Hi [[ session.user.profile.firstName ]]

Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering

External and internal threats continue to pose a challenge for security professionals worldwide. How are businesses preparing against attacks like phishing, ransomware, and social engineering?

Join security experts from the industry to learn more about:
- The most prevailing cyber threats businesses face in 2019
- Lessons from cyber attacks and strategies for protecting against them
- Solutions for faster breach detection and response
- Why network visibility is key
- Recommendations for improving enterprise security

Panellists
Richard Agnew, VP EMEA, Code42
Carl Leonard, Principal Security Analyst, Forcepoint
John Scott, Head of Security Education, Bank of England
Adenike Cosgrove, Cybersecurity Strategist, Proofpoint

Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
Recorded Jun 5 2019 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Raef Meeuwisse| Carl Leonard, Forcepoint | John Scott, Bank of England | Adenike Cosgrove, Proofpoint | Richard Agnew, Code42
Presentation preview: Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Accelerate Cloud App Adoption without Compromising Security Aug 7 2019 3:00 pm UTC 30 mins
    Ankur Chadda, Sr. Product Marketing Manager, Forcepoint
    How secure is your cloud data?

    Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments – every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable?

    In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses:

    - How to gain full visibility into your cloud environment, including shadow IT
    - Unified policy management and enforcement for on-premises and cloud security
    - How to control cloud access by unmanaged devices (BYOD)
  • Beyond GDPR: America wakes up to privacy Recorded: Jul 10 2019 33 mins
    Martin Whitworth, Research Director, European Security, IDC & Duncan Brown, Sr. Director Security Strategist, Forcepoint
    GDPR may have stolen the limelight in 2018, but it could be America’s turn in 2019: With the California Consumer Privacy Act (CCPA) coming into effect in Jan 2020 and a recent Government Accountability Office (GAO) recommendation that Congress consider enacting a federal internet privacy law, big changes could be coming.

    In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss the possible impact of future American laws, including:

    - Factors creating a push for greater regulation
    - A look at the California Consumer Privacy Act (CCPA)
    - GAO recommendations and the potential for a federal law – how heavy-handed might it be?
    - Best practices to prepare for change

    Watch the webcast to be prepared for future changes that may impact you.
  • GDPR One Year On – 5 Lessons Learned Recorded: Jun 19 2019 41 mins
    Martin Whitworth, Research Director, European Security, IDC & Duncan Brown, Sr. Director Security Strategist, Forcepoint
    We are now one year on from when GDPR became law, but the compliance race is far from over. Many organizations undoubtedly made a huge effort to revamp their processes and security around personal data—but how effective have they been?

    In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss where we succeeded, where mistakes were made, and share five lessons learned to help prepare for the evolving privacy and compliance challenges ahead, including:

    - Regulatory enforcement: Penalties are starting to be handed out and it’s not just fines; enforcement can take many forms.
    - Over-compliance: Did some companies damage themselves by deleting too much data?
    - A global trend towards privacy regulation: GDPR is just the start, with more consequences for how organizations use and misuse personal data.

    Watch the webcast to get prepared for what lies ahead.
  • Protecting Against Insider Threats Recorded: Jun 14 2019 55 mins
    Jeremy Wittkop, CTO, Intelisecure & Antonio Sanchez, Product Marketing Manager, Forcepoint
    In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. InteliSecure’s CTO Jeremy Wittkop will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.
  • Ask the Data Security Expert: How to Protect your Business in the Cloud Recorded: Jun 5 2019 16 mins
    Carl Leonard, Forcepoint | Raef Meeuwisse, ISACA Expert Speaker
    Cloud security is a key challenge for today's data-driven businesses.

    Join this interactive 1-2-1 discussion where Principal Security Analyst, Carl Leonard will share insights on;

    - What are the top cyber threats and trends to look out for in 2019?
    - Why are businesses continuing to suffer data breaches?
    - How are businesses securing themselves as they embrace digital transformation?
    - What is secure SD-WAN? Why is it increasingly important to businesses with distributed office locations?
    - What are the most important security solutions for businesses wishing to safely adopt cloud services?

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering Recorded: Jun 5 2019 47 mins
    Raef Meeuwisse| Carl Leonard, Forcepoint | John Scott, Bank of England | Adenike Cosgrove, Proofpoint | Richard Agnew, Code42
    External and internal threats continue to pose a challenge for security professionals worldwide. How are businesses preparing against attacks like phishing, ransomware, and social engineering?

    Join security experts from the industry to learn more about:
    - The most prevailing cyber threats businesses face in 2019
    - Lessons from cyber attacks and strategies for protecting against them
    - Solutions for faster breach detection and response
    - Why network visibility is key
    - Recommendations for improving enterprise security

    Panellists
    Richard Agnew, VP EMEA, Code42
    Carl Leonard, Principal Security Analyst, Forcepoint
    John Scott, Head of Security Education, Bank of England
    Adenike Cosgrove, Cybersecurity Strategist, Proofpoint

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Modernize your Data Protection Recorded: May 22 2019 26 mins
    Angelica Torres-Corral, Sr Product Marketing Manager, DLP, Forcepoint
    Steps for implementing a successful data protection strategy

    Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property from targeted attacks and accidental exposure – all while adapting to evolving IT environments of cloud applications, private clouds, mobile users and data centers. How do you secure data in an environment that has no perimeters?

    In this webcast session, we give insights to gaining visibility & control of your data, optimizing a Data Loss Prevention (DLP) solution and adopting a more proactive security posture. We will address:

    - Overcoming common data protection challenges
    - Benefits of DLP
    - Steps to success with DLP
    - Leveraging analytics to go beyond DLP
  • Employing a Risk Adaptive Model to Detect and Prevent Threats From Within Recorded: May 8 2019 23 mins
    Homayun Yaqub, Sr. Director Security Strategist, Forcepoint
    As we enable employees to be more productive with greater access to critical data, we also increase the risk of a potential breach due to accidental or malicious insider activity.

    Striking a balance between maximizing productivity and minimizing risk requires a security program that can identify and respond to the insider threat. In this webcast Forcepoint Senior Security Strategist Homayun Yaqub, discusses the foundations that underpin an effective program, including:

    - Refining analytics to better understand the intersection between people and data
    - Operationalizing CARTA as the next step in insider threat program development
    - Addressing insider risk as a core business concern
  • Who Watches the Watchers... Recorded: Mar 19 2019 30 mins
    Dr Richard Ford, Chief Scientist, Forcepoint
    IP Protection for Privileged Users

    Protecting the confidentiality of information is a critical security task. While it is relatively easy to defend against those insiders who should not be accessing certain IP, it is often the employees that create the IP who are most likely to steal it.

    In this session, Forcepoint Chief Scientist, Dr Richard Ford, looks at analytic techniques that are effective at protecting information from those who already have legitimate access to it. Richard discusses:

    - The need for a human-centric approach to tackle the malicious insider
    - What do you do when the creator of the IP… is the thief?
    - Behavioural red flags to look out for
    - Tips for deploying an Insider Threat Program
  • GDPR is Here. Now What? Recorded: Jun 18 2018 19 mins
    Karlene Berger, Solution Director, User & Data Security, Forcepoint
    The EU GDPR, one of the most important changes to data privacy regulation in 20 years, takes effect May 25, 2018. IF you haven’t prepared yet – don’t worry, you aren’t alone! Less than 50% of all organizations impacted will fully comply, according to Gartner*.

    Watch this very informative webcast to learn:

    •How you may either own or process data relevant to the regulation
    •Key requirements governing the overall regulation – why they are important and the operational impact on organizations
    •Using a NIST focused framework to help you prepare for compliance

    Whether you have a specific problem you are trying to solve or are just getting started, Forcepoint can help you stay prepared.


    *GDPR Clarity: 19 Frequently Asked Questions Answered, by Bart Willemsen, 29 August 2017
  • A Risk-Adaptive Approach to Dynamic Data Protection Recorded: Jun 18 2018 15 mins
    Bharath Vasudevan, Sr. Director, Product Marketing, Forcepoint
    Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats.

    Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, and industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
  • One Year After WannaCry - Has Anything Changed? Recorded: Jun 12 2018 36 mins
    Carl Leonard, Principal Security Analyst, Forcepoint
    A Root Cause Analysis of Data Breaches

    The year of the data breach, the year of ransomware, the year of APT – these catchy name tags summarise a given year. This session will review the last 12 months and attempt to assign a name tag. The timing is impeccable. 12 months after WannaCry, a milestone ransomware event and a couple of weeks after GDPR enforcement, provides a prompt to reveal research into the root causes of real-world data breaches and what to learn from their failings.
  • Forcepoint UEBA - User & Entity Behavior Analytics Recorded: Mar 2 2018 24 mins
    Bharath Vasudevan, Sr Director, User and Data Security, Forcepoint
    Traditional tools fail to provide contextual information about insider risk ― critical in the era of continuous security breaches and mounting governmental demands for regulatory surveillance. Forcepoint UEBA is the leading platform integrating structured and unstructured data to provide holistic visibility into nuanced human activity, patterns and long-term trends that comprise human risk.

    Join Bharath Vasudevan, Senior Director for User and Data Security, as he discusses how Forcepoint UEBA protects sensitive client information, detects compromised accounts and enforces the continued improvement of an organization's internal security culture.
  • GDPR - Responding to a breach in a Timely Manner Recorded: Nov 10 2017 47 mins
    Mike Smart - Forcepoint, Chris Jones - Forcepoint
    Organizations will need to rapidly detect data incidents and efficiently orchestrate the appropriate response within the 72 hour breach response window. In this session, Forcepoint explores how technologies can support an organization’s breach response process.
  • Rethinking Data Security in a Zero Perimeter World Recorded: Nov 8 2017 58 mins
    Eric Ogren 451 Research and Bharath Vasudevan Forcepoint
    IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.

    Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
  • GDPR Product Mapping: The Need to Monitor, Manage and Control Personal Data Flow Recorded: Nov 1 2017 41 mins
    Mike Smart, Product & Solutions Director - Forcepoint
    Learn how Forcepoint solutions can assist you with your GDPR program

    In the second of a three-part series of short, live webcasts, Forcepoint provides insight and interpretation around the General Data Protection Regulation (GDPR), how it maps to relevant information security technology, and more specifically, how Forcepoint technology can help you prepare for the GDPR.

    It’s necessary to understand personal data flows in order to measure risk and apply controls: this is an important part of managing effective processing practices. Integrating multiple technologies is a key to success. In this session, Forcepoint will show how technologies like DLP can be used to provide visibility and orchestrate controls to enforce processing policies through the integration of other technologies.
  • Forcepoint GDPR Product Mapping: Inventory of Personal Data Recorded: Oct 13 2017 58 mins
    Mike Smart - Forcepoint, Chris Jones - Forcepoint
    Learn why organizations must ensure they understand what personal data they hold and where it exists across the organization. In this session, we will discuss data-centric technologies like DLP and examine how they help organizations to find personal data and understand risk.
  • The Global Impact of GDPR Recorded: Oct 12 2017 64 mins
    Eduardo Ustaran - Hogan Lovells, Neil Thacker - Forcepoint
    A discussion on the Global implications of GDPR, with Hogan Lovells

    Join Hogan Lovells' Privacy and Data Protection Lawyer, Eduardo Ustaran and Forcepoint Deputy CISO Neil Thacker for a live webcast, as they discuss the global implications of the General Data Protection Regulation (GDPR).

    Whilst awareness of the GDPR is increasing, the broader impact is still misunderstood: any Global organization that holds or processes EU resident data will be subject to the regulation.

    In this webcast, they will discuss:

    - Which key principles of the GDPR regulation widely affect organizations
    - How prepared global organizations are to meet the May 2018 deadline
    - The latest information and guidance from the Article 29 Data Protection Working Party
    - What can be learned from organizations who are at an advanced stage in their GDPR preparations
    - The positive return to the organization from undertaking a GDPR readiness program
  • GDPR: Countdown to Day 0 Recorded: Sep 27 2017 54 mins
    Dr. Adrian Davis CISSP, (ISC)2; Moyn Uddin, Cyber Counsel; Jonathan Armstrong, Cordery; Neil Thacker, Forcepoint
    The EU General Data Protection Regulation (GDPR) will go into effect on 25th May, 2018, requiring Global organizations to significantly address how they process and protect the personal data of EU citizens.

    Hosted by The International Information System Security Certification Consortium, this webcast focused on our most up-to-date findings on the GDPR, as well as key requirements to comply with the regulation.

    Topics for discussion included obligations to:
    • Maintain a personal data inventory
    • Map Data flow vs. Data Transfer Agreements
    • Respond to incidents
    •​ Notify authorities of data breaches

    Featuring
    Dr. Adrian Davis CISSP, Managing Director, EMEA, (ISC)2

    Moyn Uddin, Chief Cyber Risk Officer, Cyber Counsel

    Jonathan P. Armstrong, Partner, Cordery

    Neil Thacker, Information Security & Strategy Officer, Forcepoint
  • Cybersecurity Demystified: Building a Practical & Sensible Cybersecurity Program Recorded: Sep 27 2017 26 mins
    Brandon Swafford, CTO, Insider Threat, Forcepoint - Mike Meline, Founder, Cyber Self-Defense
    Technology alone does not equal business outcomes. You have invested in more tools resulting in more alerts and more security spend, but you are not seeing better security outcomes—preventing the data breach from the compromised insider, stopping the malicious insider, or blocking the accidental data loss. The cybersecurity industry needs to start thinking differently. For a cybersecurity program to do its job, it must look beyond technology and include a human-centric approach that includes cybersecurity controls, employee training, comprehensive risk assessments and other people-first tactics. This webcast will discuss recent security breaches that have impacted organizations such as Equifax and HBO, identify the problem, and plot out a new course towards data protection by implementing a practical and company-wide cybersecurity program.
Securing your data in today’s workplace
Today, organizations face the challenge of protecting their critical data and IP whilst enabling the modern work anywhere environments of a cloud-first world. Equally organizations now face a myriad of regulations like GDPR that require strict governance over the data they hold and how it is used. In this channel we discuss the best way to address these challenges helping you to modernize your data protection and confidently get to compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering
  • Live at: Jun 5 2019 1:00 pm
  • Presented by: Raef Meeuwisse| Carl Leonard, Forcepoint | John Scott, Bank of England | Adenike Cosgrove, Proofpoint | Richard Agnew, Code42
  • From:
Your email has been sent.
or close