Hi [[ session.user.profile.firstName ]]

A Risk Adaptive Approach to Data Protection

One of the biggest challenges in Data Security is protecting critical data in a way that doesn’t frustrate users, overwhelm admins or mistake malicious action for normal employee behavior.

Risk-adaptive protection dynamically applies monitoring and enforcement controls to protect data, based on the calculated behavioral risk level of users and the value of data accessed. Risk levels are driven up and down based on user behavior, with each person having a unique risk level.

Learn more about how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment.
Recorded Jan 15 2020 9 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Karlene Berger, Director Product Marketing
Presentation preview: A Risk Adaptive Approach to Data Protection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Breach Detection: Becoming as Agile as The Attackers Dec 23 2020 5:00 pm UTC 23 mins
    Myrna Soto, Chief Strategy and Trust Officer, Forcepoint & Nick Kael, Chief Technology Officer, Ericom
    Hear two leading cyber security strategists – Myrna Soto and Nick Kael - discuss how the significantly altered business world has caused a focus shift from disaster recovery to business continuity and the impact this has on security.

    Find out how the ever-changing attack surface and opportunistic approach of cyber criminals is causing the security strategy to become dynamic, considering users as the new perimeter, and embracing SASE architectures, to give better visibility and management for the security analyst whilst enabling the user and business to work without hindrance.
  • A Technical Blueprint for Data Protection Nov 25 2020 5:00 pm UTC 36 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Robert Mechler, Principal Security Strategist, Forcepoint
    Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential.

    In this webcast, Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.

    Key learnings include:

    - How the move to cloud is making data protection harder
    - How to identify where your critical data is, the channels it flows through and establish an incident response plan
    - How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
    - How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
  • Get the best from DLP Nov 11 2020 5:00 pm UTC 34 mins
    Carl Eberling, CIO, Forcepoint | Eric Jackson, Vice President, General Manager User & Data Protection, Forcepoint
    Strengthen your strategy with these new features

    Data Loss Prevention (DLP) technology has been with us for many years and is now part of the common security defences employed by organizations. But today’s Enterprise DLP is anything but standard, having evolved many new and advanced capabilities that put it at the heart of a data protection strategy.

    In this discussion we examine how these new functionalities can help us address the challenges of the new working landscape, accelerate your strategy and re-think what is possible.
  • Bringing the Zero Trust Mindset to Data Protection Nov 4 2020 5:00 pm UTC 35 mins
    Nico Popp, Chief Product Officer, Forcepoint | Sean Sweeney, Chief Security Advisor, Microsoft
    The traditional approach to data security is increasingly inadequate. Old solutions introduce too much business friction, yet they still fall short when it comes to preventing data exfiltration. We need to approach data protection differently to make tools like DLP, encryption, and tokenization more responsive to the security needs of the decentralized, cloud-driven workplace.

    Introducing the core concepts of Zero Trust to your data protection posture ensures that all people in your organization are continuously being authenticated and authorized to have access to applications and data. A successful Zero Trust approach leverages dynamic, proactive, ongoing user risk assessment based on behavioral analytics to consistently prevent data breaches, while enhancing productivity rather than hindering it.

    In this session, you’ll learn more about bolstering data security with the Zero Trust mindset, including:
    - How Zero Trust and behavioral analytics can maximize the effectiveness of data protection solutions for increasingly mobile and remote workforces
    - How data security traveling with data (like fingerprinting) can help in today’s distributed environment
    - How security leaders are implementing these concepts in their environments and solutions
  • Bringing the Zero Trust Mindset to Data Protection Nov 4 2020 4:30 am UTC 36 mins
    Nico Popp, Chief Product Officer, Forcepoint | Sean Sweeney, Chief Security Advisor, Microsoft
    The traditional approach to data security is increasingly inadequate. Old solutions introduce too much business friction, yet they still fall short when it comes to preventing data exfiltration. We need to approach data protection differently to make tools like DLP, encryption, and tokenization more responsive to the security needs of the decentralized, cloud-driven workplace.

    Introducing the core concepts of Zero Trust to your data protection posture ensures that all people in your organization are continuously being authenticated and authorized to have access to applications and data. A successful Zero Trust approach leverages dynamic, proactive, ongoing user risk assessment based on behavioral analytics to consistently prevent data breaches, while enhancing productivity rather than hindering it.

    In this session, you’ll learn more about bolstering data security with the Zero Trust mindset, including:
    - How Zero Trust and behavioral analytics can maximize the effectiveness of data protection solutions for increasingly mobile and remote workforces
    - How data security traveling with data (like fingerprinting) can help in today’s distributed environment
    - How security leaders are implementing these concepts in their environments and solutions
  • Step up from integrated DLP Recorded: Oct 27 2020 34 mins
    Nicolas Fischbach, Global CTO, Forcepoint & John Stringer, Director of Product Management, Forcepoint
    How to know if you're ready for enterprise DLP

    Data Loss Prevention (DLP) technology is now everywhere – you will often find it integrated in other security products like Web and Email Security, whilst many Cloud Aps will offer it as part of their service. But is it enough to rely on a myriad of providers to fulfill this critical security need?

    In this discussion, we evaluate the data protection options against the needs of the business, including:

    - The use cases for DLP; getting visibility of your data, securing critical data wherever it is and compliance
    - How DLP can go from a blocker to a business enabler
    - Why an Enterprise DLP solution is not necessarily a tool just for the big players
    - Is integrated DLP really integrated OR isolated DLP?
  • Data Privacy Risks & Challenges In The Digitally Transformed World Recorded: Oct 22 2020 67 mins
    Panel Discussion: Forcepoint in conjunction with Deloitte
    2020 brought about a myriad of challenges to organisations across the globe, but none more so than need to rapidly digitally transform to cater for a new way of working. However, while the focus was on remote workforce projects, for many organisations, attention to data privacy and compliance requirements fell into second place.

    Hosted by Forcepoint’s Nick Savvides, join a panel discussion where specialists from Deloitte will share real-world insights into the data privacy challenges APAC organisations are now facing as part of 2020’s digital evolution. They will discuss how local markets across the region responded to change and offer tips to revert organisational focus back onto critical data privacy initiatives.
  • Indicators of Behavior a Short Crash Course Recorded: Oct 21 2020 16 mins
    Raffael Marty, Chief Research and Intelligence Officer
    This short Cyber Security Crash Course will get you up to speed quickly on the topic. Indicators of behavior (IOB) consider the dynamic nature of users, in terms of how they access resources they need. You can deliver security without impacting user productivity.
    Hear more from Chief Research and Intelligence Officer, Raffael Marty
  • Best Practices for Avoiding a Data Breach Recorded: Oct 1 2020 24 mins
    Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
    New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.

    Watch now to learn:
    - Challenges of securing data moving between on-prem and the cloud
    - Tips and takeaways from data-secure companies
    - Technologies they’ve used to prevent breaches
  • Breach Detection: Becoming as Agile as The Attackers Recorded: Aug 20 2020 23 mins
    Myrna Soto, Chief Strategy and Trust Officer, Forcepoint & Nick Kael, Chief Technology Officer, Ericom
    Hear two leading cyber security strategists – Myrna Soto and Nick Kael - discuss how the significantly altered business world has caused a focus shift from disaster recovery to business continuity and the impact this has on security.

    Find out how the ever-changing attack surface and opportunistic approach of cyber criminals is causing the security strategy to become dynamic, considering users as the new perimeter, and embracing SASE architectures, to give better visibility and management for the security analyst whilst enabling the user and business to work without hindrance.
  • Cybersecurity Threat Detection and Prevention Recorded: Aug 17 2020 61 mins
    Jo Peterson | Adi Pradeep | Brad Moldenhauer | Dr. Richard Ford | Homayun Yaqub
    Cyberthreats are viewed as a significant risk to organizations. They are capable of disrupting core operations and inflicting serious damage to brands and reputations.

    A study by Cybersecurity Ventures predicts these crimes will cost the world $6 trillion a year by 2021.

    Join this panel discussion to:
    - Review today’s expansive attack surface and the various ways bad actors penetrate networks
    - Discuss existing and emerging cyber threats
    - Understand policies, tools and best practices used to protect organizations as new threats emerge
    - Explore the roles that user training and education, skill development and governance play in defending against threats

    Panel:
    Jo Peterson, VP Cloud & Security Services, Clarify360 (moderator)
    Adarsh "Adi" Pradeep, Cybersecurity Consultant
    Brad Moldenhauer, CISO, Americas, Zscaler
    Dr. Richard Ford, CTO, Cyren
    Homayun Yaqub, Global Security Strategist, Forcepoint
  • Simplifying Security Controls Recorded: Aug 6 2020 44 mins
    Martin Sugden, CEO, Boldon James & Ankur Chadda, Sr. Solutions Manager Data Protection, Forcepoint
    In the 2nd part of the virtual series, the Boldon James and Forcepoint experts will discuss how to simplify security controls.

    Organisations are revisiting the way they manage and protect their data, adopting a more strategic perspective than ever before. As they undergo digital transformation, store vast volumes of data and contend with regulatory requirements, many businesses seek parallel protection and labelling solutions for effective control.

    Ankur and Martin will reveal how, by pairing Forcepoint DLP and Boldon James Data Classification, you can achieve better business outcomes for your organisation.

    Key Learning Outcomes:

    - Gaining visibility of data within changing environments and workflows
    - How to move from a static to a dynamic approach to policy enforcement
    - Understand how a simple process of clicks, dialogues and business taxonomy reduces frustration and supports business integrity
  • Committing to Data Privacy Recorded: Aug 5 2020 39 mins
    Enza Iannopollo, Senior Analyst, Forrester & Tamarian Del Conte Sr. Solutions Manager, Forcepoint
    Committing to Privacy is the topic in Part 1 of this two-part virtual series. The guest speaker is Forrester analyst Enza Iannopollo, who will be joined by Forcepoint and Boldon James experts for a Q&A panel.

    Privacy management cannot be the sole responsibility of regulators but is also dependent on the capacity of regulated entities, including customers, partners, and employees, to comply. Enza will talk about why organizations should move into a sustained compliance mode to ensure consistent data protection is achieved.

    Key Learning Outcomes:

    - How customer actions indicate that we should not think about privacy just in terms of regulations and fines
    - Where trusted enterprises stand when it comes to embedding privacy protection measures in day-to-day business
    - Facing the challenges of constantly evolving automation technologies
  • Forcepoint and Microsoft AIP - Automating Data Protection for Cloud Transition. Recorded: Aug 4 2020 37 mins
    Ankur Chadda, Sr. Solutions Manager, Forcepoint & Kartik Kanakasabesan, Principal PM Manager, Microsoft
    Learn how Forcepoint and Microsoft are working together to help organizations protect sensitive data in their hybrid environments. In this webinar, we will discuss:
    - How digital transformation is driving workloads to the cloud
    - Forcepoint and Microsoft integration compatibilities
    - How to automate the identification, classification, and protection of critical business data
  • Risk Management - Managing Conduct Risk in Evolving Work Environments Recorded: Jul 28 2020 26 mins
    Homayun Yaqub, Global Security Strategist, Forcepoint & Charles Keane, Global Security Specialist, Forcepoint
    Do you understand your organization’s overall risk environment? Conduct risk refers to the risk associated with decisions and behaviours of employees and whether they support proper customer outcomes and are fully integrated into the broader framework for risk management within an organization.

    During this webinar, Risk Management: Managing Conduct Risk in Evolving Work Environments, learn how to develop a holistic understanding of behaviour and use continuous monitoring to access and protect against risk.

    Learn about the nuances of risk intelligence and:

    - Understand how traditional monitoring and surveillance approaches are incomplete
    - Improve organizational efficacy by better aligning compliance and security objectives
    - Get a real-world example of how to build a picture of conduct risk
    - Establish a people and data centric approach to evolve the organization’s security strategy to more effectively reduce risk exposure.
  • Forcepoint and Microsoft AIP: Automating Data Protection for Cloud Transition Recorded: Jul 8 2020 37 mins
    Ankur Chadda, Sr. Solutions Manager, Forcepoint & Kartik Kanakasabesan, Principal PM Manager, Microsoft
    Learn how Forcepoint and Microsoft are working together to help organizations protect sensitive data in their hybrid environments. In this webinar, we will discuss:
    - How digital transformation is driving workloads to the cloud
    - Forcepoint and Microsoft integration compatibilities
    - How to automate the identification, classification, and protection of critical business data
  • Exploring Management's Views To Enterprise Cyber-Risk In Today's Landscape Recorded: Jul 7 2020 55 mins
    Kenny Yeo, Frost & Sullivan & William Tam, Forcepoint
    The ways in which organizations operate are rapidly changing. Enterprises are quickly adapting their digital transformation journey to meet shifting business requirements. IT teams are moving at light speed to empower employees to work remotely; on a variety of devices, on multiple networks and within a multitude of cloud applications, which has ultimately expanded an enterprises’ threat surface.

    So, what is Management’s views of cyber-risk in today’s current climate? And, how can organizations ensure their customer-centric focus remains core, while protecting employees, protecting data from risk, ensuring compliance and addressing the crucial human factor?

    Join this informative webinar organized with Frost & Sullivan that will reveal key data from a recent risk and cybersecurity survey. Also showcased will be a strategy to evolve an infrastructure-centric cybersecurity model to a human-centric, risk-based approach.
  • Simplifying Security Controls Recorded: Jul 2 2020 44 mins
    Martin Sugden, CEO, Boldon James & Ankur Chadda, Sr. Solutions Manager Data Protection, Forcepoint
    In the 2nd part of the virtual series, the Boldon James and Forcepoint experts will discuss how to simplify security controls.

    Organisations are revisiting the way they manage and protect their data, adopting a more strategic perspective than ever before. As they undergo digital transformation, store vast volumes of data and contend with regulatory requirements, many businesses seek parallel protection and labelling solutions for effective control.

    Ankur and Martin will reveal how, by pairing Forcepoint DLP and Boldon James Data Classification, you can achieve better business outcomes for your organisation.

    Key Learning Outcomes:

    - Gaining visibility of data within changing environments and workflows
    - How to move from a static to a dynamic approach to policy enforcement
    - Understand how a simple process of clicks, dialogues and business taxonomy reduces frustration and supports business integrity
  • Committing to Data Privacy Recorded: Jul 1 2020 39 mins
    Enza Iannopollo, Senior Analyst, Forrester & Tamarian Del Conte Sr. Solutions Manager, Forcepoint
    Committing to Privacy is the topic in Part 1 of this two-part virtual series. The guest speaker is Forrester analyst Enza Iannopollo, who will be joined halfway through the session by Forcepoint and Boldon James experts during a Q&A panel.

    Privacy management cannot be the sole responsibility of regulators, but is also dependent on the capacity of regulated entities, including customers, partners and employees, to comply.

    Enza will talk about why organisations have to move into a sustained compliance mode to ensure consistent data protection is achieved.

    Key Learning Outcomes:

    - How customer actions indicate that we should not think about privacy just in terms of regulations and fines
    - Where trusted enterprises stand when it comes to embedding privacy protection measures in day-to-day business
    - Facing the challenges of constantly evolving automation technologies
  • Risk Management: Managing Conduct Risk in Evolving Work Environments Recorded: Jun 24 2020 26 mins
    Homayun Yaqub, Global Security Strategist, Forcepoint & Charles Keane, Global Security Specialist, Forcepoint
    Do you understand your organization’s overall risk environment? Conduct risk refers to the risk associated with decisions and behaviours of employees and whether they support proper customer outcomes and are fully integrated into the broader framework for risk management within an organization.

    During this webinar, Risk Management: Managing Conduct Risk in Evolving Work Environments, learn how to develop a holistic understanding of behaviour and use continuous monitoring to access and protect against risk.

    Learn about the nuances of risk intelligence and:

    o Understand how traditional monitoring and surveillance approaches are incomplete
    o Improve organizational efficacy by better aligning compliance and security objectives
    o Get a real-world example of how to build a picture of conduct risk
    o Establish a people and data centric approach to evolve the organization’s security strategy to more effectively reduce risk exposure.
Securing your data in today’s workplace
Today, organizations face the challenge of protecting their critical data and IP whilst enabling the modern work anywhere environments of a cloud-first world. Equally organizations now face a myriad of regulations like GDPR that require strict governance over the data they hold and how it is used. In this channel we discuss the best way to address these challenges helping you to modernize your data protection and confidently get to compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Risk Adaptive Approach to Data Protection
  • Live at: Jan 15 2020 4:00 pm
  • Presented by: Karlene Berger, Director Product Marketing
  • From:
Your email has been sent.
or close