Hi [[ session.user.profile.firstName ]]

Accelerating Digital Transformation with Direct-to-Cloud Security

Accelerating Digital Transformation with Direct-to-Cloud Connectivity and Security

Secure SD-WAN, Network Security, and Web Security for the Modern Government
Recorded Aug 13 2019 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jim Fulton, Cloud & Network Security Solution Director
Presentation preview: Accelerating Digital Transformation with Direct-to-Cloud Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cross Domain Solutions For Live-Virtual Voice Communications Jun 9 2020 3:00 pm UTC 60 mins
    Charles McCullough, ASTi & Sean Carpenter, Forcepoint
    Live, Virtual, Constructive (LVC) training capabilities must be networked together to form an integrated environment so that warfighters can practice skills needed to overcome the challenges of modern multi-domain threat environments.A common issue that hampers multi-domain training is that military LVC communications assets are connected to networks operating at incompatible sensitivity and classification levels and, as such, are precluded from interoperation to reduce cybersecurity risks.

    Attend this webinar to learn:
    -How Forcepoint and ASTi partner to support Polygone Multinational Aircrew Electronic Warfare Tactics Facility’s voice communications across LVC training assets with Forcepoint SimShield and ASTi Voisus
    -Practical considerations for securely linking intra-services, joint forces, multinational, and interagency partners
    -Additional use cases for Forcepoint and ASTi’s CDS Voice solution to enable voice communication across sensitive classification levels across the government agencies and the DoD.

    Two best in class solution providers, Forcepoint and Advanced Simulation Technology, Inc. (ASTi) have formed a strategic alliance to offer the first-ever, integrated cross domain solution (CDS) voice communications system that’s specifically configured for military training environments.
  • 5 Strategies for Agencies to Enhance Productivity & Secure Your Remote Workforce Recorded: May 6 2020 51 mins
    Security Engineer, Forcepoint G2CI
    Agencies are pivoting to remote work enablement models at an unprecedented scale. As you navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority.

    Join security engineers Forcepoint's Global Government & Critical Infrastructure as they share five tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes remote.

    Discussions will include strategies for supporting:
    - Roaming users who access highly sensitive information
    - High availability for critical apps
    - Connectivity challenges
    - How to enable collaboration and productivity
    - Increased cloud app usage
  • Accelerating Digital Transformation with Direct-to-Cloud Security Recorded: Aug 13 2019 41 mins
    Jim Fulton, Cloud & Network Security Solution Director
    Accelerating Digital Transformation with Direct-to-Cloud Connectivity and Security

    Secure SD-WAN, Network Security, and Web Security for the Modern Government
  • Align Your Security Efforts with the NIST Cybersecurity Framework Recorded: Jun 11 2019 27 mins
    Homayun Yaqub-Senior Director of Strategy at Forcepoint
    Often, when implementing the NIST Cybersecurity Framework, security teams spend too much time responding to alerts and security events, and far too little on concurrently and continuously focusing on post-breach planning and recovery.

    Watch this webinar to learn how adopting a risk-adaptive security approach can help agencies better align resources and better plan for evolving security requirements.

    Presenter- Homayun Yaqub is Senior Director of Strategy at Forcepoint.

    In this role, he partners with executives across various verticals to architect and deliver Forcepoint solutions to address human-centric business issues and better enable security/risk managers to safeguard their data and people assets. Yaqub brings more than 20 years of experience in the U.S. military, government, and private sector to Forcepoint.
  • Cloud Adoption in the U.S. Federal Government Recorded: May 21 2019 43 mins
    Dr. Larry Ponemon- Founder of The Ponemon Institute
    In 2017, reaffirming the commitment to the cloud, President Trump's Executive Order on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” calls for agency heads to show preference in their procurement for shared IT services, to the extent permitted by law, including email, cloud and cybersecurity services. Under this directive, agencies are continuing to prioritize cloud computing initiatives as part of their IT modernization plans.

    2 years later, in partnership with Ponemon, Forcepoint surveyed cloud influencers within federal agencies to find out more about current cloud adoption trends across federal government to find out where agencies are having successes and what problems they are encountering, especially as it relates to securing the cloud.

    Join this webinar to review and analyze the results of the research survey by Dr. Larry Ponemon.

    Dr. Ponemon earned his Ph.D. at Union College. He has a Master’s degree from Harvard University and attended the doctoral program in system sciences at Carnegie Mellon University.

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute and is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework.
    Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. Dr. Ponemon was also an appointed to two California State task forces on privacy and data security laws. He is a member of Shared Assessments’ Advisory Board.
  • Raising the Bar with Cross Domain Solutions Recorded: Jan 10 2019 26 mins
    Michelle Jordon
    As cyber threats continue to escalate in scale and frequency, it is imperative that cross domain solutions (CDS), which protect the world’s most sensitive data, comply with latest set of guidelines.

    Michelle Jordon, Forcepoint Global Governments Information Principal Cyber Security Manager, discusses “Raise the Bar,” an initiative created by the National Security Agency’s (NSA) and NCDSMO to combat rising threats while continually improving the status quo in the cross domain community.

    Watch the webcast to learn:

    Raise the Bar’s specifications
    Guidance for this initiative, including R.A.I.N
    An overview on Cross Domain Solutions
    Now is the time to prepare.
  • 2019 Government Cybersecurity Predictions, Presented by Forcepoint & Raytheon Recorded: Dec 11 2018 53 mins
    Forcepoint's George Kamis & Raffael Marty; Raytheon's Brett Scarborough
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your agency and the primary source of security breaches driving cyber risk to all-time highs.

    In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we could have ever imagined.

    In this webinar, we'll examine topics such as:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale

    Join Forcepoint's Raffael Marty (VP Research & Intelligence) and George Kamis (CTO Global Governments & Critical Infrastructure) along with Raytheon's Brett Scarborough (Senior Manager, Cyber Business & Strategy Development) for a discussion around the most pressing cybersecurity issues for government – and what agencies can do to protect against them.
  • Rethinking Data Protection for the Gov Cloud Recorded: Dec 6 2018 48 mins
    Ankur Chadda (Sr. Product Marketing Manager, Cloud) & Rob Campbell (Director, Data Security Solutions, Global Governments)
    As agencies modernize their security and data continues to move to the cloud, it’s critical to extend the same protections that you have on premises to the cloud.

    Watch this webinar to learn how Forcepoint CASB, along with DLP for Cloud Applications and Web Security solutions, can help with:

    • Discovery – insight into what cloud apps employees are using
    • Enforcement – automated threat prevention and context-aware policy enforcement
    • Risk Assessment – contextual risk of applications, users, and security configurations
  • Building Digital Transformation from the Network Up Recorded: Nov 27 2018 65 mins
    Mark Bunn (TIC Program Manager, DHS); Bryan Skelton (EIS Program Lead, Forcepoint), Ed Fox (VP Network Services, MetTel)
    Government-wide, agencies are urged to prioritize digital transformation so defense and civilian agencies have reliable and secure digital experiences whenever and wherever they need. But too often, agencies procure new contracts to build on legacy networks that either are inadequate or don’t sufficiently support emerging technologies that can help meet growing cyber demands.

    In this Roundtable Webcast, sponsored by MetTel and Forcepoint, Mark Bunn, program manager for DHS’s Trusted Internet Connections, discusses agency needs in networking and cybersecurity.

    Topics will include:

    - Understanding and preparing for GSA’s Enterprise Infrastructure Solutions (EIS) contract
    - Developing partnerships for getting the widest geographic reach with network-to-network interfaces
    - Designing a firm network foundation that is agile enough to scale for all agency needs
    - Hardening a network for reliable connectivity and resilience
    - Building security into all network needs
    - Effective uses of automation in networking
    - Creating a command and control dashboard
  • Dynamic Data Protection in Action Recorded: Nov 12 2018 10 mins
    Diana Pena, Forcepoint
    Government agencies are challenged to identify valuable risk insights and turn them into actionable protective measures. Often, behavior analytics tools can provide various insights into risky and anomalous activity, but do not enforce agency protection policies.

    Forcepoint is a key partner to government cybersecurity strategy, with solutions scaled to support agency security programs. Our risk-adaptive approach integrates best-in-class products with analytics and behavioral profiling, bringing agencies near real-time risk insights and automated remediation to better protect critical data, wherever it resides.

    In this brief, 10-minute webinar, we will demonstrate how Dynamic Data Protection (DDP) from Forcepoint helps surface anomalies and proactively adjusts individualized data security controls in near real time with proactive, dynamic security.
  • CDM Program Insights & Trends: Hour 2 [ON-DEMAND] Recorded: Oct 2 2018 55 mins
    Max Everett, DOE CIO; Willie Crenshaw, NASA CDM Program Exec; Jason DeShano, Booz Allen Hamilton; Larry Hale, GSA
    On Oct 2, Forcepoint gathered Continuous Diagnostics and Mitigation (CDM) leaders from SBA, DOE, NASA, GSA, and more to explore the current state of CDM and what practical next steps agencies should consider as they move their CDM programs forward.

    In Hour 2, hear directly from agency and prime CDM leaders as they share best practices, pain points, and insights on their unique approaches to CDM implementation.
  • CDM Program Insights & Trends: Hour 1 [ON-DEMAND] Recorded: Oct 2 2018 60 mins
    Sanjay Gupta, SBA CTO; Aaron Heffron, Market Connections President, Eric Trexler, Forcepoint VP of Global Governments
    On Oct 2, Forcepoint gathered Continuous Diagnostics and Mitigation (CDM) leaders from SBA, DOE, NASA, GSA, and more to explore the current state of CDM and what practical next steps agencies should consider as they move their CDM programs forward.

    In Hour 1, get CDM implementation insights and tips from Sanjay Gupta of the U.S. Small Business Administration, the first federal agency to implement CDM in the cloud.

    The event also previewed the results of a recent Market Connections survey of civilian agencies within each of the six CDM task order groups, highlighting key adoption challenges as well as first-hand best practices and recommendations for CDM success. Hear about the current pulse on CDM from Market Connections President Aaron Heffron.
  • Evasions: A Growing Threat for Government Networks Recorded: Sep 20 2018 40 mins
    Opi Niemi, Senior Research Director & Michael Knapp, Director of Network Security Sales Engineers at Forcepoint
    Network protocol normalization and reassembly is the basis of traffic inspection performed by next generation firewalls (NGFW) and intrusion prevention systems (IPS). But even common network protocols are complex, with multiple possible interpretations for the same traffic sequence.

    In this webinar, learn how targeted protocol stack fuzzing can be used for automated discovery of traffic normalization errors. Attackers can use these errors to evade detection, bypass security devices, and allow exploits and malware (including aggressive ransomware attacks like WannaCry) into your network undetected. We will demonstrate how many up-to-date security devices still have vulnerabilities to basic evasive techniques and how to test your solution’s efficacy.

    Specific topics include:

    - A brief introduction to evasion vulnerabilities
    - Forcepoint’s approach of targeted protocol fuzzing to automatically discover evasions
    - Applying evasion to attack to demonstrate efficacy
    - A demo of attackers’ methods to evade detection and bypass NGFW and IPS devices
  • Modernizing Government Networks with Secure SD-WAN Recorded: Sep 13 2018 45 mins
    Jim Fulton, Solution Director - Network Security & Sean McAnnany, Federal Sales Engineering Manager, Forcepoint
    Government networks must evolve, or other IT modernization and digital transformation efforts will fail. To be successful, you need a new approach to network security and connectivity—a combination of agile, direct-to-cloud connectivity, strong security anywhere your systems touch the internet, and efficient control and management.

    Software-defined wide-area networking (SD-WAN) should be considered an essential part of IT modernization efforts. In this webcast, learn how SD-WAN can help your agency:

    - Replace or augment MPLS with direct-to-cloud connectivity
    - Increase capacity and availability while accelerating application performance and optimizing network utilization
    - See and act across your entire network, enabling consistent security at every location
    - Protect your people and data on the web and in cloud apps
  • Dynamic Data Protection for Government: Proactive Security without the Headaches Recorded: Aug 16 2018 35 mins
    Rob Campbell (Director, Data Security Solutions) & Rob Mathieson (Sr. Analytics Specialist), Forcepoint Global Governments
    Government agencies have unique and complex cybersecurity challenges that are worsened by an understaffed workforce, legacy IT systems, and a lack of modernization funding. Security teams are constantly bogged down with alerts from disparate point products that require manual investigation.

    With Forcepoint Dynamic Data Protection, you can take your agency from yesterday’s threat-centric model to a more proactive approach focused on human behavior. We combine our best-in-class data loss prevention with behavioral analytics to reinforce security without hindering productivity.

    Watch our webcast to find out how Forcepoint DDP can deliver risk-adaptive security and help your agency protect its most sensitive data.
  • Tackling CDM with Risk-Adaptive Protection Recorded: Jul 10 2018
    George Kamis, CTO, Global Governments & Critical Infrastructure (Moderator); Eric Trexler, Vice President, Global Governments
    The Continuous Diagnostics and Mitigation (CDM) program was established by the Department of Homeland Security (DHS) to assist agencies as they work to transform and modernize their infrastructure, technology, approaches and methods around cybersecurity. Under CDM DEFEND, agencies can easily explore and adopt next-level solutions that:

    Identify cybersecurity risks on an ongoing basis
    Prioritize these risks based upon potential impacts
    Enable cybersecurity personnel to mitigate the most significant problems first
    Risk-Adaptive Data Protection (RADP), a key component of Forcepoint’s Human Point System, uses risk-adaptive scoring to recognize the context and intent of user behavior for early and accurate threat detection. RADP delivers a better understanding of risky behavior and the ability to automate policies to dramatically reduce the quantity of alerts that require investigation. It cuts through the noise so you know where to focus.

    In this webinar, Forcepoint experts discuss the origins and evolution of CDM and how agencies can leverage this program to build RADP into their cybersecurity posture.
Fortify Government Networks & Systems with Forcepoint
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and
objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions.

Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Accelerating Digital Transformation with Direct-to-Cloud Security
  • Live at: Aug 13 2019 6:00 pm
  • Presented by: Jim Fulton, Cloud & Network Security Solution Director
  • From:
Your email has been sent.
or close