Hi [[ session.user.profile.firstName ]]

Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy

Effective governance requires a proactive approach. So when creating a cybersecurity strategy, it’s best to address the primary issue–risk–head on.



Watch this webcast to learn:

- How to define cybersecurity success

- Steps you can take now to help avoid compliance issues later

- Common approaches that fall short
Recorded Apr 1 2020 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Doug Landoll, CEO, Lantego
Presentation preview: Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Implementing Zero-Trust in the Enterprise Apr 29 2020 3:00 pm UTC 30 mins
    Dr Chase Cunningham, Principal Analyst, Forrester | Nico Popp, Chief Product Officer, Forcepoint
    The disconnect between security, operations and business is now a 30-year old story that is on the verge of being rewritten.Our presenters, Forrester Principal Analyst Dr. Cunningham and Forcepoint’s Chief Product Officer will exchange their views and strategies.

    Attend this session and you will discover:

    - Use cases that tell us why Zero Trust matters
    - What the reality looks like when you weed out the theory and break down the perimeters
    - How to implement Zero-Trust in enterprise environments
  • Forcepoint Exchange Live Panel: Partnering to Innovate and Transform Apr 29 2020 2:00 pm UTC 45 mins
    Mekonnen Kassa, Microsoft, Nico Popp, Forcepoint and Paul Garvey, Forcepoint’s EMEA VP, Sales
    This live panel discussion will look at how partnering can solve evolving security challenges. Panelists include Mekonnen Kassa, Microsoft, Nico Popp, Forcepoint and Paul Garvey, Forcepoint’s EMEA VP, Sales.

    During this session we explore the roles of different organisations in tackling evolving security challenges and contributing to business success.

    Moderated by Mike Smart, Director of Product Marketing, Forcepoint
  • Exploring SASE and the Future of Network Security Apr 29 2020 12:00 pm UTC 32 mins
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • Voice of the CTO: The Future of Cloud Security Apr 29 2020 11:00 am UTC 32 mins
    Nicolas Fischbach, Global CTO, Forcepoint
    While digital transformation delivers many benefits to organisations and users, it also introduces various challenges - such as a proliferation of unique applications to manage and monitor.

    Forcepoint CTO Nico Fischbach shares the shape of things to come within the technological landscape:

    - A rational approach to the tech stack
    - Converged security that does more thanks to behaviour-based algorithms
    - The growing role of SASE in cloud transformation
  • Meeting Customer Needs in the Future Apr 29 2020 10:00 am UTC 30 mins
    Mekonnen Kassa, Director of Cloud Security Engineering Customer Experience, Microsoft
    Innovation for most businesses in the foreseeable future will be largely driven by the cloud. Hear from customer experience expert Mekonnen Kassa how Microsoft, in partnership with specialist vendors including Forcepoint, is transforming the customer experience:

    - Facilitating the move from on-premise to cloud-first
    - Enabling the customer to leverage and optimise technology investments
    - Protecting core business priorities and assets
  • Forcepoint Exchange Live Panel: The Questions You Want Answered Apr 28 2020 2:00 pm UTC 45 mins
    William Beer, HB Advisory | James Wilde, Forcepoint | Dr. Jessica Barker, Cygenta | Andy Wall, Office for National Statistics
    Join William Beer for a live panel discussion with Forcepoint Exchange speakers answering your questions received during the virtual summit.

    Moderator:
    William Beer, Managing Partner, HB Advisory

    Panelists:
    James Wilde, User Protection Strategist, Forcepoint
    Dr. Jessica Barker, CEO of Cygenta and Chair of ClubCISO
    Andy Wall, CISO, Office for National Statistics
  • Cloud security – It's Just Tin Apr 28 2020 1:00 pm UTC 30 mins
    Andy Wall, CISO, Office for National Statistics | William Beer, Managing Partner, HB Advisory
    Data counts among the vital assets sitting in all organisations and every business requires a data strategy that fits with overarching business goals. With petabytes of data to govern at the Office for National Statistics, CISO Andy Wall’s approach is enlightening and includes:

    - Establishing a security programme and adapted policies
    - Propelling new strategies and overcoming inertia
    - Driving ownership of specific datasets
  • Human Bias for Cybersecurity Today Apr 28 2020 12:00 pm UTC 30 mins
    Dr. Jessica Barker, CEO of Cygenta and Chair of ClubCISO | William Beer, Managing Partner, HB Advisory
    Dr Jessica Barker talks about her own route into cyber security, and provides breaking insights into the way people behave in a hyper-connected environment.

    In this session, we’ll explore:

    - The concept of human bias in the context of cybersecurity
    - Why the human element has to be an integral part of any multi-layered defence strategy
    - Whether or not CISOs need to become human behaviour experts in the future
  • Humans are the New Perimeter: Rethinking Edge Protection Recorded: Apr 8 2020 16 mins
    Jim Fulton, Solution Director, Forcepoint
    With data and applications moving beyond the traditional enterprise edge into the cloud, your people are now your perimeter—breaking old approaches to security along the way.

    Learn how SASE security delivered from the cloud is changing how your people and your business, safe while reducing complexity and costs.
  • Increasing the security of your remote workforce Recorded: Apr 8 2020 48 mins
    Nick Savvides, Senior Director of Strategic Business, Forcepoint APAC
    Amidst the challenges that are escalating across the globe, the cogs in your organization must keep turning and both business and life need to keep moving forward.

    Here at Forcepoint, we recognize the concerns of your employees who are trying to balance between delivering quality of work while maintaining health through minimizing human interaction.

    Join our LIVE webcast where Nick Savvides will highlight tips and advice on how to increase the security of your remote workforce and improve the protection your company data and IP.
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy Recorded: Apr 1 2020 33 mins
    Doug Landoll, CEO, Lantego
    Effective governance requires a proactive approach. So when creating a cybersecurity strategy, it’s best to address the primary issue–risk–head on.



    Watch this webcast to learn:

    - How to define cybersecurity success

    - Steps you can take now to help avoid compliance issues later

    - Common approaches that fall short
  • Securing your remote workforce and keeping your enterprise safe Recorded: Apr 1 2020 34 mins
    Colette Tomasiak, Senior Product Manager, Forcepoint & Jim Fulton, Solution Director, Forcepoint
    Teams need to be able to do work anywhere and thanks to mobile devices and cloud-based applications, they can. It’s a dynamic that enables productivity, agility and innovation–while testing the security of users, data and devices.

    This webcast highlights the challenges and visibility gaps that cybersecurity teams face, and what they can do to mitigate risk in today’s hyper-connected world.

    • Easily connect to internal systems and data – securely
    • Exercise account protections across managed and unmanaged endpoints
    • Identify abnormal activity early on and enforce policies proactively
    • Use behavioral insights to minimize risk
  • ESG: Take the safer road: best practices in SaaS Application Security Recorded: Mar 25 2020 38 mins
    Doug Cahill, Senior Analyst, Cybersecurity, ESG
    In today’s environment of shared-responsibility security, you can’t–and shouldn’t–rely solely on the built-in security features of your many SaaS apps. By implementing certain standards, you can bolster security across your cloud environment.



    Watch this webcast to gain more insights into:

    - Challenges related to securing cloud apps

    - The shadow IT reality

    - CASB-specific best practices for cloud app security
  • Keeping Remote Workers Safe and Your Work Secure Recorded: Mar 25 2020 35 mins
    Carl Leonard, Principal Security Analyst, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint
    Organizations are pivoting to remote work enablement models at an unprecedented scale. As global organizations navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority.

    Join security strategists Carl Leonard and Mike Smart as they share six security tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes remote. Discussion will include;

    - Securing your employee from malicious web content
    - Securing your sensitive data from leaving your organization
    - Securing your Cloud application and the sensitive data on the cloud
    - Securing your application from remote access
  • Roundtable: Cybersecurity strategies for 2020 and beyond Recorded: Mar 24 2020 54 mins
    Moderated by Brigid Nzekwu, News Anchor & Journalist
    As security breaches continue to make headlines and many new regulations come into force, does cybersecurity have a high enough profile on the Board agenda? Has the security industry done enough to explain how threats and vulnerabilities translate to business risk?

    In this roundtable hosted by HotTopics, the panel share their experiences of how data is being related to risk, how to better educate people and how organizations should be informing their strategies.

    The Panel:
    Mike Loginov, Global CISO, Control Risks
    Brian Brackenborough, CISO, Channel 4
    Mark Phillips, CIO, Countrywide
    Tom Langford, Founder, (TL)2 Security Ltd
    Duncan Brown, Chief Security Strategist, EMEA, Forcepoint
  • Roundtable: Can Security become a business enabler? Recorded: Mar 24 2020 34 mins
    Moderated by Avril Chester, Founder & CEO, Cancer Central UK
    I.T. Security is often seen as “the department of no”, a barrier to innovation and preventing productivity. How can security break this stereotype, move beyond legacy products and strategies and become an enabler for business?

    In this roundtable discussion hosted by HotTopics, the panel discuss how security can reduce friction with the business and become the department of “yes”

    The Panel:
    David Ivell, CTO & CIO, Semta
    John Meakin, CISO & Cyber Security Adviser
    Ian Cohen, Group CIO & CTO, Addison Lee Group
    Graeme Hackland, CIO, Williams F1 Team
    Duncan Brown, Chief Security Strategist, EMEA, Forcepoint
  • Cybersecurity: Real or Fake? Recorded: Mar 23 2020 40 mins
    Panel moderated by Martin Veitch, IDG Network
    Over the last twenty years organizations have faced ever more sophisticated attacks and been stuck in a reactive mode struggling to fill the security gaps. Are we now ready to be proactive?

    In this panel discussion, hosted in collaboration with HotTopics, security leaders consider the strategies and technologies that will allow us to move left of breach.

    The Panel:
    Claire Priestley, Director of IT, City, University of London
    Graeme Hackland, CIO, Williams F1 Team
    Greg Morley, Group CIO, United Living Group
    Duncan Brown, Chief Security Strategist, EMEA, Forcepoint
  • Forrester: Mastering Policy Setting in the Cloud Recorded: Mar 18 2020 25 mins
    Andras Cser, Vice President, Principal Analyst serving Security & Risk Professionals, Forrester
    While the benefits of the cloud are many, there are trade-offs, too. When your data resides in the cloud, you’re giving up some ownership and control of that data. Still, with the right policies in place, it’s possible to ensure security and compliance.

    Watch this webcast to gain more insights into:

    - Protecting cloud data across SaaS, IaaS, and PaaS
    - The importance of automation
    - Pros and cons of different architectural approaches
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy Recorded: Mar 16 2020 34 mins
    Doug Landoll, CEO, Lantego
    Effective governance requires a proactive approach. So when creating a cybersecurity strategy, it’s best to address the primary issue–risk–head on.



    Watch this webcast to learn:

    - How to define cybersecurity success

    - Steps you can take now to help avoid compliance issues later

    - Common approaches that fall short
  • ESG: Take the safer road: best practices in SaaS Application Security Recorded: Mar 16 2020 39 mins
    Doug Cahill, Senior Analyst, Cybersecurity, ESG
    In today’s environment of shared-responsibility security, you can’t–and shouldn’t–rely solely on the built-in security features of your many SaaS apps. By implementing certain standards, you can bolster security across your cloud environment.



    Watch this webcast to gain more insights into:

    - Challenges related to securing cloud apps

    - The shadow IT reality

    - CASB-specific best practices for cloud app security
Connect and protect your mobile, global workforce
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
  • Live at: Apr 1 2020 4:00 pm
  • Presented by: Doug Landoll, CEO, Lantego
  • From:
Your email has been sent.
or close