Hi [[ session.user.profile.firstName ]]

Data Security Can’t Be Black or White

Join Forcepoint's Ankur Chadda as he provides an overview of the challenges with traditional data protection solutions. Learn how to address those challenges head onto effectively modernize your data protection strategy.

You’ll leave this webinar with:

- A comprehensive overview of the technical and business challenges associated with legacy data protection.

- Insight into how mobile and remote workers, in a cloud-enabled environment, can complicate oversight and compliance

- Actionable solutions for adding visibility and control to your data protection strategy
Recorded Apr 15 2020 14 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ankur Chadda, Senior Solution Manager
Presentation preview: Data Security Can’t Be Black or White

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best Practices for Avoiding a Data Breach Oct 1 2020 8:00 am UTC 24 mins
    Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
    New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.

    Watch now to learn:
    - Challenges of securing data moving between on-prem and the cloud
    - Tips and takeaways from data-secure companies
    - Technologies they’ve used to prevent breaches
  • Breach Detection: Becoming as Agile as The Attackers Recorded: Aug 20 2020 23 mins
    Myrna Soto, Chief Strategy and Trust Officer, Forcepoint & Nick Kael, Chief Technology Officer, Ericom
    Hear two leading cyber security strategists – Myrna Soto and Nick Kael - discuss how the significantly altered business world has caused a focus shift from disaster recovery to business continuity and the impact this has on security.

    Find out how the ever-changing attack surface and opportunistic approach of cyber criminals is causing the security strategy to become dynamic, considering users as the new perimeter, and embracing SASE architectures, to give better visibility and management for the security analyst whilst enabling the user and business to work without hindrance.
  • Cybersecurity Threat Detection and Prevention Recorded: Aug 17 2020 61 mins
    Jo Peterson | Adi Pradeep | Brad Moldenhauer | Dr. Richard Ford | Homayun Yaqub
    Cyberthreats are viewed as a significant risk to organizations. They are capable of disrupting core operations and inflicting serious damage to brands and reputations.

    A study by Cybersecurity Ventures predicts these crimes will cost the world $6 trillion a year by 2021.

    Join this panel discussion to:
    - Review today’s expansive attack surface and the various ways bad actors penetrate networks
    - Discuss existing and emerging cyber threats
    - Understand policies, tools and best practices used to protect organizations as new threats emerge
    - Explore the roles that user training and education, skill development and governance play in defending against threats

    Panel:
    Jo Peterson, VP Cloud & Security Services, Clarify360 (moderator)
    Adarsh "Adi" Pradeep, Cybersecurity Consultant
    Brad Moldenhauer, CISO, Americas, Zscaler
    Dr. Richard Ford, CTO, Cyren
    Homayun Yaqub, Global Security Strategist, Forcepoint
  • Simplifying Security Controls Recorded: Aug 6 2020 44 mins
    Martin Sugden, CEO, Boldon James & Ankur Chadda, Sr. Solutions Manager Data Protection, Forcepoint
    In the 2nd part of the virtual series, the Boldon James and Forcepoint experts will discuss how to simplify security controls.

    Organisations are revisiting the way they manage and protect their data, adopting a more strategic perspective than ever before. As they undergo digital transformation, store vast volumes of data and contend with regulatory requirements, many businesses seek parallel protection and labelling solutions for effective control.

    Ankur and Martin will reveal how, by pairing Forcepoint DLP and Boldon James Data Classification, you can achieve better business outcomes for your organisation.

    Key Learning Outcomes:

    - Gaining visibility of data within changing environments and workflows
    - How to move from a static to a dynamic approach to policy enforcement
    - Understand how a simple process of clicks, dialogues and business taxonomy reduces frustration and supports business integrity
  • Committing to Data Privacy Recorded: Aug 5 2020 39 mins
    Enza Iannopollo, Senior Analyst, Forrester & Tamarian Del Conte Sr. Solutions Manager, Forcepoint
    Committing to Privacy is the topic in Part 1 of this two-part virtual series. The guest speaker is Forrester analyst Enza Iannopollo, who will be joined by Forcepoint and Boldon James experts for a Q&A panel.

    Privacy management cannot be the sole responsibility of regulators but is also dependent on the capacity of regulated entities, including customers, partners, and employees, to comply. Enza will talk about why organizations should move into a sustained compliance mode to ensure consistent data protection is achieved.

    Key Learning Outcomes:

    - How customer actions indicate that we should not think about privacy just in terms of regulations and fines
    - Where trusted enterprises stand when it comes to embedding privacy protection measures in day-to-day business
    - Facing the challenges of constantly evolving automation technologies
  • Forcepoint and Microsoft AIP - Automating Data Protection for Cloud Transition. Recorded: Aug 4 2020 37 mins
    Ankur Chadda, Sr. Solutions Manager, Forcepoint & Kartik Kanakasabesan, Principal PM Manager, Microsoft
    Learn how Forcepoint and Microsoft are working together to help organizations protect sensitive data in their hybrid environments. In this webinar, we will discuss:
    - How digital transformation is driving workloads to the cloud
    - Forcepoint and Microsoft integration compatibilities
    - How to automate the identification, classification, and protection of critical business data
  • Risk Management - Managing Conduct Risk in Evolving Work Environments Recorded: Jul 28 2020 26 mins
    Homayun Yaqub, Global Security Strategist, Forcepoint & Charles Keane, Global Security Specialist, Forcepoint
    Do you understand your organization’s overall risk environment? Conduct risk refers to the risk associated with decisions and behaviours of employees and whether they support proper customer outcomes and are fully integrated into the broader framework for risk management within an organization.

    During this webinar, Risk Management: Managing Conduct Risk in Evolving Work Environments, learn how to develop a holistic understanding of behaviour and use continuous monitoring to access and protect against risk.

    Learn about the nuances of risk intelligence and:

    - Understand how traditional monitoring and surveillance approaches are incomplete
    - Improve organizational efficacy by better aligning compliance and security objectives
    - Get a real-world example of how to build a picture of conduct risk
    - Establish a people and data centric approach to evolve the organization’s security strategy to more effectively reduce risk exposure.
  • Forcepoint and Microsoft AIP: Automating Data Protection for Cloud Transition Recorded: Jul 8 2020 37 mins
    Ankur Chadda, Sr. Solutions Manager, Forcepoint & Kartik Kanakasabesan, Principal PM Manager, Microsoft
    Learn how Forcepoint and Microsoft are working together to help organizations protect sensitive data in their hybrid environments. In this webinar, we will discuss:
    - How digital transformation is driving workloads to the cloud
    - Forcepoint and Microsoft integration compatibilities
    - How to automate the identification, classification, and protection of critical business data
  • Exploring Management's Views To Enterprise Cyber-Risk In Today's Landscape Recorded: Jul 7 2020 55 mins
    Kenny Yeo, Frost & Sullivan & William Tam, Forcepoint
    The ways in which organizations operate are rapidly changing. Enterprises are quickly adapting their digital transformation journey to meet shifting business requirements. IT teams are moving at light speed to empower employees to work remotely; on a variety of devices, on multiple networks and within a multitude of cloud applications, which has ultimately expanded an enterprises’ threat surface.

    So, what is Management’s views of cyber-risk in today’s current climate? And, how can organizations ensure their customer-centric focus remains core, while protecting employees, protecting data from risk, ensuring compliance and addressing the crucial human factor?

    Join this informative webinar organized with Frost & Sullivan that will reveal key data from a recent risk and cybersecurity survey. Also showcased will be a strategy to evolve an infrastructure-centric cybersecurity model to a human-centric, risk-based approach.
  • Simplifying Security Controls Recorded: Jul 2 2020 44 mins
    Martin Sugden, CEO, Boldon James & Ankur Chadda, Sr. Solutions Manager Data Protection, Forcepoint
    In the 2nd part of the virtual series, the Boldon James and Forcepoint experts will discuss how to simplify security controls.

    Organisations are revisiting the way they manage and protect their data, adopting a more strategic perspective than ever before. As they undergo digital transformation, store vast volumes of data and contend with regulatory requirements, many businesses seek parallel protection and labelling solutions for effective control.

    Ankur and Martin will reveal how, by pairing Forcepoint DLP and Boldon James Data Classification, you can achieve better business outcomes for your organisation.

    Key Learning Outcomes:

    - Gaining visibility of data within changing environments and workflows
    - How to move from a static to a dynamic approach to policy enforcement
    - Understand how a simple process of clicks, dialogues and business taxonomy reduces frustration and supports business integrity
  • Committing to Data Privacy Recorded: Jul 1 2020 39 mins
    Enza Iannopollo, Senior Analyst, Forrester & Tamarian Del Conte Sr. Solutions Manager, Forcepoint
    Committing to Privacy is the topic in Part 1 of this two-part virtual series. The guest speaker is Forrester analyst Enza Iannopollo, who will be joined halfway through the session by Forcepoint and Boldon James experts during a Q&A panel.

    Privacy management cannot be the sole responsibility of regulators, but is also dependent on the capacity of regulated entities, including customers, partners and employees, to comply.

    Enza will talk about why organisations have to move into a sustained compliance mode to ensure consistent data protection is achieved.

    Key Learning Outcomes:

    - How customer actions indicate that we should not think about privacy just in terms of regulations and fines
    - Where trusted enterprises stand when it comes to embedding privacy protection measures in day-to-day business
    - Facing the challenges of constantly evolving automation technologies
  • Risk Management: Managing Conduct Risk in Evolving Work Environments Recorded: Jun 24 2020 26 mins
    Homayun Yaqub, Global Security Strategist, Forcepoint & Charles Keane, Global Security Specialist, Forcepoint
    Do you understand your organization’s overall risk environment? Conduct risk refers to the risk associated with decisions and behaviours of employees and whether they support proper customer outcomes and are fully integrated into the broader framework for risk management within an organization.

    During this webinar, Risk Management: Managing Conduct Risk in Evolving Work Environments, learn how to develop a holistic understanding of behaviour and use continuous monitoring to access and protect against risk.

    Learn about the nuances of risk intelligence and:

    o Understand how traditional monitoring and surveillance approaches are incomplete
    o Improve organizational efficacy by better aligning compliance and security objectives
    o Get a real-world example of how to build a picture of conduct risk
    o Establish a people and data centric approach to evolve the organization’s security strategy to more effectively reduce risk exposure.
  • Integrating with Microsoft Information Protection, Boldon James Recorded: Jun 17 2020 22 mins
    Mark Bloemsma, Consulting Sales Engineer, Forcepoint
    Efficient and reliable data classification is an essential part of helping businesses achieve their goals – including maintaining regulatory compliance standards.

    When you are able to identify and classify valuable data, business value increases and data management costs decrease. In this webinar, Playing Nicely with Others Part II: Microsoft Information Protection, with Boldon James, learn about all things classification including:

    •The “how” and “why” of data classification
    •An overview of Microsoft Information Protection (MIP)
    •The architecture that integrates Forcepoint & MIP
    •Actionable integration use cases
  • The Voice of the CPO: The Case for Moving Left of Breach Recorded: May 20 2020 25 mins
    Nico Popp, Chief Product Officer, Forcepoint
    A trillion dollars spent on perimeter protection is clearly not effective in securing organisations against breaches. The inspiring Nico Popp elucidates the need to move from outside-in to inside-out security on a whiteboard. You will learn:

    - What every security practitioner will be encountering in the not so distant future
    - Where the limits of endpoint, network, cloud or email security lie
    - Why the most successful strategies involve a focus on people
  • Cloud Data Protection Strategies and Trends, with ESG Analyst John Grady Recorded: May 13 2020 43 mins
    John Grady, ESG Analyst Cybersecurity & Ankur Chadda, Senior Solutions Manager, Forcepoint
    Every organization, large or small, is in the midst of a digital transformation. Part of that includes the adoption of cloud apps that give employees increased freedom, flexibility and efficiency. For this reason, cloud data security has become increasingly critical. As more cloud apps are added, security teams struggle to match the increasingly complex environment with an equally adaptive data protection strategy.

    Instead of being bogged down by false alerts and left vulnerable by an unbalanced strategy, security practitioners need to adjust their data protection mentality and approach. By revaluating data protection strategies, organization can ensure that security is not outpaced by digital transformation.

    Attend this webinar to learn more on these topics from analyst, John Grady (ESG), as he shares insights based on an extensive survey.
  • Voice of the CPO: The Case for Moving Left of Breach Recorded: Apr 29 2020 26 mins
    Nico Popp, Chief Product Officer, Forcepoint
    A trillion dollars spent on perimeter protection is clearly not effective in securing organisations against breaches. The inspiring Nico Popp elucidates the need to move from outside-in to inside-out security on a whiteboard. You will learn:

    - What every security practitioner will be encountering in the not so distant future
    - Where the limits of endpoint, network, cloud or email security lie
    - Why the most successful strategies involve a focus on people
  • Modern Strategies for Protecting Users and Data in a Borderless World Recorded: Apr 28 2020 38 mins
    Homayun Yaqub, Sr Director of Security Strategy, Forcepoint Robert Mechler, Principal Security Strategist, Forcepoint
    Modern cybersecurity requires a mindset change. Attackers are compromising access, guaranteed. Understanding the behavior of users interacting with data is the modern attackers’ kryptonite.

    This session will deliver six strategies to implement today, with the intent to
    - create efficiencies and enhance proactive security effectiveness
    - remain flexible to anticipate and manage the ever-dynamic threat landscape
  • Forward-looking Security in Finance Recorded: Apr 28 2020 27 mins
    James Wilde, User Protection Strategist, Forcepoint | William Beer, Managing Partner, HB Advisory
    Along with stiff requirements for data security compliance, financial institutions face intense scrutiny from customers, regulators and shareholders. Every day can bring its own risk of damaged reputation and material loss.

    James Wilde has managed information security and risk in banking for a number of years. He now shares his vast experience and hands-on knowledge that have also shaped his vision of cybersecurity in the future.
  • Data Security Can’t Be Black or White Recorded: Apr 15 2020 14 mins
    Ankur Chadda, Senior Solution Manager
    Join Forcepoint's Ankur Chadda as he provides an overview of the challenges with traditional data protection solutions. Learn how to address those challenges head onto effectively modernize your data protection strategy.

    You’ll leave this webinar with:

    - A comprehensive overview of the technical and business challenges associated with legacy data protection.

    - Insight into how mobile and remote workers, in a cloud-enabled environment, can complicate oversight and compliance

    - Actionable solutions for adding visibility and control to your data protection strategy
  • From Reactive to Proactive Data Protection Recorded: Mar 4 2020 19 mins
    Dr. Chris Boorman, Security Evangelist, Forcepoint & Mike Smart, Director Product Marketing, Forcepoint
    In today’s world, organizations typically audit data access and use rather than enforcing protection policies. As a result, security teams spend their energy investigating data incidents, identifying breaches and cleaning up after the incident. But with a greater focus on how organizations are protecting data and responding to regulations, can we move to a world where we actually stop data breaches from occurring but without impacting the productivity of the workforce?

    In this session, Security Evangelist Chris Boorman and Director of Product Marketing Mike Smart, analyze this challenge using the Data Protection Maturity Curve and map how organizations can move from the Data Swamp, through Visibility and Analysis to a state of Proactive Automation.

    How valuable is your data? Watch our video discussion and learn how you can move your organization along the maturity curve.
Securing your data in today’s workplace
Today, organizations face the challenge of protecting their critical data and IP whilst enabling the modern work anywhere environments of a cloud-first world. Equally organizations now face a myriad of regulations like GDPR that require strict governance over the data they hold and how it is used. In this channel we discuss the best way to address these challenges helping you to modernize your data protection and confidently get to compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Security Can’t Be Black or White
  • Live at: Apr 15 2020 4:00 pm
  • Presented by: Ankur Chadda, Senior Solution Manager
  • From:
Your email has been sent.
or close