EMEA: Unified Data Protection for Hybrid IT - Part 1
A dynamic approach to protect data wherever it resides
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP: 90% of the World's data has been created in the last two years, whilst there is an increase in places where it is stored and by the number of people who have access.
This webinar explores how companies should rethink data security, focusing on the following three principles:
- Analytics driven visibility to give gain oversight everywhere users collaborate
- Risk-adaptive controls to eliminate the complexity of policy enforcement
- Intelligent and dynamic automation - building a better understanding of context and user intent and getting to action faster
RecordedNov 20 201920 mins
Your place is confirmed, we'll send you email reminders
Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint
In today’s world, organisations typically audit data access and use rather than enforcing protection policies. As a result, security teams spend their energy investigating data incidents, identifying breaches and cleaning up after the incident. But with a greater focus on how organizations are protecting data and responding to regulations, can we move to a world where we actually stop data breaches from occurring but without impacting the productivity of the workforce?
In this session, Security Evangelist Chris Boorman and Director of Product Marketing Mike Smart, analyse this challenge using the Data Protection Maturity Curve and map how organisations can move from the Data Swamp, through Visibility and Analysis to a state of Proactive Automation.
How valuable is your data? Watch our video discussion and learn how you can move your organisation along the maturity curve.
A deeper dive into the use cases & challenges businesses face
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs.
Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification and protection of critical data.
This webinar explores how companies should rethink data security. Addressing the challenges of protecting Critical Data & Intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.
- Analytics Driven Visibility – to gain oversight everywhere users work and collaborate
- Risk-Adaptive Controls – to eliminate the complexity of policy enforcement
- Intelligent & Dynamic Automation – building a better understanding of context and user intent
A deeper dive into the use cases & challenges businesses face
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs.
Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification and protection of critical data.
This webinar explores how companies should rethink data security. Addressing the challenges of protecting Critical Data & Intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.
- Analytics Driven Visibility – to gain oversight everywhere users work and collaborate
- Risk-Adaptive Controls – to eliminate the complexity of policy enforcement
- Intelligent & Dynamic Automation – building a better understanding of context and user intent
Karlene Berger, Director of Product Marketing, Forcepoint
A dynamic approach to protect data wherever it resides
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP: 90% of the World's data has been created in the last two years, whilst there is an increase in places where it is stored and by the number of people who have access.
This webinar explores how companies should rethink data security, focusing on the following three principles:
- Analytics driven visibility to give gain oversight everywhere users collaborate
- Risk-adaptive controls to eliminate the complexity of policy enforcement
- Intelligent and dynamic automation - building a better understanding of context and user intent and getting to action faster
Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint
In today’s world, organizations typically audit data access and use rather than enforcing protection policies. As a result, security teams spend their energy investigating data incidents, identifying breaches and cleaning up after the incident. But with a greater focus on how organizations are protecting data and responding to regulations, can we move to a world where we actually stop data breaches from occurring but without impacting the productivity of the workforce?
In this session, Security Evangelist Chris Boorman and Director of Product Marketing Mike Smart, analyze this challenge using the Data Protection Maturity Curve and map how organizations can move from the Data Swamp, through Visibility and Analysis to a state of Proactive Automation.
How valuable is your data? Watch our video discussion and learn how you can move your organization along the maturity curve.
Karlene Berger, Director of Product Marketing, Forcepoint
"Enterprises are facing new challenges when it comes to protecting regulated data and critical IP.
This webinar explores how companies should rethink data security. Addressing the challenges of protecting Critical Data & Intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection."
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP.
Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data.
Wednesday, October 16, 2019
10 a.m. CDT
This webinar explores how companies should rethink data security. Addressing the challenges of protecting critical data & intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.
Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate
Risk-Adaptive Controls – to eliminate the complexity of policy enforcement
Intelligent & Dynamic Automation – to build a better understanding of context and user intent
Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?
Why are data loss events increasing even while Cybersecurity spending is soaring? Because legacy DLP solutions are still focused on traditional threat blocking policies and haven't evolved to address today's modern security threats.
Learn more about how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment.
Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments – every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable?
In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses:
- How to gain full visibility into your cloud environment, including shadow IT
- Unified policy management and enforcement for on-premises and cloud security
- How to control cloud access by unmanaged devices (BYOD)
Martin Whitworth, Research Director, European Security, IDC & Duncan Brown, Sr. Director Security Strategist, Forcepoint
GDPR may have stolen the limelight in 2018, but it could be America’s turn in 2019: With the California Consumer Privacy Act (CCPA) coming into effect in Jan 2020 and a recent Government Accountability Office (GAO) recommendation that Congress consider enacting a federal internet privacy law, big changes could be coming.
In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss the possible impact of future American laws, including:
- Factors creating a push for greater regulation
- A look at the California Consumer Privacy Act (CCPA)
- GAO recommendations and the potential for a federal law – how heavy-handed might it be?
- Best practices to prepare for change
Watch the webcast to be prepared for future changes that may impact you.
Martin Whitworth, Research Director, European Security, IDC & Duncan Brown, Sr. Director Security Strategist, Forcepoint
We are now one year on from when GDPR became law, but the compliance race is far from over. Many organizations undoubtedly made a huge effort to revamp their processes and security around personal data—but how effective have they been?
In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss where we succeeded, where mistakes were made, and share five lessons learned to help prepare for the evolving privacy and compliance challenges ahead, including:
- Regulatory enforcement: Penalties are starting to be handed out and it’s not just fines; enforcement can take many forms.
- Over-compliance: Did some companies damage themselves by deleting too much data?
- A global trend towards privacy regulation: GDPR is just the start, with more consequences for how organizations use and misuse personal data.
Watch the webcast to get prepared for what lies ahead.
Jeremy Wittkop, CTO, Intelisecure & Antonio Sanchez, Product Marketing Manager, Forcepoint
In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. InteliSecure’s CTO Jeremy Wittkop will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.
Carl Leonard, Forcepoint | Raef Meeuwisse, ISACA Expert Speaker
Cloud security is a key challenge for today's data-driven businesses.
Join this interactive 1-2-1 discussion where Principal Security Analyst, Carl Leonard will share insights on;
- What are the top cyber threats and trends to look out for in 2019?
- Why are businesses continuing to suffer data breaches?
- How are businesses securing themselves as they embrace digital transformation?
- What is secure SD-WAN? Why is it increasingly important to businesses with distributed office locations?
- What are the most important security solutions for businesses wishing to safely adopt cloud services?
Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
Raef Meeuwisse| Carl Leonard, Forcepoint | John Scott, Bank of England | Adenike Cosgrove, Proofpoint | Richard Agnew, Code42
External and internal threats continue to pose a challenge for security professionals worldwide. How are businesses preparing against attacks like phishing, ransomware, and social engineering?
Join security experts from the industry to learn more about:
- The most prevailing cyber threats businesses face in 2019
- Lessons from cyber attacks and strategies for protecting against them
- Solutions for faster breach detection and response
- Why network visibility is key
- Recommendations for improving enterprise security
Panellists
Richard Agnew, VP EMEA, Code42
Carl Leonard, Principal Security Analyst, Forcepoint
John Scott, Head of Security Education, Bank of England
Adenike Cosgrove, Cybersecurity Strategist, Proofpoint
Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
Angelica Torres-Corral, Sr Product Marketing Manager, DLP, Forcepoint
Steps for implementing a successful data protection strategy
Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property from targeted attacks and accidental exposure – all while adapting to evolving IT environments of cloud applications, private clouds, mobile users and data centers. How do you secure data in an environment that has no perimeters?
In this webcast session, we give insights to gaining visibility & control of your data, optimizing a Data Loss Prevention (DLP) solution and adopting a more proactive security posture. We will address:
- Overcoming common data protection challenges
- Benefits of DLP
- Steps to success with DLP
- Leveraging analytics to go beyond DLP
Homayun Yaqub, Sr. Director Security Strategist, Forcepoint
As we enable employees to be more productive with greater access to critical data, we also increase the risk of a potential breach due to accidental or malicious insider activity.
Striking a balance between maximizing productivity and minimizing risk requires a security program that can identify and respond to the insider threat. In this webcast Forcepoint Senior Security Strategist Homayun Yaqub, discusses the foundations that underpin an effective program, including:
- Refining analytics to better understand the intersection between people and data
- Operationalizing CARTA as the next step in insider threat program development
- Addressing insider risk as a core business concern
Protecting the confidentiality of information is a critical security task. While it is relatively easy to defend against those insiders who should not be accessing certain IP, it is often the employees that create the IP who are most likely to steal it.
In this session, Forcepoint Chief Scientist, Dr Richard Ford, looks at analytic techniques that are effective at protecting information from those who already have legitimate access to it. Richard discusses:
- The need for a human-centric approach to tackle the malicious insider
- What do you do when the creator of the IP… is the thief?
- Behavioural red flags to look out for
- Tips for deploying an Insider Threat Program
Karlene Berger, Solution Director, User & Data Security, Forcepoint
The EU GDPR, one of the most important changes to data privacy regulation in 20 years, takes effect May 25, 2018. IF you haven’t prepared yet – don’t worry, you aren’t alone! Less than 50% of all organizations impacted will fully comply, according to Gartner*.
Watch this very informative webcast to learn:
•How you may either own or process data relevant to the regulation
•Key requirements governing the overall regulation – why they are important and the operational impact on organizations
•Using a NIST focused framework to help you prepare for compliance
Whether you have a specific problem you are trying to solve or are just getting started, Forcepoint can help you stay prepared.
*GDPR Clarity: 19 Frequently Asked Questions Answered, by Bart Willemsen, 29 August 2017
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats.
Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, and industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Carl Leonard, Principal Security Analyst, Forcepoint
A Root Cause Analysis of Data Breaches
The year of the data breach, the year of ransomware, the year of APT – these catchy name tags summarise a given year. This session will review the last 12 months and attempt to assign a name tag. The timing is impeccable. 12 months after WannaCry, a milestone ransomware event and a couple of weeks after GDPR enforcement, provides a prompt to reveal research into the root causes of real-world data breaches and what to learn from their failings.
Today, organizations face the challenge of protecting their critical data and IP whilst enabling the modern work anywhere environments of a cloud-first world. Equally organizations now face a myriad of regulations like GDPR that require strict governance over the data they hold and how it is used. In this channel we discuss the best way to address these challenges helping you to modernize your data protection and confidently get to compliance.
EMEA: Unified Data Protection for Hybrid IT - Part 1Karlene Berger, Director of Product Marketing, Forcepoint[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]20 mins