Hi [[ session.user.profile.firstName ]]

APAC: Strategies for Enhancing your Conduct Risk Management

Join us as we discuss best practices around developing your own strategy for enhancing your conduct risk management. With most employees having to shift to remote working overnight, it has become even more challenging to strike the balance between maximizing employee productivity and minimizing your risk.

In this webinar we’ll cover:

- Covid-19 impact and the need for insider risk management in the financial services industry.
- Modern conduct risk and how organizations can evolve their strategies.
- Using continuous risk monitoring to stay ahead of breaches.
AMERICAS: https://www.brighttalk.com/webcast/15527/462437
EUROPE: https://www.brighttalk.com/webcast/15527/462438
Jan 27 3:00 am UTC 25 mins
Starting in 00:00:00
Your place is confirmed,
we'll send you email reminders
Presented by
Myrna Soto, Chief Security Strategist & Trust Officer | Homayun Yaqub | James Wilde
Presentation preview: APAC: Strategies for Enhancing your Conduct Risk Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • AMERICAS: Strategies for Enhancing your Conduct Risk Management-Finance Jan 27 2021 5:00 pm UTC 25 mins
    Myrna Soto, Chief Security Strategist & Trust Officer | Homayun Yaqub | James Wilde
    Join us as we discuss best practices around developing your own strategy for enhancing your conduct risk management. With most employees having to shift to remote working overnight, it has become even more challenging to strike the balance between maximizing employee productivity and minimizing your risk.

    In this webinar we’ll cover:

    - Covid-19 impact and the need for insider risk management in the financial services industry.
    - Modern conduct risk and how organizations can evolve their strategies.
    - Using continuous risk monitoring to stay ahead of breaches.

    EUROPE: https://www.brighttalk.com/webcast/15527/462438
    APAC: https://www.brighttalk.com/webcast/15527/462439
  • EUROPE: Strategies for Enhancing your Conduct Risk Management Jan 27 2021 11:00 am UTC 25 mins
    Myrna Soto, Chief Security Strategist & Trust Officer | Homayun Yaqub | James Wilde
    Join us as we discuss best practices around developing your own strategy for enhancing your conduct risk management. With most employees having to shift to remote working overnight, it has become even more challenging to strike the balance between maximizing employee productivity and minimizing your risk.

    In this webinar we’ll cover:

    - Covid-19 impact and the need for insider risk management in the financial services industry.
    - Modern conduct risk and how organizations can evolve their strategies.
    - Using continuous risk monitoring to stay ahead of breaches.

    AMERICAS: https://www.brighttalk.com/webcast/15527/462437
    APAC: https://www.brighttalk.com/webcast/15527/462439
  • APAC: Strategies for Enhancing your Conduct Risk Management Jan 27 2021 3:00 am UTC 25 mins
    Myrna Soto, Chief Security Strategist & Trust Officer | Homayun Yaqub | James Wilde
    Join us as we discuss best practices around developing your own strategy for enhancing your conduct risk management. With most employees having to shift to remote working overnight, it has become even more challenging to strike the balance between maximizing employee productivity and minimizing your risk.

    In this webinar we’ll cover:

    - Covid-19 impact and the need for insider risk management in the financial services industry.
    - Modern conduct risk and how organizations can evolve their strategies.
    - Using continuous risk monitoring to stay ahead of breaches.
    AMERICAS: https://www.brighttalk.com/webcast/15527/462437
    EUROPE: https://www.brighttalk.com/webcast/15527/462438
  • AMERICAS: Cloud Security Game Plan Recorded: Jan 20 2021 26 mins
    Nico Popp, Chief Product Officer, Forcepoint
    Current events have accelerated organizations' plans to migrate to cloud applications and their digital transformation efforts in general. And it’s clear that an ever-increasing number of customers expect cloud-powered security solutions moving forward. So how can you protect your remote workers wherever they are and the data they interact with? Through Secure Access Service Edge (SASE).

    In this session, see how you can:

    - Securely connect remote workers to apps and filter out non-work traffic while ensuring data accessed from both private and cloud-based apps are safe
    - Overcome the pain of dealing with traditional VPNs
    - Utilize behavioral analytics to assess and manage risk
  • EUROPE: Cloud Security Game Plan Recorded: Jan 20 2021 26 mins
    Nico Popp, Chief Product Officer, Forcepoint
    Current events have accelerated organizations' plans to migrate to cloud applications and their digital transformation efforts in general. And it’s clear that an ever-increasing number of customers expect cloud-powered security solutions moving forward. So how can you protect your remote workers wherever they are and the data they interact with? Through Secure Access Service Edge (SASE).

    In this session, see how you can:

    - Securely connect remote workers to apps and filter out non-work traffic while ensuring data accessed from both private and cloud-based apps are safe
    - Overcome the pain of dealing with traditional VPNs
    - Utilize behavioral analytics to assess and manage risk
  • APAC: Cloud Security Game Plan Recorded: Jan 20 2021 26 mins
    Nico Popp, Chief Product Officer, Forcepoint
    Current events have accelerated organizations' plans to migrate to cloud applications and their digital transformation efforts in general. And it’s clear that an ever-increasing number of customers expect cloud-powered security solutions moving forward. So how can you protect your remote workers wherever they are and the data they interact with? Through Secure Access Service Edge (SASE).

    In this session, see how you can:

    - Securely connect remote workers to apps and filter out non-work traffic while ensuring data accessed from both private and cloud-based apps are safe
    - Overcome the pain of dealing with traditional VPNs
    - Utilize behavioral analytics to assess and manage risk

    AMERICAS: https://www.brighttalk.com/webcast/15527/462429
    EUROPE: https://www.brighttalk.com/webcast/15527/462434
  • Americas: Zero Trust + SASE: A Purpose-driven Approach to Cloud-based Security Recorded: Jan 13 2021 33 mins
    Chris Gullion, AWS World Wide Public Sector Sales Amazon Web Services and Jim Fulton, Director – SASE & Zero Trust Solutions
    Today’s need to support a work-from-anywhere workforce is bringing together two of the fastest-growing trends in IT security: SASE and Zero Trust. Security risk changes and compounds with digital transformation. As organizations shift more applications and services from on-premises to the cloud, their existing infrastructure-centric security is a mismatch to securing user access and data in this ‘wherever they are’ cloud environment.
    In this webcast you’ll learn how to:
    - Improve user productivity
    - Replace costly legacy VPNs
    - Protect internal networks against compromised devices, users, and Wi-Fi hotspots
    - Gain visibility and control to streamline compliance efforts

    Europe region live: https://www.brighttalk.com/webcast/15527/459782
    APAC region live: https://www.brighttalk.com/webcast/15527/460761
  • Europe: Zero Trust + SASE: A Purpose-driven Approach to Cloud-based Security Recorded: Jan 13 2021 33 mins
    Chris Gullion, AWS World Wide Public Sector Sales Amazon Web Services and Jim Fulton, Director – SASE & Zero Trust Solutions
    Today’s need to support a work-from-anywhere workforce is bringing together two of the fastest-growing trends in IT security: SASE and Zero Trust. Security risk changes and compounds with digital transformation. As organizations shift more applications and services from on-premises to the cloud, their existing infrastructure-centric security is a mismatch to securing user access and data in this ‘wherever they are’ cloud environment.
    In this webcast you’ll learn how to:
    - Improve user productivity
    - Replace costly legacy VPNs
    - Protect internal networks against compromised devices, users, and Wi-Fi hotspots
    - Gain visibility and control to streamline compliance efforts

    Americas region live: https://www.brighttalk.com/webcast/15527/459782
    APAC region live: https://www.brighttalk.com/webcast/15527/460761
  • APAC: Zero Trust + SASE: A Purpose-driven Approach to Cloud-based Security Recorded: Jan 13 2021 33 mins
    Chris Gullion, AWS World Wide Public Sector Sales Amazon Web Services and Jim Fulton, Director – SASE & Zero Trust Solutions
    Today’s need to support a work-from-anywhere workforce is bringing together two of the fastest-growing trends in IT security: SASE and Zero Trust. Security risk changes and compounds with digital transformation. As organizations shift more applications and services from on-premises to the cloud, their existing infrastructure-centric security is a mismatch to securing user access and data in this ‘wherever they are’ cloud environment.
    In this webcast you’ll learn how to:
    - Improve user productivity
    - Replace costly legacy VPNs
    - Protect internal networks against compromised devices, users, and Wi-Fi hotspots
    - Gain visibility and control to streamline compliance efforts

    Americas region live: https://www.brighttalk.com/webcast/15527/459782
    Europe region live: https://www.brighttalk.com/webcast/15527/460760
  • On the Cybersecurity Forefront: Behavioral Analytics to the Rescue Recorded: Dec 30 2020 43 mins
    Bob Bragdon, SVP/Managing Dir of CSO, Worldwide at IDG and Jim Fulton, Dir, Cloud & Edge Protection Solutions, Forcepoint
    Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioral analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world.

    Join IDG’s Bob Bragdon and Forcepoint’s Jim Fulton as we explore the survey findings, including why behavioural analytics is growing in use and best practices for deploying such solutions from IT security practitioners.
  • CXO Online: What If Cyber Security Was Just Created Today? Recorded: Dec 17 2020 48 mins
    Hamish Taylor Former CEO of Eurostar, Sainsbury's Bank, Lisa Forte, Renowned Global Voice on the Human Side of Cyber Security
    While companies increasingly rely on the modern strategies of global growth, transition to the cloud and a flexible workforce to increase productivity and profits, these same efforts can spread sensitive and critical data in a way that opens the door to new threats and new challenges. It’s more important than ever for successful companies to rely on modern security strategies to keep critical data and employees safe in a risky and complex world.

    In this session, we will explore:
    - What cyber security would look like if it were created today
    - What improvements could be made to better serve your role in the organization

    About the speakers:

    Hamish Taylor
    Former CEO of Eurostar, Sainsbury's Bank and Vision UK

    Lisa Forte
    Renowned Global Voice on the Human Side of Cyber Security & Social Engineering. In 2018 she won the “Top 100 Women In Tech” Award recognizing her achievements and contributions to the cyber security industry.

    Nico Fischbach
    As Global CTO, Nico Fischbach drives corporate level vision, defines the research agenda, and pilots technology and architecture road maps that underpin Forcepoint's human-centric cybersecurity solutions.
  • Slackers, Go-Getters, & Evildoers: Understanding Negative Workplace Behaviors Recorded: Dec 17 2020 44 mins
    Dr. Margaret Cunningham, Principal Research Scientist, Forcepoint | Daniel Norman, Snr. Solutions Analyst, ISF
    Even model employees are guilty of exhibiting bad behaviors and understanding them is critical to establishing effective cybersecurity solutions.

    In this webcast, the Information Security Forum’s Analyst Daniel Norman hosts Forcepoint’s research scientist Dr. Margaret Cunningham as they explore three different types of rule breakers and try to understand how their motivations can jeopardize security.

    Find out what drives your employees actions and learn strategies for mitigating the risks that stem from negative workplace behaviors.
     


    Dr. Margaret Cunningham is Principal Research Scientist for Human Behavior within Forcepoint X-Labs, focused on establishing a human-centric model for improving cybersecurity. Previously, Cunningham supported technology acquisition, research and development, operational testing and evaluation, and integration for the U.S. Department of Homeland Security and U.S. Coast Guard
  • A Necessary Change in the Data Protection Mindset Recorded: Dec 17 2020 54 mins
    Raffael Marty, VP Forcepoint X-Labs | Homayun Yaqub, Snr Strategist, Forcepoint | Steve Wright, Partner, Privacy Culture
    It is time for a paradigm shift in security. Although trillions of dollars have been invested in keeping external attackers at bay, there seems to be no end in sight to the cat and mouse game between attackers and the security industry; zero day attacks, new vulnerabilities and ever increasingly sophisticated attacks dominate cybersecurity headlines. We need to expand the concept of threat intelligence and indicators of compromise (IOCs). Effective cyber security needs to understand behaviors; those of devices and those of humans in order to help us move left of breach, to identify bad actors early and provide a necessary building block for zero trust access to resources.

    Key Takeaways from Discussion:

    - Everyone can agree moving left of breach is the modern cybersecurity path forward, and it’s what every organization wants to achieve

    - Just as cyber threats are dynamic and ever-evolving, so too must be today’s security strategy -- dynamic, risk-adaptive with automated enforcement that stops breaches in real time

    - The cost of a data breach today can be astronomical for businesses – not only significant fines but also loss of revenue, brand trust as well as lost IP that can irrevocably mitigate an organization’s competitive advantage

    - Forcepoint’s differentiated strategy delivers what no one else can – understanding the behavior of people and data on your network while delivering adaptive and automated security response
  • 6 ways CISOs are securing and navigating the cloud Recorded: Dec 17 2020 60 mins
    Jo Peterson, Clarify 360; Brian ThompsonVP, Veeam Software; Michael Goldgof, Barracuda Networks; Carl Eberling, Forcepoint
    Cloud Adoption is on the rise again. According to IDG’s 2020 Cloud Computing Survey, 59 percent of respondents said their organizations would be mostly or all in the cloud within 18 months. Cloud changes our approach on so many levels—new technology, new shared responsibility model and new cybersecurity considerations

    In today’s session, we’ll explore 6 ways CISOs are navigating the cloud:
    - Securing an extended perimeter
    - Upskilling the team
    - Balancing Risk Management in Third Party Relationships
    - Defining the Shared Roles in a Shared Responsibility Model
    - Enhancing Visibility
    - Taking Advantage of Automation

    Moderator:
    Jo Peterson, Vice President, Cloud and Security Services, Clarify360
    Speakers:
    Brian Campbell--VP, Cyber Security Architect, Veeam Software
    Mike Goldgof--Senior Director, Product Marketing at Barracuda
    Carl Eberling-- CIO/CISO- Forcepoint
  • SASE Success Behind-The-Scenes Recorded: Dec 17 2020 25 mins
    Nico Fischbach, Global Chief Technology Officer, Forcepoint
    SASE converges network, web, data, and cloud app connectivity and security, but implementing a true SASE architecture is a daunting task and there is no one-size-fits-all approach. Join Forcepoint Global CTO Nicolas Fischbach for insights on Forcepoint’s approach to delivering the industry’s first true data-centric SASE as well as providing steps for a practical approach to implementing SASE today including evaluation criteria for SASE platforms and how to leverage existing, and identify new, areas for investment.
  • Preparing for the unpredictable: 2020, meet 2021 Recorded: Dec 17 2020 23 mins
    Nico Fischbach, Global Chief Technology Officer, Forcepoint | Myrna Soto, Chief Strategy and Trust Officer, Forcepoint
    Every year, Forcepoint cybersecurity experts from across the business come together to assess how the industry has changed in the last twelve months, and what is likely to happen in the next year.

    In our Future Insights Webcast, Chief Technology Officer Nicolas Fischbach is joined by Chief Strategy Officer Myrna Soto to discuss these security predictions and explore how organizations can best prepare for what lies ahead.

    What are the emerging trends and how should we adapt to them? How do we prepare for the threats we can’t yet see? Find out in this thought provoking discussion.

    About the speakers:

    Nico Fischbach
    As Global CTO, Nico Fischbach drives corporate level vision, defines the research agenda, and pilots technology and architecture road maps that underpin Forcepoint's human-centric cybersecurity solutions.

    Myrna Soto
    As the Chief Strategy and Trust Officer for Forcepoint. A strategic business and technology leader, Soto drives and champions the company’s enterprise vision, strategy and programs to protect people, critical data and IP both within the company and for thousands of Forcepoint customers around the globe.
  • Exploring SASE and the Future of Network Security Recorded: Dec 17 2020 32 mins
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • CXO Online: What If Cyber Security Was Just Created Today? Recorded: Dec 15 2020 48 mins
    Hamish Taylor Former CEO of Eurostar, Sainsbury's Bank, Lisa Forte, Renowned Global Voice on the Human Side of Cyber Security
    While companies increasingly rely on the modern strategies of global growth, transition to the cloud and a flexible workforce to increase productivity and profits, these same efforts can spread sensitive and critical data in a way that opens the door to new threats and new challenges. It’s more important than ever for successful companies to rely on modern security strategies to keep critical data and employees safe in a risky and complex world.

    In this session, we will explore:
    - What cyber security would look like if it were created today
    - What improvements could be made to better serve your role in the organization

    About the speakers:

    Hamish Taylor
    Former CEO of Eurostar, Sainsbury's Bank and Vision UK

    Lisa Forte
    Renowned Global Voice on the Human Side of Cyber Security & Social Engineering. In 2018 she won the “Top 100 Women In Tech” Award recognizing her achievements and contributions to the cyber security industry.

    Nico Fischbach
    As Global CTO, Nico Fischbach drives corporate level vision, defines the research agenda, and pilots technology and architecture road maps that underpin Forcepoint's human-centric cybersecurity solutions.
  • Slackers, Go-Getters, & Evildoers: Understanding Negative Workplace Behaviors Recorded: Dec 15 2020 44 mins
    Dr. Margaret Cunningham, Principal Research Scientist, Forcepoint | Daniel Norman, Snr. Solutions Analyst, ISF
    Even model employees are guilty of exhibiting bad behaviors and understanding them is critical to establishing effective cybersecurity solutions.

    In this webcast, the Information Security Forum’s Analyst Daniel Norman hosts Forcepoint’s research scientist Dr. Margaret Cunningham as they explore three different types of rule breakers and try to understand how their motivations can jeopardize security.

    Find out what drives your employees actions and learn strategies for mitigating the risks that stem from negative workplace behaviors.
     


    Dr. Margaret Cunningham is Principal Research Scientist for Human Behavior within Forcepoint X-Labs, focused on establishing a human-centric model for improving cybersecurity. Previously, Cunningham supported technology acquisition, research and development, operational testing and evaluation, and integration for the U.S. Department of Homeland Security and U.S. Coast Guard
  • A Necessary Change in the Data Protection Mindset Recorded: Dec 15 2020 54 mins
    Raffael Marty, VP Forcepoint X-Labs | Homayun Yaqub, Snr Strategist, Forcepoint | Steve Wright, Partner, Privacy Culture
    It is time for a paradigm shift in security. Although trillions of dollars have been invested in keeping external attackers at bay, there seems to be no end in sight to the cat and mouse game between attackers and the security industry; zero day attacks, new vulnerabilities and ever increasingly sophisticated attacks dominate cybersecurity headlines. We need to expand the concept of threat intelligence and indicators of compromise (IOCs). Effective cyber security needs to understand behaviors; those of devices and those of humans in order to help us move left of breach, to identify bad actors early and provide a necessary building block for zero trust access to resources.

    Key Takeaways from Discussion:

    - Everyone can agree moving left of breach is the modern cybersecurity path forward, and it’s what every organization wants to achieve

    - Just as cyber threats are dynamic and ever-evolving, so too must be today’s security strategy -- dynamic, risk-adaptive with automated enforcement that stops breaches in real time

    - The cost of a data breach today can be astronomical for businesses – not only significant fines but also loss of revenue, brand trust as well as lost IP that can irrevocably mitigate an organization’s competitive advantage

    - Forcepoint’s differentiated strategy delivers what no one else can – understanding the behavior of people and data on your network while delivering adaptive and automated security response
Connect and protect your remote, global workforce
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: APAC: Strategies for Enhancing your Conduct Risk Management
  • Live at: Jan 27 2021 3:00 am
  • Presented by: Myrna Soto, Chief Security Strategist & Trust Officer | Homayun Yaqub | James Wilde
  • From:
Your email has been sent.
or close