Exploring Management's Views To Enterprise Cyber-Risk In Today's Landscape
The ways in which organizations operate are rapidly changing. Enterprises are quickly adapting their digital transformation journey to meet shifting business requirements. IT teams are moving at light speed to empower employees to work remotely; on a variety of devices, on multiple networks and within a multitude of cloud applications, which has ultimately expanded an enterprises’ threat surface.
So, what is Management’s views of cyber-risk in today’s current climate? And, how can organizations ensure their customer-centric focus remains core, while protecting employees, protecting data from risk, ensuring compliance and addressing the crucial human factor?
Join this informative webinar organized with Frost & Sullivan that will reveal key data from a recent risk and cybersecurity survey. Also showcased will be a strategy to evolve an infrastructure-centric cybersecurity model to a human-centric, risk-based approach.
RecordedJul 7 202055 mins
Your place is confirmed, we'll send you email reminders
In today’s remote working environment, there is a need to securely access data anywhere – but the more we enable our employees the greater the security risk we are exposed to. Technological advancements like SASE architectures and Zero Trust approaches look to provide a dynamic response to risk through continually reviewing where, when, how and who is accessing data.
In this webcast we explore how Forcepoint’s integrations with Microsoft Azure can give you the visibility and context behind your data interactions to make managing that risk possible. We share:
- Why an understanding of your data is key to securing your organization
- An overview of 10 Forcepoint security solution integrations with the Azure ecosystem
- A short use case demonstration of integrating Forcepoint Behavioral Analytics and how it impacts user risk score and dynamic policies
EUROPE time: https://www.brighttalk.com/webcast/15683/462416
APAC time: https://www.brighttalk.com/webcast/15683/462418
In today’s remote working environment, there is a need to securely access data anywhere – but the more we enable our employees the greater the security risk we are exposed to. Technological advancements like SASE architectures and Zero Trust approaches look to provide a dynamic response to risk through continually reviewing where, when, how and who is accessing data.
In this webcast we explore how Forcepoint’s integrations with Microsoft Azure can give you the visibility and context behind your data interactions to make managing that risk possible. We share:
- Why an understanding of your data is key to securing your organization
- An overview of 10 Forcepoint security solution integrations with the Azure ecosystem
- A short use case demonstration of integrating Forcepoint Behavioral Analytics and how it impacts user risk score and dynamic policies
In today’s remote working environment, there is a need to securely access data anywhere – but the more we enable our employees the greater the security risk we are exposed to. Technological advancements like SASE architectures and Zero Trust approaches look to provide a dynamic response to risk through continually reviewing where, when, how and who is accessing data.
In this webcast we explore how Forcepoint’s integrations with Microsoft Azure can give you the visibility and context behind your data interactions to make managing that risk possible. We share:
- Why an understanding of your data is key to securing your organization
- An overview of 10 Forcepoint security solution integrations with the Azure ecosystem
- A short use case demonstration of integrating Forcepoint Behavioral Analytics and how it impacts user risk score and dynamic policies
AMERICAS time: https://www.forcepoint.com/resources/webcasts/how-forcepoint-enhances-your-microsoft-azure-security-posture
EUROPE time:
Myrna Soto, Chief Strategy and Trust Officer, Forcepoint & Nick Kael, Chief Technology Officer, Ericom
Hear two leading cyber security strategists – Myrna Soto and Nick Kael - discuss how the significantly altered business world has caused a focus shift from disaster recovery to business continuity and the impact this has on security.
Find out how the ever-changing attack surface and opportunistic approach of cyber criminals is causing the security strategy to become dynamic, considering users as the new perimeter, and embracing SASE architectures, to give better visibility and management for the security analyst whilst enabling the user and business to work without hindrance.
Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.
Watch now to learn:
- Challenges of securing data moving between on-prem and the cloud
- Tips and takeaways from data-secure companies
- Technologies they’ve used to prevent breaches
Alan Ross, Fellow and Chief Architect at X-Labs in Forcepoint and Sarah Radin Product Marketing Manager
Indicator of Behavior (IOB) FAQs:
Insider breaches can be extremely costly for organizations and most aren’t even aware of a breach until well after it occurs. Forcepoint’s Indicators of Behavior (IOBs), a new predictive approach to cybersecurity, changes the paradigm by allowing organizations to identify and understand when users are trending towards risk… and stop them before a breach occurs. In this session, you will learn: - What IOBs are, and how they are used to stop breaches
- How risk scoring is assessed and managed
- Real world examples of IOBs in action
Carl Eberling, CIO, Forcepoint | Eric Jackson, Vice President, General Manager User & Data Protection, Forcepoint
Data Loss Prevention (DLP) technology has been with us for many years and is now part of the common security defences employed by organizations. But today’s Enterprise DLP is anything but standard, having evolved many new and advanced capabilities that put it at the heart of a data protection strategy.
In this discussion we examine:
- How these new functionalities can help us address the challenges of the new working landscape
- How to accelerate your strategy and re-think what is possible
Ankur Chadda, Principal Data Protection Solutions Manager & Robert Mechler, Principal Security Strategist, Forcepoint
Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential.
In this webcast, Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.
Key learnings include:
- How the move to cloud is making data protection harder
- How to identify where your critical data is, the channels it flows through and establish an incident response plan
- How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
- How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
Carl Eberling, CIO, Forcepoint | Eric Jackson, Vice President, General Manager User & Data Protection, Forcepoint
Strengthen your strategy with these new features
Data Loss Prevention (DLP) technology has been with us for many years and is now part of the common security defences employed by organizations. But today’s Enterprise DLP is anything but standard, having evolved many new and advanced capabilities that put it at the heart of a data protection strategy.
In this discussion we examine how these new functionalities can help us address the challenges of the new working landscape, accelerate your strategy and re-think what is possible.
Nico Popp, Chief Product Officer, Forcepoint | Sean Sweeney, Chief Security Advisor, Microsoft
The traditional approach to data security is increasingly inadequate. Old solutions introduce too much business friction, yet they still fall short when it comes to preventing data exfiltration. We need to approach data protection differently to make tools like DLP, encryption, and tokenization more responsive to the security needs of the decentralized, cloud-driven workplace.
Introducing the core concepts of Zero Trust to your data protection posture ensures that all people in your organization are continuously being authenticated and authorized to have access to applications and data. A successful Zero Trust approach leverages dynamic, proactive, ongoing user risk assessment based on behavioral analytics to consistently prevent data breaches, while enhancing productivity rather than hindering it.
In this session, you’ll learn more about bolstering data security with the Zero Trust mindset, including:
- How Zero Trust and behavioral analytics can maximize the effectiveness of data protection solutions for increasingly mobile and remote workforces
- How data security traveling with data (like fingerprinting) can help in today’s distributed environment
- How security leaders are implementing these concepts in their environments and solutions
Nico Popp, Chief Product Officer, Forcepoint | Sean Sweeney, Chief Security Advisor, Microsoft
The traditional approach to data security is increasingly inadequate. Old solutions introduce too much business friction, yet they still fall short when it comes to preventing data exfiltration. We need to approach data protection differently to make tools like DLP, encryption, and tokenization more responsive to the security needs of the decentralized, cloud-driven workplace.
Introducing the core concepts of Zero Trust to your data protection posture ensures that all people in your organization are continuously being authenticated and authorized to have access to applications and data. A successful Zero Trust approach leverages dynamic, proactive, ongoing user risk assessment based on behavioral analytics to consistently prevent data breaches, while enhancing productivity rather than hindering it.
In this session, you’ll learn more about bolstering data security with the Zero Trust mindset, including:
- How Zero Trust and behavioral analytics can maximize the effectiveness of data protection solutions for increasingly mobile and remote workforces
- How data security traveling with data (like fingerprinting) can help in today’s distributed environment
- How security leaders are implementing these concepts in their environments and solutions
Nicolas Fischbach, Global CTO, Forcepoint & John Stringer, Director of Product Management, Forcepoint
How to know if you're ready for enterprise DLP
Data Loss Prevention (DLP) technology is now everywhere – you will often find it integrated in other security products like Web and Email Security, whilst many Cloud Aps will offer it as part of their service. But is it enough to rely on a myriad of providers to fulfill this critical security need?
In this discussion, we evaluate the data protection options against the needs of the business, including:
- The use cases for DLP; getting visibility of your data, securing critical data wherever it is and compliance
- How DLP can go from a blocker to a business enabler
- Why an Enterprise DLP solution is not necessarily a tool just for the big players
- Is integrated DLP really integrated OR isolated DLP?
Panel Discussion: Forcepoint in conjunction with Deloitte
2020 brought about a myriad of challenges to organisations across the globe, but none more so than need to rapidly digitally transform to cater for a new way of working. However, while the focus was on remote workforce projects, for many organisations, attention to data privacy and compliance requirements fell into second place.
Hosted by Forcepoint’s Nick Savvides, join a panel discussion where specialists from Deloitte will share real-world insights into the data privacy challenges APAC organisations are now facing as part of 2020’s digital evolution. They will discuss how local markets across the region responded to change and offer tips to revert organisational focus back onto critical data privacy initiatives.
Raffael Marty, Chief Research and Intelligence Officer
This short Cyber Security Crash Course will get you up to speed quickly on the topic. Indicators of behavior (IOB) consider the dynamic nature of users, in terms of how they access resources they need. You can deliver security without impacting user productivity.
Hear more from Chief Research and Intelligence Officer, Raffael Marty
Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.
Watch now to learn:
- Challenges of securing data moving between on-prem and the cloud
- Tips and takeaways from data-secure companies
- Technologies they’ve used to prevent breaches
Myrna Soto, Chief Strategy and Trust Officer, Forcepoint & Nick Kael, Chief Technology Officer, Ericom
Hear two leading cyber security strategists – Myrna Soto and Nick Kael - discuss how the significantly altered business world has caused a focus shift from disaster recovery to business continuity and the impact this has on security.
Find out how the ever-changing attack surface and opportunistic approach of cyber criminals is causing the security strategy to become dynamic, considering users as the new perimeter, and embracing SASE architectures, to give better visibility and management for the security analyst whilst enabling the user and business to work without hindrance.
Jo Peterson | Adi Pradeep | Brad Moldenhauer | Dr. Richard Ford | Homayun Yaqub
Cyberthreats are viewed as a significant risk to organizations. They are capable of disrupting core operations and inflicting serious damage to brands and reputations.
A study by Cybersecurity Ventures predicts these crimes will cost the world $6 trillion a year by 2021.
Join this panel discussion to:
- Review today’s expansive attack surface and the various ways bad actors penetrate networks
- Discuss existing and emerging cyber threats
- Understand policies, tools and best practices used to protect organizations as new threats emerge
- Explore the roles that user training and education, skill development and governance play in defending against threats
Panel:
Jo Peterson, VP Cloud & Security Services, Clarify360 (moderator)
Adarsh "Adi" Pradeep, Cybersecurity Consultant
Brad Moldenhauer, CISO, Americas, Zscaler
Dr. Richard Ford, CTO, Cyren
Homayun Yaqub, Global Security Strategist, Forcepoint
Martin Sugden, CEO, Boldon James & Ankur Chadda, Sr. Solutions Manager Data Protection, Forcepoint
In the 2nd part of the virtual series, the Boldon James and Forcepoint experts will discuss how to simplify security controls.
Organisations are revisiting the way they manage and protect their data, adopting a more strategic perspective than ever before. As they undergo digital transformation, store vast volumes of data and contend with regulatory requirements, many businesses seek parallel protection and labelling solutions for effective control.
Ankur and Martin will reveal how, by pairing Forcepoint DLP and Boldon James Data Classification, you can achieve better business outcomes for your organisation.
Key Learning Outcomes:
- Gaining visibility of data within changing environments and workflows
- How to move from a static to a dynamic approach to policy enforcement
- Understand how a simple process of clicks, dialogues and business taxonomy reduces frustration and supports business integrity
Committing to Privacy is the topic in Part 1 of this two-part virtual series. The guest speaker is Forrester analyst Enza Iannopollo, who will be joined by Forcepoint and Boldon James experts for a Q&A panel.
Privacy management cannot be the sole responsibility of regulators but is also dependent on the capacity of regulated entities, including customers, partners, and employees, to comply. Enza will talk about why organizations should move into a sustained compliance mode to ensure consistent data protection is achieved.
Key Learning Outcomes:
- How customer actions indicate that we should not think about privacy just in terms of regulations and fines
- Where trusted enterprises stand when it comes to embedding privacy protection measures in day-to-day business
- Facing the challenges of constantly evolving automation technologies
Ankur Chadda, Sr. Solutions Manager, Forcepoint & Kartik Kanakasabesan, Principal PM Manager, Microsoft
Learn how Forcepoint and Microsoft are working together to help organizations protect sensitive data in their hybrid environments. In this webinar, we will discuss:
- How digital transformation is driving workloads to the cloud
- Forcepoint and Microsoft integration compatibilities
- How to automate the identification, classification, and protection of critical business data
Today, organizations face the challenge of protecting their critical data and IP whilst enabling the modern work anywhere environments of a cloud-first world. Equally organizations now face a myriad of regulations like GDPR that require strict governance over the data they hold and how it is used. In this channel we discuss the best way to address these challenges helping you to modernize your data protection and confidently get to compliance.
Exploring Management's Views To Enterprise Cyber-Risk In Today's LandscapeKenny Yeo, Frost & Sullivan & William Tam, Forcepoint[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]55 mins