Hi [[ session.user.profile.firstName ]]

Employing a Risk Adaptive Model to Detect and Prevent Threats From Within

As we enable employees to be more productive with greater access to critical data, we also increase the risk of a potential breach due to accidental or malicious insider activity.

Striking a balance between maximizing productivity and minimizing risk requires a security program that can identify and respond to the insider threat. In this webcast Forcepoint Senior Security Strategist Homayun Yaqub, discusses the foundations that underpin an effective program, including:

- Refining analytics to better understand the intersection between people and data
- Operationalizing CARTA as the next step in insider threat program development
- Addressing insider risk as a core business concern
Recorded May 8 2019 23 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Homayun Yaqub, Sr. Director Security Strategist, Forcepoint
Presentation preview: Employing a Risk Adaptive Model to Detect and Prevent Threats From Within

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Integrating Microsoft Information Protection, with Boldon James Jun 17 2020 4:00 pm UTC 22 mins
    Mark Bloemsma, Consulting Sales Engineer, Forcepoint
    Efficient and reliable data classification is an essential part of helping businesses achieve their goals – including maintaining regulatory compliance standards.

    When you are able to identify and classify valuable data, business value increases and data management costs decrease. In this webinar, Playing Nicely with Others Part II: Microsoft Information Protection, with Boldon James, learn about all things classification including:

    •The “how” and “why” of data classification
    •An overview of Microsoft Information Protection (MIP)
    •The architecture that integrates Forcepoint & MIP
    •Actionable integration use cases
  • The Voice of the CPO: The Case for Moving Left of Breach Recorded: May 20 2020 25 mins
    Nico Popp, Chief Product Officer, Forcepoint
    A trillion dollars spent on perimeter protection is clearly not effective in securing organisations against breaches. The inspiring Nico Popp elucidates the need to move from outside-in to inside-out security on a whiteboard. You will learn:

    - What every security practitioner will be encountering in the not so distant future
    - Where the limits of endpoint, network, cloud or email security lie
    - Why the most successful strategies involve a focus on people
  • Cloud Data Protection Strategies and Trends, with ESG Analyst John Grady Recorded: May 13 2020 43 mins
    John Grady, ESG Analyst Cybersecurity & Ankur Chadda, Senior Solutions Manager, Forcepoint
    Every organization, large or small, is in the midst of a digital transformation. Part of that includes the adoption of cloud apps that give employees increased freedom, flexibility and efficiency. For this reason, cloud data security has become increasingly critical. As more cloud apps are added, security teams struggle to match the increasingly complex environment with an equally adaptive data protection strategy.

    Instead of being bogged down by false alerts and left vulnerable by an unbalanced strategy, security practitioners need to adjust their data protection mentality and approach. By revaluating data protection strategies, organization can ensure that security is not outpaced by digital transformation.

    Attend this webinar to learn more on these topics from analyst, John Grady (ESG), as he shares insights based on an extensive survey.
  • Voice of the CPO: The Case for Moving Left of Breach Recorded: Apr 29 2020 26 mins
    Nico Popp, Chief Product Officer, Forcepoint
    A trillion dollars spent on perimeter protection is clearly not effective in securing organisations against breaches. The inspiring Nico Popp elucidates the need to move from outside-in to inside-out security on a whiteboard. You will learn:

    - What every security practitioner will be encountering in the not so distant future
    - Where the limits of endpoint, network, cloud or email security lie
    - Why the most successful strategies involve a focus on people
  • Modern Strategies for Protecting Users and Data in a Borderless World Recorded: Apr 28 2020 38 mins
    Homayun Yaqub, Sr Director of Security Strategy, Forcepoint Robert Mechler, Principal Security Strategist, Forcepoint
    Modern cybersecurity requires a mindset change. Attackers are compromising access, guaranteed. Understanding the behavior of users interacting with data is the modern attackers’ kryptonite.

    This session will deliver six strategies to implement today, with the intent to
    - create efficiencies and enhance proactive security effectiveness
    - remain flexible to anticipate and manage the ever-dynamic threat landscape
  • Forward-looking Security in Finance Recorded: Apr 28 2020 27 mins
    James Wilde, User Protection Strategist, Forcepoint | William Beer, Managing Partner, HB Advisory
    Along with stiff requirements for data security compliance, financial institutions face intense scrutiny from customers, regulators and shareholders. Every day can bring its own risk of damaged reputation and material loss.

    James Wilde has managed information security and risk in banking for a number of years. He now shares his vast experience and hands-on knowledge that have also shaped his vision of cybersecurity in the future.
  • Data Security Can’t Be Black or White Recorded: Apr 15 2020 14 mins
    Ankur Chadda, Senior Solution Manager
    Join Forcepoint's Ankur Chadda as he provides an overview of the challenges with traditional data protection solutions. Learn how to address those challenges head onto effectively modernize your data protection strategy.

    You’ll leave this webinar with:

    - A comprehensive overview of the technical and business challenges associated with legacy data protection.

    - Insight into how mobile and remote workers, in a cloud-enabled environment, can complicate oversight and compliance

    - Actionable solutions for adding visibility and control to your data protection strategy
  • From Reactive to Proactive Data Protection Recorded: Mar 4 2020 19 mins
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint
    In today’s world, organizations typically audit data access and use rather than enforcing protection policies. As a result, security teams spend their energy investigating data incidents, identifying breaches and cleaning up after the incident. But with a greater focus on how organizations are protecting data and responding to regulations, can we move to a world where we actually stop data breaches from occurring but without impacting the productivity of the workforce?

    In this session, Security Evangelist Chris Boorman and Director of Product Marketing Mike Smart, analyze this challenge using the Data Protection Maturity Curve and map how organizations can move from the Data Swamp, through Visibility and Analysis to a state of Proactive Automation.

    How valuable is your data? Watch our video discussion and learn how you can move your organization along the maturity curve.
  • A Risk Adaptive Approach to Data Protection Recorded: Jan 15 2020 9 mins
    Karlene Berger, Director Product Marketing
    One of the biggest challenges in Data Security is protecting critical data in a way that doesn’t frustrate users, overwhelm admins or mistake malicious action for normal employee behavior.

    Risk-adaptive protection dynamically applies monitoring and enforcement controls to protect data, based on the calculated behavioral risk level of users and the value of data accessed. Risk levels are driven up and down based on user behavior, with each person having a unique risk level.

    Learn more about how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment.
  • APAC: Unified Data Protection for Hybrid IT- part 2 Recorded: Nov 28 2019 37 mins
    Ankur Chadda, Senior Product Marketing Manager
    A deeper dive into the use cases & challenges businesses face

    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs.

    Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification and protection of critical data.

    This webinar explores how companies should rethink data security. Addressing the challenges of protecting Critical Data & Intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.

    - Analytics Driven Visibility – to gain oversight everywhere users work and collaborate
    - Risk-Adaptive Controls – to eliminate the complexity of policy enforcement
    - Intelligent & Dynamic Automation – building a better understanding of context and user intent
  • EMEA: Unified Data Protection for Hybrid IT - Part 2 Recorded: Nov 27 2019 37 mins
    Ankur Chadda, Senior Product Marketing Manager
    A deeper dive into the use cases & challenges businesses face

    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs.

    Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification and protection of critical data.

    This webinar explores how companies should rethink data security. Addressing the challenges of protecting Critical Data & Intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.

    - Analytics Driven Visibility – to gain oversight everywhere users work and collaborate
    - Risk-Adaptive Controls – to eliminate the complexity of policy enforcement
    - Intelligent & Dynamic Automation – building a better understanding of context and user intent
  • EMEA: Unified Data Protection for Hybrid IT - Part 1 Recorded: Nov 20 2019 20 mins
    Karlene Berger, Director of Product Marketing, Forcepoint
    A dynamic approach to protect data wherever it resides

    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP: 90% of the World's data has been created in the last two years, whilst there is an increase in places where it is stored and by the number of people who have access.

    This webinar explores how companies should rethink data security, focusing on the following three principles:

    - Analytics driven visibility to give gain oversight everywhere users collaborate
    - Risk-adaptive controls to eliminate the complexity of policy enforcement
    - Intelligent and dynamic automation - building a better understanding of context and user intent and getting to action faster
  • From Reactive to Proactive Data Protection Recorded: Nov 13 2019 19 mins
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint
    In today’s world, organizations typically audit data access and use rather than enforcing protection policies. As a result, security teams spend their energy investigating data incidents, identifying breaches and cleaning up after the incident. But with a greater focus on how organizations are protecting data and responding to regulations, can we move to a world where we actually stop data breaches from occurring but without impacting the productivity of the workforce?

    In this session, Security Evangelist Chris Boorman and Director of Product Marketing Mike Smart, analyze this challenge using the Data Protection Maturity Curve and map how organizations can move from the Data Swamp, through Visibility and Analysis to a state of Proactive Automation.

    How valuable is your data? Watch our video discussion and learn how you can move your organization along the maturity curve.
  • Unified Data Protection for Hybrid IT - Executive Summary Recorded: Oct 30 2019 20 mins
    Karlene Berger, Director of Product Marketing, Forcepoint
    "Enterprises are facing new challenges when it comes to protecting regulated data and critical IP.
    This webinar explores how companies should rethink data security. Addressing the challenges of protecting Critical Data & Intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection."
  • Unified Data Protection: Part 2 Recorded: Oct 16 2019 38 mins
    Ankur Chadda, Senior Product Marketing Manager
    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP.

    Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data.

    Wednesday, October 16, 2019

    10 a.m. CDT

    This webinar explores how companies should rethink data security. Addressing the challenges of protecting critical data & intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.

    Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate

    Risk-Adaptive Controls – to eliminate the complexity of policy enforcement

    Intelligent & Dynamic Automation – to build a better understanding of context and user intent
  • A Risk Adaptive Approach to Data Protection Recorded: Sep 18 2019 9 mins
    Karlene Berger, Director Product Marketing
    Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?
    Why are data loss events increasing even while Cybersecurity spending is soaring? Because legacy DLP solutions are still focused on traditional threat blocking policies and haven't evolved to address today's modern security threats.

    Learn more about how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment.
  • Accelerate Cloud App Adoption without Compromising Security Recorded: Aug 7 2019 30 mins
    Ankur Chadda, Sr. Product Marketing Manager, Forcepoint
    How secure is your cloud data?

    Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments – every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable?

    In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses:

    - How to gain full visibility into your cloud environment, including shadow IT
    - Unified policy management and enforcement for on-premises and cloud security
    - How to control cloud access by unmanaged devices (BYOD)
  • Beyond GDPR: America wakes up to privacy Recorded: Jul 10 2019 33 mins
    Martin Whitworth, Research Director, European Security, IDC & Duncan Brown, Sr. Director Security Strategist, Forcepoint
    GDPR may have stolen the limelight in 2018, but it could be America’s turn in 2019: With the California Consumer Privacy Act (CCPA) coming into effect in Jan 2020 and a recent Government Accountability Office (GAO) recommendation that Congress consider enacting a federal internet privacy law, big changes could be coming.

    In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss the possible impact of future American laws, including:

    - Factors creating a push for greater regulation
    - A look at the California Consumer Privacy Act (CCPA)
    - GAO recommendations and the potential for a federal law – how heavy-handed might it be?
    - Best practices to prepare for change

    Watch the webcast to be prepared for future changes that may impact you.
  • GDPR One Year On – 5 Lessons Learned Recorded: Jun 19 2019 41 mins
    Martin Whitworth, Research Director, European Security, IDC & Duncan Brown, Sr. Director Security Strategist, Forcepoint
    We are now one year on from when GDPR became law, but the compliance race is far from over. Many organizations undoubtedly made a huge effort to revamp their processes and security around personal data—but how effective have they been?

    In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss where we succeeded, where mistakes were made, and share five lessons learned to help prepare for the evolving privacy and compliance challenges ahead, including:

    - Regulatory enforcement: Penalties are starting to be handed out and it’s not just fines; enforcement can take many forms.
    - Over-compliance: Did some companies damage themselves by deleting too much data?
    - A global trend towards privacy regulation: GDPR is just the start, with more consequences for how organizations use and misuse personal data.

    Watch the webcast to get prepared for what lies ahead.
  • Protecting Against Insider Threats Recorded: Jun 14 2019 55 mins
    Jeremy Wittkop, CTO, Intelisecure & Antonio Sanchez, Product Marketing Manager, Forcepoint
    In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. InteliSecure’s CTO Jeremy Wittkop will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.
Securing your data in today’s workplace
Today, organizations face the challenge of protecting their critical data and IP whilst enabling the modern work anywhere environments of a cloud-first world. Equally organizations now face a myriad of regulations like GDPR that require strict governance over the data they hold and how it is used. In this channel we discuss the best way to address these challenges helping you to modernize your data protection and confidently get to compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Employing a Risk Adaptive Model to Detect and Prevent Threats From Within
  • Live at: May 8 2019 3:00 pm
  • Presented by: Homayun Yaqub, Sr. Director Security Strategist, Forcepoint
  • From:
Your email has been sent.
or close