Hi [[ session.user.profile.firstName ]]

Best Practices for Avoiding a Data Breach

New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.

Watch now to learn:
- Challenges of securing data moving between on-prem and the cloud
- Tips and takeaways from data-secure companies
- Technologies they’ve used to prevent breaches
Recorded Aug 4 2021 25 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
Presentation preview: Best Practices for Avoiding a Data Breach

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 6 Stages for a Successful DLP Migration. Nov 24 2021 9:30 am UTC 61 mins
    Kevin Oliveira, Sr. Product Marketing Manager, Forcepoint | Abdul Pasha, Sr. Manager - Professional Services, Forcepoint
    How did a large enterprise customer migrate its DLP with 100,000 endpoints in just six weeks?

    By leveraging the same six-stage framework that countless businesses across the world have used to successfully migrate to Forcepoint DLP. Hosts Abdul Pasha, Sr. Manager of Professional Services, and Kevin Oliveira, Sr. Product Marketing Manager, share their best practices and strategic tips for seamlessly migrating DLP platforms of all sizes.

    Key topics include:

    - Planning your timeline backward from a target implementation date
    - Understanding similarities of language and functionality for both platforms
    - Facilitating post-implementation knowledge transfer
  • Die Herausforderungen von Cyberangriffen und Ransomware. Nov 17 2021 9:00 am UTC 57 mins
    Hans-Wilhelm Dunn | David Berger | Konrad Langhammer
    Ransomware und andere Cyberangriffe stellen seit langem eine besondere Herausforderung dar.
    Regierungen weltweit sind sich dessen bewusst, dass Regierungsbehörden und Organisationen in kritischen nationalen Infrastrukturen dringend neue Pläne, Cybersicherheitsprogramme und Wiederherstellungssysteme benötigen.

    Der "Zero Trust"-Ansatz für die Netzwerksicherheit eignet sich hervorragend für den Schutz von Unternehmen im Zeitalter von Cloud-Anwendungen, virtualisierten Desktops und weit verbreitetem Netzwerkzugriff.

    Eine wichtige Frage dabei ist allerdings, welche Bereiche zu einem solchen „Zero Trust Netzwerk“ dazu gehören. Wo ziehen wir unseren Perimeter? Was hat das alles mit den großen Hacks aus der jüngsten Zeit zu tun? Auf diese und viele weitere Fragen möchten wir gemeinsam mit Herrn Hans-Wilhelm Dünn, Präsident, Cyber-Sicherheitsrat e.V., Antworten liefern.
    Wenn Sie mehr über die Bedeutung von Zero Trust für unsere IT-Infrastrukturen erfahren möchten, schauen Sie sich unser Webinar.
  • Rester dans la course : Une longueur d’avance sur la transformation numérique Nov 16 2021 7:00 am UTC 47 mins
    Venita Maupou, Rémi Enjalbert, Stéphane Chmielewski, Benjamin Leroux
    Tandis que les entreprises ont dû s’adapter rapidement au changement en passant du travail au bureau au travail à distance, la transformation numérique a continué à se développer en 2020. Ces changements comprennent, sans s’y limiter, le passage au cloud, et ses diverses utilisations pour à la fois accéder aux données clients dans le domaine bancaire ou la fabrication, jusqu’à la transformation du SD-WAN, qui a fait évoluer pour toujours la façon dont nous restons connectés.

    Tandis que la transformation numérique a été un élément clé de 2020, la transformation des entreprises et du leadership a également évoluée. 2020 a obligé, plus qu’auparavant, les dirigeants à réfléchir de façon plus critique à leurs stratégies de sécurité de l’entreprise. La transformation participative s’est développée et les dirigeants doivent dorénavant écouter les utilisateurs plutôt que de leur dire non, et adopter la Shadow IT. D’autres domaines de transformation comprennent les décisions liées à l’adoption du cloud, à la gestion de la sécurité des employés sur les appareils utilisés à domicile, et à de plus larges questions de vie privée.

    Il est essentiel que les dirigeants aient suffisamment de connaissances afin de prendre les meilleures décisions possibles pour leurs sociétés.

    Dans cette séance, nous allons aborder les points suivants:
    -La principale force motrice de la transformation numérique
    -La responsabilité des choix informatiques ; comment adopter le Shadow IT sans mettre en danger la sécurité
    -Les sociétés et leurs employés prennent-ils des décisions plus audacieuses et celles-ci peuvent-elles être plus bénéfiques et faire baisser le coût de propriété ?
    -Prendre les meilleures décisions de sécurité pour votre activité ; les réflexions autour de l’adoption du cloud et des appareils des employés

    -Venita Maupou Senior Program Manager/Rémi Enjalbert Senior Sales Engineer, Forcepoint
    -Stéphane Chmielewski CISO, Finologee
    -Benjamin Leroux Marketing Director, Advens
  • The Human Threat: Breaking Down Insider Risk Nov 9 2021 10:00 am UTC 57 mins
    Michael Crouse, Dir. Enterprise User & Data Protection, Forcepoint | Darren Mott, Former FBI Supervisory Special Agent
    Identifying and stopping insider threats continues to be one of the biggest security challenges facing organizations today. They range from the ‘good’ employee engaging in unintentional risky activity, the employee being targeted by external bad actors, to the worst case scenario, the malicious insider. In this more complex remote world, what strategies are available to surface threats – and can we stop them before they cause a breach?

    In this session, Forcepoint’s Director of User & Data Protection, Michael Crouse is joined by special guest, Former FBI Supervisory Special Agent, Darren Mott to share their experiences in helping organizations and government bodies develop their insider threat programs:

    Topics include:
    - Real insider threat cases and their outcomes
    - Insider threat vectors and the telltale signs of exploit
    - The role of technology in providing meaningful visibility to protect “the crown jewels”
    - Investigating behavioral changes and the impact of social distancing
    - How to minimize losses and collateral damage
    - Practical steps you can implement today
  • Optimizing Cyber Resilience In The Era Of Ransomware. Nov 3 2021 9:30 am UTC 55 mins
    Nick Savvides, Senior Director of Strategic Business, Asia Pacific, Forcepoint
    As our businesses have all become dependent on technology for practically all aspects of operations, cyber-resilience is now directly tied to business-resilience closer than ever before.

    Join Forcepoint’s Senior Director of Strategic Business – Nick Savvides – online where he’ll share insights into how cyber-criminals are using ransomware to cripple organizations including their common techniques and methods of operation.

    He will also reveal how to optimize the most common existing controls that organizations typically already have deployed, to reduce the likelihood and the impact of a ransomware event.

    And finally, Nick will examine what new technologies and approaches can be applied to significantly improve the resilience of these attacks as well as how to build a business case to obtain resourcing from the board to support new technology initiatives.
  • Risk-adaptive Data Security for Today’s Hybrid Workforce. Nov 3 2021 9:30 am UTC 21 mins
    Ozgur Danisman, Vice President Sales Engineering, EMEA, Forcepoint
    Cybersecurity - particularly during the pandemic - is a true business enabler, delivering customers anywhere, anytime security availability without compromising performance or productivity. In fact, a recent joint Forcepoint/WSJ Intelligence survey revealed that leaders view cybersecurity as the key to business advantage, with 48% of the respondents reporting cybersecurity’s bigger role in enabling innovation and 41% agreeing that it delivers a competitive edge.

    Today’s reality is that people are working from everywhere, and progressive organizations must address the protection of precious information assets in perimeter-less networking environments.

    But how to manage, harness and protect this data to best effect? The challenges we as cybersecurity professionals face are multiple.

    Join this webinar to learn:
    - How to protect data as it flows across a hyper-distributed organization, with multi-generational infrastructure?
    - How to comply with international data protection regulations?
    - How to truly understand what data we have, what we need to protect, who wants to access it, how are they behaving, and where the data is moving?
  • Die Gratwanderung zwischen dem Datenschutz und der Befähigung von Fernarbeitern Recorded: Oct 28 2021 37 mins
    Carsten Hoffmann I Lars Kroll I Peter "Faxe" Lachenmair
    In den letzten 12 Monaten hat sich die Fernarbeit grundlegend verändert. Diese wird jedoch in absehbarer Zeit nicht vorbei sein. Die Arbeit ist von einem Standort zu einer Aktivität geworden, und die Art und Weise, wie wir arbeiten, hat sich für immer verändert. Eine Gartner-Umfrage ergab, dass 74 % der CFOs beabsichtigen, einen Teil ihrer Mitarbeiter vor Ort langfristig an einen anderen Standort zu versetzen. Das Problem, mit dem viele Organisationen konfrontiert sind, besteht darin, dass das Fernarbeiten dazu führt, dass sich Benutzer und Daten außerhalb der traditionellen IT-Abwehrsysteme befinden, die normalerweise automatisch denjenigen innerhalb des Netzwerks vertrauen. Führungskräfte müssen lernen, wie sie die Daten innerhalb ihres Unternehmens schützen können, wenn Mitarbeiter „draußen“ sind. Der Wandel in den Arbeitsumgebungen hat die Führungskräfte zu wichtigen Entscheidungen hinsichtlich der Fernarbeit, der Nutzung der Cloud und der Art und Weise, wie sowohl ihre Daten als auch ihre Mitarbeiter geschützt werden können, gezwungen.

    Wie können Unternehmen also ihre Daten schützen und gleichzeitig einer mehr und mehr Remote-Belegschaft leichteren Zugang gewähren? Wie ermöglichen wir es Mitarbeitern, jederzeit und überall sicher auf Daten zuzugreifen?

    Nehmen Sie an dieser Sitzung teil, während wir folgende Punkte diskutieren:
    - Die durch die Pandemie verursachte Änderungsrate und wie sich diese auf Sicherheit, Daten-Compliance und Datenschutzfragen für Mitarbeiter und Kunden auswirkt.
    - Wie man Daten vor Bedrohungen und Exfiltration schützt und gleichzeitig Zugriff auf diese in einem noch nie dagewesenen Ausmaß gewährt
    - Wie man Remote-Mitarbeiter sicher und geschützt hält und gleichzeitig Konflikte im Unternehmen vermeidet, sodass die Mitarbeiter ihre Arbeit erfüllen können
  • Identity e Data Security: pronto alle nuove sfide poste dai cambiamenti attuali? Recorded: Oct 20 2021 41 mins
    Andrea Rigoni | Alessio Uva | Andrea Solaroli | Alessandro Biagini
    Secondo un recente sondaggio di McKinsey, una delle maggiori sfide che gli addetti alla sicurezza dovranno affrontare nei prossimi dodici mesi sarà la gestione e la protezione del dati di forza lavoro perlopiu remota : nove organizzazioni su dieci hanno bisogno di una sicurezza che protegga utenti, dati e privacy senza influire negativamente sulla produttività.

    Parleremo di:
    - Come identificare le principali iniziative per la sicurezza del lavoro a distanza e qual è la migliore per la tua azienda
    - Modalita efficaci per ridurre l’impatto degli attacchi ransomware
    - Prevenzione consapevole di un data breach
  • Der beste Weg um Daten zu schützen Recorded: Oct 20 2021 25 mins
    David Berger, Account Manager, Forcepoint | Lars Kroll, Security Stratege, Kroll Strategieberatung
    Eine der größten Herausforderungen für Security Verantwortliche in den nächsten 12 Monaten wird der Schutz von Daten in hybriden Arbeitsumgebungen sein. McKinsey geht davon aus, dass neun von zehn Unternehmen in Zukunft klassische Büro- und Home-Office-Arbeitsplätze kombinieren werden.
    Um in dies zu ermöglichen, müssen IT-Abteilungen Daten und Privatsphäre schützen, ohne die Produktivität zu beeinträchtigen.
    Ein Data-First Ansatz ermöglicht es die Produktivität unabhängig vom Arbeitsort zu steigern, indem der Zugriff auf Daten und Anwendungen vereinheitlicht wird. Gleichzeitig minimiert der Ansatz das Risiko von Datenverlust.

    Wir sprechen über

    - Die wichtigsten Initiativen, um Hybride Arbeitsmodelle zu ermöglichen
    - Die größten Herausforderungen beim Schutz von Daten
    - Die Privatsphäre von Mitarbeitern in einer hybriden Arbeitsumgebung
  • Hibrit iş Gücü için Veri Koruması ve Etkileri Recorded: Oct 20 2021 52 mins
    Murat Bayraktar, Forcepoint | Gürkan Papila, Eczacıbaşı Holding | Murat Zaralı, Yıldız Holding
    McKinsey'in 2021 yılı küresel anketine göre, önümüzdeki on iki ay boyunca siber güvenlik uzmanlarının karşılaşacağı en büyük zorluklardan biri, fiziki sınırların ortadan kalktığı işgücünün kritik verilerini yönetmek ve korumak olacak. Ayrıca araştırmada on kuruluştan dokuzunun uzaktan ve yerinde çalışmayı birleştireceği belirtilmiş. Gartner’ın yaptığı diğer bir araştırmaya göre de, şirketlerin %75'inin COVID-19 sonrası bazı çalışanlarını kalıcı olarak uzaktan çalışmaya kaydırmayı planladığını ortaya koyuyor.
    Bu hibrit çalışma ortamına etkin bir şekilde uyum sağlamak için, kuruluşların iş üretkenliğini, verileri ve gizliliği olumsuz bir şekilde etkilemeden koruyan bir siber güvenlik altyapısına ihtiyacı var.

    Güvenli erişim sağlamak için kullanılan “Veri Odaklı” yaklaşım, üretkenliği artırır ve riski azaltır; verilerinize, uygulamalarınıza ve hizmetlerinize erişimi iyileştirmenize ve kullanıldığı her yerde verilerin güvenliğini sağlamanıza olanak tanır.

    Bu etkinlikte irdelenecek konular:

    - Uzaktan çalışma için temel siber güvenlik insiyatifleri nasıl belirlenir ve bunlardan hangisi sizin iş ortamınız için en iyisidir?
    - Fidye yazılımı saldırılarının etkisini azaltmak için en etkili insiyatif hangisidir?
    - Veri ihlallerinin önlenmesi konusunda karşılaşılan zorluklar ve çözümleri nelerdir?
    - Hibrit iş gücü ortamında veri gizliliğinin korunması ve 2022 yılı için regulasyonlara uyumluluk konusundaki temel gelişmeler nelerdir?

    Murat Bayraktar, Satış Mühendisliği Müdürü, Forcepoint
    Gürkan Papila, CIO, Eczacıbaşı Holding
    Murat Zaralı, Bilgi Güvenliği Direktörü, Yıldız Holding
  • La Protección del Dato en un entorno laboral híbrido Recorded: Oct 20 2021 46 mins
    Elena Cerrada, Forcepoint | Juan Luis Garijo, Crowdstrike | Carlos Ferro, Thycotic
    El cambio dramático que hemos experimentado para poder mantener una fuerza laboral remota y la aceleración en la transformación digital que conlleva, han puesto de relieve dos aspectos relevantes: que el riesgo ciber ya es un problema que se aborda en los Comités de Dirección y que la ciberseguridad se ha convertido en un habilitador estratégico del negocio.

    Ahora que convivimos con un formato híbrido de trabajo, tenemos que proteger los datos y usuarios allá donde estén y mantener la privacidad sin afectar negativamente la productividad.

    El evento virtual Forcepoint Exchange reúne voces reconocidas de la industria de la ciberseguridad y Forcepoint. Únete a Elena Cerrada, Country Manager de Forcepoint, Juan Luis Garijo, Country Manager de Crowdstrike y Carlos Ferro, VP Sales de Thycotic, para analizar cómo abordan la protección de los datos para mejorar la productividad de su fuerza laboral y simplificar las operaciones de sus equipos de TI.

    Elena Cerrada, Country Manager de Forcepoint para Iberia
    Juan Luis Garijo, Country Manager de Crowdstrike para Iberia
    Carlos Ferro, VP de Ventas en Thycotic
  • Sécuriser la data à l'ère du travail hybride Recorded: Oct 20 2021 39 mins
    Christian Guyon, Manager, Sales Engineering, Forcepoint | Olivier Bouzereau, Journaliste | Mathieu Gorge CEO, Vigitrust
    Dans l’avenir proche, l'un des plus grands défis auxquels les professionnels de la cybersécurité seront confrontés sera la gestion et la protection des données qui dépassent le strict périmètre de l’entreprise. 9 organisations sur 10 combineront désormais le travail à distance et sur site - selon une enquête globale menée par McKinsey en 2021.

    Pour s'adapter efficacement à cet environnement de travail hybride, la sécurité et la confidentialité revêtent autant d’importance que la productivité.

    Fluidifier les échanges en toute sécurité repose sur une approche axée sur les données.

    Rejoignez cette table ronde pour découvrir :

    - Quelles sont les principales initiatives de cybersécurité télétravailleuse adoptées par diverses entreprises en adéquation avec leurs transformations
    - Les dispositifs les plus efficaces pour réduire l'impact des attaques de ransomware
    - Les défis considérables à relever dans le cadre d’une protection efficace et pérenne des données
    - Les développements clés au niveau de la conformité d’ici 2022
  • Data Security - Learning from Healthcare Recorded: Oct 20 2021 42 mins
    Alex Hilton, Cloud Industry Forum | Kevin Oliveira, Forcepoint | David W. Reis, University of Miami Health System
    The COVID-19 pandemic irrevocably changed global healthcare. IT infrastructure was deployed hastily and organizations were forced to accelerate the adoption of new technologies and services.

    Whilst this uptake was imperative to continue the delivery of life-saving services and treatment, cybercriminals recognized this vulnerability and compromised confidential patient data, according to the 2021 Ponemon Cost of a Data Breach Report, Healthcare was the top industry in average cost of a breach for the 11th year in a row – with nearly a 30% increase, rising from $7.13M to $9.23M in 2021.

    It is therefore crucial that all industries learn from the challenges faced by the Healthcare industry and look ahead at how they can be better prepared.

    Join this session to learn:

    - Why cybersecurity in healthcare couldn’t afford to be competitive?
    - Where should organizations look to invest their budget (if limited)?
    - How to securely make confidential data accessible to staff on and off-site.
    - Why a balance between steady improvement security without negatively impacting the availability of critical medical technology.
    - The difficulty of implementing an industry-wide security standard.

    Alex Hilton, CEO, Cloud Industry Forum
    Kevin Oliveira, Senior Product Marketing Manager, Forcepoint
    David W. Reis, Chief Information Officer at University of Miami Health System
  • Data-first Security for Today's Hybrid Workforce Recorded: Oct 20 2021 51 mins
    Alex Hilton, Cloud Industry Forum | Alexandra Willsher, Forcepoint | Edward Liebig, Delviom | Kimber Dowsett, Truss
    Over the next twelve months, one of the greatest challenges facing cybersecurity professionals will be managing and protecting the data of the borderless workforce, according to McKinsey’s 2021 global survey: nine out of ten organizations will combine remote and on-site working.
    To effectively accommodate this hybrid work environment organizations need security that secures data and privacy without negatively impacting productivity.
    A data-first approach for delivering secure access boosts productivity and reduces risk, allowing you to improve access to your data, apps, and services and secure data everywhere it’s used.

    What you will learn:
    - How to identify the core cybersecurity initiatives for remote working and which is best for your business?
    - Which initiative is the most efficient to lower the impact of ransomware attacks?
    - A discussion on the biggest challenge in preventing a data breach?
    - Maintaining data privacy in a hybrid-workforce environment and key compliance developments in 2022.
  • From Workplace to Workforce Security Recorded: Oct 20 2021 53 mins
    Nick Savvides, Forcepoint | Michelle Griffey, Communisis | Philip Souter, Digital Resilience
    There is much discussion around the remote workforce. Who will return full time? What proportion will be hybrid? Will this be a permanent change? From a security perspective, the challenge is the same: secure your people and data wherever they are.

    In this executive-level discussion, Forcepoint’s Nick Savvides hosts Communisis Chief Risk Officer, Michelle Griffey, and Digital Resilience CISO, Philip Souter, to share their experiences of enabling the transition from workplace to workforce security, lessons learned and looking ahead to the future.

    Key topics include:
    • Shortcomings of traditional technologies for supporting a remote workforce
    • Importance of SASE and Zero Trust in balancing user productivity with security
    • New solutions, platforms and frameworks to sustain the evolution of workforce security
  • Risk Management Technology: Getting It Right Recorded: Oct 20 2021 50 mins
    Nick Savvides, Forcepoint | Marco Figueroa, Australian Institute of Company Directors (AICD)
    When it comes to risk management and data protection, many organizations today are driven by compliance and might have all the tick boxes checked, but are still experiencing data breaches, cyber events and other disruptions. Ransomware is the main culprit at the top of the list, but being ‘compliant’ won’t stop it. CISOs need to focus security budget and controls in the right areas in order to effectively protect an organization from cyber threats and data breaches.

    Join this session and listen to a fireside chat between Forcepoint’s Nick Savvides and Marco Figueroa, CISO of the AICD. They will share insights into the risks associated with not having correct technology deployed to effectively secure an organization from cyber threats, the critical areas that security budget should be invested when limited funds are available, the key metrics CISO’s should be using to measure results and “have a voice” at Board level, and how to articulate a Zero Trust concept into a conversation that resonates with board members.

    Key takeaways for audience:
    - How to enable a healthy balance between being compliant and having necessary threat protection technology in place.
    - Critical areas to invest security budget when limited funds are available.
    - The importance of using metrics that are understood by the Board and to ensure positive outcomes.
    - Articulating the concept of Zero Trust into a conversation that resonates with the board.

    Nick Savvides, Senior Strategic Business Director, Forcepoint
    Marco Figueroa, CISO, Australian Institute of Company Directors (AICD)
  • Hybrid Workforce Security—Bring Security to Users, No Matter Where They Are Recorded: Sep 22 2021 37 mins
    Jim Fulton, Senior Director, SASE and Zero Trust Solutions, Forcepoint
    Businesses are embracing hybrid work models that allow people to divide their time between remote and in-office work, but for people to work anywhere and be safe everywhere, connectivity and data security have to follow--seamlessly.

    Join Jim Fulton, Senior Director, SASE and Zero Trust Solutions, Forcepoint, for a look at real life examples that demonstrate how a Secure Service Access Edge (SASE) architecture makes it possible for people to work safely anywhere and, with zero trust principles applied, lets you ensure explicit permissions for the user.
  • Cloud Data Protection Strategies and Trends, with ESG Analyst John Grady Recorded: Sep 15 2021 44 mins
    John Grady, ESG Analyst Cybersecurity & Ankur Chadda, Senior Solutions Manager, Forcepoint
    Every organization, large or small, is in the midst of a digital transformation. Part of that includes the adoption of cloud apps that give employees increased freedom, flexibility and efficiency. For this reason, cloud data security has become increasingly critical. As more cloud apps are added, security teams struggle to match the increasingly complex environment with an equally adaptive data protection strategy.

    Instead of being bogged down by false alerts and left vulnerable by an unbalanced strategy, security practitioners need to adjust their data protection mentality and approach. By revaluating data protection strategies, organization can ensure that security is not outpaced by digital transformation.

    Attend this webinar to learn more on these topics from analyst, John Grady (ESG), as he shares insights based on an extensive survey.
  • Getting Past Impossible: The Human Factors of Cybersecurity. Recorded: Sep 1 2021 21 mins
    Dr. Margaret Cunningham, Forcepoint | Dr. Calvin Nobles, Illinois Tech College of Computing
    Organizations continue to invest in technology solutions time and time again, yet cyber criminals and nation states continue to break through our defenses. That’s because the emphasis has been on approaches that are too cut-and-dried around indicators of compromise.

    Margaret Cunningham, principal research scientist on human behavior at Forcepoint, and Calvin Nobles, chair and associate professor of information and management at Illinois Tech College of Computing, know it is time to address cybersecurity from a new angle: human behavior. People are integral at every level of a company, yet are often overlooked as the foundation of an effective cybersecurity posture.

    Human Factors Engineering is the practice of applying science to optimize human behaviors in the work environment, creating a more effective and holistic approach to cybersecurity.

    Join us to learn:

    - How to educate business executives and decision makers on human behaviors
    - Recognizing the importance of human factors at every level of a company
    - How the science of human behavior allows us to predict mistakes that may weaken our systems
    - How to create the security framework that addresses human behavior, especially in new remote workspaces created by the pandemic
  • Continuously Monitoring User Risk for Better Remote Worker Security. Recorded: Aug 25 2021 18 mins
    Jim Fulton, Sr Director SASE & Zero Trust Solutions - Sean O'Sullivan, Sr Principal Solutions Engineer
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 5 and learn how:

    • Know who is actually at the ‘other end’ is much harder when people are remote
    • Behavioral intelligence is the key to understanding who is really there
    • Defining policies in terms of risk boosts security, simplicity, productivity
Strategic sessions on Cloud, Network & Data Security
To enable users to work anywhere, we must put data protection at the center of cloud and network security strategies. In this channel, we explore the latest technologies, security trends and frameworks like Zero Trust and SASE to help you not only determine where you are, but also what you still need to do to protect your business. Get the materials and building blocks you need to implement a data-first SASE architecture. See for yourself. https://www.forcepoint.com/sase

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Avoiding a Data Breach
  • Live at: Aug 4 2021 8:30 am
  • Presented by: Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
  • From:
Your email has been sent.
or close