Hi [[ session.user.profile.firstName ]]

Data Security Can’t Be Black or White

Join Forcepoint's Ankur Chadda as he provides an overview of the challenges with traditional data protection solutions. Learn how to address those challenges head onto effectively modernize your data protection strategy.

You’ll leave this webinar with:

- A comprehensive overview of the technical and business challenges associated with legacy data protection.

- Insight into how mobile and remote workers, in a cloud-enabled environment, can complicate oversight and compliance

- Actionable solutions for adding visibility and control to your data protection strategy
Recorded Apr 15 2020 14 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ankur Chadda, Senior Solution Manager
Presentation preview: Data Security Can’t Be Black or White

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • AMER: Risk-Adaptive Data Protection: Stop Breaches. Enable Productivity. Recorded: Jun 2 2021 38 mins
    Austin Zide, Product Manager, Forcepoint | Ashish Malpani, Snr. Director of Solutions, Forcepoint
    Balancing employee productivity against providing effective breach protection is a core challenge for IT Security. In many implementations, DLP policies are so rigid that it is left in passive, monitoring mode so employees can do their jobs. In other words, the cost of a data breach is less damaging than bad DLP!

    The solution – upgrade to a Risk-Based DLP that understands how your people interact with your data, that can focus protection where and when it is needed most to deliver true dynamic, automated enforcement.

    In this webcast, we explore how Risk-Adaptive DLP can help your business:

    - Provide secure access to critical data for remote workers
    - Unburden IT security through effective incident prioritization
    - See a demonstration of Risk-Adaptive DLP in action
  • EMEA: Risk-Adaptive Data Protection: Stop Breaches. Enable Productivity. Recorded: Jun 2 2021 38 mins
    Austin Zide, Product Manager, Forcepoint | Ashish Malpani, Snr. Director of Solutions, Forcepoint
    Balancing employee productivity against providing effective breach protection is a core challenge for IT Security. In many implementations, DLP policies are so rigid that it is left in passive, monitoring mode so employees can do their jobs. In other words, the cost of a data breach is less damaging than bad DLP!

    The solution – upgrade to a Risk-Based DLP that understands how your people interact with your data, that can focus protection where and when it is needed most to deliver true dynamic, automated enforcement.

    In this webcast, we explore how Risk-Adaptive DLP can help your business:

    - Provide secure access to critical data for remote workers
    - Unburden IT security through effective incident prioritization
    - See a demonstration of Risk-Adaptive DLP in action
  • APAC: Risk-Adaptive Data Protection: Stop Breaches. Enable Productivity. Recorded: Jun 2 2021 38 mins
    Austin Zide, Product Manager, Forcepoint | Ashish Malpani, Snr. Director of Solutions, Forcepoint
    Balancing employee productivity against providing effective breach protection is a core challenge for IT Security. In many implementations, DLP policies are so rigid that it is left in passive, monitoring mode so employees can do their jobs. In other words, the cost of a data breach is less damaging than bad DLP!

    The solution – upgrade to a Risk-Based DLP that understands how your people interact with your data, that can focus protection where and when it is needed most to deliver true dynamic, automated enforcement.

    In this webcast, we explore how Risk-Adaptive DLP can help your business:

    - Provide secure access to critical data for remote workers
    - Unburden IT security through effective incident prioritization
    - See a demonstration of Risk-Adaptive DLP in action
  • Preventing the Big One: Staying Ahead of the Breach Recorded: May 11 2021 54 mins
    Michelle Drolet, Towerwall| Andy Thompson, CyberArk| Nico Fischbach, Forcepoint| Satya Gupta, Virsec| Micheal Meyer, MRSBPO
    Over 37 billion records were exposed in breach events in 2020 - by far the most records exposed in a single year, according to a recent report by Risk Based Security. How has remote working impacted your organization's security posture? What lessons can security professionals learn from the recent wave of breaches and what steps can enterprises take to strengthen security in 2021?

    This keynote panel of security experts and industry leaders will explore the best practices for breach prevention, as well as share real-life lessons from the frontlines on what works and doesn't work.

    Viewers will learn more about:
    - The reality of data breaches
    - Why data breach severity is rising
    - Ransomware attacks on the rise (doubling from 2019 to 2020) and the threat to businesses
    - Technologies that help with breach prevention, detection and response
    - Why security awareness matters and best practices for educating employees to be cyber secure

    Moderated by:
    Michelle Drolet, CEO, Towerwall
    Nico Fischbach, Global CTO, Forcepoint
    Micheal Meyer, Chief Risk and Innovation Officer, MRSBPO
    Andy Thompson, Research Evangelist, CyberArk
    Satya Gupta, CTO & Founder, Virsec
  • The Human Threat: Breaking Down Insider Risk Recorded: May 11 2021 57 mins
    Michael Crouse, Dir. Enterprise User & Data Protection, Forcepoint | Darren Mott, Former FBI Supervisory Special Agent
    Identifying and stopping insider threats continues to be one of the biggest security challenges facing organizations today. They range from the ‘good’ employee engaging in unintentional risky activity, the employee being targeted by external bad actors, to the worst case scenario, the malicious insider. In this more complex remote world, what strategies are available to surface threats – and can we stop them before they cause a breach?

    In this session, Forcepoint’s Director of User & Data Protection, Michael Crouse is joined by special guest, Former FBI Supervisory Special Agent, Darren Mott to share their experiences in helping organizations and government bodies develop their insider threat programs:

    Topics include:
    - Real insider threat cases and their outcomes
    - Insider threat vectors and the telltale signs of exploit
    - The role of technology in providing meaningful visibility to protect “the crown jewels”
    - Investigating behavioral changes and the impact of social distancing
    - How to minimize losses and collateral damage
    - Practical steps you can implement today
  • Zero Trust & Data Protection Recorded: Apr 20 2021 57 mins
    Tyler Robinson, Dir of Offensive Security & Research at Trimarc | Ashish Malpani – Snr. Dir Solutions Marketing, Forcepoint
    As with businesses today, cybersecurity isn’t a static concept and to be effective it must continue to evolve with technological advances — be it in mobility, digital transformation, Zero Trust, or the growing sophistication of attackers and their ability to steal what’s most valuable to the organization — intellectual property.

    The traditional product-centric security paradigm is contributing to the near record number of infrastructure compromises and data breaches. Today’s distributed work environment requires modern cybersecurity that is proactive, risk-adaptive and delivered through a converged platform approach that understands users and data no matter where they are. Join us to learn more on moving your company left of breach utilizing an approach to security designed for today’s sophisticated threat landscape that provides a seamless path to grow your security capabilities when and where you need them.

    Attendees will learn...
    - How understanding human behavior underpins modern cybersecurity strategies to finally move left of compromise
    - Operational benefits driven through the power of proactive and adaptive security capabilities
    - Future-proofing your investment and the value proposition in a SASE converged security platform approach that removes operational complexities and lowers TCO
  • A Technical Blueprint for Data Protection Recorded: Mar 24 2021 36 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Robert Mechler, Principal Security Strategist, Forcepoint
    Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential.

    In this webcast, Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.

    Key learnings include:

    - How the move to cloud is making data protection harder
    - How to identify where your critical data is, the channels it flows through and establish an incident response plan
    - How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
    - How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
  • Protecting Data while Enabling Innovation: A View of Singapore Revised 2020 PDPA Recorded: Mar 4 2021 64 mins
    Nick Savvides, Forcepoint APAC - Lee Ser Yen, Cyber Security Consulting, KMPG - Brandon Tan, Forcepoint APAC
    Throughout 2020, we have continued to see serious data breaches affecting huge numbers of records, continuing to plague organisations such as RedMart and Eatigo. The Singapore Government has recently made amendments to strengthen the Personal Data Protection Act (PDPA), with these changes coming into force in November this year, they will impose heavier fines for data breaches, while lending more support for legitimate business uses of data under the Act.

    Hosted by Forcepoint’s Nick Savvides, join this virtual fireside chat where our team of cyber security experts will decipher & deep-dive on the changes of the Act and our guest speaker, Lee Ser Yen, Partner, Cyber Security Consulting, KMPG will share from a consultant’s perspective on what your organisation needs to do to respond to the changes and offers tips & takeaways on your critical data privacy initiatives.

    The session will also include a demonstration and discussion by Brandon Tan, Sales Engineering Director for Forcepoint, as he walks us through some practical tips and use-cases on how organizations can leverage technology to accelerate time-to-compliance of PDPA.
  • Human-Centred Security: Managing The Insider Threat Recorded: Feb 24 2021 43 mins
    Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint | Oz Alashe MBE, CEO, CybSafe
    The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally to compromise information assets. Managing the insider threat is arguably the biggest challenge in information security, with the majority of security incidents coming from a human source. A lack of understanding of behaviour, mismanagement of resources and an inability to measure the success of initiatives has contributed to the wider issue.

    Daniel Norman, Senior Solutions Analyst at the ISF is joined by Dr Margaret Cunningham, Principal Research Scientist for Human Behavior at Forcepoint, and Oz Alashe MBE, CEO at CybSafe to discuss the insider threat and the impact it has on cybersecurity.
  • The New Reality: Moving "Left of Breach" Recorded: Feb 23 2021 21 mins
    Myrna Soto, Chief Strategy & Trust Officer, Forcepoint | Mike Towers, CISO, Takeda Pharmaceutics
    In the era of the Unbound Enterprise, employees are working remotely as companies accelerate their timetables for cloud and business transformation. Cybersecurity teams must adapt just as quickly. Myrna Soto and Mike Towers explain how best-of-breed cybersecurity moves you left of breach by understanding risk and proactively preventing compromise.
  • How to Stay Ahead of Privacy and Compliance Regulations Recorded: Feb 17 2021 2 mins
    Petko Stoyanov, Chief Technology Officer, Forcepoint
    Start by securing critical and customer data in an increasingly remote and regulated world. Use compliance to enhance your security risk strategy and build customer trust to make security your competitive advantage.

    •Understand your global and industry data obligations
    •Get visibility of where, when, and how your data is used
    •Secure your customer AND employee data privacy
  • Safeguard Your Data with Risk-adaptive Protection Recorded: Feb 17 2021 4 mins
    Petko Stoyanov, Chief Technology Officer, Forcepoint
    See how behavioral intelligence can detect user and data risk proactively. Advance your data protection strategy to keep ahead of threats and enhance DLP effectiveness with behavioral analytics.

    •Individualized adaptive data policies
    •Data discovery and classification
    •Maximize security analyst efficiency
  • Enhance Your Security with User Activity Monitoring Recorded: Feb 17 2021 4 mins
    Petko Stoyanov, Chief Technology Officer, Forcepoint
    Proactively detect high-risk behaviors and compromised access in organizations, large or small. Uncover insider risk at the earliest point of detection and stop critical data loss instantly through real-time, behavioral-centric policy enforcement.

    •Identify and mitigate risky behaviors from compromised users
    •Detect risk "left of loss" with comprehensive risk scoring
    •Investigate risk from insiders with efficiency and ease
  • Chief Risk Officer: Security's Next Leader Recorded: Feb 10 2021 27 mins
    Nico Fischbach, Global CTO, Forcepoint; Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica
    One of the few success stories of 2020 was the cementing of security as a key business function. CISOs and their teams worked intensely to both secure the business as its teams went remote overnight and strategically thereafter to keep a now disparate workforce protected. If there was a trend emerging of security having more visibility at board-level, COVID-19 accelerated it. Does that then also mean a new seat at the table for a Chief Risk Officer?

    Emma Sinden moderated a debate to answer that very question as Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica; Nico Fischbach, Global CTO, Forcepoint; and Brian Brackenborough, CISO, Channel 4, pondered on who would be the right person to manage risk, IT and security in the future.
  • Enhance Your Microsoft Azure Security Posture Recorded: Jan 6 2021 38 mins
    Ankur Chadda, Principal Solutions Manager, Forcepoint | Mattia Maggioli, Strategic Tech Partner Integrations, Forcepoint
    In today’s remote working environment, there is a need to securely access data anywhere – but the more we enable our employees the greater the security risk we are exposed to. Technological advancements like SASE architectures and Zero Trust approaches look to provide a dynamic response to risk through continually reviewing where, when, how and who is accessing data.

    In this webcast we explore how Forcepoint’s integrations with Microsoft Azure can give you the visibility and context behind your data interactions to make managing that risk possible. We share:

    - Why an understanding of your data is key to securing your organization

    - An overview of 10 Forcepoint security solution integrations with the Azure ecosystem

    - A short use case demonstration of integrating Forcepoint Behavioral Analytics and how it impacts user risk score and dynamic policies

    EUROPE time: https://www.brighttalk.com/webcast/15683/462416
    APAC time: https://www.brighttalk.com/webcast/15683/462418
  • Breach Detection: Becoming as Agile as The Attackers Recorded: Dec 23 2020 23 mins
    Myrna Soto, Chief Strategy and Trust Officer, Forcepoint & Nick Kael, Chief Technology Officer, Ericom
    Hear two leading cyber security strategists – Myrna Soto and Nick Kael - discuss how the significantly altered business world has caused a focus shift from disaster recovery to business continuity and the impact this has on security.

    Find out how the ever-changing attack surface and opportunistic approach of cyber criminals is causing the security strategy to become dynamic, considering users as the new perimeter, and embracing SASE architectures, to give better visibility and management for the security analyst whilst enabling the user and business to work without hindrance.
  • Best Practices for Avoiding a Data Breach Recorded: Dec 22 2020 24 mins
    Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
    New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.

    Watch now to learn:
    - Challenges of securing data moving between on-prem and the cloud
    - Tips and takeaways from data-secure companies
    - Technologies they’ve used to prevent breaches
  • IOBs; A New Predictive Approach to Cybersecurity Recorded: Dec 16 2020 23 mins
    Alan Ross, Fellow and Chief Architect at X-Labs in Forcepoint and Sarah Radin Product Marketing Manager
    Indicator of Behavior (IOB) FAQs:
    Insider breaches can be extremely costly for organizations and most aren’t even aware of a breach until well after it occurs. Forcepoint’s Indicators of Behavior (IOBs), a new predictive approach to cybersecurity, changes the paradigm by allowing organizations to identify and understand when users are trending towards risk… and stop them before a breach occurs. In this session, you will learn: - What IOBs are, and how they are used to stop breaches
    - How risk scoring is assessed and managed
    - Real world examples of IOBs in action
  • Making the Most of Data Loss Prevention Technology Recorded: Dec 8 2020 34 mins
    Carl Eberling, CIO, Forcepoint | Eric Jackson, Vice President, General Manager User & Data Protection, Forcepoint
    Data Loss Prevention (DLP) technology has been with us for many years and is now part of the common security defences employed by organizations. But today’s Enterprise DLP is anything but standard, having evolved many new and advanced capabilities that put it at the heart of a data protection strategy.

    In this discussion we examine:
    - How these new functionalities can help us address the challenges of the new working landscape
    - How to accelerate your strategy and re-think what is possible
  • A Technical Blueprint for Data Protection Recorded: Nov 25 2020 36 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Robert Mechler, Principal Security Strategist, Forcepoint
    Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential.

    In this webcast, Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.

    Key learnings include:

    - How the move to cloud is making data protection harder
    - How to identify where your critical data is, the channels it flows through and establish an incident response plan
    - How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
    - How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
Securing your data in today’s workplace
Today, organizations face the challenge of protecting their critical data and IP whilst enabling the modern work anywhere environments of a cloud-first world. Equally organizations now face a myriad of regulations like GDPR that require strict governance over the data they hold and how it is used. In this channel we discuss the best way to address these challenges helping you to modernize your data protection and confidently get to compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Security Can’t Be Black or White
  • Live at: Apr 15 2020 4:00 pm
  • Presented by: Ankur Chadda, Senior Solution Manager
  • From:
Your email has been sent.
or close