Hi [[ session.user.profile.firstName ]]

Walking the Tightrope Between Protecting Data and Enabling Remote Workers

Since the 2020 workplace evolved from a location to an activity, the way we work has changed forever. Organizations accept that supporting a remote or hybrid workforce is a permanent reality – a recent study revealed 49% of employees prefer a hybrid work arrangement, whilst Gartner has found 75% of midsize enterprises plan to use a hybrid model.

With users and data operating outside of traditional IT defenses, organizations must understand new exposures to data risk. That new data risk exposure requires implementation of new security models that balance workforce enablement and data security.

In this discussion, host Alex Hilton is joined by Jim Fulton, Forcepoint’s Director of SASE and Zero Trust Solutions, and Paul Haywood, Group CISO the UK Healthcare Provider, BUPA, to share their experiences and best practices for meeting this challenge.

Speakers:
- Alex Hilton, CEO at Cloud Industry Forum
- Paul Haywood, Group CISO at BUPA
- Jim Fulton, Director of SASE & Zero Trust solutions at Forcepoint
Recorded Aug 17 2021 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alex Hilton, Cloud Industry Forum | Paul Haywood, BUPA | Jim Fulton, Forcepoint
Presentation preview: Walking the Tightrope Between Protecting Data and Enabling Remote Workers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Optimizing Cyber Resilience In The Era Of Ransomware. Nov 3 2021 9:30 am UTC 55 mins
    Nick Savvides, Senior Director of Strategic Business, Asia Pacific, Forcepoint
    As our businesses have all become dependent on technology for practically all aspects of operations, cyber-resilience is now directly tied to business-resilience closer than ever before.

    Join Forcepoint’s Senior Director of Strategic Business – Nick Savvides – online where he’ll share insights into how cyber-criminals are using ransomware to cripple organizations including their common techniques and methods of operation.

    He will also reveal how to optimize the most common existing controls that organizations typically already have deployed, to reduce the likelihood and the impact of a ransomware event.

    And finally, Nick will examine what new technologies and approaches can be applied to significantly improve the resilience of these attacks as well as how to build a business case to obtain resourcing from the board to support new technology initiatives.
  • Hibrit İş Gücü için Veri Koruması ve Etkileri Oct 20 2021 11:00 am UTC 45 mins
    Murat Bayraktar, Director of Sales Engineering, Forcepoint
    McKinsey'in 2021 yılı küresel anketine göre, önümüzdeki on iki ay boyunca siber güvenlik uzmanlarının karşılaşacağı en büyük zorluklardan biri, fiziki sınırların ortadan kalktığı işgücünün kritik verilerini yönetmek ve korumak olacak. Ayrıca araştırmada on kuruluştan dokuzunun uzaktan ve yerinde çalışmayı birleştireceği belirtilmiş. Gartner’ın yaptığı diğer bir araştırmaya göre de, şirketlerin %75'inin COVID-19 sonrası bazı çalışanlarını kalıcı olarak uzaktan çalışmaya kaydırmayı planladığını ortaya koyuyor.
    Bu hibrit çalışma ortamına etkin bir şekilde uyum sağlamak için, kuruluşların iş üretkenliğini, verileri ve gizliliği olumsuz bir şekilde etkilemeden koruyan bir siber güvenlik altyapısına ihtiyacı var.

    Güvenli erişim sağlamak için kullanılan “Veri Odaklı” yaklaşım, üretkenliği artırır ve riski azaltır; verilerinize, uygulamalarınıza ve hizmetlerinize erişimi iyileştirmenize ve kullanıldığı her yerde verilerin güvenliğini sağlamanıza olanak tanır.

    Bu etkinlikte irdelenecek konular:

    - Uzaktan çalışma için temel siber güvenlik insiyatifleri nasıl belirlenir ve bunlardan hangisi sizin iş ortamınız için en iyisidir?
    - Fidye yazılımı saldırılarının etkisini azaltmak için en etkili insiyatif hangisidir?
    - Veri ihlallerinin önlenmesi konusunda karşılaşılan zorluklar ve çözümleri nelerdir?
    - Hibrit iş gücü ortamında veri gizliliğinin korunması ve 2022 yılı için regulasyonlara uyumluluk konusundaki temel gelişmeler nelerdir?
  • Data-first Security for Today's Hybrid Workforce Oct 20 2021 8:00 am UTC 60 mins
    Alex Hilton, Cloud Industry Forum | Alexandra Willsher, Forcepoint | Edward Liebig, Delviom | Kimber Dowsett, Truss
    Over the next twelve months, one of the greatest challenges facing cybersecurity professionals will be managing and protecting the data of the borderless workforce, according to McKinsey’s 2021 global survey: nine out of ten organizations will combine remote and on-site working.
    To effectively accommodate this hybrid work environment organizations need security that secures data and privacy without negatively impacting productivity.
    A data-first approach for delivering secure access boosts productivity and reduces risk, allowing you to improve access to your data, apps, and services and secure data everywhere it’s used.

    What you will learn:
    - How to identify the core cybersecurity initiatives for remote working and which is best for your business?
    - Which initiative is the most efficient to lower the impact of ransomware attacks?
    - A discussion on the biggest challenge in preventing a data breach?
    - Maintaining data privacy in a hybrid-workforce environment and key compliance developments in 2022.
  • Risk Management Technology: Getting It Right Oct 20 2021 4:00 am UTC 45 mins
    Nick Savvides, Forcepoint | Marco Figueroa, Australian Institute of Company Directors (AICD)
    When it comes to risk management and data protection, many organizations today are driven by compliance and might have all the tick boxes checked, but are still experiencing data breaches, cyber events and other disruptions. Ransomware is the main culprit at the top of the list, but being ‘compliant’ won’t stop it. CISOs need to focus security budget and controls in the right areas in order to effectively protect an organization from cyber threats and data breaches.



    Join this session and listen to a fireside chat between Forcepoint’s Nick Savvides and Marco Figueroa, CISO of the AICD. They will share insights into the risks associated with not having correct technology deployed to effectively secure an organization from cyber threats, the critical areas that security budget should be invested when limited funds are available, the key metrics CISO’s should be using to measure results and “have a voice” at Board level, and how to articulate a Zero Trust concept into a conversation that resonates with board members.

    Key takeaways for audience:
    - How to enable a healthy balance between being compliant and having necessary threat protection technology in place.
    - Critical areas to invest security budget when limited funds are available.
    - The importance of using Metrics that are understood by the Board and to ensure positive outcomes.
    - Articulating the concept of Zero Trust into a conversation that resonates with the board.

    Presenters:
    Nick Savvides, Senior Strategic Business Director, Forcepoint
    Marco Figueroa, CISO, Australian Institute of Company Directors (AICD)
  • The Human Threat: Breaking Down Insider Risk Sep 29 2021 8:30 am UTC 57 mins
    Michael Crouse, Dir. Enterprise User & Data Protection, Forcepoint | Darren Mott, Former FBI Supervisory Special Agent
    Identifying and stopping insider threats continues to be one of the biggest security challenges facing organizations today. They range from the ‘good’ employee engaging in unintentional risky activity, the employee being targeted by external bad actors, to the worst case scenario, the malicious insider. In this more complex remote world, what strategies are available to surface threats – and can we stop them before they cause a breach?

    In this session, Forcepoint’s Director of User & Data Protection, Michael Crouse is joined by special guest, Former FBI Supervisory Special Agent, Darren Mott to share their experiences in helping organizations and government bodies develop their insider threat programs:

    Topics include:
    - Real insider threat cases and their outcomes
    - Insider threat vectors and the telltale signs of exploit
    - The role of technology in providing meaningful visibility to protect “the crown jewels”
    - Investigating behavioral changes and the impact of social distancing
    - How to minimize losses and collateral damage
    - Practical steps you can implement today
  • Hybrid Workforce Security—Bring Security to Users, No Matter Where They Are Recorded: Sep 22 2021 37 mins
    Jim Fulton, Senior Director, SASE and Zero Trust Solutions, Forcepoint
    Businesses are embracing hybrid work models that allow people to divide their time between remote and in-office work, but for people to work anywhere and be safe everywhere, connectivity and data security have to follow--seamlessly.

    Join Jim Fulton, Senior Director, SASE and Zero Trust Solutions, Forcepoint, for a look at real life examples that demonstrate how a Secure Service Access Edge (SASE) architecture makes it possible for people to work safely anywhere and, with zero trust principles applied, lets you ensure explicit permissions for the user.
  • Cloud Data Protection Strategies and Trends, with ESG Analyst John Grady Recorded: Sep 15 2021 44 mins
    John Grady, ESG Analyst Cybersecurity & Ankur Chadda, Senior Solutions Manager, Forcepoint
    Every organization, large or small, is in the midst of a digital transformation. Part of that includes the adoption of cloud apps that give employees increased freedom, flexibility and efficiency. For this reason, cloud data security has become increasingly critical. As more cloud apps are added, security teams struggle to match the increasingly complex environment with an equally adaptive data protection strategy.

    Instead of being bogged down by false alerts and left vulnerable by an unbalanced strategy, security practitioners need to adjust their data protection mentality and approach. By revaluating data protection strategies, organization can ensure that security is not outpaced by digital transformation.

    Attend this webinar to learn more on these topics from analyst, John Grady (ESG), as he shares insights based on an extensive survey.
  • Getting Past Impossible: The Human Factors of Cybersecurity. Recorded: Sep 1 2021 21 mins
    Dr. Margaret Cunningham, Forcepoint | Dr. Calvin Nobles, Illinois Tech College of Computing
    Organizations continue to invest in technology solutions time and time again, yet cyber criminals and nation states continue to break through our defenses. That’s because the emphasis has been on approaches that are too cut-and-dried around indicators of compromise.

    Margaret Cunningham, principal research scientist on human behavior at Forcepoint, and Calvin Nobles, chair and associate professor of information and management at Illinois Tech College of Computing, know it is time to address cybersecurity from a new angle: human behavior. People are integral at every level of a company, yet are often overlooked as the foundation of an effective cybersecurity posture.

    Human Factors Engineering is the practice of applying science to optimize human behaviors in the work environment, creating a more effective and holistic approach to cybersecurity.

    Join us to learn:

    - How to educate business executives and decision makers on human behaviors
    - Recognizing the importance of human factors at every level of a company
    - How the science of human behavior allows us to predict mistakes that may weaken our systems
    - How to create the security framework that addresses human behavior, especially in new remote workspaces created by the pandemic
  • Continuously Monitoring User Risk for Better Remote Worker Security. Recorded: Aug 25 2021 18 mins
    Jim Fulton, Sr Director SASE & Zero Trust Solutions - Sean O'Sullivan, Sr Principal Solutions Engineer
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 5 and learn how:

    • Know who is actually at the ‘other end’ is much harder when people are remote
    • Behavioral intelligence is the key to understanding who is really there
    • Defining policies in terms of risk boosts security, simplicity, productivity
  • A Technical Blueprint for Data Protection Recorded: Aug 18 2021 37 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Robert Mechler, Principal Security Strategist, Forcepoint
    Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential.

    In this webcast, Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.

    Key learnings include:

    - How the move to cloud is making data protection harder
    - How to identify where your critical data is, the channels it flows through and establish an incident response plan
    - How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
    - How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
  • Walking the Tightrope Between Protecting Data and Enabling Remote Workers Recorded: Aug 17 2021 44 mins
    Alex Hilton, Cloud Industry Forum | Paul Haywood, BUPA | Jim Fulton, Forcepoint
    Since the 2020 workplace evolved from a location to an activity, the way we work has changed forever. Organizations accept that supporting a remote or hybrid workforce is a permanent reality – a recent study revealed 49% of employees prefer a hybrid work arrangement, whilst Gartner has found 75% of midsize enterprises plan to use a hybrid model.

    With users and data operating outside of traditional IT defenses, organizations must understand new exposures to data risk. That new data risk exposure requires implementation of new security models that balance workforce enablement and data security.

    In this discussion, host Alex Hilton is joined by Jim Fulton, Forcepoint’s Director of SASE and Zero Trust Solutions, and Paul Haywood, Group CISO the UK Healthcare Provider, BUPA, to share their experiences and best practices for meeting this challenge.

    Speakers:
    - Alex Hilton, CEO at Cloud Industry Forum
    - Paul Haywood, Group CISO at BUPA
    - Jim Fulton, Director of SASE & Zero Trust solutions at Forcepoint
  • Network Transformation Projects: Common Risks & How to Prevent Them Recorded: Aug 17 2021 58 mins
    Nick Savvides, Senior Director of Strategic Business, Forcepoint
    Many organizations are modernizing their networks; moving from MPLS to SD-WAN, dropping on-premises gateways and adopting cloud-based offerings, breaking out internet traffic, looking at VPN replacements. There are many benefits to modernizing, but there are risks, too. Organizations with complex networks and services often find themselves derailed by technology and business realities.

    In this webinar Nick Savvides, Forcepoint Senior Director of Strategic Business APAC, will explore common risks and key considerations in ambitious network transformations and share:

    • Mitigation strategies for common risks of network transformation projects
    • Key considerations to ensure successful, future-proofed secured network transformations
    • Strategies for building a balanced business case to gain approval for network transformation

    Don’t miss out on this informative 1-hour session designed to provide you with knowledge, insights and useful takeaways.

    APAC Time Zone: 9.30am IST / 12pm SGT / 2pm AEDT
  • Cybersecurity Simplified for Retail & Hospitality. Recorded: Aug 11 2021 32 mins
    Jim Fulton, Head of SASE & Zero Trust Solutions, Forcepoint
    The working models of protecting the edge are no longer enough. Users and apps are everywhere, so it’s essential to protect your data everywhere, too. Secure Service Access Edge (SASE) makes it possible for people to work safely from anywhere. And, with Zero Trust Network Access (ZTNA) principles applied, you can ensure explicit permissions are in place throughout your organization.

    A data-first SASE architecture with built-in ZTNA helps you ensure each person has access to the data they need and allows you to implement appropriate control points based on the usage of that data. See how you can create an integrated cloud and network security strategy using the power of a data-first approach.

    Key takeaways:
    • Protect remote workers both on the web and in the cloud while controlling cloud and private app access without VPNs
    • Connect and protect branch offices as well as safeguard data use everywhere
    • Monitor user risk at all times
  • Best Practices for Avoiding a Data Breach Recorded: Aug 4 2021 25 mins
    Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
    New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.

    Watch now to learn:
    - Challenges of securing data moving between on-prem and the cloud
    - Tips and takeaways from data-secure companies
    - Technologies they’ve used to prevent breaches
  • Cybercrime zu Corona – und etwas Hoffnung Recorded: Aug 3 2021 72 mins
    Volker Kozok - Cyber space Expert | David Berger - Forcepoint | Konrad Langhammer - Forcepoint
    Zero Trust Architekturen ist eines der meistdiskutierten Themen unserer Zeit. So hat die Regierung der USA im Mai 2021 eine umfassende executive order zum Thema cybersecurity erlassen. Unter anderem wurde angeordnet, innerhalb von 60 Tagen Konzepte für moderne Architekturen ohne implizites Vertrauen vorzulegen.

    Eine wichtige Frage dabei ist allerdings, welche Bereiche zu einem solchen „Zero Trust Network“ dazu gehören? Wo ziehen wir unseren Perimeter? Was hat das alles mit großen Hacks aus der jüngsten Zeit zu tun?

    Auf diese und viele weitere Fragen möchten wir gemeinsam mit Herrn Volker Kozok, Cybersecurity Experte, Antworten liefern. Wenn Sie mehr über den Stand der IT-Sicherheit in Deutschland und die Bedeutung von Zero Trust für unsere IT-Infrastrukturen erfahren möchten, schauen Sie sich unseren Webinar.
  • Principles for Board Governance of Cyber Risk Recorded: Jul 28 2021 38 mins
    Maya Bundt, Swiss Reinsurance | John Holmes, Forcepoint | Daniel Dobrygowski, World Economic Forum
    Gone are the days of cyber risk as the sole responsibility of the IT department. Today, we’re seeing ransomware attacks every 11 seconds and more than 80% of organizations that pay ransoms are attacked a second time. With cyber thieves and criminals more sophisticated and aggressive, cyber risks continue to be a top threat and priority for business leaders.

    Boards of directors around the world are recognizing that adapting to cyber risk is the cost of doing business today. But how do they move forward?

    This webcast brings together cybersecurity experts from the World Economic Forum, Swiss Reinsurance and Forcepoint to provide insights on the realities of cyber risk facing boards today. Our panelists highlight globally applicable principles to aid directors in governing cyber risk. Uncover why enterprise decision-making requires analysis of the economics behind cyber risk.

    Join us to learn:
    - The economic drivers and impact of cyber risk
    - Alignment of cyber risk management with business needs
    - How cybersecurity is a strategic business enabler
    - Ways to incorporate cybersecurity expertise into board governance
  • Continuously Monitoring User Risk for Better Remote Worker Security Recorded: Jul 26 2021 18 mins
    Jim Fulton, Sr Director SASE & Zero Trust Solutions - Sean O'Sullivan, Sr Principal Solutions Engineer
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 5 and learn how:

    • Know who is actually at the ‘other end’ is much harder when people are remote
    • Behavioral intelligence is the key to understanding who is really there
    • Defining policies in terms of risk boosts security, simplicity, productivity
  • The Human Threat: Breaking Down Insider Risk Recorded: Jul 21 2021 57 mins
    Michael Crouse, Dir. Enterprise User & Data Protection, Forcepoint | Darren Mott, Former FBI Supervisory Special Agent
    Identifying and stopping insider threats continues to be one of the biggest security challenges facing organizations today. They range from the ‘good’ employee engaging in unintentional risky activity, the employee being targeted by external bad actors, to the worst case scenario, the malicious insider. In this more complex remote world, what strategies are available to surface threats – and can we stop them before they cause a breach?

    In this session, Forcepoint’s Director of User & Data Protection, Michael Crouse is joined by special guest, Former FBI Supervisory Special Agent, Darren Mott to share their experiences in helping organizations and government bodies develop their insider threat programs:

    Topics include:
    - Real insider threat cases and their outcomes
    - Insider threat vectors and the telltale signs of exploit
    - The role of technology in providing meaningful visibility to protect “the crown jewels”
    - Investigating behavioral changes and the impact of social distancing
    - How to minimize losses and collateral damage
    - Practical steps you can implement today
  • Leverage Zero Trust to Empower Work from Anywhere while Keeping Data Safe Recorded: Jul 14 2021 17 mins
    Ravi Srinivasan, VP of Solutions and Platform Marketing, Forcepoint
    Forcepoint's VP of Solutions and Platform Marketing takes a look at how Zero Trust, delivered via SASE/ZT Edge, is powering the new work-anywhere approach to business operations and how to get there in 4 key steps, including;

    - The move from implicit to explicit trust
    - How Zero Trust Edge strengthens security for remote people and data
    - A Zero Trust approach enables continuous, risk-adaptive security
  • Cybercrime zu Corona – und etwas Hoffnung Recorded: Jul 8 2021 72 mins
    Volker Kozok - Cyber space Expert | David Berger - Forcepoint | Konrad Langhammer - Forcepoint
    Zero Trust Architekturen ist eines der meistdiskutierten Themen unserer Zeit. So hat die Regierung der USA im Mai 2021 eine umfassende executive order zum Thema cybersecurity erlassen. Unter anderem wurde angeordnet, innerhalb von 60 Tagen Konzepte für moderne Architekturen ohne implizites Vertrauen vorzulegen.

    Eine wichtige Frage dabei ist allerdings, welche Bereiche zu einem solchen „Zero Trust Network“ dazu gehören? Wo ziehen wir unseren Perimeter? Was hat das alles mit großen Hacks aus der jüngsten Zeit zu tun?

    Auf diese und viele weitere Fragen möchten wir gemeinsam mit Herrn Volker Kozok, Cybersecurity Experte, Antworten liefern. Wenn Sie mehr über den Stand der IT-Sicherheit in Deutschland und die Bedeutung von Zero Trust für unsere IT-Infrastrukturen erfahren möchten, schauen Sie sich unseren Webinar.
Strategic sessions on Cloud, Network & Data Security
To enable users to work anywhere, we must put data protection at the center of cloud and network security strategies. In this channel, we explore the latest technologies, security trends and frameworks like Zero Trust and SASE to help you not only determine where you are, but also what you still need to do to protect your business. Get the materials and building blocks you need to implement a data-first SASE architecture. See for yourself. https://www.forcepoint.com/sase

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Walking the Tightrope Between Protecting Data and Enabling Remote Workers
  • Live at: Aug 17 2021 8:00 am
  • Presented by: Alex Hilton, Cloud Industry Forum | Paul Haywood, BUPA | Jim Fulton, Forcepoint
  • From:
Your email has been sent.
or close