Hi [[ session.user.profile.firstName ]]

Rethinking Data Security in a Zero Perimeter World

IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.

Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
Recorded Nov 8 2017 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Ogren 451 Research and Bharath Vasudevan Forcepoint
Presentation preview: Rethinking Data Security in a Zero Perimeter World

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • GDPR is Here. Now What? Recorded: Jun 18 2018 19 mins
    Karlene Berger, Solution Director, User & Data Security, Forcepoint
    The EU GDPR, one of the most important changes to data privacy regulation in 20 years, takes effect May 25, 2018. IF you haven’t prepared yet – don’t worry, you aren’t alone! Less than 50% of all organizations impacted will fully comply, according to Gartner*.

    Watch this very informative webcast to learn:

    •How you may either own or process data relevant to the regulation
    •Key requirements governing the overall regulation – why they are important and the operational impact on organizations
    •Using a NIST focused framework to help you prepare for compliance

    Whether you have a specific problem you are trying to solve or are just getting started, Forcepoint can help you stay prepared.

    *GDPR Clarity: 19 Frequently Asked Questions Answered, by Bart Willemsen, 29 August 2017
  • A Risk-Adaptive Approach to Dynamic Data Protection Recorded: Jun 18 2018 15 mins
    Bharath Vasudevan, Sr. Director, Product Marketing, Forcepoint
    Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats.

    Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, and industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
  • One Year After WannaCry - Has Anything Changed? Recorded: Jun 12 2018 36 mins
    Carl Leonard, Principal Security Analyst, Forcepoint
    A Root Cause Analysis of Data Breaches

    The year of the data breach, the year of ransomware, the year of APT – these catchy name tags summarise a given year. This session will review the last 12 months and attempt to assign a name tag. The timing is impeccable. 12 months after WannaCry, a milestone ransomware event and a couple of weeks after GDPR enforcement, provides a prompt to reveal research into the root causes of real-world data breaches and what to learn from their failings.
  • Forcepoint UEBA - User & Entity Behavior Analytics Recorded: Mar 2 2018 24 mins
    Bharath Vasudevan, Sr Director, User and Data Security, Forcepoint
    Traditional tools fail to provide contextual information about insider risk ― critical in the era of continuous security breaches and mounting governmental demands for regulatory surveillance. Forcepoint UEBA is the leading platform integrating structured and unstructured data to provide holistic visibility into nuanced human activity, patterns and long-term trends that comprise human risk.

    Join Bharath Vasudevan, Senior Director for User and Data Security, as he discusses how Forcepoint UEBA protects sensitive client information, detects compromised accounts and enforces the continued improvement of an organization's internal security culture.
  • GDPR - Responding to a breach in a Timely Manner Recorded: Nov 10 2017 47 mins
    Mike Smart - Forcepoint, Chris Jones - Forcepoint
    Organizations will need to rapidly detect data incidents and efficiently orchestrate the appropriate response within the 72 hour breach response window. In this session, Forcepoint explores how technologies can support an organization’s breach response process.
  • Rethinking Data Security in a Zero Perimeter World Recorded: Nov 8 2017 58 mins
    Eric Ogren 451 Research and Bharath Vasudevan Forcepoint
    IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.

    Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
  • GDPR Product Mapping: The Need to Monitor, Manage and Control Personal Data Flow Recorded: Nov 1 2017 41 mins
    Mike Smart, Product & Solutions Director - Forcepoint
    Learn how Forcepoint solutions can assist you with your GDPR program

    In the second of a three-part series of short, live webcasts, Forcepoint provides insight and interpretation around the General Data Protection Regulation (GDPR), how it maps to relevant information security technology, and more specifically, how Forcepoint technology can help you prepare for the GDPR.

    It’s necessary to understand personal data flows in order to measure risk and apply controls: this is an important part of managing effective processing practices. Integrating multiple technologies is a key to success. In this session, Forcepoint will show how technologies like DLP can be used to provide visibility and orchestrate controls to enforce processing policies through the integration of other technologies.
  • Forcepoint GDPR Product Mapping: Inventory of Personal Data Recorded: Oct 13 2017 58 mins
    Mike Smart - Forcepoint, Chris Jones - Forcepoint
    Learn why organizations must ensure they understand what personal data they hold and where it exists across the organization. In this session, we will discuss data-centric technologies like DLP and examine how they help organizations to find personal data and understand risk.
  • The Global Impact of GDPR Recorded: Oct 12 2017 64 mins
    Eduardo Ustaran - Hogan Lovells, Neil Thacker - Forcepoint
    A discussion on the Global implications of GDPR, with Hogan Lovells

    Join Hogan Lovells' Privacy and Data Protection Lawyer, Eduardo Ustaran and Forcepoint Deputy CISO Neil Thacker for a live webcast, as they discuss the global implications of the General Data Protection Regulation (GDPR).

    Whilst awareness of the GDPR is increasing, the broader impact is still misunderstood: any Global organization that holds or processes EU resident data will be subject to the regulation.

    In this webcast, they will discuss:

    - Which key principles of the GDPR regulation widely affect organizations
    - How prepared global organizations are to meet the May 2018 deadline
    - The latest information and guidance from the Article 29 Data Protection Working Party
    - What can be learned from organizations who are at an advanced stage in their GDPR preparations
    - The positive return to the organization from undertaking a GDPR readiness program
  • GDPR: Countdown to Day 0 Recorded: Sep 27 2017 54 mins
    Dr. Adrian Davis CISSP, (ISC)2; Moyn Uddin, Cyber Counsel; Jonathan Armstrong, Cordery; Neil Thacker, Forcepoint
    The EU General Data Protection Regulation (GDPR) will go into effect on 25th May, 2018, requiring Global organizations to significantly address how they process and protect the personal data of EU citizens.

    Hosted by The International Information System Security Certification Consortium, this webcast focused on our most up-to-date findings on the GDPR, as well as key requirements to comply with the regulation.

    Topics for discussion included obligations to:
    • Maintain a personal data inventory
    • Map Data flow vs. Data Transfer Agreements
    • Respond to incidents
    •​ Notify authorities of data breaches

    Dr. Adrian Davis CISSP, Managing Director, EMEA, (ISC)2

    Moyn Uddin, Chief Cyber Risk Officer, Cyber Counsel

    Jonathan P. Armstrong, Partner, Cordery

    Neil Thacker, Information Security & Strategy Officer, Forcepoint
  • Cybersecurity Demystified: Building a Practical & Sensible Cybersecurity Program Recorded: Sep 27 2017 26 mins
    Brandon Swafford, CTO, Insider Threat, Forcepoint - Mike Meline, Founder, Cyber Self-Defense
    Technology alone does not equal business outcomes. You have invested in more tools resulting in more alerts and more security spend, but you are not seeing better security outcomes—preventing the data breach from the compromised insider, stopping the malicious insider, or blocking the accidental data loss. The cybersecurity industry needs to start thinking differently. For a cybersecurity program to do its job, it must look beyond technology and include a human-centric approach that includes cybersecurity controls, employee training, comprehensive risk assessments and other people-first tactics. This webcast will discuss recent security breaches that have impacted organizations such as Equifax and HBO, identify the problem, and plot out a new course towards data protection by implementing a practical and company-wide cybersecurity program.
  • Breaking Bad Or Good: HR & Sec. Partnering to Protect Employees & Business Data Recorded: Sep 27 2017 24 mins
    Kristin Machacek Leary, CHRO, Forcepoint & Dr. Richard Ford, Chief Scientist, Forcepoint
    Insider threat detection. Employee monitoring. Background checks. These techniques pose social, ethical, legislative and security challenges – but are also effective ways for organizations to guard its most important data assets. In this session, Dr. Richard Ford and Kristin Leary from Forcepoint will explain the most effective way to proactively mitigate insider threats – fusing technology with a people-centric approach based on understanding employee intent. Forward-looking security programs balance employee privacy with data, IP and user protection, and Forcepoint will offer perspectives and recommendations from both human resources and technology executives, who share these responsibilities.
  • 2017 US State of Cybercrime: The Reality of Today’s Security Risks Recorded: Sep 27 2017 36 mins
    Dr. Richard Ford, Chief Scientist, Forcepoint - Bob Bragdon, SVP/Publisher, CSO at IDG Enterprise
    Excerpts from the US State of Cybercrime Survey, conducted by CSO, US Secret Service, Carnegie Mellon University CERT, and Forcepoint
  • User and Entity Behavior Analytics: Data without Context is Meaningless Recorded: Sep 26 2017 22 mins
    Brian White, Vice President, Data & Insider Threat, Forcepoint
    We live in a zero-perimeter world, transformed by cloud, remote workers and BYOD. Your sensitive and proprietary data is now everywhere. As a result, security teams are playing catch-up and relying on point product-based technology solutions. Not only do these products create overwhelming amounts of alert noise, but they also neglect to focus on your most important line of defense – your people. This webcast will explore how User and Entity Behavior Analytics (UEBA) enables security teams to proactively protect your data by identifying high risk behavior inside the enterprise. Effectively integrated UEBA provides unparalleled context into your people by fusing structured and unstructured data to identify and disrupt malicious, compromised and negligent users. Join this webcast to learn:

    •What data sources to integrate for visibility into human risk
    •How to Identify and prioritize high risk users and critical data
    •How to Investigate and act to reduce risk and protect data
  • Data Security & Office 365—Stop Chasing Data Recorded: Sep 26 2017 35 mins
    Brian Moran, Director, Data & Insider Threat, Forcepoint
    Data security is a never-ending battle to keep up with the latest regulations and protect intellectual property from targeted attacks and accidental exposure—all while adapting to evolving IT environments of cloud applications. Understandably, most enterprises want to meet their compliance demands and data protection needs with integrated, built-in DLP features that come with cloud applications like Office 365. Most take the seemingly logical approach to chase the data in your Office 365, other cloud apps and IT systems—find it, catalogue it, control it. But this ignores the biggest threat to data security—your people. By ignoring how your people interact with the data, who touches it and who has access to it, data protection teams limit their perspective to IT systems and don’t actually reduce the risk of data loss. Data security shouldn’t start and stop with the data. By focusing on your people and how they interact with the data, data security teams can deliver actual data protection that eases the burden of compliance, identifies risk based on user behavior and stops data loss by applying the appropriate control based on user risk and sensitivity of the data.
  • A Predictive "PreCrime" Approach Requires a Human Focus Recorded: Sep 26 2017 36 mins
    Dr. Richard Ford, Chief Scientist, Forcepoint
    In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Precrime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed.

    In this webcast, we will examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
  • Employee & Device Monitoring – Dispelling the Myths Recorded: Sep 13 2017 62 mins
    Harriet Pearson (Partner, Hogan Lovells) & Neil Thacker (Deputy CISO, Forcepoint)
    With the increased complexity of today’s cybersecurity threats and the need to meet regulatory compliance, organizations are looking to internal controls, employing monitoring and analytics to meet these challenges. But for many, addressing the misconceptions of employee monitoring versus managing data protection, data governance and meeting new regulatory requirements requires a new approach.

    Join Hogan Lovells' corporate data privacy and cybersecurity experts, Harriet Pearson and James Denvil, and Forcepoint Deputy CISO Neil Thacker, as they analyse the goals, requirements and considerations for undertaking security programs that involve both device and employee monitoring.

    They will discuss:

    • How device and employee monitoring can identify insider threats from accidental, malicious and compromised activities
    • Review key regional privacy regulations from 15 countries including US and EU (France, Germany, UK etc)
    • Considerations on monitoring communication channels including email, web usage, BYOD and privileged access
    • Review laws on screen video capture and keylogging
    • Approaches to behavioural monitoring to understand intent


    Harriet Pearson, Partner, Hogan Lovells
    Internationally recognized as a corporate data privacy and cybersecurity pioneer, Harriet has acquired decades of leading-edge experience advising companies.

    Neil Thacker, Deputy CISO, Forcepoint
    Neil has over 20 years’ experience within the IT and Information Security industry. As Deputy CISO for Forcepoint, Neil offers advice to the security community around their security posture, business processes and the application of security technologies.

    James Denvil, Senior Associate, Hogan Lovells
    James regularly advises clients on a range of technology issues, including implementing Big Data technologies, incident response, privacy risk assessments and mitigation, and employee monitoring.
  • Operationalizing a Practical Insider Threat Program Recorded: Jul 14 2017 30 mins
    Brandon Swafford
    When the phrase “insider threat” comes to mind, most automatically think of fraud, sabotage and theft; it’s natural to do so, as malicious insider threats make regular headlines.

    The truth is that 68% of all insider threats are attributed to accidental users, who unintentionally put their organizations at risk because of a user error or lack of training. Insiders are really anyone that works with sensitive data inside the network.

    In Operationalizing a Practical Insider Threat Program, we’ll review:

    -Requirements for building an insider threat program
    -An overview of the stakeholders and investigative best practices
    -Real world examples of an insider threat program in action


    Brandon Swafford, CTO of Data & Insider Threat Security, Forcepoint

    Brandon Swafford has more than 12 years of experience in legal investigations and security, including hedge funds where he built security technology and the U.S. Intelligence Community as a Cyber Counterintelligence consultant and analyst. Within the intelligence community, Brandon covered several classified agencies and worked closely with the National Insider Threat Task Force and National Counterintelligence Executive. In addition, Brandon provided insider threat analysis and investigation consulting to the International Monetary Fund in Washington, D.C.
  • How CISO's Tackle Insider Threat Data Protection Recorded: Jun 14 2017 59 mins
    Doug Copley, Barry Caplin
    78% of employees pose critical threats to your security, says a study from the Ponemon Institute (1). Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day.

    According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best enable your teams to access the data they need while keeping it safe?

    Hear how a real-world CISO plans, implements and manages an insider threat program. Find out how you enable employees to use disruptive, transformative technology while keeping sensitive data safe. Gain practical insights into planning and implementing an Insider Threat program, including employee education and adoption and executive sponsorship.

    (1) “Privileged User Abuse & The Insider Threat,” Ponemon Institute 2014.
  • GDPR Compliance and its Impact on Security and Data Protection Programs Recorded: Jun 14 2017 54 mins
    Mike Osterman, Mike Smart
    In 2018, the General Data Protection Regulation (GDPR) will require EU organizations to meet strict standards and processes to protect personal data. Non-compliance with the GDPR can cost you a fortune, but being in compliance can save you one. Recent estimates put business savings at about €2.3 billion annually.

    Join Mike Osterman (Osterman Research) and Mike Smart (Forcepoint Product & Solutions Director, EMEA) as they discuss how to become GDPR compliant by implementing organizational and technical solutions.
    This on-demand webcast will explore GDPR security responsibilities and obligations, including:

    -Data subject consent
    -Data discovery, cataloguing and classifying
    -Data breach identification and notification
    -Cloud storage and sharing services
End alert fatigue by automating enforcement based on risk
Legacy DLP solutions traditionally apply overly restrictive policies that grind end-user productivity to a halt. They also overwhelm security analysts with millions of alerts from sophisticated threats.

The only path forward is Dynamic Data Protection. This industry-first solution uses human-centric behavior analytics to continuously determine the risk that cyber identities pose, based on their actions and the value of the data being used. Armed with this intelligent context, administrators can focus only on the alerts that matter.

They now have the power of automated, adaptive enforcement at an individual level. The policy-driven response can be dialed up or down depending on the severity of the risk. With Forcepoint Dynamic Data Protection, security teams can finally do their jobs so end users can do theirs.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Rethinking Data Security in a Zero Perimeter World
  • Live at: Nov 8 2017 4:00 pm
  • Presented by: Eric Ogren 451 Research and Bharath Vasudevan Forcepoint
  • From:
Your email has been sent.
or close