5 Strategies for Agencies to Enhance Productivity & Secure Your Remote Workforce
Agencies are pivoting to remote work enablement models at an unprecedented scale. As you navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority.
Join security engineers Forcepoint's Global Government & Critical Infrastructure as they share five tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes remote.
Discussions will include strategies for supporting:
- Roaming users who access highly sensitive information
- High availability for critical apps
- Connectivity challenges
- How to enable collaboration and productivity
- Increased cloud app usage
RecordedMay 6 202051 mins
Your place is confirmed, we'll send you email reminders
Mike Gruss, Exec Editor, Defense News C4ISRNET & Phil Goldstein, Sr. Editor FedTech Mag & StateTech Mag
What were the biggest trends and headlines in 2020 in cybersecurity and what trends and programs updates lie ahead in 2021 for government cybersecurity? Join this webinar as cyber pros from To the Point Cybersecurity podcast, FedTech, StateTech, Defense News and C4ISRNET discuss:
- The SolarWinds Orion breach
- The immediate and long-term implications of COVID-19 for government agency cybersecurity
- How remote work has accelerated the move to the Cloud
- Strategies for improving federal cybersecurity in 2021+
- Predictions about AI, government taking the lead, technology and security overall in 2021
- and more.
Jason Osterman, Chief Engineer, Forcepoint & Carolyn Ford, Host, To the Point Cybersecurity
Collaboration in disparate federal agencies has been a challenge for year. In 2020, we saw the challenges come to light even more as they relate to accessing and collaborating across multiple classification levels while working remotely.
Join this webinar to hear Jason Osterman, Chief Engineer, Forcepoint & Carolyn Ford, Host, To the Point Cybersecurity, discuss how agency workers can securely communicate across networks with multiple classification levels via chat, voice, telecon and more with Forcepoint's Raise the Bar-compliant Trusted Thin Client Cross Domain Solution.
The old tried-and-true network approach is fragmented, labor intensive, and inconsistent to operate—and it’s inhibiting your agency from protecthing and securing your networks in the cloud-era. Digital transformation is a great way to innovate in today’s hyper-competitive world. But doing it successfully requires a new approach, combining agile, direct-to-cloud connectivity, strong security anywhere your systems touch the internet, and the ability to control and manage it all efficiently.
Next-generation firewalls filter network traffic to protect an organization from external threats, but in this webcast we will focus on 3 primary areas that make Forcepoint next-generation firewalls stand out as you look to ensure better protection of your networks against emerging exploits and malware, accelerate cloud adoption and performance, and boost network resilience without sacrificing security
George Randle, Strategic Advisor, EF Overwatch, former US Army & VP Global Talent Acquisition at Forcepoint
In our modern business landscape, the war for talent is more complex than ever. You need to attract and retain the best talent for your organization to win, but without the right strategy or mindset, you won't be able to compete. If your revenue is declining, you're losing market share to your competition, or your organizational health is deteriorating, it's time to evolve how you approach this never-ending war. After all, your PEOPLE-not your product or service-are your strongest competitive advantage. Applying the logic of "The Talent War: How Special Operations and Great Organizations Win on Talent" to the cybersecurity job market.
Dr. John Zangardi, Redhorse Corp & former CIO, DHS; Dr. Margaret Cunningham, Forcepoint's X-Lab & Petko Stoyanov, Forcepoint
As the global cost of cybercrime continues to rise, millions of people’s personal data is being exposed, and our government and infrastructure are actively being targeted. Issues such as noisy data, human motivation and its impact on behavior, and complex data and systems increase the risk for human error in today’s environments- making it increasingly important for agencies to build a better understanding of how to identify individual and systemic risk factors that impact human performance. This session will discuss how to frame these problems and begin to design balanced intervention strategies to improve overall organizational resilience.
Ankur Chadda, Product Marketing, Forcepoint; Carl Eberling, CIO, Forcepoint & Eric Jackson, Product Management, Forcepoint
Today’s Enterprise DLP has evolved many new and advanced capabilities that put it at the heart of a data protection strategy. Ankur Chadda is joined by Carl Eberling and Eric Jackson to discuss how these advancements can help us address the challenges of the new working landscape, accelerate your strategy and re-think what is possible.
Dr. Larry Ponemon, Ponemon Institute; Mike Crouse, Forcepoint & Jared Quance, U.S. Coast Guard
Government organizations are struggling to improve their privileged access governance practices and reduce the likelihood of a data breach or other security incidents caused by insiders. According a recent Ponemon Institute survey, many individuals admit they have privileged access rights that are not necessary to complete their current job assignments.
•49% of Privileged users access sensitive or confidential data because of their curiosity
•44% of Privileged users can be pressured to share their access rights with others in the organization
•36% of Privileged users believe they are empowered to access all the information they can view
On this webinar Dr Ponemon presents key findings and discusses what they mean for Government agencies with Mike Crouse, Director Insider Threat Strategies, Forcepoint and as an implementer, Jared Quance, Insider Threat Program Manager, U.S. Coast Guard provides real-world understanding of what they mean for insider threat programs.
DLP technology is now everywhere – often found integrated in other security products like Web and Email Security, whilst many Cloud Aps will offer it as part of their service. But is it enough to rely on a myriad of providers to fulfill this critical security need? Ankur is joined by guests Nico Fischbach and John Stringer to discuss why an organization to discuss why Enterprise DLP is still the best option.
Agency IT teams must balance new workforce productivity and BYOD trends with security demands essential for evolving compliance and ‘work from home” requirements. By integrating Forcepoint Dynamic Edge Protection (DEP) and CommScope’s RUCKUS SmartZone, Cloudpath and Analytics, agencies can realize increased visibility over sources of network traffic and increased control from the campus across the entire enterprise.
Join Forcepoint and CommScope to learn about how their Adaptive Software Enabled Architecture solution
- Delivers policy-based secure network access for BYOD, guest users, and IT-owned devices—including IP-enabled IoT devices
- Creates policy-based security network access that adapts based on the actions of end users or mission needs.
- Enforce adaptive security policies with per-user or per-device granular control.
- Raises the bar on network and data security with a SASE solution that is greater than the sum of its parts
CommScope is the only global manufacturer of every technology required for tomorrow’s ultra-efficient converged networks consisting of wired and wireless networks. The RUCKUS portfolio of products drives every level of network infrastructure, and bring interoperability, ease of deployment and simplicity of management to mission needs. Forcepoint Dynamic Edge Protection (DEP) provides true SASE security-as-a-service that is ideal for safeguarding branch offices, SD-WAN connections, and Wi-Fi networks without deploying security hardware. When combined, their comprehensive solution enables greater user productivity and simplified management control across complex government agencies.
George Kamis, CTO G2CI, Forcepoint & MG (ret.) Joseph Brendler, Principal, Brendler Consulting, LLC
Work-from-home has become the “new normal” and pose unique challenges for those whose jobs require a higher level of security and sensitive data access. Remote Work has created an increasingly urgent struggle to securely manage information sharing required to confidently make mission-critical decisions in real time. Cross Domain Solutions enable agencies to fortify and manage multi-network environments, reduce risk and provide access to mission critical data no matter where personal are located. Cross Domain Solutions embed security and leverage automation to facilitate end-user collaboration, reduce mission errors, and enable quicker decision making. Moving those capabilities to the cloud speeds deployment and reduces infrastructure costs. George Kamis, Forcepoint CTO Global Governments & Critical Infrastructure, and Maj. Gen. Joseph Brendler (Ret.) discuss how and why deploying Cross Domain Solutions in the cloud will enable secure information sharing for remote workers and mission partners no matter where they are located.
Steven Hernandez, Dept of Ed; Brandon Wales, DHS; Myrna Soto, Forcepoint
This year there has been growing interest in Zero Trust among Federal Agencies. In fact, 44 federal agencies now have dedicated, funded tiger teams to either research or start implementing zero trust strategically. As agencies accelerate work from home programs and consider Zero Trust, this panel will discuss real world examples and advice to help you create an effective blueprint for implementing zero trust within your environment.
Stanley McChrystal, Retired General, U.S. Army & Eric Trexler and Carolyn Ford, Forcepoint
100th episode with retired, four-star General Stanley McChrystal, discussing his bestselling book "Team of Teams" and the similarities between the landscape he encountered in Iraq and today's Cyber landscape and how we can apply the lessons and tactics used to defend against Al Qaeda to cyber.
Sean Kelley, EVP of Operations at Unissant, Carolyn Ford & Eric Trexler, Forcepoint
Sean Kelley, Executive Vice President of Operations at Unissant leverages his 25 years experience in the Healthcare industry to weigh in on the security of the COVID-19 vaccine and healthcare in general during a pandemic. He offers the top things he would do as a CISO right now to make healthcare more secure.
Jason DeShano, Chief Technologist, Booz Allen Hamilton; Eric Trexler, VP, Forcepoint; Carolyn Ford, PMM, Forcepoint
The Continuous Diagnostics and Mitigation (CDM) program is evolving to lead the effort to reduce cyber risk and provide visibility across the federal government. Jason DeShano, Chief Architect for the Continuous Diagnostics and Mitigation (CDM) Booz Allen Hamilton answers the hard questions.
Dan Velez, Director of Insider Threat Consulting Services, Forcepoint
Forcepoint’s Dan Velez, Director of Insider Threat Consulting Services discusses the components of a well-constructed Insider Threat defense program. Dan has helped stand up insider threat programs for the US Government for over a decade. During this discussion he draws on his experience to share best practices.
George Kamis, CTO Forcepoint Global Governments & Critical Infrastructure
Learn how agencies can deftly boost collaborative cross domain operations when end-users meet mission partners; simplify their data security protocols; and how industry is automating the provisioning, certificate management and deployment of CSfC
David White, Sr. Account Manager & Guy Crumpley. Cloud Solutions Architect
Federal agencies are rapidly moving to the cloud. In fact, there are over 228 cloud providers being used by Federal Government today and federal email is rapidly moving to the cloud with over 70% of all federal email now being hosted in the cloud.
For agencies making the transition to the cloud, security threats are constantly evolving and becoming more sophisticated, and the cloud is equally at risk than an on-premises environment. In this webinar, we’ll discuss top cloud risks you need to be aware of, the importance of consistent data protection across all environments, and data protection strategies you can use today to secure Office 365 and other SaaS apps.
Michael Crouse, Director of Insider Risk Programs, Forcepoint
What does “Insider Threat” mean to you? For some it means user activity monitoring; some insider risk or data loss protection; for others: risk compliance, and for the adventurous, continuous evaluation and verification. No matter what you name your insider threat program, or what your mission is, all insider threat programs center around human behavior and visibility. In fact, the cybersecurity industry overall is recognizing the need to center around human behavior. Nothing identifies this new understanding better than RSA’s theme: “Human Element”. Human behavior is complex and voluminous, a successful program requires automated and adaptive risk management to rapidly respond to constantly changing threats independent of the individual mission. A successful program must also take a holistic approach, rather than point solutions, to address the mobile workforce, and organizations shift to cloud storage. In this session Mike addresses these unifying elements of a successful program.
Connect & protect your global, multi-domain workforce
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and
objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions.
Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.