In the 2nd part of the virtual series, the Boldon James and Forcepoint experts will discuss how to simplify security controls.
Organisations are revisiting the way they manage and protect their data, adopting a more strategic perspective than ever before. As they undergo digital transformation, store vast volumes of data and contend with regulatory requirements, many businesses seek parallel protection and labelling solutions for effective control.
Ankur and Martin will reveal how, by pairing Forcepoint DLP and Boldon James Data Classification, you can achieve better business outcomes for your organisation.
Key Learning Outcomes:
- Gaining visibility of data within changing environments and workflows
- How to move from a static to a dynamic approach to policy enforcement
- Understand how a simple process of clicks, dialogues and business taxonomy reduces frustration and supports business integrity
RecordedJul 2 202044 mins
Your place is confirmed, we'll send you email reminders
Nick Savvides, Forcepoint APAC - Lee Ser Yen, Cyber Security Consulting, KMPG - Brandon Tan, Forcepoint APAC
Throughout 2020, we have continued to see serious data breaches affecting huge numbers of records, continuing to plague organisations such as RedMart and Eatigo. The Singapore Government has recently made amendments to strengthen the Personal Data Protection Act (PDPA), with these changes coming into force in November this year, they will impose heavier fines for data breaches, while lending more support for legitimate business uses of data under the Act.
Hosted by Forcepoint’s Nick Savvides, join this virtual fireside chat where our team of cyber security experts will decipher & deep-dive on the changes of the Act and our guest speaker, Lee Ser Yen, Partner, Cyber Security Consulting, KMPG will share from a consultant’s perspective on what your organisation needs to do to respond to the changes and offers tips & takeaways on your critical data privacy initiatives.
The session will also include a demonstration and discussion by Brandon Tan, Sales Engineering Director for Forcepoint, as he walks us through some practical tips and use-cases on how organizations can leverage technology to accelerate time-to-compliance of PDPA.
Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint | Oz Alashe MBE, CEO, CybSafe
The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally to compromise information assets. Managing the insider threat is arguably the biggest challenge in information security, with the majority of security incidents coming from a human source. A lack of understanding of behaviour, mismanagement of resources and an inability to measure the success of initiatives has contributed to the wider issue.
Daniel Norman, Senior Solutions Analyst at the ISF is joined by Dr Margaret Cunningham, Principal Research Scientist for Human Behavior at Forcepoint, and Oz Alashe MBE, CEO at CybSafe to discuss the insider threat and the impact it has on cybersecurity.
Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint | Oz Alashe MBE, CEO, CybSafe
The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally to compromise information assets. Managing the insider threat is arguably the biggest challenge in information security, with the majority of security incidents coming from a human source. A lack of understanding of behaviour, mismanagement of resources and an inability to measure the success of initiatives has contributed to the wider issue.
Daniel Norman, Senior Solutions Analyst at the ISF is joined by Dr Margaret Cunningham, Principal Research Scientist for Human Behavior at Forcepoint, and Oz Alashe MBE, CEO at CybSafe to discuss the insider threat and the impact it has on cybersecurity.
Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint | Oz Alashe MBE, CEO, CybSafe
The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally to compromise information assets. Managing the insider threat is arguably the biggest challenge in information security, with the majority of security incidents coming from a human source. A lack of understanding of behaviour, mismanagement of resources and an inability to measure the success of initiatives has contributed to the wider issue.
Daniel Norman, Senior Solutions Analyst at the ISF is joined by Dr Margaret Cunningham, Principal Research Scientist for Human Behavior at Forcepoint, and Oz Alashe MBE, CEO at CybSafe to discuss the insider threat and the impact it has on cybersecurity.
In the era of the Unbound Enterprise, employees are working remotely as companies accelerate their timetables for cloud and business transformation. Cybersecurity teams must adapt just as quickly. Myrna Soto and Mike Towers explain how best-of-breed cybersecurity moves you left of breach by understanding risk and proactively preventing compromise.
Start by securing critical and customer data in an increasingly remote and regulated world. Use compliance to enhance your security risk strategy and build customer trust to make security your competitive advantage.
•Understand your global and industry data obligations
•Get visibility of where, when, and how your data is used
•Secure your customer AND employee data privacy
See how behavioral intelligence can detect user and data risk proactively. Advance your data protection strategy to keep ahead of threats and enhance DLP effectiveness with behavioral analytics.
•Individualized adaptive data policies
•Data discovery and classification
•Maximize security analyst efficiency
Proactively detect high-risk behaviors and compromised access in organizations, large or small. Uncover insider risk at the earliest point of detection and stop critical data loss instantly through real-time, behavioral-centric policy enforcement.
•Identify and mitigate risky behaviors from compromised users
•Detect risk "left of loss" with comprehensive risk scoring
•Investigate risk from insiders with efficiency and ease
Nico Fischbach, Global CTO, Forcepoint; Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica
One of the few success stories of 2020 was the cementing of security as a key business function. CISOs and their teams worked intensely to both secure the business as its teams went remote overnight and strategically thereafter to keep a now disparate workforce protected. If there was a trend emerging of security having more visibility at board-level, COVID-19 accelerated it. Does that then also mean a new seat at the table for a Chief Risk Officer?
Emma Sinden moderated a debate to answer that very question as Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica; Nico Fischbach, Global CTO, Forcepoint; and Brian Brackenborough, CISO, Channel 4, pondered on who would be the right person to manage risk, IT and security in the future.
Nico Fischbach, Global CTO, Forcepoint; Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica
One of the few success stories of 2020 was the cementing of security as a key business function. CISOs and their teams worked intensely to both secure the business as its teams went remote overnight and strategically thereafter to keep a now disparate workforce protected. If there was a trend emerging of security having more visibility at board-level, COVID-19 accelerated it. Does that then also mean a new seat at the table for a Chief Risk Officer?
Emma Sinden moderated a debate to answer that very question as Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica; Nico Fischbach, Global CTO, Forcepoint; and Brian Brackenborough, CISO, Channel 4, pondered on who would be the right person to manage risk, IT and security in the future.
Nico Fischbach, Global CTO, Forcepoint; Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica
One of the few success stories of 2020 was the cementing of security as a key business function. CISOs and their teams worked intensely to both secure the business as its teams went remote overnight and strategically thereafter to keep a now disparate workforce protected. If there was a trend emerging of security having more visibility at board-level, COVID-19 accelerated it. Does that then also mean a new seat at the table for a Chief Risk Officer?
Emma Sinden moderated a debate to answer that very question as Keith Baxter, CIO, Anthony Nicholas Group; Alejandro Becerra, Group CISO, Telefonica; Nico Fischbach, Global CTO, Forcepoint; and Brian Brackenborough, CISO, Channel 4, pondered on who would be the right person to manage risk, IT and security in the future.
In today’s remote working environment, there is a need to securely access data anywhere – but the more we enable our employees the greater the security risk we are exposed to. Technological advancements like SASE architectures and Zero Trust approaches look to provide a dynamic response to risk through continually reviewing where, when, how and who is accessing data.
In this webcast we explore how Forcepoint’s integrations with Microsoft Azure can give you the visibility and context behind your data interactions to make managing that risk possible. We share:
- Why an understanding of your data is key to securing your organization
- An overview of 10 Forcepoint security solution integrations with the Azure ecosystem
- A short use case demonstration of integrating Forcepoint Behavioral Analytics and how it impacts user risk score and dynamic policies
EUROPE time: https://www.brighttalk.com/webcast/15683/462416
APAC time: https://www.brighttalk.com/webcast/15683/462418
Myrna Soto, Chief Strategy and Trust Officer, Forcepoint & Nick Kael, Chief Technology Officer, Ericom
Hear two leading cyber security strategists – Myrna Soto and Nick Kael - discuss how the significantly altered business world has caused a focus shift from disaster recovery to business continuity and the impact this has on security.
Find out how the ever-changing attack surface and opportunistic approach of cyber criminals is causing the security strategy to become dynamic, considering users as the new perimeter, and embracing SASE architectures, to give better visibility and management for the security analyst whilst enabling the user and business to work without hindrance.
Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint
New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.
Watch now to learn:
- Challenges of securing data moving between on-prem and the cloud
- Tips and takeaways from data-secure companies
- Technologies they’ve used to prevent breaches
Alan Ross, Fellow and Chief Architect at X-Labs in Forcepoint and Sarah Radin Product Marketing Manager
Indicator of Behavior (IOB) FAQs:
Insider breaches can be extremely costly for organizations and most aren’t even aware of a breach until well after it occurs. Forcepoint’s Indicators of Behavior (IOBs), a new predictive approach to cybersecurity, changes the paradigm by allowing organizations to identify and understand when users are trending towards risk… and stop them before a breach occurs. In this session, you will learn: - What IOBs are, and how they are used to stop breaches
- How risk scoring is assessed and managed
- Real world examples of IOBs in action
Carl Eberling, CIO, Forcepoint | Eric Jackson, Vice President, General Manager User & Data Protection, Forcepoint
Data Loss Prevention (DLP) technology has been with us for many years and is now part of the common security defences employed by organizations. But today’s Enterprise DLP is anything but standard, having evolved many new and advanced capabilities that put it at the heart of a data protection strategy.
In this discussion we examine:
- How these new functionalities can help us address the challenges of the new working landscape
- How to accelerate your strategy and re-think what is possible
Ankur Chadda, Principal Data Protection Solutions Manager & Robert Mechler, Principal Security Strategist, Forcepoint
Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential.
In this webcast, Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.
Key learnings include:
- How the move to cloud is making data protection harder
- How to identify where your critical data is, the channels it flows through and establish an incident response plan
- How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
- How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
Carl Eberling, CIO, Forcepoint | Eric Jackson, Vice President, General Manager User & Data Protection, Forcepoint
Strengthen your strategy with these new features
Data Loss Prevention (DLP) technology has been with us for many years and is now part of the common security defences employed by organizations. But today’s Enterprise DLP is anything but standard, having evolved many new and advanced capabilities that put it at the heart of a data protection strategy.
In this discussion we examine how these new functionalities can help us address the challenges of the new working landscape, accelerate your strategy and re-think what is possible.
Nico Popp, Chief Product Officer, Forcepoint | Sean Sweeney, Chief Security Advisor, Microsoft
The traditional approach to data security is increasingly inadequate. Old solutions introduce too much business friction, yet they still fall short when it comes to preventing data exfiltration. We need to approach data protection differently to make tools like DLP, encryption, and tokenization more responsive to the security needs of the decentralized, cloud-driven workplace.
Introducing the core concepts of Zero Trust to your data protection posture ensures that all people in your organization are continuously being authenticated and authorized to have access to applications and data. A successful Zero Trust approach leverages dynamic, proactive, ongoing user risk assessment based on behavioral analytics to consistently prevent data breaches, while enhancing productivity rather than hindering it.
In this session, you’ll learn more about bolstering data security with the Zero Trust mindset, including:
- How Zero Trust and behavioral analytics can maximize the effectiveness of data protection solutions for increasingly mobile and remote workforces
- How data security traveling with data (like fingerprinting) can help in today’s distributed environment
- How security leaders are implementing these concepts in their environments and solutions
Nico Popp, Chief Product Officer, Forcepoint | Sean Sweeney, Chief Security Advisor, Microsoft
The traditional approach to data security is increasingly inadequate. Old solutions introduce too much business friction, yet they still fall short when it comes to preventing data exfiltration. We need to approach data protection differently to make tools like DLP, encryption, and tokenization more responsive to the security needs of the decentralized, cloud-driven workplace.
Introducing the core concepts of Zero Trust to your data protection posture ensures that all people in your organization are continuously being authenticated and authorized to have access to applications and data. A successful Zero Trust approach leverages dynamic, proactive, ongoing user risk assessment based on behavioral analytics to consistently prevent data breaches, while enhancing productivity rather than hindering it.
In this session, you’ll learn more about bolstering data security with the Zero Trust mindset, including:
- How Zero Trust and behavioral analytics can maximize the effectiveness of data protection solutions for increasingly mobile and remote workforces
- How data security traveling with data (like fingerprinting) can help in today’s distributed environment
- How security leaders are implementing these concepts in their environments and solutions
Today, organizations face the challenge of protecting their critical data and IP whilst enabling the modern work anywhere environments of a cloud-first world. Equally organizations now face a myriad of regulations like GDPR that require strict governance over the data they hold and how it is used. In this channel we discuss the best way to address these challenges helping you to modernize your data protection and confidently get to compliance.