5 Strategies for Agencies to Enhance Productivity & Secure Your Remote Workforce
Agencies are pivoting to remote work enablement models at an unprecedented scale. As you navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority.
Join security engineers Forcepoint's Global Government & Critical Infrastructure as they share five tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes remote.
Discussions will include strategies for supporting:
- Roaming users who access highly sensitive information
- High availability for critical apps
- Connectivity challenges
- How to enable collaboration and productivity
- Increased cloud app usage
RecordedMay 6 202051 mins
Your place is confirmed, we'll send you email reminders
Mike Crouse, Director Insider Threat, Forcepoint & Jared Quance, Insider Threat Program Manager, US Gov.
Elements of Insider threat programs, the role Privileged users play, and how #Sunburst has affected insider threat programs. With Mike Crouse, Director Insider Threat Strategies, Forcepoint, and Jared Quance, US Gov Insider Threat Program Manager.
Eric Trexler, VP, Forcepoint G2CI & Rachael Lyon, VP, Forcepoint
This week, Eric Trexler and Rachael Lyon get To The Point on the latest cybersecurity headlines such as Colonial Pipeline, ransomware, the double extortion trend, the new Biden Executive Order on improving the nation's cybersecurity, a new Gartner report this month noting cyber spending will grow to $150 billion this year, yet cloud security is the most under-invested category
Steve Turner- Security and Risk Analyst, Forrester Rachel Ballard, Financial & Budgeting Consultant, Forrester’s TEI
Forcepoint’s Raise the Bar-compliant Cross Domain suite is in operational use in some of the most stringent environments in the world, securing global missions efficiently and effectively while providing a high degree of usability, without compromising security. Forrester Consulting presents key challenges a Department of Defense intelligence agency encounters and how the implementation of a Forcepoint cross domain solution can provide critical results and benefits in the face of these challenges.
Hear from Forrester about the quantified and qualified benefits of Forcepoint Trusted Thin Client, Trusted Gateway System and Trusted Print Delivery.
Nicole Perlroth, award-winning journalist for The New York Times and best-selling author
This week Nicole Perlroth, award-winning journalist for The New York Times and best-selling author of “This Is How They Tell Me the World Ends” joins the podcast to discuss her decade-long journey covering cybersecurity and many terrifying discoveries navigating through the underbelly of the secretive cyberweapons market. She shares insights on the importance of making cyber understanding and awareness accessible to all audiences.
And she details the many challenges governments and society face today as cyberattacks continue to ratchet up in scope of disruption and financial rewards with no consequences as we collectively wait for “the big event” that will be the forcing function to drive needed investment, global cooperation, and changed behaviors to truly take some of the advantage out of attackers’ hands.
George Kamis, Forcepoint Global Governments & Critical Infrastructure
"Zero Trust is a cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated”, according to NIST Zero Trust Architecture (NIST Special Publication 800-207). However, how can that be achieved?
Join Forcepoint Global Governments & Critical Infrastructure CTO, George Kamis, for a pragmatic approach to Zero Trust in a multi-domain environment, and gain the following:
Knowledge on Verifying Explicitly – using multiple attributes (Dynamic and static) to derive confidence levels for contextual access decisions to resources.
Detailed blueprints on how to utilize identity, but implement technology that is agnostic to A&A - providing proper access and transfers for multi-domains, remotely, from a single device.
Knowledge on how to implement a Zero Trust framework built for continuous monitoring for DCO Enclaves and Cross Enclave collaboration.
Darren Mott, Former Supervisory Special Agent, FBI & Michael Crouse, Director of User & Data Protection, Forcepoint
Identifying and stopping insider threats continues to be one of the biggest security challenges facing organizations today. They range from the ‘good’ employee engaging in unintentional risky activity, the employee being targeted by external bad actors, to the worst case scenario, the malicious insider. In this more complex remote world, what strategies are available to surface threats – and can we stop them before they cause a breach?
In this session, Forcepoint’s Director of User & Data Protection, Michael Crouse is joined by special guest, Former FBI Supervisory Special Agent, Darren Mott to share their experiences in helping organizations and government bodies develop their insider threat programs:
-Real insider threat cases and their outcomes
-Insider threat vectors and the telltale signs of exploit
-The role of technology in providing meaningful visibility to protect “the crown jewels”
-Investigating behavioral changes and the impact of social distancing
-How to minimize losses and collateral damage
-Practical steps you can implement today
Nicholas Lessen, Principal Sales Engineer - G2CI, Forcepoint
In today's decentralized workplace, it's a challenge to safeguard people connecting via personal devices and to protect the data they are working with remotely and in the cloud. Agencies can use Identity Access Management (IAM) to onboard employees with legitimate credentials onto the network but authenticating and authorizing users isn't enough to ensure that everybody is acting in our best interests or is even who they say they are.
Join Forcepoint for a live demo and discussion on how Zero Trust can secure enterprises from the risky behaviors of different users so you can shift left of breach, with tools and tactics including:
- Continuous, automated analysis and scoring of user behavior to identify risky users
- Automated, dynamic responses to risky behavior ranging from warnings and credential checks to limited or full blocking of user access and data usage
- Replacing broad, sweeping security with individualized, adaptive data policies that won't slow down productivity.
Bryan Skelton, Data Guard Sales Lead - G2CI, Forcepoint
Isolating IT and OT environments is a practice that has been widely used by critical infrastructure stakeholders for many years, but this traditional approach suffers from significant drawbacks when looking to adopt new Industry 4.0 technologies.
Organizations can leverage the same military-grade approach to securely connecting your IT and OT environments while providing higher levels of assurance and improved security postures with Forcepoint's Data Guard Cross Domain Solution.
Join Forcepoint and Carahsoft for a virtual, 45-minute webinar in which Bryan Skelton, Forcepoint's Data Guard Sales Lead, will give a brief presentation and host an open Q&A session for technology professionals within the critical infrastructure industry on how Data Guard:
-- Provides a flexible data inspection engine
-- Is adaptable to a wide variety of data types and security policies
-- Offers byte-level deep content inspection, data validation and filtering
-- Delivers extensive support for highly complex automated transfer requirements of big data between multiple sensitive networks or clouds.
Petko Stoyanov, CTO, Forcepoint & Eric Trexler, Vice President, Forcepoint Global Governments & Critical Infrastructure
President Biden's recent Executive Order outlines steps the US Federal Government must take to improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors the United States’ Cybersecurity.
Join Forcepoint's CTO and VP of Global Governments & Critical Infrastructure as they discuss the recent Executive Order, including
- what it means for Zero Trust
- how agencies can modernize and implement stronger cyber standards
- strategies for removing barriers to sharing information
- and more
U.S. Navy, U.S. Dept. of Transportation, U.S. Dept of Labor, USPS, Ponemon Institute, ATARC, Forcepoint
Moving “left of breach” is the modern cybersecurity path forward that every agency should be striving for. That means focusing cybersecurity resources more on detecting and preventing potential breaches rather than cleaning up after a breach has already occurred.
ATARC, Government experts and Forcepoint recently had a robust discussion on how agencies are innovating to stay ahead of advisories. Hear from Dr Larry Ponemon of the Ponemon institute as he shares the latest results of a 2021 Government Breach Trends Study that examines the problems and what innovation is happening across government to move to a more proactive security posture. Then learn what our panel of experts are doing to improve breach detection and response in a landscape where they are inundated by new, rapidly-evolving challenges as well as lessons learned.
Mike Gruss, Exec Editor, Defense News C4ISRNET & Phil Goldstein, Sr. Editor FedTech Mag & StateTech Mag
What were the biggest trends and headlines in 2020 in cybersecurity and what trends and programs updates lie ahead in 2021 for government cybersecurity? Join this webinar as cyber pros from To the Point Cybersecurity podcast, FedTech, StateTech, Defense News and C4ISRNET discuss:
- The SolarWinds Orion breach
- The immediate and long-term implications of COVID-19 for government agency cybersecurity
- How remote work has accelerated the move to the Cloud
- Strategies for improving federal cybersecurity in 2021+
- Predictions about AI, government taking the lead, technology and security overall in 2021
- and more.
Jason Osterman, Chief Engineer, Forcepoint & Carolyn Ford, Host, To the Point Cybersecurity
Collaboration in disparate federal agencies has been a challenge for year. In 2020, we saw the challenges come to light even more as they relate to accessing and collaborating across multiple classification levels while working remotely.
Join this webinar to hear Jason Osterman, Chief Engineer, Forcepoint & Carolyn Ford, Host, To the Point Cybersecurity, discuss how agency workers can securely communicate across networks with multiple classification levels via chat, voice, telecon and more with Forcepoint's Raise the Bar-compliant Trusted Thin Client Cross Domain Solution.
The old tried-and-true network approach is fragmented, labor intensive, and inconsistent to operate—and it’s inhibiting your agency from protecthing and securing your networks in the cloud-era. Digital transformation is a great way to innovate in today’s hyper-competitive world. But doing it successfully requires a new approach, combining agile, direct-to-cloud connectivity, strong security anywhere your systems touch the internet, and the ability to control and manage it all efficiently.
Next-generation firewalls filter network traffic to protect an organization from external threats, but in this webcast we will focus on 3 primary areas that make Forcepoint next-generation firewalls stand out as you look to ensure better protection of your networks against emerging exploits and malware, accelerate cloud adoption and performance, and boost network resilience without sacrificing security
George Randle, Strategic Advisor, EF Overwatch, former US Army & VP Global Talent Acquisition at Forcepoint
In our modern business landscape, the war for talent is more complex than ever. You need to attract and retain the best talent for your organization to win, but without the right strategy or mindset, you won't be able to compete. If your revenue is declining, you're losing market share to your competition, or your organizational health is deteriorating, it's time to evolve how you approach this never-ending war. After all, your PEOPLE-not your product or service-are your strongest competitive advantage. Applying the logic of "The Talent War: How Special Operations and Great Organizations Win on Talent" to the cybersecurity job market.
Dr. John Zangardi, Redhorse Corp & former CIO, DHS; Dr. Margaret Cunningham, Forcepoint's X-Lab & Petko Stoyanov, Forcepoint
As the global cost of cybercrime continues to rise, millions of people’s personal data is being exposed, and our government and infrastructure are actively being targeted. Issues such as noisy data, human motivation and its impact on behavior, and complex data and systems increase the risk for human error in today’s environments- making it increasingly important for agencies to build a better understanding of how to identify individual and systemic risk factors that impact human performance. This session will discuss how to frame these problems and begin to design balanced intervention strategies to improve overall organizational resilience.
Ankur Chadda, Product Marketing, Forcepoint; Carl Eberling, CIO, Forcepoint & Eric Jackson, Product Management, Forcepoint
Today’s Enterprise DLP has evolved many new and advanced capabilities that put it at the heart of a data protection strategy. Ankur Chadda is joined by Carl Eberling and Eric Jackson to discuss how these advancements can help us address the challenges of the new working landscape, accelerate your strategy and re-think what is possible.
Connect & protect your global, multi-domain workforce
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and
objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions.
Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.