Hi [[ session.user.profile.firstName ]]

Episode One: Prepare for the next phase of work-anywhere security

"Fundamentally attackers are trying to get your data, and the way attackers get your data is through your people"
"Where your people are and how you secure access to data has changed"

Listen to this 30-minute fireside chat for answers on:

- How will hybrid-work change security for the long run?
- How can a Zero Trust approach be used to solve the current security challenges?
- How do companies adapt their security strategy?
- Why Lookout extended its product offering to include CASB and ZTNA

Host
- Sr. Manager of Security Solutions & host of the Endpoint Enigma podcast

Speakers
- Tom Davison, Senior Director, EMEA Security Engineering, Lookout
- Nick Sears, Vice President of SASE, Lookout
Recorded Jun 24 2021 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tom Davison, Senior Director, EMEA Security Engineering, Lookout
Presentation preview: Episode One: Prepare for the next phase of work-anywhere security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Achieve Enhanced Cloud Security with Data Loss Prevention Dec 14 2021 4:00 pm UTC 52 mins
    Sascha Spangenberg, Consulting Sales Engineer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. Cloud apps such as SAP, Workday and Salesforce have increased productivity, but so has the risk your data is exposed to. To tap into this boosted productivity without risking your data, you need to stay in full control. In this session you will learn:

    - What is SASE and how to easily deploy it to protect your cloud apps
    - How Data Loss Prevention (DLP) enables you to stay in control of your data with advanced data protection capabilities
    - How to track and gain visibility in shadow clouds
    - How to achieve mobile security with conditional access
  • Episode Four: Guilty until proven innocent - Playing by Zero Trust laws Dec 9 2021 4:00 pm UTC 32 mins
    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief, Defense Intelligence Agency
    Users and endpoints are being targeted by security threats from all angles, is a Zero Trust security strategy the answer?

    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief of the Defense Intelligence Agency will join Lookout for the final episode of our Achieving Endpoint-to-Cloud Security series.

    Learn how Tyler helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats, as she answers:

    - What cyberattacks stand out and how have threats evolved?
    - Could a Zero Trust mindset have prevented previous security breaches from happening?
    - Why losing your smartphone is much riskier than losing your wallet?
    - What practices enterprises and government organizations can put in place to reduce phishing risk?
  • Security from Endpoint to Cloud - Securing Productivity from anywhere Dec 2 2021 4:00 pm UTC 16 mins
    Tom Davison, Senior Director Mobile Security Threat Intelligence, Lookout
    As we adapt to permanent hybrid working there is a need to keep employees productive on any device while they work with corporate data across multiple sources.

    For many organisations this presents significant challenges and blindspots remain.

    This session will look at the issues associated with hybrid working and show how to effectively move towards a Zero Trust model.

    Topics covered:
    – Trends in hybrid working models
    – The risks and threats linked to public clouds and unmanaged endpoints – phishing, ransomware, data leakage
    – How to enable ‘work from anywhere’ without compromising privacy
    – How to effectively bridge security from endpoint to cloud.
  • Episode Three: How to defeat ransomware attacks Nov 30 2021 4:00 pm UTC 62 mins
    Magda Chelly Head of Cyber Consulting, Former CISO, Founder of Women on Cyber
    The third episode in the Achieving Endpoint-to-Cloud Security series welcomes Magda Chelly, Head of Cyber Consulting, Former CISO, Founder of Women on Cyber who will answer:

    - Why are ransomware attacks increasing?
    - What are the most common entry points?
    - What are attackers doing to maximize their return?
    - Can we trust attackers to give data back exactly as they found it?
  • Zero Trust isn’t a Buzzword: How Lookout Secures your Data Nov 23 2021 4:00 pm UTC 49 mins
    Stephen Banda, Senior Manager, Security Solutions at Lookout
    Security perimeters have become obsolete as people use mobile devices and cloud applications to work from anywhere. To make smart Zero Trust access decisions that safeguard sensitive data and do not hinder productivity, you need deep visibility into all endpoints, data and apps within your organization.

    Join us to learn about how we have integrated access controls with capabilities to assess telemetry into a single platform. We provide unprecedented visibility to organizations, enabling them to effectively detect threats and anomalies, support compliance requirements and ultimately prevent breaches.

    In this webinar, you will learn:
    - What is a modern Zero Trust security framework?
    - Why you need rich telemetry of endpoints, users, networks, apps and data.
    - How to secure data while enabling productivity.
  • Episode Two: Prevent data leakage from productivity tools Nov 17 2021 4:00 pm UTC 29 mins
    Sundaram Lakshmanan, CTO, SASE Products at Lookout
    Lookout's CTO of SASE Products, Sundaram Lakshmanan invites you and your colleagues to join him to discuss how to evolve your security strategy to prevent data loss.

    Whether an employee downloads a sensitive file or accidentally shares it with unapproved users, preventing leakage of confidential data through productivity tools is a necessity for the modern, connected enterprise.

    Watch this webinar to learn:

    - How Data Loss Prevention (DLP) technology has grown from what we've always known into what it is today.
    - How the application of DLP has changed in reaction to continuously evolving infrastructure.
    - How you can remediate DLP issues and challenges your organization is facing.
  • Episode One: Prepare for the next phase of work-anywhere security Nov 10 2021 4:00 pm UTC 37 mins
    Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    "Fundamentally attackers are trying to get your data, and the way attackers get your data is through your people"
    "Where your people are and how you secure access to data has changed"

    Listen to this 30-minute fireside chat for answers on:

    - How will hybrid-work change security for the long run?
    - How can a Zero Trust approach be used to solve the current security challenges?
    - How do companies adapt their security strategy?
    - Why Lookout extended its product offering to include CASB and ZTNA

    Host
    - Sr. Manager of Security Solutions & host of the Endpoint Enigma podcast

    Speakers
    - Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    - Nick Sears, Vice President of SASE, Lookout
  • Zero Trust isn’t a buzzword: how Lookout secures your data Nov 4 2021 10:00 am UTC 49 mins
    Stephen Banda, Senior Manager, Security Solutions at Lookout
    Security perimeters have become obsolete as people use mobile devices and cloud applications to work from anywhere. To make smart Zero Trust access decisions that safeguard sensitive data and do not hinder productivity, you need deep visibility into all endpoints, data and apps within your organization.

    Join us to learn about how we have integrated access controls with capabilities to assess telemetry into a single platform. We provide unprecedented visibility to organizations, enabling them to effectively detect threats and anomalies, support compliance requirements and ultimately prevent breaches.

    In this webinar, you will learn:
    - What is a modern Zero Trust security framework?
    - Why you need rich telemetry of endpoints, users, networks, apps and data.
    - How to secure data while enabling productivity.
  • Cloud applications: A Zero Trust approach to security in Healthcare Nov 2 2021 3:00 pm UTC 57 mins
    Nick Sears, Vice President of SASE, Lookout
    Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable both employees and patients to access data from anywhere. Compound this use of managed and unmanaged mobile devices in a world where the network perimeter is being eroded and you have a real challenge at hand.

    Join the Lookout team today to find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – regardless of SaaS, IaaS or on-premises application.

    AGENDA:

    Zero Trust - How to apply a dynamic and contextual approach to applications and data access in the cloud.
    Data Protection and DLP for preventing data loss - Using advanced DLP to ensure data is protected against inappropriate upload, download and sharing.
    Threat Prevention and Anomaly Detection - Gain deep visibility into user activity across all cloud applications and prevent malware and associated risks.
    Audit and Compliance - How to administer a common security policy and investigate for real-time compliance across SaaS apps and platforms.
    Lookout CASB+ and ZTNA platform - Interactive demo.
  • Episode Four: Guilty until proven innocent - Playing by Zero Trust laws Recorded: Oct 14 2021 32 mins
    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief, Defense Intelligence Agency
    Users and endpoints are being targeted by security threats from all angles, is a Zero Trust security strategy the answer?

    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief of the Defense Intelligence Agency will join Lookout for the final episode of our Achieving Endpoint-to-Cloud Security series.

    Learn how Tyler helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats, as she answers:

    - What cyberattacks stand out and how have threats evolved?
    - Could a Zero Trust mindset have prevented previous security breaches from happening?
    - Why losing your smartphone is much riskier than losing your wallet?
    - What practices enterprises and government organizations can put in place to reduce phishing risk?
  • Episode Three: How to defeat ransomware attacks Recorded: Oct 13 2021 62 mins
    Magda Chelly Head of Cyber Consulting, Former CISO, Founder of Women on Cyber
    The third episode in the Achieving Endpoint-to-Cloud Security series welcomes Magda Chelly, Head of Cyber Consulting, Former CISO, Founder of Women on Cyber who will answer:

    - Why are ransomware attacks increasing?
    - What are the most common entry points?
    - What are attackers doing to maximize their return?
    - Can we trust attackers to give data back exactly as they found it?
  • Security from Endpoint to Cloud Recorded: Oct 12 2021 21 mins
    Aaron Cockerill, Chief Strategy Officer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. To securely tap into this productivity you need a Secure Access Service Edge (SASE), delivering data protection in the cloud like you still have a perimeter. But existing SASE technologies are invasive and clash with the users expectation of privacy when working remotely. It’s only when you integrate endpoint security with SASE that you can protect data in a manner that respects personal privacy.

    Watch this session with Aaron Cockerill, Chief Strategy Officer at Lookout to learn why you need integrated endpoint-to-cloud security to safeguard your data while complying with regulations and respecting personal privacy.
  • Episode One: Prepare for the next phase of work-anywhere security Recorded: Oct 11 2021 37 mins
    Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    "Fundamentally attackers are trying to get your data, and the way attackers get your data is through your people"
    "Where your people are and how you secure access to data has changed"

    Listen to this 30-minute fireside chat for answers on:

    - How will hybrid-work change security for the long run?
    - How can a Zero Trust approach be used to solve the current security challenges?
    - How do companies adapt their security strategy?
    - Why Lookout extended its product offering to include CASB and ZTNA

    Host
    - Sr. Manager of Security Solutions & host of the Endpoint Enigma podcast

    Speakers
    - Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    - Nick Sears, Vice President of SASE, Lookout
  • Security from Endpoint to Cloud Recorded: Oct 7 2021 21 mins
    Aaron Cockerill, Chief Strategy Officer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. To securely tap into this productivity you need a Secure Access Service Edge (SASE), delivering data protection in the cloud like you still have a perimeter. But existing SASE technologies are invasive and clash with the users expectation of privacy when working remotely. It’s only when you integrate endpoint security with SASE that you can protect data in a manner that respects personal privacy.

    Watch this session with Aaron Cockerill, Chief Strategy Officer at Lookout to learn why you need integrated endpoint-to-cloud security to safeguard your data while complying with regulations and respecting personal privacy.
  • Achieve Enhanced Cloud Security with Data Loss Prevention Recorded: Oct 7 2021 52 mins
    Sascha Spangenberg, Consulting Sales Engineer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. Cloud apps such as SAP, Workday and Salesforce have increased productivity, but so has the risk your data is exposed to. To tap into this boosted productivity without risking your data, you need to stay in full control. In this session you will learn:

    - What is SASE and how to easily deploy it to protect your cloud apps
    - How Data Loss Prevention (DLP) enables you to stay in control of your data with advanced data protection capabilities
    - How to track and gain visibility in shadow clouds
    - How to achieve mobile security with conditional access
  • Achieve Enhanced Cloud Security with Data Loss Prevention Recorded: Oct 6 2021 52 mins
    Sascha Spangenberg, Consulting Sales Engineer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. Cloud apps such as SAP, Workday and Salesforce have increased productivity, but so has the risk your data is exposed to. To tap into this boosted productivity without risking your data, you need to stay in full control. In this session you will learn:

    - What is SASE and how to easily deploy it to protect your cloud apps
    - How Data Loss Prevention (DLP) enables you to stay in control of your data with advanced data protection capabilities
    - How to track and gain visibility in shadow clouds
    - How to achieve mobile security with conditional access
  • Security from Endpoint to Cloud Recorded: Oct 6 2021 21 mins
    Aaron Cockerill, Chief Strategy Officer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. To securely tap into this productivity you need a Secure Access Service Edge (SASE), delivering data protection in the cloud like you still have a perimeter. But existing SASE technologies are invasive and clash with the users expectation of privacy when working remotely. It’s only when you integrate endpoint security with SASE that you can protect data in a manner that respects personal privacy.

    Watch this session with Aaron Cockerill, Chief Strategy Officer at Lookout to learn why you need integrated endpoint-to-cloud security to safeguard your data while complying with regulations and respecting personal privacy.
  • Cloud applications: A Zero Trust approach to security in Healthcare Recorded: Oct 4 2021 57 mins
    Nick Sears, Vice President of SASE, Lookout
    Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable both employees and patients to access data from anywhere. Compound this use of managed and unmanaged mobile devices in a world where the network perimeter is being eroded and you have a real challenge at hand.

    Join ISMG and Lookout to find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – regardless of SaaS, IaaS or on-premises application.

    AGENDA:

    Zero Trust - How to apply a dynamic and contextual approach to applications and data access in the cloud.
    Data Protection and DLP for preventing data loss - Using advanced DLP to ensure data is protected against inappropriate upload, download and sharing.
    Threat Prevention and Anomaly Detection - Gain deep visibility into user activity across all cloud applications and prevent malware and associated risks.
    Audit and Compliance - How to administer a common security policy and investigate for real-time compliance across SaaS apps and platforms.
    Lookout CASB+ and ZTNA platform - Interactive demo.
  • Security from Endpoint to Cloud - Securing Productivity from anywhere Recorded: Sep 30 2021 16 mins
    Tom Davison, Senior Director Mobile Security Threat Intelligence, Lookout
    As we adapt to permanent hybrid working there is a need to keep employees productive on any device while they work with corporate data across multiple sources.
    For many organisations this presents significant challenges and blindspots remain.
    This session will look at the issues associated with hybrid working and show how to effectively move towards a Zero Trust model.
    Topics covered –
    – Trends in hybrid working models
    – The risks and threats linked to public clouds and unmanaged endpoints – phishing, ransomware, data leakage
    – How to enable ‘work from anywhere’ without compromising privacy
    – How to effectively bridge security from endpoint to cloud.
  • A Zero Trust approach to cloud security & data protection Recorded: Sep 30 2021 27 mins
    Nick Sears, VP, SASE Solutions
    A Zero Trust approach to cloud security & data protection Why Endpoint to Cloud security is essential
Work anywhere with endpoint-to-cloud security
Lookout is an integrated endpoint-to-cloud security company. Our mission is to secure and empower our digital future in a privacy-focused world where mobility and cloud are essential to all we do for work and play. We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Lookout is trusted by millions of consumers, the largest enterprises and government agencies, and partners such as AT&T, Verizon, Vodafone, Microsoft, Google, and Apple. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C. To learn more, visit www.lookout.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Episode One: Prepare for the next phase of work-anywhere security
  • Live at: Jun 24 2021 10:29 am
  • Presented by: Tom Davison, Senior Director, EMEA Security Engineering, Lookout
  • From:
Your email has been sent.
or close