology and business realities.

    In this webinar Nick Savvides, Forcepoint Senior Director of Strategic Business APAC, will explore common risks and key considerations in ambitious network transformations and share:

    • Mitigation strategies for common risks of network transformation projects
    • Key considerations to ensure successful, future-proofed secured network transformations
    • Strategies for building a balanced business case to gain approval for network transformation

    Don’t miss out on this informative 1-hour session designed to provide you with knowledge, insights and useful takeaways.

    APAC Time Zone: 9.30am IST / 12pm SGT / 2pm AEDT
  • La Protección del Dato en un entorno laboral híbrido Dec 7 2021 10:00 am UTC 46 mins
    Elena Cerrada, Forcepoint | Juan Luis Garijo, Crowdstrike | Carlos Ferro, Thycotic
    El cambio dramático que hemos experimentado para poder mantener una fuerza laboral remota y la aceleración en la transformación digital que conlleva, han puesto de relieve dos aspectos relevantes: que el riesgo ciber ya es un problema que se aborda en los Comités de Dirección y que la ciberseguridad se ha convertido en un habilitador estratégico del negocio.

    Ahora que convivimos con un formato híbrido de trabajo, tenemos que proteger los datos y usuarios allá donde estén y mantener la privacidad sin afectar negativamente la productividad.

    El evento virtual Forcepoint Exchange reúne voces reconocidas de la industria de la ciberseguridad y Forcepoint. Únete a Elena Cerrada, Country Manager de Forcepoint, Juan Luis Garijo, Country Manager de Crowdstrike y Carlos Ferro, VP Sales de Thycotic, para analizar cómo abordan la protección de los datos para mejorar la productividad de su fuerza laboral y simplificar las operaciones de sus equipos de TI.


    Elena Cerrada, Country Manager de Forcepoint para Iberia
    Juan Luis Garijo, Country Manager de Crowdstrike para Iberia
    Carlos Ferro, VP de Ventas en Thycotic
  • Sécuriser la data à l'ère du travail hybride Recorded: Dec 2 2021 39 mins
    Christian Guyon, Manager, Sales Engineering, Forcepoint | Olivier Bouzereau, Journaliste | Mathieu Gorge CEO, Vigitrust
    Dans l’avenir proche, l'un des plus grands défis auxquels les professionnels de la cybersécurité seront confrontés sera la gestion et la protection des données qui dépassent le strict périmètre de l’entreprise. 9 organisations sur 10 combineront désormais le travail à distance et sur site - selon une enquête globale menée par McKinsey en 2021.

    Pour s'adapter efficacement à cet environnement de travail hybride, la sécurité et la confidentialité revêtent autant d’importance que la productivité.

    Fluidifier les échanges en toute sécurité repose sur une approche axée sur les données.

    Rejoignez cette table ronde pour découvrir :

    - Quelles sont les principales initiatives de cybersécurité télétravailleuse adoptées par diverses entreprises en adéquation avec leurs transformations
    - Les dispositifs les plus efficaces pour réduire l'impact des attaques de ransomware
    - Les défis considérables à relever dans le cadre d’une protection efficace et pérenne des données
    - Les développements clés au niveau de la conformité d’ici 2022
  • Securing the Edge in Higher Education: A Fireside Chat with SUNY Plattsburgh. Recorded: Dec 1 2021 40 mins
    Jim Lucas, Network Manager, SUNY Plattsburgh | Yuval Sarig, Forcepoint | Cat Allen, Forcepoint
    Protecting your organization starts with protecting your network. With the rising number of threats that lurk on the outside, and the added complexity of a larger than usual remote workforce, you need to work harder than ever to maintain uninterrupted connectivity and control over widely distributed networks. This can be more difficult to manage over the long term.

    Learn how to gain visibility and performance through Forcepoint Next-Generation Firewall and hear from Jim Lucas, Network Manager at SUNY Plattsburgh, on how his university protects from external threats while enabling free sharing of information and content within the university environment. 

    Takeaways

    - The firewalls act as a “first line of defense”
    - Actively blocks blocked by the firewalls
    - The Security Management Center provides the power and flexibility to manage the firewalls centrally and efficiently
    - The network team is able to leverage Forcepoint Next-Gen Firewall to troubleshoot application-level problems, such as desktop scanning/printer issues for example, by examining network traffic
    - With the redundancy features, their uptime is over 99.999%
  • From Workplace to Workforce Security Recorded: Nov 30 2021 53 mins
    Nick Savvides, Forcepoint | Michelle Griffey, Communisis | Philip Souter, Digital Resilience
    There is much discussion around the remote workforce. Who will return full time? What proportion will be hybrid? Will this be a permanent change? From a security perspective, the challenge is the same: secure your people and data wherever they are.

    In this executive-level discussion, Forcepoint’s Nick Savvides hosts Communisis Chief Risk Officer, Michelle Griffey, and Digital Resilience CISO, Philip Souter, to share their experiences of enabling the transition from workplace to workforce security, lessons learned and looking ahead to the future.

    Key topics include:
    • Shortcomings of traditional technologies for supporting a remote workforce
    • Importance of SASE and Zero Trust in balancing user productivity with security
    • New solutions, platforms and frameworks to sustain the evolution of workforce security
  • Risk Management Technology: Getting It Right Recorded: Nov 25 2021 50 mins
    Nick Savvides, Forcepoint | Marco Figueroa, Australian Institute of Company Directors (AICD)
    When it comes to risk management and data protection, many organizations today are driven by compliance and might have all the tick boxes checked, but are still experiencing data breaches, cyber events and other disruptions. Ransomware is the main culprit at the top of the list, but being ‘compliant’ won’t stop it. CISOs need to focus security budget and controls in the right areas in order to effectively protect an organization from cyber threats and data breaches.

    Join this session and listen to a fireside chat between Forcepoint’s Nick Savvides and Marco Figueroa, CISO of the AICD. They will share insights into the risks associated with not having correct technology deployed to effectively secure an organization from cyber threats, the critical areas that security budget should be invested when limited funds are available, the key metrics CISO’s should be using to measure results and “have a voice” at Board level, and how to articulate a Zero Trust concept into a conversation that resonates with board members.

    Key takeaways for audience:
    - How to enable a healthy balance between being compliant and having necessary threat protection technology in place.
    - Critical areas to invest security budget when limited funds are available.
    - The importance of using metrics that are understood by the Board and to ensure positive outcomes.
    - Articulating the concept of Zero Trust into a conversation that resonates with the board.

    Presenters:
    Nick Savvides, Senior Strategic Business Director, Forcepoint
    Marco Figueroa, CISO, Australian Institute of Company Directors (AICD)
  • 6 Stages for a Successful DLP Migration. Recorded: Nov 24 2021 61 mins
    Kevin Oliveira, Sr. Product Marketing Manager, Forcepoint | Abdul Pasha, Sr. Manager - Professional Services, Forcepoint
    How did a large enterprise customer migrate its DLP with 100,000 endpoints in just six weeks?

    By leveraging the same six-stage framework that countless businesses across the world have used to successfully migrate to Forcepoint DLP. Hosts Abdul Pasha, Sr. Manager of Professional Services, and Kevin Oliveira, Sr. Product Marketing Manager, share their best practices and strategic tips for seamlessly migrating DLP platforms of all sizes.

    Key topics include:

    - Planning your timeline backward from a target implementation date
    - Understanding similarities of language and functionality for both platforms
    - Facilitating post-implementation knowledge transfer
  • Die Herausforderungen von Cyberangriffen und Ransomware. Recorded: Nov 17 2021 57 mins
    Hans-Wilhelm Dunn | David Berger | Konrad Langhammer
    Ransomware und andere Cyberangriffe stellen seit langem eine besondere Herausforderung dar.
    Regierungen weltweit sind sich dessen bewusst, dass Regierungsbehörden und Organisationen in kritischen nationalen Infrastrukturen dringend neue Pläne, Cybersicherheitsprogramme und Wiederherstellungssysteme benötigen.

    Der "Zero Trust"-Ansatz für die Netzwerksicherheit eignet sich hervorragend für den Schutz von Unternehmen im Zeitalter von Cloud-Anwendungen, virtualisierten Desktops und weit verbreitetem Netzwerkzugriff.

    Eine wichtige Frage dabei ist allerdings, welche Bereiche zu einem solchen „Zero Trust Netzwerk“ dazu gehören. Wo ziehen wir unseren Perimeter? Was hat das alles mit den großen Hacks aus der jüngsten Zeit zu tun? Auf diese und viele weitere Fragen möchten wir gemeinsam mit Herrn Hans-Wilhelm Dünn, Präsident, Cyber-Sicherheitsrat e.V., Antworten liefern.
    Wenn Sie mehr über die Bedeutung von Zero Trust für unsere IT-Infrastrukturen erfahren möchten, schauen Sie sich unser Webinar.
  • Rester dans la course : Une longueur d’avance sur la transformation numérique Recorded: Nov 16 2021 47 mins
    Venita Maupou, Rémi Enjalbert, Stéphane Chmielewski, Benjamin Leroux
    Tandis que les entreprises ont dû s’adapter rapidement au changement en passant du travail au bureau au travail à distance, la transformation numérique a continué à se développer en 2020. Ces changements comprennent, sans s’y limiter, le passage au cloud, et ses diverses utilisations pour à la fois accéder aux données clients dans le domaine bancaire ou la fabrication, jusqu’à la transformation du SD-WAN, qui a fait évoluer pour toujours la façon dont nous restons connectés.

    Tandis que la transformation numérique a été un élément clé de 2020, la transformation des entreprises et du leadership a également évoluée. 2020 a obligé, plus qu’auparavant, les dirigeants à réfléchir de façon plus critique à leurs stratégies de sécurité de l’entreprise. La transformation participative s’est développée et les dirigeants doivent dorénavant écouter les utilisateurs plutôt que de leur dire non, et adopter la Shadow IT. D’autres domaines de transformation comprennent les décisions liées à l’adoption du cloud, à la gestion de la sécurité des employés sur les appareils utilisés à domicile, et à de plus larges questions de vie privée.

    Il est essentiel que les dirigeants aient suffisamment de connaissances afin de prendre les meilleures décisions possibles pour leurs sociétés.

    Dans cette séance, nous allons aborder les points suivants:
    -La principale force motrice de la transformation numérique
    -La responsabilité des choix informatiques ; comment adopter le Shadow IT sans mettre en danger la sécurité
    -Les sociétés et leurs employés prennent-ils des décisions plus audacieuses et celles-ci peuvent-elles être plus bénéfiques et faire baisser le coût de propriété ?
    -Prendre les meilleures décisions de sécurité pour votre activité ; les réflexions autour de l’adoption du cloud et des appareils des employés

    Presenters:
    -Venita Maupou Senior Program Manager/Rémi Enjalbert Senior Sales Engineer, Forcepoint
    -Stéphane Chmielewski CISO, Finologee
    -Benjamin Leroux Marketing Director, Advens
  • The Human Threat: Breaking Down Insider Risk Recorded: Nov 9 2021 57 mins
    Michael Crouse, Dir. Enterprise User & Data Protection, Forcepoint | Darren Mott, Former FBI Supervisory Special Agent
    Identifying and stopping insider threats continues to be one of the biggest security challenges facing organizations today. They range from the ‘good’ employee engaging in unintentional risky activity, the employee being targeted by external bad actors, to the worst case scenario, the malicious insider. In this more complex remote world, what strategies are available to surface threats – and can we stop them before they cause a breach?

    In this session, Forcepoint’s Director of User & Data Protection, Michael Crouse is joined by special guest, Former FBI Supervisory Special Agent, Darren Mott to share their experiences in helping organizations and government bodies develop their insider threat programs:

    Topics include:
    - Real insider threat cases and their outcomes
    - Insider threat vectors and the telltale signs of exploit
    - The role of technology in providing meaningful visibility to protect “the crown jewels”
    - Investigating behavioral changes and the impact of social distancing
    - How to minimize losses and collateral damage
    - Practical steps you can implement today
  • Optimizing Cyber Resilience In The Era Of Ransomware. Recorded: Nov 3 2021 55 mins
    Nick Savvides, Senior Director of Strategic Business, Asia Pacific, Forcepoint
    As our businesses have all become dependent on technology for practically all aspects of operations, cyber-resilience is now directly tied to business-resilience closer than ever before.

    Join Forcepoint’s Senior Director of Strategic Business – Nick Savvides – online where he’ll share insights into how cyber-criminals are using ransomware to cripple organizations including their common techniques and methods of operation.

    He will also reveal how to optimize the most common existing controls that organizations typically already have deployed, to reduce the likelihood and the impact of a ransomware event.

    And finally, Nick will examine what new technologies and approaches can be applied to significantly improve the resilience of these attacks as well as how to build a business case to obtain resourcing from the board to support new technology initiatives.
  • Risk-adaptive Data Security for Today’s Hybrid Workforce. Recorded: Nov 3 2021 21 mins
    Ozgur Danisman, Vice President Sales Engineering, EMEA, Forcepoint
    Cybersecurity - particularly during the pandemic - is a true business enabler, delivering customers anywhere, anytime security availability without compromising performance or productivity. In fact, a recent joint Forcepoint/WSJ Intelligence survey revealed that leaders view cybersecurity as the key to business advantage, with 48% of the respondents reporting cybersecurity’s bigger role in enabling innovation and 41% agreeing that it delivers a competitive edge.

    Today’s reality is that people are working from everywhere, and progressive organizations must address the protection of precious information assets in perimeter-less networking environments.

    But how to manage, harness and protect this data to best effect? The challenges we as cybersecurity professionals face are multiple.

    Join this webinar to learn:
    - How to protect data as it flows across a hyper-distributed organization, with multi-generational infrastructure?
    - How to comply with international data protection regulations?
    - How to truly understand what data we have, what we need to protect, who wants to access it, how are they behaving, and where the data is moving?
  • Die Gratwanderung zwischen dem Datenschutz und der Befähigung von Fernarbeitern Recorded: Oct 28 2021 37 mins
    Carsten Hoffmann I Lars Kroll I Peter "Faxe" Lachenmair
    In den letzten 12 Monaten hat sich die Fernarbeit grundlegend verändert. Diese wird jedoch in absehbarer Zeit nicht vorbei sein. Die Arbeit ist von einem Standort zu einer Aktivität geworden, und die Art und Weise, wie wir arbeiten, hat sich für immer verändert. Eine Gartner-Umfrage ergab, dass 74 % der CFOs beabsichtigen, einen Teil ihrer Mitarbeiter vor Ort langfristig an einen anderen Standort zu versetzen. Das Problem, mit dem viele Organisationen konfrontiert sind, besteht darin, dass das Fernarbeiten dazu führt, dass sich Benutzer und Daten außerhalb der traditionellen IT-Abwehrsysteme befinden, die normalerweise automatisch denjenigen innerhalb des Netzwerks vertrauen. Führungskräfte müssen lernen, wie sie die Daten innerhalb ihres Unternehmens schützen können, wenn Mitarbeiter „draußen“ sind. Der Wandel in den Arbeitsumgebungen hat die Führungskräfte zu wichtigen Entscheidungen hinsichtlich der Fernarbeit, der Nutzung der Cloud und der Art und Weise, wie sowohl ihre Daten als auch ihre Mitarbeiter geschützt werden können, gezwungen.

    Wie können Unternehmen also ihre Daten schützen und gleichzeitig einer mehr und mehr Remote-Belegschaft leichteren Zugang gewähren? Wie ermöglichen wir es Mitarbeitern, jederzeit und überall sicher auf Daten zuzugreifen?

    Nehmen Sie an dieser Sitzung teil, während wir folgende Punkte diskutieren:
    - Die durch die Pandemie verursachte Änderungsrate und wie sich diese auf Sicherheit, Daten-Compliance und Datenschutzfragen für Mitarbeiter und Kunden auswirkt.
    - Wie man Daten vor Bedrohungen und Exfiltration schützt und gleichzeitig Zugriff auf diese in einem noch nie dagewesenen Ausmaß gewährt
    - Wie man Remote-Mitarbeiter sicher und geschützt hält und gleichzeitig Konflikte im Unternehmen vermeidet, sodass die Mitarbeiter ihre Arbeit erfüllen können
  • Data Security - Learning from Healthcare Recorded: Oct 20 2021 42 mins
    Alex Hilton, Cloud Industry Forum | Kevin Oliveira, Forcepoint | David W. Reis, University of Miami Health System
    The COVID-19 pandemic irrevocably changed global healthcare. IT infrastructure was deployed hastily and organizations were forced to accelerate the adoption of new technologies and services.

    Whilst this uptake was imperative to continue the delivery of life-saving services and treatment, cybercriminals recognized this vulnerability and compromised confidential patient data, according to the 2021 Ponemon Cost of a Data Breach Report, Healthcare was the top industry in average cost of a breach for the 11th year in a row – with nearly a 30% increase, rising from $7.13M to $9.23M in 2021.

    It is therefore crucial that all industries learn from the challenges faced by the Healthcare industry and look ahead at how they can be better prepared.

    Join this session to learn:

    - Why cybersecurity in healthcare couldn’t afford to be competitive?
    - Where should organizations look to invest their budget (if limited)?
    - How to securely make confidential data accessible to staff on and off-site.
    - Why a balance between steady improvement security without negatively impacting the availability of critical medical technology.
    - The difficulty of implementing an industry-wide security standard.

    Alex Hilton, CEO, Cloud Industry Forum
    Kevin Oliveira, Senior Product Marketing Manager, Forcepoint
    David W. Reis, Chief Information Officer at University of Miami Health System
Strategic sessions on Cloud, Network & Data Security
To enable users to work anywhere, we must put data protection at the center of cloud and network security strategies. In this channel, we explore the latest technologies, security trends and frameworks like Zero Trust and SASE to help you not only determine where you are, but also what you still need to do to protect your business. Get the materials and building blocks you need to implement a data-first SASE architecture. See for yourself. https://www.forcepoint.com/sase

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Understanding the Limitations of Microsoft O365 Security
  • Live at: Feb 27 2019 4:00 pm
  • Presented by: Mike Osterman (Osterman Research)
  • From:
Your email has been sent.
or close