Hi [[ session.user.profile.firstName ]]

ESG: Take the safer road: best practices in SaaS Application Security

In today’s environment of shared-responsibility security, you can’t–and shouldn’t–rely solely on the built-in security features of your many SaaS apps. By implementing certain standards, you can bolster security across your cloud environment.



Watch this webcast to gain more insights into:

- Challenges related to securing cloud apps

- The shadow IT reality

- CASB-specific best practices for cloud app security
Recorded Mar 25 2020 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Doug Cahill, Senior Analyst, Cybersecurity, ESG
Presentation preview: ESG: Take the safer road: best practices in SaaS Application Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Continuously Monitoring User Risk for Better Remote Worker Security. Aug 25 2021 8:30 am UTC 18 mins
    Jim Fulton, Sr Director SASE & Zero Trust Solutions - Sean O'Sullivan, Sr Principal Solutions Engineer
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 5 and learn how:

    • Know who is actually at the ‘other end’ is much harder when people are remote
    • Behavioral intelligence is the key to understanding who is really there
    • Defining policies in terms of risk boosts security, simplicity, productivity
  • A Technical Blueprint for Data Protection Aug 18 2021 8:30 am UTC 37 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Robert Mechler, Principal Security Strategist, Forcepoint
    Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential.

    In this webcast, Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.

    Key learnings include:

    - How the move to cloud is making data protection harder
    - How to identify where your critical data is, the channels it flows through and establish an incident response plan
    - How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
    - How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
  • Walking the Tightrope Between Protecting Data and Enabling Remote Workers Aug 17 2021 8:00 am UTC 60 mins
    Alex Hilton, Cloud Industry Forum | Paul Haywood, BUPA | Jim Fulton, Forcepoint
    Since the 2020 workplace evolved from a location to an activity, the way we work has changed forever. Organizations accept that supporting a remote or hybrid workforce is a permanent reality – a recent study revealed 49% of employees prefer a hybrid work arrangement, whilst Gartner has found 75% of midsize enterprises plan to use a hybrid model.

    With users and data operating outside of traditional IT defenses, organizations must understand new exposures to data risk. That new data risk exposure requires implementation of new security models that balance workforce enablement and data security.

    In this discussion, host Alex Hilton is joined by Jim Fulton, Forcepoint’s Director of SASE and Zero Trust Solutions, and Paul Haywood, Group CISO the UK Healthcare Provider, BUPA, to share their experiences and best practices for meeting this challenge.

    Speakers:
    - Alex Hilton, CEO at Cloud Industry Forum
    - Paul Haywood, Group CISO at BUPA
    - Jim Fulton, Director of SASE & Zero Trust solutions at Forcepoint
  • Network Transformation Projects: Common Risks & How to Prevent Them Aug 17 2021 4:00 am UTC 60 mins
    Nick Savvides, Senior Director of Strategic Business, Forcepoint
    Many organizations are modernizing their networks; moving from MPLS to SD-WAN, dropping on-premises gateways and adopting cloud-based offerings, breaking out internet traffic, looking at VPN replacements. There are many benefits to modernizing, but there are risks, too. Organizations with complex networks and services often find themselves derailed by technology and business realities.

    In this webinar Nick Savvides, Forcepoint Senior Director of Strategic Business APAC, will explore common risks and key considerations in ambitious network transformations and share:

    • Mitigation strategies for common risks of network transformation projects
    • Key considerations to ensure successful, future-proofed secured network transformations
    • Strategies for building a balanced business case to gain approval for network transformation

    Don’t miss out on this informative 1-hour session designed to provide you with knowledge, insights and useful takeaways.

    APAC Time Zone: 9.30am IST / 12pm SGT / 2pm AEDT
  • Cybersecurity Simplified for Retail & Hospitality. Aug 11 2021 3:00 pm UTC 32 mins
    Jim Fulton, Head of SASE & Zero Trust Solutions, Forcepoint
    The working models of protecting the edge are no longer enough. Users and apps are everywhere, so it’s essential to protect your data everywhere, too. Secure Service Access Edge (SASE) makes it possible for people to work safely from anywhere. And, with Zero Trust Network Access (ZTNA) principles applied, you can ensure explicit permissions are in place throughout your organization.

    A data-first SASE architecture with built-in ZTNA helps you ensure each person has access to the data they need and allows you to implement appropriate control points based on the usage of that data. See how you can create an integrated cloud and network security strategy using the power of a data-first approach.

    Key takeaways:
    • Protect remote workers both on the web and in the cloud while controlling cloud and private app access without VPNs
    • Connect and protect branch offices as well as safeguard data use everywhere
    • Monitor user risk at all times
  • Best Practices for Avoiding a Data Breach Aug 4 2021 8:30 am UTC 25 mins
    Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
    New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.

    Watch now to learn:
    - Challenges of securing data moving between on-prem and the cloud
    - Tips and takeaways from data-secure companies
    - Technologies they’ve used to prevent breaches
  • Cybercrime zu Corona – und etwas Hoffnung Aug 3 2021 8:00 am UTC 72 mins
    Volker Kozok - Cyber space Expert | David Berger - Forcepoint | Konrad Langhammer - Forcepoint
    Zero Trust Architekturen ist eines der meistdiskutierten Themen unserer Zeit. So hat die Regierung der USA im Mai 2021 eine umfassende executive order zum Thema cybersecurity erlassen. Unter anderem wurde angeordnet, innerhalb von 60 Tagen Konzepte für moderne Architekturen ohne implizites Vertrauen vorzulegen.

    Eine wichtige Frage dabei ist allerdings, welche Bereiche zu einem solchen „Zero Trust Network“ dazu gehören? Wo ziehen wir unseren Perimeter? Was hat das alles mit großen Hacks aus der jüngsten Zeit zu tun?

    Auf diese und viele weitere Fragen möchten wir gemeinsam mit Herrn Volker Kozok, Cybersecurity Experte, Antworten liefern. Wenn Sie mehr über den Stand der IT-Sicherheit in Deutschland und die Bedeutung von Zero Trust für unsere IT-Infrastrukturen erfahren möchten, schauen Sie sich unseren Webinar.
  • Principles for Board Governance of Cyber Risk Recorded: Jul 28 2021 38 mins
    Maya Bundt, Swiss Reinsurance | John Holmes, Forcepoint | Daniel Dobrygowski, World Economic Forum
    Gone are the days of cyber risk as the sole responsibility of the IT department. Today, we’re seeing ransomware attacks every 11 seconds and more than 80% of organizations that pay ransoms are attacked a second time. With cyber thieves and criminals more sophisticated and aggressive, cyber risks continue to be a top threat and priority for business leaders.

    Boards of directors around the world are recognizing that adapting to cyber risk is the cost of doing business today. But how do they move forward?

    This webcast brings together cybersecurity experts from the World Economic Forum, Swiss Reinsurance and Forcepoint to provide insights on the realities of cyber risk facing boards today. Our panelists highlight globally applicable principles to aid directors in governing cyber risk. Uncover why enterprise decision-making requires analysis of the economics behind cyber risk.

    Join us to learn:
    - The economic drivers and impact of cyber risk
    - Alignment of cyber risk management with business needs
    - How cybersecurity is a strategic business enabler
    - Ways to incorporate cybersecurity expertise into board governance
  • Continuously Monitoring User Risk for Better Remote Worker Security Recorded: Jul 26 2021 18 mins
    Jim Fulton, Sr Director SASE & Zero Trust Solutions - Sean O'Sullivan, Sr Principal Solutions Engineer
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 5 and learn how:

    • Know who is actually at the ‘other end’ is much harder when people are remote
    • Behavioral intelligence is the key to understanding who is really there
    • Defining policies in terms of risk boosts security, simplicity, productivity
  • The Human Threat: Breaking Down Insider Risk Recorded: Jul 21 2021 57 mins
    Michael Crouse, Dir. Enterprise User & Data Protection, Forcepoint | Darren Mott, Former FBI Supervisory Special Agent
    Identifying and stopping insider threats continues to be one of the biggest security challenges facing organizations today. They range from the ‘good’ employee engaging in unintentional risky activity, the employee being targeted by external bad actors, to the worst case scenario, the malicious insider. In this more complex remote world, what strategies are available to surface threats – and can we stop them before they cause a breach?

    In this session, Forcepoint’s Director of User & Data Protection, Michael Crouse is joined by special guest, Former FBI Supervisory Special Agent, Darren Mott to share their experiences in helping organizations and government bodies develop their insider threat programs:

    Topics include:
    - Real insider threat cases and their outcomes
    - Insider threat vectors and the telltale signs of exploit
    - The role of technology in providing meaningful visibility to protect “the crown jewels”
    - Investigating behavioral changes and the impact of social distancing
    - How to minimize losses and collateral damage
    - Practical steps you can implement today
  • Leverage Zero Trust to Empower Work from Anywhere while Keeping Data Safe Recorded: Jul 14 2021 17 mins
    Ravi Srinivasan, VP of Solutions and Platform Marketing, Forcepoint
    Forcepoint's VP of Solutions and Platform Marketing takes a look at how Zero Trust, delivered via SASE/ZT Edge, is powering the new work-anywhere approach to business operations and how to get there in 4 key steps, including;

    - The move from implicit to explicit trust
    - How Zero Trust Edge strengthens security for remote people and data
    - A Zero Trust approach enables continuous, risk-adaptive security
  • Cybercrime zu Corona – und etwas Hoffnung Recorded: Jul 8 2021 72 mins
    Volker Kozok - Cyber space Expert | David Berger - Forcepoint | Konrad Langhammer - Forcepoint
    Zero Trust Architekturen ist eines der meistdiskutierten Themen unserer Zeit. So hat die Regierung der USA im Mai 2021 eine umfassende executive order zum Thema cybersecurity erlassen. Unter anderem wurde angeordnet, innerhalb von 60 Tagen Konzepte für moderne Architekturen ohne implizites Vertrauen vorzulegen.

    Eine wichtige Frage dabei ist allerdings, welche Bereiche zu einem solchen „Zero Trust Network“ dazu gehören? Wo ziehen wir unseren Perimeter? Was hat das alles mit großen Hacks aus der jüngsten Zeit zu tun?

    Auf diese und viele weitere Fragen möchten wir gemeinsam mit Herrn Volker Kozok, Cybersecurity Experte, Antworten liefern. Wenn Sie mehr über den Stand der IT-Sicherheit in Deutschland und die Bedeutung von Zero Trust für unsere IT-Infrastrukturen erfahren möchten, schauen Sie sich unseren Webinar.
  • Step up from integrated DLP Recorded: Jul 7 2021 35 mins
    Nicolas Fischbach, Global CTO, Forcepoint & John Stringer, Director of Product Management, Forcepoint
    How to know if you're ready for enterprise DLP

    Data Loss Prevention (DLP) technology is now everywhere – you will often find it integrated in other security products like Web and Email Security, whilst many Cloud Aps will offer it as part of their service. But is it enough to rely on a myriad of providers to fulfill this critical security need?

    In this discussion, we evaluate the data protection options against the needs of the business, including:

    - The use cases for DLP; getting visibility of your data, securing critical data wherever it is and compliance
    - How DLP can go from a blocker to a business enabler
    - Why an Enterprise DLP solution is not necessarily a tool just for the big players
    - Is integrated DLP really integrated OR isolated DLP?
  • AMER: Connecting and Protecting Branch Offices in a Cloud World Recorded: Jun 30 2021 18 mins
    Jim Fulton, Sr. Director of Data-first SASE and Zero Trust Solutions - Cat Allen, Network Security Product Marketing Manager
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 4 and learn how:
    • Direct-to-internet connections replace MPLS due to cost and performance
    • SD-WAN enables smart site connectivity parallel to agent user connectivity
    • SASE cloud security is key to keeping resource access safe and seamless
  • Global Privacy, Data Security, and User Protection: What’s New? Recorded: Jun 30 2021 40 mins
    Harriet Pearson, Partner, Hogan Lovells | James Denvil, Counsel, Hogan Lovells | John Holmes, Chief Legal Officer, Forcepoint
    In the current era of distributed enterprises, executive and security leaders must address where and how employees work while protecting the organization’s critical data and intellectual property. Corporate risk management programs must evolve along with IT and security services to support a permanent, massive remote workforce. Monitoring user interactions with data and systems continues to be the foundation of managing cyber risk.

    This webcast provides a legal perspective on running effective cyber-risk management in the remote workforce era. Discover the latest trends and strategies for security monitoring programs and the impact on privacy, compliance and productivity for the anywhere worker.

    Join us to learn:

    - The impact of remote work arrangements on cyber risk and security policy controls
    - The similarities and differences between international regulations and laws governing data protection compliance
    - Approaches to user monitoring that balance privacy protection for the remote workforce and cyber risk management for the organization
  • Une stratégie Zero Trust : Ne faites jamais confiance, Vérifiez toujours Recorded: Jun 24 2021 46 mins
    Venita Maupou & Vincent LeClerc (Forcepoint) | Alain De Maght (Hôpitaux Iris Sud)
    Les mots d’ordre du modèle de sécurité Zero Trust sont « Ne faites jamais confiance, Vérifiez toujours. À chaque fois. » Cette attitude envers la vérification est particulièrement importante dans le monde du post-Covid19. Tandis que de nombreux salariés travaillent toujours à distance et ont besoin d'avoir accès à des logiciels sur leurs appareils à domicile, votre modèle de sécurité doit être diligent. Cependant, en dépit de la pandémie, la sophistication des violations de données augmente depuis des années, et les mesures de sécurité doivent continuer à s’adapter aux risques continus. Selon Microsoft, 94% des sociétés ont déclaré qu’elles étaient en train de déployer une approche Zero Trust.

    Qu’est donc Zero Trust, et que peut-elle faire pour vous ?

    Dans cette session, nous allons examiner :
    - Pourquoi Zero Trust est en train de prendre son essor, et si Zero Trust peut faire du tort à l’expérience utilisateur, ou l’améliorer
    - Comment changer la façon dont vous envisagez la sécurité afin de préparer votre entreprise à la stratégie Zero Trust

    Participez à cette séance pour en apprendre plus sur l’utilité de la stratégie Zero Trust, et savoir s’il s’agit d’une la solution définitive ou simplement du début d’une stratégie évolutive de cyber sécurité.

    Les présentateurs:
    -Venita Maupou Sr Program Manager, Forcepoint
    -Vincent LeClerc, Sales Engineer, Forcepoint
    -Alain De Maght CISO, Hôpitaux Iris Sud
  • Connecting and Protecting Branch Offices in a Cloud World Recorded: Jun 23 2021 18 mins
    Jim Fulton, Sr. Director of Data-first SASE and Zero Trust Solutions - Cat Allen, Network Security Product Marketing Manager
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 4 and learn how:
    • Direct-to-internet connections replace MPLS due to cost and performance
    • SD-WAN enables smart site connectivity parallel to agent user connectivity
    • SASE cloud security is key to keeping resource access safe and seamless
  • Business and Security Strategies for The Unbound Enterprise Recorded: Jun 23 2021 31 mins
    Nico Fischbach, Global CTO, Forcepoint | Elizabeth Nann, Exec. Dir. of Global Consumer Insights, WSJ Intelligence
    Executives agree in the vast potential for integrated, converged security approaches, believing security is the path to innovation and competitive advantages. That is the upshot from the new “The C-Suite Report: Business and Security Strategies for The Unbound Enterprise.”

    Join Elizabeth Nann, executive director of Consumer Insights for Wall Street Journal, and Nico Fischbach, global CTO and vice president of SASE Engineering, both with unique personal insights on the view from the board and SOC.

    Elizabeth’s and Nico’s share insights on:

    - How you can adapt your company to SASE and cloud consumption models
    - How much new innovation your company should take on as part of the journey to the new model
    - How to choose the right SASE partner – and the capabilities and services to look for
    - Ways to avoid fragmentation while implementing unified policy, unified reporting and better user experience.
    - How SASE can pave the way to ultimately get to a frictionless user experience
    - And, why Zero Trust and SASE are better together.
  • Zero-Trust-Strategie: Niemals vertrauen, immer überprüfen Recorded: Jun 22 2021 32 mins
    Carsten Hoffmann I Lars Kroll I Jens Schubert
    Das Schlüsselwort des Zero Trust-Sicherheitsmodells lautet „Nie vertrauen, immer überprüfen. Immer.“ Diese Einstellung zu Sicherheit ist in einer Welt nach Covid-19 besonders wichtig, da viele Mitarbeiter immer noch von zu Hause arbeiten und teilweise mit ihren eigenen Geräten auf Geschäftsdaten zugreifen.

    Unabhängig von der Pandemie werden Cyber Angriffe seit Jahren immer raffinierter und die Auswirkungen immer kostspieliger. Sicherheitsmaßnahmen müssen an die Risiken angepasst werden. Laut Microsoft haben 94 % der Unternehmen berichtet, dass sie dabei sind Zero-Trust- zu implementieren.
    Was ist also Zero Trust, und welche Vorteile bietet es Ihnen?

    In dieser Session werden wir folgende Punkte diskutieren:
    - Warum Zero Trust jetzt an Bedeutung gewinnt und ob Zero Trust die Benutzererfahrung beeinträchtigen oder verbessern kann.
    - Umdenken im Sicherheitsbereich, um Ihre Organisation auf eine Zero-Trust-Strategie vorzubereiten.

    Nehmen Sie an dieser Session teil, um mehr über den Wert einer Zero Trust-Strategie zu erfahren und darüber, ob Zero Trust das Endergebnis ist oder ob es nur der Ausgangspunkt für eine zukunftssichere Cybersicherheitsstrategie ist.
  • Managing Cloud Risk and Security in 2021 Recorded: Jun 17 2021 60 mins
    Jo Peterson | Nicolas Moy | Stan Lowe | Jim Fulton
    Cloud adoption is skyrocketing. The Hyperscale providers are reporting double digit increases in revenues. Cloud can be more secure than on premises environments, but the optimal word is can. Cloud security is a shared responsibility model. How business approach their part of the security, management and oversight of cloud is a critical part of the success puzzle.

    In this session we’ll explore:

    • Biggest Cloud Security Challenges of 2021
    • Adopting a Risk Management Framework
    • A life cycle approach that includes Security by Design and Privacy by Design
    • Regulatory considerations and cloud privacy
    • Tools that can help


    Jo Peterson, Vice President, Cloud & Security Services, Clarify360)
    Nicolas Moy, VP Security Engineering, Fairway Independent Mortgage
    Stan Lowe, Former CISO of Zscaler
    Jim Fulton, Senior Director of Product Marketing, Forcepoint
Strategic sessions on Cloud, Network & Data Security
To enable users to work anywhere, we must put data protection at the center of cloud and network security strategies. In this channel, we explore the latest technologies, security trends and frameworks like Zero Trust and SASE to help you not only determine where you are, but also what you still need to do to protect your business. Get the materials and building blocks you need to implement a data-first SASE architecture. See for yourself. https://www.forcepoint.com/sase

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ESG: Take the safer road: best practices in SaaS Application Security
  • Live at: Mar 25 2020 4:00 pm
  • Presented by: Doug Cahill, Senior Analyst, Cybersecurity, ESG
  • From:
Your email has been sent.
or close