Hi [[ session.user.profile.firstName ]]

Enabling Safe Remote Working with Zero Trust

Getting to the web and public cloud is easy; getting to private apps is a lot trickier, especially when we’re working from home. Doing it all safely is even harder. Keeping advanced threats out and sensitive data in when people are outside the traditional boundaries of enterprise security is more important than ever.

Zero Trust Network Access (ZTNA) is the modern approach to giving remote workers access to private apps. It eliminates the complexities and bottlenecks of using VPNs. Delivering ZTNA from a cloud platform also provides enterprises with the latest capabilities for safeguarding against internet-based attacks, compromised endpoints, “dirty” Wi-Fi networks, and even risky users.

In this session, learn how a Zero Trust approach to providing access to web, cloud, and private apps can:
- Make your users everywhere more productive and lower your operations costs
- Keep advanced threats out so you can safely move to the cloud
- Give you visibility into and control over data in your cloud



Presenters:
Carl Eberling, Chief Information Officer, Forcepoint
Merritt Baer, Principal Security Architect, Amazon Web Services
Ravi Srinivasan, Vice President, Solutions Marketing, Forcepoint
Recorded Nov 4 2020 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Carl Eberling, Ravi Srinivasan Forcepoint | Merritt Baer, Amazon Web Services |
Presentation preview: Enabling Safe Remote Working with Zero Trust

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • APAC: 5 pillars for creating your Unbound Enterprise with data-centric SASE Mar 10 2021 3:00 am UTC 56 mins
    L. Neely, LLNL | J. Fulton, Forcepoint | Dr. S. Murray, ISSA Int. Board of Directors | F. Doyle, CubicPrism Analytics
    Even before 2020, we knew where digital transformation was taking us. But we had no idea how quickly it would arrive. Because of the pandemic, our journey in cloud migration happened almost overnight. As a result, businesses today are less constrained by traditional network infrastructure and designated worksites. And, while we’ve always had some agility to shift work between on-prem and remote, we’re seeing the beginning of the new age of the Unbound Enterprise in which people have the freedom to work anywhere and anytime.

    Join this discussion to see how the new ways that people are accessing and using data—in multiple locations, on different devices, over the internet, in public and private clouds—are greatly accelerating the need to replace siloed infrastructure that can’t keep up. We’ll connect the dots on how you can take a “human-centric” SASE approach that puts users and data at the center of cloud-based security to make your business more agile and safer, all while cutting complexity and cost.

    Takeaways:
    1. Make working anywhere seamless and easy to deploy
    2. Protect data everywhere with a single set of policies enforced uniformly from endpoints to the cloud
    3. Automatically personalize security based on people’s behavior and the risk they present
  • Slackers, Go-Getters, & Evildoers: Understanding Negative Workplace Behaviors Mar 9 2021 7:00 pm UTC 44 mins
    Dr. Margaret Cunningham, Principal Research Scientist, Forcepoint | Daniel Norman, Snr. Solutions Analyst, ISF
    Even model employees are guilty of exhibiting bad behaviors and understanding them is critical to establishing effective cybersecurity solutions.

    In this webcast, the Information Security Forum’s Analyst Daniel Norman hosts Forcepoint’s research scientist Dr. Margaret Cunningham as they explore three different types of rule breakers and try to understand how their motivations can jeopardize security.

    Find out what drives your employees actions and learn strategies for mitigating the risks that stem from negative workplace behaviors.
     


    Dr. Margaret Cunningham is Principal Research Scientist for Human Behavior within Forcepoint X-Labs, focused on establishing a human-centric model for improving cybersecurity. Previously, Cunningham supported technology acquisition, research and development, operational testing and evaluation, and integration for the U.S. Department of Homeland Security and U.S. Coast Guard
  • AMERICAS: Zero Trust: Ciso Strategies for 2021 Recorded: Mar 3 2021 30 mins
    Nick Savvides, Forcepoint Mansi Thapar, Jaquar Group, Sumeet Khokhani, Intas Pharmaceuticals, George Eapen Petrofac
    What tools does the Chief Information Security Officer need in order to fulfil their destiny as business' next great strategic partner? Global security leaders debate.

    In a suddenly remote working environment the CISO has become one of the most valued leaders in the industry. With their expertise in security, risk management and, increasingly, business value, they are well placed to ensure smooth, safe operations despite a disparate workforce. How can they continue doing so? It will require a not-so-simple combination of people, processes and technologies. In this debate on the future of their function, four security leaders focus on the concept of zero trust, how they can utilize it for security and what else is needed to protect and serve their organizations.

    Mansi Thapar, Head of Information Security at Jaquar Group, Sumeet Khokhani, CISO of Intas Pharmaceuticals, George Eapen, Group CISO of Petrofac and Nick Savvides, Senior Director of Strategic Business, APAC at Forcepoint, came together at The Studio @ Home for a session moderated by Mark Chillingworth, Senior Content Editor, Financial Times.
  • EUROPE: Zero Trust: Ciso Strategies for 2021 Recorded: Mar 3 2021 30 mins
    Nick Savvides, Forcepoint Mansi Thapar, Jaquar Group, Sumeet Khokhani, Intas Pharmaceuticals, George Eapen Petrofac
    What tools does the Chief Information Security Officer need in order to fulfil their destiny as business' next great strategic partner? Global security leaders debate.

    In a suddenly remote working environment the CISO has become one of the most valued leaders in the industry. With their expertise in security, risk management and, increasingly, business value, they are well placed to ensure smooth, safe operations despite a disparate workforce. How can they continue doing so? It will require a not-so-simple combination of people, processes and technologies. In this debate on the future of their function, four security leaders focus on the concept of zero trust, how they can utilize it for security and what else is needed to protect and serve their organizations.

    Mansi Thapar, Head of Information Security at Jaquar Group, Sumeet Khokhani, CISO of Intas Pharmaceuticals, George Eapen, Group CISO of Petrofac and Nick Savvides, Senior Director of Strategic Business, APAC at Forcepoint, came together at The Studio @ Home for a session moderated by Mark Chillingworth, Senior Content Editor, Financial Times.
  • APAC: Zero Trust: Ciso Strategies for 2021 Recorded: Mar 3 2021 30 mins
    Nick Savvides, Forcepoint Mansi Thapar, Jaquar Group, Sumeet Khokhani, Intas Pharmaceuticals, George Eapen Petrofac
    What tools does the Chief Information Security Officer need in order to fulfil their destiny as business' next great strategic partner? Global security leaders debate.

    In a suddenly remote working environment the CISO has become one of the most valued leaders in the industry. With their expertise in security, risk management and, increasingly, business value, they are well placed to ensure smooth, safe operations despite a disparate workforce. How can they continue doing so? It will require a not-so-simple combination of people, processes and technologies. In this debate on the future of their function, four security leaders focus on the concept of zero trust, how they can utilize it for security and what else is needed to protect and serve their organizations.

    Mansi Thapar, Head of Information Security at Jaquar Group, Sumeet Khokhani, CISO of Intas Pharmaceuticals, George Eapen, Group CISO of Petrofac and Nick Savvides, Senior Director of Strategic Business, APAC at Forcepoint, came together at The Studio @ Home for a session moderated by Mark Chillingworth, Senior Content Editor, Financial Times.
  • SASE Success Behind-The-Scenes Recorded: Mar 2 2021 25 mins
    Nico Fischbach, Global Chief Technology Officer, Forcepoint
    SASE converges network, web, data, and cloud app connectivity and security, but implementing a true SASE architecture is a daunting task and there is no one-size-fits-all approach. Join Forcepoint Global CTO Nicolas Fischbach for insights on Forcepoint’s approach to delivering the industry’s first true data-centric SASE as well as providing steps for a practical approach to implementing SASE today including evaluation criteria for SASE platforms and how to leverage existing, and identify new, areas for investment.
  • Zero-Trust-Strategie: Niemals vertrauen, immer überprüfen Recorded: Mar 2 2021 32 mins
    Carsten Hoffmann I Lars Kroll I Jens Schubert
    Das Schlüsselwort des Zero Trust-Sicherheitsmodells lautet „Nie vertrauen, immer überprüfen. Immer.“ Diese Einstellung zu Sicherheit ist in einer Welt nach Covid-19 besonders wichtig, da viele Mitarbeiter immer noch von zu Hause arbeiten und teilweise mit ihren eigenen Geräten auf Geschäftsdaten zugreifen.

    Unabhängig von der Pandemie werden Cyber Angriffe seit Jahren immer raffinierter und die Auswirkungen immer kostspieliger. Sicherheitsmaßnahmen müssen an die Risiken angepasst werden. Laut Microsoft haben 94 % der Unternehmen berichtet, dass sie dabei sind Zero-Trust- zu implementieren.
    Was ist also Zero Trust, und welche Vorteile bietet es Ihnen?

    In dieser Session werden wir folgende Punkte diskutieren:
    - Warum Zero Trust jetzt an Bedeutung gewinnt und ob Zero Trust die Benutzererfahrung beeinträchtigen oder verbessern kann.
    - Umdenken im Sicherheitsbereich, um Ihre Organisation auf eine Zero-Trust-Strategie vorzubereiten.

    Nehmen Sie an dieser Session teil, um mehr über den Wert einer Zero Trust-Strategie zu erfahren und darüber, ob Zero Trust das Endergebnis ist oder ob es nur der Ausgangspunkt für eine zukunftssichere Cybersicherheitsstrategie ist.
  • AMERICAS: The C-Suite and Security Post-Pandemic Recorded: Feb 17 2021 29 mins
    Carl Eberling, CISO Forcepoint, Selim Aissi, CISO, Ellie Mae, Erik Decker, Chief Security, University of Chicago
    The CISO role has evolved dramatically over the last decade, inline with the risk landscape a digitized world provides. 2020 once more putt a brand’s security and risk leader front and center, for their cybersecurity response. In a few short months, the CISO has eked out more responsibility for themselves than ever before; how can they continue to push that momentum in a business-as-usual context? Or, has last year taught us that leaving a CISO alone until a crisis hits is a poor form of business management?

    Deneen DeFiore, CISO, United Airlines; Selim Aissi, CISO, Ellie Mae; Erik Decker, Chief Security and Privacy Officer, University of Chicago Medicine; George Eapen, CISO, Petrofac; and Carl Eberling, CIO/CISO of Forcepoint, came together at The Studio @ Home to discuss the ever-developing relationship between a CISO and their C-Suite.
  • Thinking Beyond Identity in a Zero Trust Architecture Recorded: Feb 17 2021 3 mins
    Petko Stoyanov, Chief Technology Officer, Forcepoint
    Continuously monitor a person's usage of applications and data to create stronger identity practices and stay ahead of threats. Never trust, always verify—with your people working remotely, keeping your enterprise systems and data secure requires a new approach.

    •Stop threats from moving within your network
    •Control usage of data—not just access
    •Continuously know who's creating risk
  • Building an Adaptive Zero Trust Architecture Recorded: Feb 17 2021 6 mins
    Petko Stoyanov, Chief Technology Officer, Forcepoint
    Cloud and on-prem endpoints need to be adaptive to ensure the right people have access to the right data when they need it, regardless of where they’re working. Never trust, always verify—with your people working remotely, keeping your enterprise systems and data secure requires a new approach.

    •Stop threats from moving within your network
    •Control usage of data—not just access
    •Continuously know who's creating risk
  • EUROPE: The C-Suite and Security Post-Pandemic Recorded: Feb 17 2021 29 mins
    Carl Eberling, CISO Forcepoint, Selim Aissi, CISO, Ellie Mae, Erik Decker, Chief Security, University of Chicago
    The CISO role has evolved dramatically over the last decade, inline with the risk landscape a digitized world provides. 2020 once more putt a brand’s security and risk leader front and center, for their cybersecurity response. In a few short months, the CISO has eked out more responsibility for themselves than ever before; how can they continue to push that momentum in a business-as-usual context? Or, has last year taught us that leaving a CISO alone until a crisis hits is a poor form of business management?

    Deneen DeFiore, CISO, United Airlines; Selim Aissi, CISO, Ellie Mae; Erik Decker, Chief Security and Privacy Officer, University of Chicago Medicine; George Eapen, CISO, Petrofac; and Carl Eberling, CIO/CISO of Forcepoint, came together at The Studio @ Home to discuss the ever-developing relationship between a CISO and their C-Suite.
  • APAC: The C-Suite and Security Post-Pandemic Recorded: Feb 17 2021 29 mins
    Carl Eberling, CISO Forcepoint, Selim Aissi, CISO, Ellie Mae, Erik Decker, Chief Security, University of Chicago
    The CISO role has evolved dramatically over the last decade, inline with the risk landscape a digitized world provides. 2020 once more putt a brand’s security and risk leader front and center, for their cybersecurity response. In a few short months, the CISO has eked out more responsibility for themselves than ever before; how can they continue to push that momentum in a business-as-usual context? Or, has last year taught us that leaving a CISO alone until a crisis hits is a poor form of business management?

    Deneen DeFiore, CISO, United Airlines; Selim Aissi, CISO, Ellie Mae; Erik Decker, Chief Security and Privacy Officer, University of Chicago Medicine; George Eapen, CISO, Petrofac; and Carl Eberling, CIO/CISO of Forcepoint, came together at The Studio @ Home to discuss the ever-developing relationship between a CISO and their C-Suite.
  • Die Gratwanderung zwischen dem Datenschutz und der Befähigung von Fernarbeitern Recorded: Feb 16 2021 37 mins
    Carsten Hoffmann I Lars Kroll I Peter "Faxe" Lachenmair
    In den letzten 12 Monaten hat sich die Fernarbeit grundlegend verändert. Diese wird jedoch in absehbarer Zeit nicht vorbei sein. Die Arbeit ist von einem Standort zu einer Aktivität geworden, und die Art und Weise, wie wir arbeiten, hat sich für immer verändert. Eine Gartner-Umfrage ergab, dass 74 % der CFOs beabsichtigen, einen Teil ihrer Mitarbeiter vor Ort langfristig an einen anderen Standort zu versetzen. Das Problem, mit dem viele Organisationen konfrontiert sind, besteht darin, dass das Fernarbeiten dazu führt, dass sich Benutzer und Daten außerhalb der traditionellen IT-Abwehrsysteme befinden, die normalerweise automatisch denjenigen innerhalb des Netzwerks vertrauen. Führungskräfte müssen lernen, wie sie die Daten innerhalb ihres Unternehmens schützen können, wenn Mitarbeiter „draußen“ sind. Der Wandel in den Arbeitsumgebungen hat die Führungskräfte zu wichtigen Entscheidungen hinsichtlich der Fernarbeit, der Nutzung der Cloud und der Art und Weise, wie sowohl ihre Daten als auch ihre Mitarbeiter geschützt werden können, gezwungen.

    Wie können Unternehmen also ihre Daten schützen und gleichzeitig einer mehr und mehr Remote-Belegschaft leichteren Zugang gewähren? Wie ermöglichen wir es Mitarbeitern, jederzeit und überall sicher auf Daten zuzugreifen?

    Nehmen Sie an dieser Sitzung teil, während wir folgende Punkte diskutieren:
    - Die durch die Pandemie verursachte Änderungsrate und wie sich diese auf Sicherheit, Daten-Compliance und Datenschutzfragen für Mitarbeiter und Kunden auswirkt.
    - Wie man Daten vor Bedrohungen und Exfiltration schützt und gleichzeitig Zugriff auf diese in einem noch nie dagewesenen Ausmaß gewährt
    - Wie man Remote-Mitarbeiter sicher und geschützt hält und gleichzeitig Konflikte im Unternehmen vermeidet, sodass die Mitarbeiter ihre Arbeit erfüllen können
  • Optimizing Web Security for Today’s Evolved Working Environment Recorded: Feb 16 2021 39 mins
    Matthew Bant, Senior Solution Engineer, Forcepoint
    Forcepoint Cloud Security Gateway (CSG) is a SaaS solution that combines Secure Web Gateway, DLP, CASB and Remote Browser Isolation (RBI) capabilities together to enhance web security strategies, increase the protection of users and data no matter where they reside, and streamline security administration via a single console. The solution offers real-time visibility into risks and threats through dashboards and reports which has become critical in the new world of remote working to enable the proactive control and prevention of security breaches.

    Join this webcast to learn how Forcepoint CSG can optimize web security for today’s hybrid working environment as well as the benefits this solution can bring to your business and security team.
  • Strategies for Enhancing your Conduct Risk Management Recorded: Jan 27 2021 25 mins
    Myrna Soto, Chief Security Strategist & Trust Officer | Homayun Yaqub | James Wilde
    Join us as we discuss best practices around developing your own strategy for enhancing your conduct risk management. With most employees having to shift to remote working overnight, it has become even more challenging to strike the balance between maximizing employee productivity and minimizing your risk.

    In this webinar we’ll cover:

    - Covid-19 impact and the need for insider risk management in the financial services industry.
    - Modern conduct risk and how organizations can evolve their strategies.
    - Using continuous risk monitoring to stay ahead of breaches.

    AMERICAS: https://www.brighttalk.com/webcast/15527/462437
    APAC: https://www.brighttalk.com/webcast/15527/462439
  • Cloud Security Game Plan Recorded: Jan 20 2021 26 mins
    Nico Popp, Chief Product Officer, Forcepoint
    Current events have accelerated organizations' plans to migrate to cloud applications and their digital transformation efforts in general. And it’s clear that an ever-increasing number of customers expect cloud-powered security solutions moving forward. So how can you protect your remote workers wherever they are and the data they interact with? Through Secure Access Service Edge (SASE).

    In this session, see how you can:

    - Securely connect remote workers to apps and filter out non-work traffic while ensuring data accessed from both private and cloud-based apps are safe
    - Overcome the pain of dealing with traditional VPNs
    - Utilize behavioral analytics to assess and manage risk

    AMERICAS: https://www.brighttalk.com/webcast/15527/462429
    EUROPE: https://www.brighttalk.com/webcast/15527/462434
  • Zero Trust + SASE: A Purpose-driven Approach to Cloud-based Security Recorded: Jan 13 2021 33 mins
    Chris Gullion, AWS World Wide Public Sector Sales Amazon Web Services and Jim Fulton, Director – SASE & Zero Trust Solutions
    Today’s need to support a work-from-anywhere workforce is bringing together two of the fastest-growing trends in IT security: SASE and Zero Trust. Security risk changes and compounds with digital transformation. As organizations shift more applications and services from on-premises to the cloud, their existing infrastructure-centric security is a mismatch to securing user access and data in this ‘wherever they are’ cloud environment.
    In this webcast you’ll learn how to:
    - Improve user productivity
    - Replace costly legacy VPNs
    - Protect internal networks against compromised devices, users, and Wi-Fi hotspots
    - Gain visibility and control to streamline compliance efforts

    Americas region live: https://www.brighttalk.com/webcast/15527/459782
    Europe region live: https://www.brighttalk.com/webcast/15527/460760
  • On the Cybersecurity Forefront: Behavioral Analytics to the Rescue Recorded: Dec 30 2020 43 mins
    Bob Bragdon, SVP/Managing Dir of CSO, Worldwide at IDG and Jim Fulton, Dir, Cloud & Edge Protection Solutions, Forcepoint
    Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioral analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world.

    Join IDG’s Bob Bragdon and Forcepoint’s Jim Fulton as we explore the survey findings, including why behavioural analytics is growing in use and best practices for deploying such solutions from IT security practitioners.
  • A Necessary Change in the Data Protection Mindset Recorded: Dec 17 2020 54 mins
    Raffael Marty, VP Forcepoint X-Labs | Homayun Yaqub, Snr Strategist, Forcepoint | Steve Wright, Partner, Privacy Culture
    It is time for a paradigm shift in security. Although trillions of dollars have been invested in keeping external attackers at bay, there seems to be no end in sight to the cat and mouse game between attackers and the security industry; zero day attacks, new vulnerabilities and ever increasingly sophisticated attacks dominate cybersecurity headlines. We need to expand the concept of threat intelligence and indicators of compromise (IOCs). Effective cyber security needs to understand behaviors; those of devices and those of humans in order to help us move left of breach, to identify bad actors early and provide a necessary building block for zero trust access to resources.

    Key Takeaways from Discussion:

    - Everyone can agree moving left of breach is the modern cybersecurity path forward, and it’s what every organization wants to achieve

    - Just as cyber threats are dynamic and ever-evolving, so too must be today’s security strategy -- dynamic, risk-adaptive with automated enforcement that stops breaches in real time

    - The cost of a data breach today can be astronomical for businesses – not only significant fines but also loss of revenue, brand trust as well as lost IP that can irrevocably mitigate an organization’s competitive advantage

    - Forcepoint’s differentiated strategy delivers what no one else can – understanding the behavior of people and data on your network while delivering adaptive and automated security response
  • 6 ways CISOs are securing and navigating the cloud Recorded: Dec 17 2020 60 mins
    Jo Peterson, Clarify 360; Brian ThompsonVP, Veeam Software; Michael Goldgof, Barracuda Networks; Carl Eberling, Forcepoint
    Cloud Adoption is on the rise again. According to IDG’s 2020 Cloud Computing Survey, 59 percent of respondents said their organizations would be mostly or all in the cloud within 18 months. Cloud changes our approach on so many levels—new technology, new shared responsibility model and new cybersecurity considerations

    In today’s session, we’ll explore 6 ways CISOs are navigating the cloud:
    - Securing an extended perimeter
    - Upskilling the team
    - Balancing Risk Management in Third Party Relationships
    - Defining the Shared Roles in a Shared Responsibility Model
    - Enhancing Visibility
    - Taking Advantage of Automation

    Moderator:
    Jo Peterson, Vice President, Cloud and Security Services, Clarify360
    Speakers:
    Brian Campbell--VP, Cyber Security Architect, Veeam Software
    Mike Goldgof--Senior Director, Product Marketing at Barracuda
    Carl Eberling-- CIO/CISO- Forcepoint
Connect and protect your remote, global workforce
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Enabling Safe Remote Working with Zero Trust
  • Live at: Nov 4 2020 3:45 am
  • Presented by: Carl Eberling, Ravi Srinivasan Forcepoint | Merritt Baer, Amazon Web Services |
  • From:
Your email has been sent.
or close