Hi [[ session.user.profile.firstName ]]

Forward-looking Security in Finance

Along with stiff requirements for data security compliance, financial institutions face intense scrutiny from customers, regulators and shareholders. Every day can bring its own risk of damaged reputation and material loss.

James Wilde has managed information security and risk in banking for a number of years. He now shares his vast experience and hands-on knowledge that have also shaped his vision of cybersecurity in the future.
Recorded Apr 28 2020 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Wilde, User Protection Strategist, Forcepoint | William Beer, Managing Partner, HB Advisory
Presentation preview: Forward-looking Security in Finance

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protecting Data while Enabling Innovation: A View of Singapore Revised 2020 PDPA Mar 4 2021 3:00 am UTC 60 mins
    Nick Savvides, Forcepoint APAC - Lee Ser Yen, Cyber Security Consulting, KMPG - Brandon Tan, Forcepoint APAC
    Throughout 2020, we have continued to see serious data breaches affecting huge numbers of records, continuing to plague organisations such as RedMart and Eatigo. The Singapore Government has recently made amendments to strengthen the Personal Data Protection Act (PDPA), with these changes coming into force in November this year, they will impose heavier fines for data breaches, while lending more support for legitimate business uses of data under the Act.

    Hosted by Forcepoint’s Nick Savvides, join this virtual fireside chat where our team of cyber security experts will decipher & deep-dive on the changes of the Act and our guest speaker, Lee Ser Yen, Partner, Cyber Security Consulting, KMPG will share from a consultant’s perspective on what your organisation needs to do to respond to the changes and offers tips & takeaways on your critical data privacy initiatives.

    The session will also include a demonstration and discussion by Brandon Tan, Sales Engineering Director for Forcepoint, as he walks us through some practical tips and use-cases on how organizations can leverage technology to accelerate time-to-compliance of PDPA.
  • AMERICAS: Human-Centred Security: Managing The Insider Threat Recorded: Feb 24 2021 43 mins
    Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint | Oz Alashe MBE, CEO, CybSafe
    The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally to compromise information assets. Managing the insider threat is arguably the biggest challenge in information security, with the majority of security incidents coming from a human source. A lack of understanding of behaviour, mismanagement of resources and an inability to measure the success of initiatives has contributed to the wider issue.

    Daniel Norman, Senior Solutions Analyst at the ISF is joined by Dr Margaret Cunningham, Principal Research Scientist for Human Behavior at Forcepoint, and Oz Alashe MBE, CEO at CybSafe to discuss the insider threat and the impact it has on cybersecurity.
  • EUROPE: Human-Centred Security: Managing The Insider Threat Recorded: Feb 24 2021 43 mins
    Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint | Oz Alashe MBE, CEO, CybSafe
    The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally to compromise information assets. Managing the insider threat is arguably the biggest challenge in information security, with the majority of security incidents coming from a human source. A lack of understanding of behaviour, mismanagement of resources and an inability to measure the success of initiatives has contributed to the wider issue.

    Daniel Norman, Senior Solutions Analyst at the ISF is joined by Dr Margaret Cunningham, Principal Research Scientist for Human Behavior at Forcepoint, and Oz Alashe MBE, CEO at CybSafe to discuss the insider threat and the impact it has on cybersecurity.
  • APAC: Human-Centred Security: Managing The Insider Threat Recorded: Feb 24 2021 43 mins
    Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint | Oz Alashe MBE, CEO, CybSafe
    The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally to compromise information assets. Managing the insider threat is arguably the biggest challenge in information security, with the majority of security incidents coming from a human source. A lack of understanding of behaviour, mismanagement of resources and an inability to measure the success of initiatives has contributed to the wider issue.

    Daniel Norman, Senior Solutions Analyst at the ISF is joined by Dr Margaret Cunningham, Principal Research Scientist for Human Behavior at Forcepoint, and Oz Alashe MBE, CEO at CybSafe to discuss the insider threat and the impact it has on cybersecurity.
  • The New Reality: Moving "Left of Breach" Recorded: Feb 23 2021 21 mins
    Myrna Soto, Chief Strategy & Trust Officer, Forcepoint | Mike Towers, CISO, Takeda Pharmaceutics
    In the era of the Unbound Enterprise, employees are working remotely as companies accelerate their timetables for cloud and business transformation. Cybersecurity teams must adapt just as quickly. Myrna Soto and Mike Towers explain how best-of-breed cybersecurity moves you left of breach by understanding risk and proactively preventing compromise.
  • How to Stay Ahead of Privacy and Compliance Regulations Recorded: Feb 17 2021 2 mins
    Petko Stoyanov, Chief Technology Officer, Forcepoint
    Start by securing critical and customer data in an increasingly remote and regulated world. Use compliance to enhance your security risk strategy and build customer trust to make security your competitive advantage.

    •Understand your global and industry data obligations
    •Get visibility of where, when, and how your data is used
    •Secure your customer AND employee data privacy
  • Safeguard Your Data with Risk-adaptive Protection Recorded: Feb 17 2021 4 mins
    Petko Stoyanov, Chief Technology Officer, Forcepoint
    See how behavioral intelligence can detect user and data risk proactively. Advance your data protection strategy to keep ahead of threats and enhance DLP effectiveness with behavioral analytics.

    •Individualized adaptive data policies
    •Data discovery and classification
    •Maximize security analyst efficiency
  • Enhance Your Security with User Activity Monitoring Recorded: Feb 17 2021 4 mins
    Petko Stoyanov, Chief Technology Officer, Forcepoint
    Proactively detect high-risk behaviors and compromised access in organizations, large or small. Uncover insider risk at the earliest point of detection and stop critical data loss instantly through real-time, behavioral-centric policy enforcement.

    •Identify and mitigate risky behaviors from compromised users
    •Detect risk "left of loss" with comprehensive risk scoring
    •Investigate risk from insiders with efficiency and ease
  • AMERICAS: Chief Risk Officer: Security's Next Leader Recorded: Feb 10 2021 27 mins
    Nico Fischbach, Global CTO, Forcepoint; Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica
    One of the few success stories of 2020 was the cementing of security as a key business function. CISOs and their teams worked intensely to both secure the business as its teams went remote overnight and strategically thereafter to keep a now disparate workforce protected. If there was a trend emerging of security having more visibility at board-level, COVID-19 accelerated it. Does that then also mean a new seat at the table for a Chief Risk Officer?

    Emma Sinden moderated a debate to answer that very question as Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica; Nico Fischbach, Global CTO, Forcepoint; and Brian Brackenborough, CISO, Channel 4, pondered on who would be the right person to manage risk, IT and security in the future.
  • EUROPE: Chief Risk Officer: Security's Next Leader Recorded: Feb 10 2021 27 mins
    Nico Fischbach, Global CTO, Forcepoint; Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica
    One of the few success stories of 2020 was the cementing of security as a key business function. CISOs and their teams worked intensely to both secure the business as its teams went remote overnight and strategically thereafter to keep a now disparate workforce protected. If there was a trend emerging of security having more visibility at board-level, COVID-19 accelerated it. Does that then also mean a new seat at the table for a Chief Risk Officer?

    Emma Sinden moderated a debate to answer that very question as Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica; Nico Fischbach, Global CTO, Forcepoint; and Brian Brackenborough, CISO, Channel 4, pondered on who would be the right person to manage risk, IT and security in the future.
  • APAC: Chief Risk Officer: Security's Next Leader Recorded: Feb 10 2021 27 mins
    Nico Fischbach, Global CTO, Forcepoint; Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica
    One of the few success stories of 2020 was the cementing of security as a key business function. CISOs and their teams worked intensely to both secure the business as its teams went remote overnight and strategically thereafter to keep a now disparate workforce protected. If there was a trend emerging of security having more visibility at board-level, COVID-19 accelerated it. Does that then also mean a new seat at the table for a Chief Risk Officer?

    Emma Sinden moderated a debate to answer that very question as Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica; Nico Fischbach, Global CTO, Forcepoint; and Brian Brackenborough, CISO, Channel 4, pondered on who would be the right person to manage risk, IT and security in the future.
  • Enhance Your Microsoft Azure Security Posture Recorded: Jan 6 2021 38 mins
    Ankur Chadda, Principal Solutions Manager, Forcepoint | Mattia Maggioli, Strategic Tech Partner Integrations, Forcepoint
    In today’s remote working environment, there is a need to securely access data anywhere – but the more we enable our employees the greater the security risk we are exposed to. Technological advancements like SASE architectures and Zero Trust approaches look to provide a dynamic response to risk through continually reviewing where, when, how and who is accessing data.

    In this webcast we explore how Forcepoint’s integrations with Microsoft Azure can give you the visibility and context behind your data interactions to make managing that risk possible. We share:

    - Why an understanding of your data is key to securing your organization

    - An overview of 10 Forcepoint security solution integrations with the Azure ecosystem

    - A short use case demonstration of integrating Forcepoint Behavioral Analytics and how it impacts user risk score and dynamic policies

    EUROPE time: https://www.brighttalk.com/webcast/15683/462416
    APAC time: https://www.brighttalk.com/webcast/15683/462418
  • Breach Detection: Becoming as Agile as The Attackers Recorded: Dec 23 2020 23 mins
    Myrna Soto, Chief Strategy and Trust Officer, Forcepoint & Nick Kael, Chief Technology Officer, Ericom
    Hear two leading cyber security strategists – Myrna Soto and Nick Kael - discuss how the significantly altered business world has caused a focus shift from disaster recovery to business continuity and the impact this has on security.

    Find out how the ever-changing attack surface and opportunistic approach of cyber criminals is causing the security strategy to become dynamic, considering users as the new perimeter, and embracing SASE architectures, to give better visibility and management for the security analyst whilst enabling the user and business to work without hindrance.
  • Best Practices for Avoiding a Data Breach Recorded: Dec 22 2020 24 mins
    Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
    New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.

    Watch now to learn:
    - Challenges of securing data moving between on-prem and the cloud
    - Tips and takeaways from data-secure companies
    - Technologies they’ve used to prevent breaches
  • IOBs; A New Predictive Approach to Cybersecurity Recorded: Dec 16 2020 23 mins
    Alan Ross, Fellow and Chief Architect at X-Labs in Forcepoint and Sarah Radin Product Marketing Manager
    Indicator of Behavior (IOB) FAQs:
    Insider breaches can be extremely costly for organizations and most aren’t even aware of a breach until well after it occurs. Forcepoint’s Indicators of Behavior (IOBs), a new predictive approach to cybersecurity, changes the paradigm by allowing organizations to identify and understand when users are trending towards risk… and stop them before a breach occurs. In this session, you will learn: - What IOBs are, and how they are used to stop breaches
    - How risk scoring is assessed and managed
    - Real world examples of IOBs in action
  • Making the Most of Data Loss Prevention Technology Recorded: Dec 8 2020 34 mins
    Carl Eberling, CIO, Forcepoint | Eric Jackson, Vice President, General Manager User & Data Protection, Forcepoint
    Data Loss Prevention (DLP) technology has been with us for many years and is now part of the common security defences employed by organizations. But today’s Enterprise DLP is anything but standard, having evolved many new and advanced capabilities that put it at the heart of a data protection strategy.

    In this discussion we examine:
    - How these new functionalities can help us address the challenges of the new working landscape
    - How to accelerate your strategy and re-think what is possible
  • A Technical Blueprint for Data Protection Recorded: Nov 25 2020 36 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Robert Mechler, Principal Security Strategist, Forcepoint
    Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential.

    In this webcast, Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.

    Key learnings include:

    - How the move to cloud is making data protection harder
    - How to identify where your critical data is, the channels it flows through and establish an incident response plan
    - How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
    - How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
  • Get the best from DLP Recorded: Nov 11 2020 34 mins
    Carl Eberling, CIO, Forcepoint | Eric Jackson, Vice President, General Manager User & Data Protection, Forcepoint
    Strengthen your strategy with these new features

    Data Loss Prevention (DLP) technology has been with us for many years and is now part of the common security defences employed by organizations. But today’s Enterprise DLP is anything but standard, having evolved many new and advanced capabilities that put it at the heart of a data protection strategy.

    In this discussion we examine how these new functionalities can help us address the challenges of the new working landscape, accelerate your strategy and re-think what is possible.
  • Bringing the Zero Trust Mindset to Data Protection Recorded: Nov 4 2020 35 mins
    Nico Popp, Chief Product Officer, Forcepoint | Sean Sweeney, Chief Security Advisor, Microsoft
    The traditional approach to data security is increasingly inadequate. Old solutions introduce too much business friction, yet they still fall short when it comes to preventing data exfiltration. We need to approach data protection differently to make tools like DLP, encryption, and tokenization more responsive to the security needs of the decentralized, cloud-driven workplace.

    Introducing the core concepts of Zero Trust to your data protection posture ensures that all people in your organization are continuously being authenticated and authorized to have access to applications and data. A successful Zero Trust approach leverages dynamic, proactive, ongoing user risk assessment based on behavioral analytics to consistently prevent data breaches, while enhancing productivity rather than hindering it.

    In this session, you’ll learn more about bolstering data security with the Zero Trust mindset, including:
    - How Zero Trust and behavioral analytics can maximize the effectiveness of data protection solutions for increasingly mobile and remote workforces
    - How data security traveling with data (like fingerprinting) can help in today’s distributed environment
    - How security leaders are implementing these concepts in their environments and solutions
  • Bringing the Zero Trust Mindset to Data Protection Recorded: Nov 4 2020 36 mins
    Nico Popp, Chief Product Officer, Forcepoint | Sean Sweeney, Chief Security Advisor, Microsoft
    The traditional approach to data security is increasingly inadequate. Old solutions introduce too much business friction, yet they still fall short when it comes to preventing data exfiltration. We need to approach data protection differently to make tools like DLP, encryption, and tokenization more responsive to the security needs of the decentralized, cloud-driven workplace.

    Introducing the core concepts of Zero Trust to your data protection posture ensures that all people in your organization are continuously being authenticated and authorized to have access to applications and data. A successful Zero Trust approach leverages dynamic, proactive, ongoing user risk assessment based on behavioral analytics to consistently prevent data breaches, while enhancing productivity rather than hindering it.

    In this session, you’ll learn more about bolstering data security with the Zero Trust mindset, including:
    - How Zero Trust and behavioral analytics can maximize the effectiveness of data protection solutions for increasingly mobile and remote workforces
    - How data security traveling with data (like fingerprinting) can help in today’s distributed environment
    - How security leaders are implementing these concepts in their environments and solutions
Securing your data in today’s workplace
Today, organizations face the challenge of protecting their critical data and IP whilst enabling the modern work anywhere environments of a cloud-first world. Equally organizations now face a myriad of regulations like GDPR that require strict governance over the data they hold and how it is used. In this channel we discuss the best way to address these challenges helping you to modernize your data protection and confidently get to compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Forward-looking Security in Finance
  • Live at: Apr 28 2020 11:00 am
  • Presented by: James Wilde, User Protection Strategist, Forcepoint | William Beer, Managing Partner, HB Advisory
  • From:
Your email has been sent.
or close