Hi [[ session.user.profile.firstName ]]

Cybersecurity Simplified for Retail & Hospitality.

The working models of protecting the edge are no longer enough. Users and apps are everywhere, so it’s essential to protect your data everywhere, too. Secure Service Access Edge (SASE) makes it possible for people to work safely from anywhere. And, with Zero Trust Network Access (ZTNA) principles applied, you can ensure explicit permissions are in place throughout your organization.

A data-first SASE architecture with built-in ZTNA helps you ensure each person has access to the data they need and allows you to implement appropriate control points based on the usage of that data. See how you can create an integrated cloud and network security strategy using the power of a data-first approach.

Key takeaways:
• Protect remote workers both on the web and in the cloud while controlling cloud and private app access without VPNs
• Connect and protect branch offices as well as safeguard data use everywhere
• Monitor user risk at all times
Recorded Aug 11 2021 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jim Fulton, Head of SASE & Zero Trust Solutions, Forcepoint
Presentation preview: Cybersecurity Simplified for Retail & Hospitality.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Optimizing Cyber Resilience In The Era Of Ransomware. Nov 3 2021 9:30 am UTC 55 mins
    Nick Savvides, Senior Director of Strategic Business, Asia Pacific, Forcepoint
    As our businesses have all become dependent on technology for practically all aspects of operations, cyber-resilience is now directly tied to business-resilience closer than ever before.

    Join Forcepoint’s Senior Director of Strategic Business – Nick Savvides – online where he’ll share insights into how cyber-criminals are using ransomware to cripple organizations including their common techniques and methods of operation.

    He will also reveal how to optimize the most common existing controls that organizations typically already have deployed, to reduce the likelihood and the impact of a ransomware event.

    And finally, Nick will examine what new technologies and approaches can be applied to significantly improve the resilience of these attacks as well as how to build a business case to obtain resourcing from the board to support new technology initiatives.
  • Risk-adaptive Data Security for Today’s Hybrid Workforce. Nov 3 2021 9:30 am UTC 21 mins
    Ozgur Danisman, Vice President Sales Engineering, EMEA, Forcepoint
    Cybersecurity - particularly during the pandemic - is a true business enabler, delivering customers anywhere, anytime security availability without compromising performance or productivity. In fact, a recent joint Forcepoint/WSJ Intelligence survey revealed that leaders view cybersecurity as the key to business advantage, with 48% of the respondents reporting cybersecurity’s bigger role in enabling innovation and 41% agreeing that it delivers a competitive edge.

    Today’s reality is that people are working from everywhere, and progressive organizations must address the protection of precious information assets in perimeter-less networking environments.

    But how to manage, harness and protect this data to best effect? The challenges we as cybersecurity professionals face are multiple.

    Join this webinar to learn:
    - How to protect data as it flows across a hyper-distributed organization, with multi-generational infrastructure?
    - How to comply with international data protection regulations?
    - How to truly understand what data we have, what we need to protect, who wants to access it, how are they behaving, and where the data is moving?
  • Die Gratwanderung zwischen dem Datenschutz und der Befähigung von Fernarbeitern Oct 28 2021 7:00 am UTC 37 mins
    Carsten Hoffmann I Lars Kroll I Peter "Faxe" Lachenmair
    In den letzten 12 Monaten hat sich die Fernarbeit grundlegend verändert. Diese wird jedoch in absehbarer Zeit nicht vorbei sein. Die Arbeit ist von einem Standort zu einer Aktivität geworden, und die Art und Weise, wie wir arbeiten, hat sich für immer verändert. Eine Gartner-Umfrage ergab, dass 74 % der CFOs beabsichtigen, einen Teil ihrer Mitarbeiter vor Ort langfristig an einen anderen Standort zu versetzen. Das Problem, mit dem viele Organisationen konfrontiert sind, besteht darin, dass das Fernarbeiten dazu führt, dass sich Benutzer und Daten außerhalb der traditionellen IT-Abwehrsysteme befinden, die normalerweise automatisch denjenigen innerhalb des Netzwerks vertrauen. Führungskräfte müssen lernen, wie sie die Daten innerhalb ihres Unternehmens schützen können, wenn Mitarbeiter „draußen“ sind. Der Wandel in den Arbeitsumgebungen hat die Führungskräfte zu wichtigen Entscheidungen hinsichtlich der Fernarbeit, der Nutzung der Cloud und der Art und Weise, wie sowohl ihre Daten als auch ihre Mitarbeiter geschützt werden können, gezwungen.

    Wie können Unternehmen also ihre Daten schützen und gleichzeitig einer mehr und mehr Remote-Belegschaft leichteren Zugang gewähren? Wie ermöglichen wir es Mitarbeitern, jederzeit und überall sicher auf Daten zuzugreifen?

    Nehmen Sie an dieser Sitzung teil, während wir folgende Punkte diskutieren:
    - Die durch die Pandemie verursachte Änderungsrate und wie sich diese auf Sicherheit, Daten-Compliance und Datenschutzfragen für Mitarbeiter und Kunden auswirkt.
    - Wie man Daten vor Bedrohungen und Exfiltration schützt und gleichzeitig Zugriff auf diese in einem noch nie dagewesenen Ausmaß gewährt
    - Wie man Remote-Mitarbeiter sicher und geschützt hält und gleichzeitig Konflikte im Unternehmen vermeidet, sodass die Mitarbeiter ihre Arbeit erfüllen können
  • Identity e Data Security: pronto alle nuove sfide poste dai cambiamenti attuali? Oct 20 2021 1:00 pm UTC 45 mins
    Andrea Rigoni | Alessio Uva | Andrea Solaroli | Alessandro Biagini
    Secondo un recente sondaggio di McKinsey, una delle maggiori sfide che gli addetti alla sicurezza dovranno affrontare nei prossimi dodici mesi sarà la gestione e la protezione del dati di forza lavoro perlopiu remota : nove organizzazioni su dieci hanno bisogno di una sicurezza che protegga utenti, dati e privacy senza influire negativamente sulla produttività.

    Parleremo di:
    - Come identificare le principali iniziative per la sicurezza del lavoro a distanza e qual è la migliore per la tua azienda
    - Modalita efficaci per ridurre l’impatto degli attacchi ransomware
    - Prevenzione consapevole di un data breach
  • Der beste Weg um Daten zu schützen Oct 20 2021 12:00 pm UTC 45 mins
    David Berger, Account Manager, Forcepoint | Lars Kroll, Security Stratege, Kroll Strategieberatung
    Eine der größten Herausforderungen für Security Verantwortliche in den nächsten 12 Monaten wird der Schutz von Daten in hybriden Arbeitsumgebungen sein. McKinsey geht davon aus, dass neun von zehn Unternehmen in Zukunft klassische Büro- und Home-Office-Arbeitsplätze kombinieren werden.
    Um in dies zu ermöglichen, müssen IT-Abteilungen Daten und Privatsphäre schützen, ohne die Produktivität zu beeinträchtigen.
    Ein Data-First Ansatz ermöglicht es die Produktivität unabhängig vom Arbeitsort zu steigern, indem der Zugriff auf Daten und Anwendungen vereinheitlicht wird. Gleichzeitig minimiert der Ansatz das Risiko von Datenverlust.

    Wir sprechen über

    - Die wichtigsten Initiativen, um Hybride Arbeitsmodelle zu ermöglichen
    - Die größten Herausforderungen beim Schutz von Daten
    - Die Privatsphäre von Mitarbeitern in einer hybriden Arbeitsumgebung
  • Hibrit iş Gücü için Veri Koruması ve Etkileri Oct 20 2021 11:00 am UTC 45 mins
    Murat Bayraktar, Forcepoint | Gürkan Papila, Eczacıbaşı Holding | Murat Zaralı, Yıldız Holding
    McKinsey'in 2021 yılı küresel anketine göre, önümüzdeki on iki ay boyunca siber güvenlik uzmanlarının karşılaşacağı en büyük zorluklardan biri, fiziki sınırların ortadan kalktığı işgücünün kritik verilerini yönetmek ve korumak olacak. Ayrıca araştırmada on kuruluştan dokuzunun uzaktan ve yerinde çalışmayı birleştireceği belirtilmiş. Gartner’ın yaptığı diğer bir araştırmaya göre de, şirketlerin %75'inin COVID-19 sonrası bazı çalışanlarını kalıcı olarak uzaktan çalışmaya kaydırmayı planladığını ortaya koyuyor.
    Bu hibrit çalışma ortamına etkin bir şekilde uyum sağlamak için, kuruluşların iş üretkenliğini, verileri ve gizliliği olumsuz bir şekilde etkilemeden koruyan bir siber güvenlik altyapısına ihtiyacı var.

    Güvenli erişim sağlamak için kullanılan “Veri Odaklı” yaklaşım, üretkenliği artırır ve riski azaltır; verilerinize, uygulamalarınıza ve hizmetlerinize erişimi iyileştirmenize ve kullanıldığı her yerde verilerin güvenliğini sağlamanıza olanak tanır.

    Bu etkinlikte irdelenecek konular:

    - Uzaktan çalışma için temel siber güvenlik insiyatifleri nasıl belirlenir ve bunlardan hangisi sizin iş ortamınız için en iyisidir?
    - Fidye yazılımı saldırılarının etkisini azaltmak için en etkili insiyatif hangisidir?
    - Veri ihlallerinin önlenmesi konusunda karşılaşılan zorluklar ve çözümleri nelerdir?
    - Hibrit iş gücü ortamında veri gizliliğinin korunması ve 2022 yılı için regulasyonlara uyumluluk konusundaki temel gelişmeler nelerdir?

    Murat Bayraktar, Satış Mühendisliği Müdürü, Forcepoint
    Gürkan Papila, CIO, Eczacıbaşı Holding
    Murat Zaralı, Bilgi Güvenliği Direktörü, Yıldız Holding
  • La Protección del Dato en un entorno laboral híbrido Oct 20 2021 10:00 am UTC 45 mins
    Elena Cerrada, Forcepoint | Juan Luis Garijo, Crowdstrike | Carlos Ferro, Thycotic
    El cambio dramático que hemos experimentado para poder mantener una fuerza laboral remota y la aceleración en la transformación digital que conlleva, han puesto de relieve dos aspectos relevantes: que el riesgo ciber ya es un problema que se aborda en los Comités de Dirección y que la ciberseguridad se ha convertido en un habilitador estratégico del negocio.

    Ahora que convivimos con un formato híbrido de trabajo, tenemos que proteger los datos y usuarios allá donde estén y mantener la privacidad sin afectar negativamente la productividad.

    El evento virtual Forcepoint Exchange reúne voces reconocidas de la industria de la ciberseguridad y Forcepoint. Únete a Elena Cerrada, Country Manager de Forcepoint, Juan Luis Garijo, Country Manager de Crowdstrike y Carlos Ferro, VP Sales de Thycotic, para analizar cómo abordan la protección de los datos para mejorar la productividad de su fuerza laboral y simplificar las operaciones de sus equipos de TI.


    Elena Cerrada, Country Manager de Forcepoint para Iberia
    Juan Luis Garijo, Country Manager de Crowdstrike para Iberia
    Carlos Ferro, VP de Ventas en Thycotic
  • Sécuriser la data à l'ère du travail hybride Oct 20 2021 9:00 am UTC 45 mins
    Christian Guyon, Manager, Sales Engineering, Forcepoint | Olivier Bouzereau, Journaliste | Mathieu Gorge CEO, Vigitrust
    Dans l’avenir proche, l'un des plus grands défis auxquels les professionnels de la cybersécurité seront confrontés sera la gestion et la protection des données qui dépassent le strict périmètre de l’entreprise. 9 organisations sur 10 combineront désormais le travail à distance et sur site - selon une enquête globale menée par McKinsey en 2021.

    Pour s'adapter efficacement à cet environnement de travail hybride, la sécurité et la confidentialité revêtent autant d’importance que la productivité.

    Fluidifier les échanges en toute sécurité repose sur une approche axée sur les données.

    Rejoignez cette table ronde pour découvrir :

    - Quelles sont les principales initiatives de cybersécurité télétravailleuse adoptées par diverses entreprises en adéquation avec leurs transformations
    - Les dispositifs les plus efficaces pour réduire l'impact des attaques de ransomware
    - Les défis considérables à relever dans le cadre d’une protection efficace et pérenne des données
    - Les développements clés au niveau de la conformité d’ici 2022
  • Data Security - Learning from Healthcare Oct 20 2021 8:00 am UTC 60 mins
    Alex Hilton, Cloud Industry Forum | Kevin Oliveira, Forcepoint | David W. Reis, University of Miami Health System
    The COVID-19 pandemic irrevocably changed global healthcare. IT infrastructure was deployed hastily and organizations were forced to accelerate the adoption of new technologies and services.

    Whilst this uptake was imperative to continue the delivery of life-saving services and treatment, cybercriminals recognized this vulnerability and compromised confidential patient data, according to the 2021 Ponemon Cost of a Data Breach Report, Healthcare was the top industry in average cost of a breach for the 11th year in a row – with nearly a 30% increase, rising from $7.13M to $9.23M in 2021.

    It is therefore crucial that all industries learn from the challenges faced by the Healthcare industry and look ahead at how they can be better prepared.

    Join this session to learn:

    - Why cybersecurity in healthcare couldn’t afford to be competitive?
    - Where should organizations look to invest their budget (if limited)?
    - How to securely make confidential data accessible to staff on and off-site.
    - Why a balance between steady improvement security without negatively impacting the availability of critical medical technology.
    - The difficulty of implementing an industry-wide security standard.

    Alex Hilton, CEO, Cloud Industry Forum
    Kevin Oliveira, Senior Product Marketing Manager, Forcepoint
    David W. Reis, Chief Information Officer at University of Miami Health System
  • Data-first Security for Today's Hybrid Workforce Recorded: Oct 20 2021 60 mins
    Alex Hilton, Cloud Industry Forum | Alexandra Willsher, Forcepoint | Edward Liebig, Delviom | Kimber Dowsett, Truss
    Over the next twelve months, one of the greatest challenges facing cybersecurity professionals will be managing and protecting the data of the borderless workforce, according to McKinsey’s 2021 global survey: nine out of ten organizations will combine remote and on-site working.
    To effectively accommodate this hybrid work environment organizations need security that secures data and privacy without negatively impacting productivity.
    A data-first approach for delivering secure access boosts productivity and reduces risk, allowing you to improve access to your data, apps, and services and secure data everywhere it’s used.

    What you will learn:
    - How to identify the core cybersecurity initiatives for remote working and which is best for your business?
    - Which initiative is the most efficient to lower the impact of ransomware attacks?
    - A discussion on the biggest challenge in preventing a data breach?
    - Maintaining data privacy in a hybrid-workforce environment and key compliance developments in 2022.
  • From Workplace to Workforce Security Recorded: Oct 20 2021 53 mins
    Nick Savvides, Forcepoint | Michelle Griffey, Communisis | Philip Souter, Digital Resilience
    There is much discussion around the remote workforce. Who will return full time? What proportion will be hybrid? Will this be a permanent change? From a security perspective, the challenge is the same: secure your people and data wherever they are.

    In this executive-level discussion, Forcepoint’s Nick Savvides hosts Communisis Chief Risk Officer, Michelle Griffey, and Digital Resilience CISO, Philip Souter, to share their experiences of enabling the transition from workplace to workforce security, lessons learned and looking ahead to the future.

    Key topics include:
    • Shortcomings of traditional technologies for supporting a remote workforce
    • Importance of SASE and Zero Trust in balancing user productivity with security
    • New solutions, platforms and frameworks to sustain the evolution of workforce security
  • Risk Management Technology: Getting It Right Recorded: Oct 20 2021 50 mins
    Nick Savvides, Forcepoint | Marco Figueroa, Australian Institute of Company Directors (AICD)
    When it comes to risk management and data protection, many organizations today are driven by compliance and might have all the tick boxes checked, but are still experiencing data breaches, cyber events and other disruptions. Ransomware is the main culprit at the top of the list, but being ‘compliant’ won’t stop it. CISOs need to focus security budget and controls in the right areas in order to effectively protect an organization from cyber threats and data breaches.

    Join this session and listen to a fireside chat between Forcepoint’s Nick Savvides and Marco Figueroa, CISO of the AICD. They will share insights into the risks associated with not having correct technology deployed to effectively secure an organization from cyber threats, the critical areas that security budget should be invested when limited funds are available, the key metrics CISO’s should be using to measure results and “have a voice” at Board level, and how to articulate a Zero Trust concept into a conversation that resonates with board members.

    Key takeaways for audience:
    - How to enable a healthy balance between being compliant and having necessary threat protection technology in place.
    - Critical areas to invest security budget when limited funds are available.
    - The importance of using metrics that are understood by the Board and to ensure positive outcomes.
    - Articulating the concept of Zero Trust into a conversation that resonates with the board.

    Presenters:
    Nick Savvides, Senior Strategic Business Director, Forcepoint
    Marco Figueroa, CISO, Australian Institute of Company Directors (AICD)
  • The Human Threat: Breaking Down Insider Risk Recorded: Sep 29 2021 57 mins
    Michael Crouse, Dir. Enterprise User & Data Protection, Forcepoint | Darren Mott, Former FBI Supervisory Special Agent
    Identifying and stopping insider threats continues to be one of the biggest security challenges facing organizations today. They range from the ‘good’ employee engaging in unintentional risky activity, the employee being targeted by external bad actors, to the worst case scenario, the malicious insider. In this more complex remote world, what strategies are available to surface threats – and can we stop them before they cause a breach?

    In this session, Forcepoint’s Director of User & Data Protection, Michael Crouse is joined by special guest, Former FBI Supervisory Special Agent, Darren Mott to share their experiences in helping organizations and government bodies develop their insider threat programs:

    Topics include:
    - Real insider threat cases and their outcomes
    - Insider threat vectors and the telltale signs of exploit
    - The role of technology in providing meaningful visibility to protect “the crown jewels”
    - Investigating behavioral changes and the impact of social distancing
    - How to minimize losses and collateral damage
    - Practical steps you can implement today
  • Hybrid Workforce Security—Bring Security to Users, No Matter Where They Are Recorded: Sep 22 2021 37 mins
    Jim Fulton, Senior Director, SASE and Zero Trust Solutions, Forcepoint
    Businesses are embracing hybrid work models that allow people to divide their time between remote and in-office work, but for people to work anywhere and be safe everywhere, connectivity and data security have to follow--seamlessly.

    Join Jim Fulton, Senior Director, SASE and Zero Trust Solutions, Forcepoint, for a look at real life examples that demonstrate how a Secure Service Access Edge (SASE) architecture makes it possible for people to work safely anywhere and, with zero trust principles applied, lets you ensure explicit permissions for the user.
  • Cloud Data Protection Strategies and Trends, with ESG Analyst John Grady Recorded: Sep 15 2021 44 mins
    John Grady, ESG Analyst Cybersecurity & Ankur Chadda, Senior Solutions Manager, Forcepoint
    Every organization, large or small, is in the midst of a digital transformation. Part of that includes the adoption of cloud apps that give employees increased freedom, flexibility and efficiency. For this reason, cloud data security has become increasingly critical. As more cloud apps are added, security teams struggle to match the increasingly complex environment with an equally adaptive data protection strategy.

    Instead of being bogged down by false alerts and left vulnerable by an unbalanced strategy, security practitioners need to adjust their data protection mentality and approach. By revaluating data protection strategies, organization can ensure that security is not outpaced by digital transformation.

    Attend this webinar to learn more on these topics from analyst, John Grady (ESG), as he shares insights based on an extensive survey.
  • Getting Past Impossible: The Human Factors of Cybersecurity. Recorded: Sep 1 2021 21 mins
    Dr. Margaret Cunningham, Forcepoint | Dr. Calvin Nobles, Illinois Tech College of Computing
    Organizations continue to invest in technology solutions time and time again, yet cyber criminals and nation states continue to break through our defenses. That’s because the emphasis has been on approaches that are too cut-and-dried around indicators of compromise.

    Margaret Cunningham, principal research scientist on human behavior at Forcepoint, and Calvin Nobles, chair and associate professor of information and management at Illinois Tech College of Computing, know it is time to address cybersecurity from a new angle: human behavior. People are integral at every level of a company, yet are often overlooked as the foundation of an effective cybersecurity posture.

    Human Factors Engineering is the practice of applying science to optimize human behaviors in the work environment, creating a more effective and holistic approach to cybersecurity.

    Join us to learn:

    - How to educate business executives and decision makers on human behaviors
    - Recognizing the importance of human factors at every level of a company
    - How the science of human behavior allows us to predict mistakes that may weaken our systems
    - How to create the security framework that addresses human behavior, especially in new remote workspaces created by the pandemic
  • Continuously Monitoring User Risk for Better Remote Worker Security. Recorded: Aug 25 2021 18 mins
    Jim Fulton, Sr Director SASE & Zero Trust Solutions - Sean O'Sullivan, Sr Principal Solutions Engineer
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 5 and learn how:

    • Know who is actually at the ‘other end’ is much harder when people are remote
    • Behavioral intelligence is the key to understanding who is really there
    • Defining policies in terms of risk boosts security, simplicity, productivity
  • A Technical Blueprint for Data Protection Recorded: Aug 18 2021 37 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Robert Mechler, Principal Security Strategist, Forcepoint
    Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential.

    In this webcast, Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.

    Key learnings include:

    - How the move to cloud is making data protection harder
    - How to identify where your critical data is, the channels it flows through and establish an incident response plan
    - How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
    - How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
  • Walking the Tightrope Between Protecting Data and Enabling Remote Workers Recorded: Aug 17 2021 44 mins
    Alex Hilton, Cloud Industry Forum | Paul Haywood, BUPA | Jim Fulton, Forcepoint
    Since the 2020 workplace evolved from a location to an activity, the way we work has changed forever. Organizations accept that supporting a remote or hybrid workforce is a permanent reality – a recent study revealed 49% of employees prefer a hybrid work arrangement, whilst Gartner has found 75% of midsize enterprises plan to use a hybrid model.

    With users and data operating outside of traditional IT defenses, organizations must understand new exposures to data risk. That new data risk exposure requires implementation of new security models that balance workforce enablement and data security.

    In this discussion, host Alex Hilton is joined by Jim Fulton, Forcepoint’s Director of SASE and Zero Trust Solutions, and Paul Haywood, Group CISO the UK Healthcare Provider, BUPA, to share their experiences and best practices for meeting this challenge.

    Speakers:
    - Alex Hilton, CEO at Cloud Industry Forum
    - Paul Haywood, Group CISO at BUPA
    - Jim Fulton, Director of SASE & Zero Trust solutions at Forcepoint
  • Network Transformation Projects: Common Risks & How to Prevent Them Recorded: Aug 17 2021 58 mins
    Nick Savvides, Senior Director of Strategic Business, Forcepoint
    Many organizations are modernizing their networks; moving from MPLS to SD-WAN, dropping on-premises gateways and adopting cloud-based offerings, breaking out internet traffic, looking at VPN replacements. There are many benefits to modernizing, but there are risks, too. Organizations with complex networks and services often find themselves derailed by technology and business realities.

    In this webinar Nick Savvides, Forcepoint Senior Director of Strategic Business APAC, will explore common risks and key considerations in ambitious network transformations and share:

    • Mitigation strategies for common risks of network transformation projects
    • Key considerations to ensure successful, future-proofed secured network transformations
    • Strategies for building a balanced business case to gain approval for network transformation

    Don’t miss out on this informative 1-hour session designed to provide you with knowledge, insights and useful takeaways.

    APAC Time Zone: 9.30am IST / 12pm SGT / 2pm AEDT
Strategic sessions on Cloud, Network & Data Security
To enable users to work anywhere, we must put data protection at the center of cloud and network security strategies. In this channel, we explore the latest technologies, security trends and frameworks like Zero Trust and SASE to help you not only determine where you are, but also what you still need to do to protect your business. Get the materials and building blocks you need to implement a data-first SASE architecture. See for yourself. https://www.forcepoint.com/sase

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybersecurity Simplified for Retail & Hospitality.
  • Live at: Aug 11 2021 3:00 pm
  • Presented by: Jim Fulton, Head of SASE & Zero Trust Solutions, Forcepoint
  • From:
Your email has been sent.
or close