Hi [[ session.user.profile.firstName ]]

5 Strategies for Agencies to Enhance Productivity & Secure Your Remote Workforce

Agencies are pivoting to remote work enablement models at an unprecedented scale. As you navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority.

Join security engineers Forcepoint's Global Government & Critical Infrastructure as they share five tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes remote.

Discussions will include strategies for supporting:
- Roaming users who access highly sensitive information
- High availability for critical apps
- Connectivity challenges
- How to enable collaboration and productivity
- Increased cloud app usage
Recorded May 6 2020 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Security Engineer, Forcepoint G2CI
Presentation preview: 5 Strategies for Agencies to Enhance Productivity & Secure Your Remote Workforce

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Government 2021 Cybersecurity Insights And Predictions Recorded: Feb 8 2021 67 mins
    Mike Gruss, Exec Editor, Defense News C4ISRNET & Phil Goldstein, Sr. Editor FedTech Mag & StateTech Mag
    What were the biggest trends and headlines in 2020 in cybersecurity and what trends and programs updates lie ahead in 2021 for government cybersecurity? Join this webinar as cyber pros from To the Point Cybersecurity podcast, FedTech, StateTech, Defense News and C4ISRNET discuss:
    - The SolarWinds Orion breach
    - The immediate and long-term implications of COVID-19 for government agency cybersecurity
    - How remote work has accelerated the move to the Cloud
    - Strategies for improving federal cybersecurity in 2021+
    - Predictions about AI, government taking the lead, technology and security overall in 2021
    - and more.
  • How to Securely Enable Remote Collaboration Across Multiple Domains Recorded: Jan 27 2021 15 mins
    Jason Osterman, Chief Engineer, Forcepoint & Carolyn Ford, Host, To the Point Cybersecurity
    Collaboration in disparate federal agencies has been a challenge for year. In 2020, we saw the challenges come to light even more as they relate to accessing and collaborating across multiple classification levels while working remotely.

    Join this webinar to hear Jason Osterman, Chief Engineer, Forcepoint & Carolyn Ford, Host, To the Point Cybersecurity, discuss how agency workers can securely communicate across networks with multiple classification levels via chat, voice, telecon and more with Forcepoint's Raise the Bar-compliant Trusted Thin Client Cross Domain Solution.
  • 3 Differentiators of Forcepoint Next Generation Firewall & Why You Should Care Recorded: Jan 19 2021 42 mins
    Chris Sather, Product Management, Forcepoint & Derrick Wilson, Sr. Network Security Specialist, Forcepoint
    The old tried-and-true network approach is fragmented, labor intensive, and inconsistent to operate—and it’s inhibiting your agency from protecthing and securing your networks in the cloud-era. Digital transformation is a great way to innovate in today’s hyper-competitive world. But doing it successfully requires a new approach, combining agile, direct-to-cloud connectivity, strong security anywhere your systems touch the internet, and the ability to control and manage it all efficiently.

    Next-generation firewalls filter network traffic to protect an organization from external threats, but in this webcast we will focus on 3 primary areas that make Forcepoint next-generation firewalls stand out as you look to ensure better protection of your networks against emerging exploits and malware, accelerate cloud adoption and performance, and boost network resilience without sacrificing security
  • Filling the Cybersecurity Talent Gap Recorded: Jan 5 2021 36 mins
    George Randle, Strategic Advisor, EF Overwatch, former US Army & VP Global Talent Acquisition at Forcepoint
    In our modern business landscape, the war for talent is more complex than ever. You need to attract and retain the best talent for your organization to win, but without the right strategy or mindset, you won't be able to compete. If your revenue is declining, you're losing market share to your competition, or your organizational health is deteriorating, it's time to evolve how you approach this never-ending war. After all, your PEOPLE-not your product or service-are your strongest competitive advantage. Applying the logic of "The Talent War: How Special Operations and Great Organizations Win on Talent" to the cybersecurity job market.
  • Components of a Blueprint for Human and Organizational Resilience Recorded: Dec 14 2020 38 mins
    Dr. John Zangardi, Redhorse Corp & former CIO, DHS; Dr. Margaret Cunningham, Forcepoint's X-Lab & Petko Stoyanov, Forcepoint
    As the global cost of cybercrime continues to rise, millions of people’s personal data is being exposed, and our government and infrastructure are actively being targeted. Issues such as noisy data, human motivation and its impact on behavior, and complex data and systems increase the risk for human error in today’s environments- making it increasingly important for agencies to build a better understanding of how to identify individual and systemic risk factors that impact human performance. This session will discuss how to frame these problems and begin to design balanced intervention strategies to improve overall organizational resilience.
  • Get the best from DLP - Strengthen your strategy with these new features Recorded: Dec 8 2020 34 mins
    Ankur Chadda, Product Marketing, Forcepoint; Carl Eberling, CIO, Forcepoint & Eric Jackson, Product Management, Forcepoint
    Today’s Enterprise DLP has evolved many new and advanced capabilities that put it at the heart of a data protection strategy. Ankur Chadda is joined by Carl Eberling and Eric Jackson to discuss how these advancements can help us address the challenges of the new working landscape, accelerate your strategy and re-think what is possible.
  • Ponemon Institute US & UK Privileged User Survey Results Recorded: Dec 2 2020 41 mins
    Dr. Larry Ponemon, Ponemon Institute; Mike Crouse, Forcepoint & Jared Quance, U.S. Coast Guard
    Government organizations are struggling to improve their privileged access governance practices and reduce the likelihood of a data breach or other security incidents caused by insiders. According a recent Ponemon Institute survey, many individuals admit they have privileged access rights that are not necessary to complete their current job assignments.
    •49% of Privileged users access sensitive or confidential data because of their curiosity
    •44% of Privileged users can be pressured to share their access rights with others in the organization
    •36% of Privileged users believe they are empowered to access all the information they can view
    On this webinar Dr Ponemon presents key findings and discusses what they mean for Government agencies with Mike Crouse, Director Insider Threat Strategies, Forcepoint and as an implementer, Jared Quance, Insider Threat Program Manager, U.S. Coast Guard provides real-world understanding of what they mean for insider threat programs.
  • How to know if you're ready for enterprise DLP Recorded: Nov 19 2020 34 mins
    Ankur Chadda, Product Marketing, Forcepoint; Nico Fischbach, CTO, Forcepoint & John Stringer, Product Management, Forcepoint
    DLP technology is now everywhere – often found integrated in other security products like Web and Email Security, whilst many Cloud Aps will offer it as part of their service. But is it enough to rely on a myriad of providers to fulfill this critical security need? Ankur is joined by guests Nico Fischbach and John Stringer to discuss why an organization to discuss why Enterprise DLP is still the best option.
  • Mission Enablement Shorts: Operations Center Modernization Recorded: Nov 16 2020 4 mins
    Carolyn Ford, Product Marketing Manager, Forcepoint
    Understand How We Can Fortify Government Networks, Systems, & Missions in 5 minutes or less with actual customer deployments.
  • Increase Enterprise Visibility with an Adaptive Software Enabled Architecture Recorded: Nov 11 2020 47 mins
    Duke Butler, CommScope
    Agency IT teams must balance new workforce productivity and BYOD trends with security demands essential for evolving compliance and ‘work from home” requirements. By integrating Forcepoint Dynamic Edge Protection (DEP) and CommScope’s RUCKUS SmartZone, Cloudpath and Analytics, agencies can realize increased visibility over sources of network traffic and increased control from the campus across the entire enterprise.

    Join Forcepoint and CommScope to learn about how their Adaptive Software Enabled Architecture solution
    - Delivers policy-based secure network access for BYOD, guest users, and IT-owned devices—including IP-enabled IoT devices
    - Creates policy-based security network access that adapts based on the actions of end users or mission needs.
    - Enforce adaptive security policies with per-user or per-device granular control.
    - Raises the bar on network and data security with a SASE solution that is greater than the sum of its parts

    CommScope is the only global manufacturer of every technology required for tomorrow’s ultra-efficient converged networks consisting of wired and wireless networks. The RUCKUS portfolio of products drives every level of network infrastructure, and bring interoperability, ease of deployment and simplicity of management to mission needs. Forcepoint Dynamic Edge Protection (DEP) provides true SASE security-as-a-service that is ideal for safeguarding branch offices, SD-WAN connections, and Wi-Fi networks without deploying security hardware. When combined, their comprehensive solution enables greater user productivity and simplified management control across complex government agencies.
  • Blueprint for Cloud Multi Domain Operations Recorded: Nov 2 2020 19 mins
    George Kamis, CTO G2CI, Forcepoint & MG (ret.) Joseph Brendler, Principal, Brendler Consulting, LLC
    Work-from-home has become the “new normal” and pose unique challenges for those whose jobs require a higher level of security and sensitive data access. Remote Work has created an increasingly urgent struggle to securely manage information sharing required to confidently make mission-critical decisions in real time. Cross Domain Solutions enable agencies to fortify and manage multi-network environments, reduce risk and provide access to mission critical data no matter where personal are located. Cross Domain Solutions embed security and leverage automation to facilitate end-user collaboration, reduce mission errors, and enable quicker decision making. Moving those capabilities to the cloud speeds deployment and reduces infrastructure costs. George Kamis, Forcepoint CTO Global Governments & Critical Infrastructure, and Maj. Gen. Joseph Brendler (Ret.) discuss how and why deploying Cross Domain Solutions in the cloud will enable secure information sharing for remote workers and mission partners no matter where they are located.
  • Blueprint for Zero Trust in a Remote World Recorded: Oct 26 2020 25 mins
    Steven Hernandez, Dept of Ed; Brandon Wales, DHS; Myrna Soto, Forcepoint
    This year there has been growing interest in Zero Trust among Federal Agencies. In fact, 44 federal agencies now have dedicated, funded tiger teams to either research or start implementing zero trust strategically. As agencies accelerate work from home programs and consider Zero Trust, this panel will discuss real world examples and advice to help you create an effective blueprint for implementing zero trust within your environment.
  • A Technical Blueprint for Data Protection Recorded: Oct 21 2020 36 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Bob Mechler, Principal Security Strategist , Forcepoint
    Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.
  • Applying "Team of Teams" Logic to Cyber with General Stanley McChrystal Recorded: Oct 13 2020 45 mins
    Stanley McChrystal, Retired General, U.S. Army & Eric Trexler and Carolyn Ford, Forcepoint
    100th episode with retired, four-star General Stanley McChrystal, discussing his bestselling book "Team of Teams" and the similarities between the landscape he encountered in Iraq and today's Cyber landscape and how we can apply the lessons and tactics used to defend against Al Qaeda to cyber.
  • Are Our COVID Vaccines Safe From Hackers? Recorded: Oct 1 2020 21 mins
    Sean Kelley, EVP of Operations at Unissant, Carolyn Ford & Eric Trexler, Forcepoint
    Sean Kelley, Executive Vice President of Operations at Unissant leverages his 25 years experience in the Healthcare industry to weigh in on the security of the COVID-19 vaccine and healthcare in general during a pandemic. He offers the top things he would do as a CISO right now to make healthcare more secure.
  • The Next Chapter of CDM with Jason DeShano, Chief Architect, Booz Allen Hamilton Recorded: Sep 22 2020 25 mins
    Jason DeShano, Chief Technologist, Booz Allen Hamilton; Eric Trexler, VP, Forcepoint; Carolyn Ford, PMM, Forcepoint
    The Continuous Diagnostics and Mitigation (CDM) program is evolving to lead the effort to reduce cyber risk and provide visibility across the federal government. Jason DeShano, Chief Architect for the Continuous Diagnostics and Mitigation (CDM) Booz Allen Hamilton answers the hard questions.
  • Building an Insider Threat Program, Lessons Learned Recorded: Sep 15 2020 38 mins
    Dan Velez, Director of Insider Threat Consulting Services, Forcepoint
    Forcepoint’s Dan Velez, Director of Insider Threat Consulting Services discusses the components of a well-constructed Insider Threat defense program. Dan has helped stand up insider threat programs for the US Government for over a decade. During this discussion he draws on his experience to share best practices.
  • How the FBI Achieved Remote Multi Domain Access Recorded: Sep 8 2020 22 mins
    George Kamis, CTO Forcepoint Global Governments & Critical Infrastructure
    Learn how agencies can deftly boost collaborative cross domain operations when end-users meet mission partners; simplify their data security protocols; and how industry is automating the provisioning, certificate management and deployment of CSfC
  • Extending Data Protection to the Cloud Recorded: Aug 25 2020 46 mins
    David White, Sr. Account Manager & Guy Crumpley. Cloud Solutions Architect
    Federal agencies are rapidly moving to the cloud. In fact, there are over 228 cloud providers being used by Federal Government today and federal email is rapidly moving to the cloud with over 70% of all federal email now being hosted in the cloud.

    For agencies making the transition to the cloud, security threats are constantly evolving and becoming more sophisticated, and the cloud is equally at risk than an on-premises environment. In this webinar, we’ll discuss top cloud risks you need to be aware of, the importance of consistent data protection across all environments, and data protection strategies you can use today to secure Office 365 and other SaaS apps.
  • Human Behavior: The Heart of an Insider Threat Program Recorded: Aug 18 2020 40 mins
    Michael Crouse, Director of Insider Risk Programs, Forcepoint
    What does “Insider Threat” mean to you? For some it means user activity monitoring; some insider risk or data loss protection; for others: risk compliance, and for the adventurous, continuous evaluation and verification. No matter what you name your insider threat program, or what your mission is, all insider threat programs center around human behavior and visibility. In fact, the cybersecurity industry overall is recognizing the need to center around human behavior. Nothing identifies this new understanding better than RSA’s theme: “Human Element”. Human behavior is complex and voluminous, a successful program requires automated and adaptive risk management to rapidly respond to constantly changing threats independent of the individual mission. A successful program must also take a holistic approach, rather than point solutions, to address the mobile workforce, and organizations shift to cloud storage. In this session Mike addresses these unifying elements of a successful program.
Connect & protect your global, multi-domain workforce
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and
objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions.

Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 5 Strategies for Agencies to Enhance Productivity & Secure Your Remote Workforce
  • Live at: May 6 2020 6:00 pm
  • Presented by: Security Engineer, Forcepoint G2CI
  • From:
Your email has been sent.
or close