Hi [[ session.user.profile.firstName ]]

Modernizing Federal Networks: How to Align with DHS’ Updated TIC 3.0

The U.S. government is urging its defense and civilian agencies to prioritize digital transformation to ensure reliable and secure digital experiences anytime, anywhere. But just building on to legacy networks often can’t support the emerging technologies that help meet growing cyber demands.

Since the M-08-05 Implementation of the Trusted Internet Connection policy in 2007, the technology landscape has changed dramatically. Private-sector cloud offerings, software-defined networks, and increased workforce mobility have all led to these TIC 3.0 updates, which provide more flexibility to help agencies keep pace.

This webinar will cover:

- What TIC 3.0 updates mean for agencies
- How updates map to federal IT modernization efforts
- Ways that Forcepoint technologies can aid in compliance and modernization efforts
Recorded Jul 8 2020 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
AD Blanchette, Sales Engineering Manager, Forcepoint & David Hermann, Account Manager, Forcepoint
Presentation preview: Modernizing Federal Networks: How to Align with DHS’ Updated TIC 3.0

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 3 Differentiators of Forcepoint Next Generation Firewall & Why You Should Care Aug 11 2020 6:00 pm UTC 45 mins
    Chris Sather, Product Management, Forcepoint
    3 Differentiators of Forcepoint Next Generation Firewall & Why You Should Care
  • Forcepoint Cross Domain Solutions Forum Jul 28 2020 2:30 pm UTC 90 mins
    Steve Stratton, Senior Director Product Management Forcepoint, Lisa Hawes, Product Management Forcepoint
    Latest Industry Trends, Initiatives & Solutions and Capability Updates
  • Federal Cybersecurity in a Changing World: How to Create an Ideal Cyber Strategy Jul 22 2020 2:00 pm UTC 60 mins
    Brittany Johnston, Research Lead, MeriTalk & George Kamis, CTO, Forcepoint
    Federal cybersecurity is more critical than ever as agencies quickly adapt to a “maximized telework” environment. But, how effective are Feds’ current cybersecurity efforts? Underwritten by Forcepoint, MeriTalk surveyed 150 Federal IT managers and compiled qualitative data from in-depth interviews with Federal cybersecurity leaders to understand the state of cybersecurity in Federal agencies and offer recommendations to advance cyber progress.

    Attend the webinar to learn about:
    - What is working well in agencies’ cybersecurity strategies, and what needs to change
    - If agencies could rebuild their strategies from the ground up, what would they look like
    - Strategies for overcoming common challenges in federal agency modernization efforts.
  • Modernizing Federal Networks: How to Align with DHS’ Updated TIC 3.0 Recorded: Jul 8 2020 28 mins
    AD Blanchette, Sales Engineering Manager, Forcepoint & David Hermann, Account Manager, Forcepoint
    The U.S. government is urging its defense and civilian agencies to prioritize digital transformation to ensure reliable and secure digital experiences anytime, anywhere. But just building on to legacy networks often can’t support the emerging technologies that help meet growing cyber demands.

    Since the M-08-05 Implementation of the Trusted Internet Connection policy in 2007, the technology landscape has changed dramatically. Private-sector cloud offerings, software-defined networks, and increased workforce mobility have all led to these TIC 3.0 updates, which provide more flexibility to help agencies keep pace.

    This webinar will cover:

    - What TIC 3.0 updates mean for agencies
    - How updates map to federal IT modernization efforts
    - Ways that Forcepoint technologies can aid in compliance and modernization efforts
  • Implementing Zero Trust in Government Agencies: How to Think Beyond Identity Recorded: Jun 25 2020 44 mins
    Victor Martinez, Senior Cyber Engineer, Forcepoint
    As enterprise networks change to support remote users and cloud-based assets that are not located within an enterprise-owned network boundary, security has forever changed. Zero trust focuses on protecting resources, not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. In 2020, the definitions and guidance for what zero trust is and how it should be implemented have been formally laid out in the pending NIST 800-207 publication. According to this guidance, users and their identities play a pivotal role in a zero trust framework, and organizations must ensure on a continuous basis that only authenticated and authorized users and devices can access applications and data. However, identity is just the beginning when designing a zero trust environment. This session will review the latest research on agency adoption of Zero trust, discuss the 7 basic tenets of a Zero Trust architecture that NIST has identified, and cover why evaluating behavioral attributes is also important to consider as you continually re-evaluate trust throughout the users interaction with your data.
  • Forcepoint’s Dynamic Data Protection (DDP) Solution Sharpener Recorded: Jun 17 2020 10 mins
    Jill Bradshaw, Sr. Product Marketing Manager, Forcepoint
    In this edition of Forcepoint’s GovCyber Solution Sharpeners Series, Forcepoint's product marketing team discusses our Dynamic Data Protection solution. Dynamic Data Protection gives your team the power to identify and investigate the entities that pose a potential risk
    to critical data and assets. Then, it dynamically applies monitoring and
    enforcement controls to safeguard assets based on individual risk levels and the value of the data being accessed.

    Watch this on-demand solution overview to learn about:
    -Product features, benefits and A&A endorsements
    -Relevant use cases and success stories from agency deployments

    Forcepoint is a leading cybersecurity company that has been fortifying mission-critical data and networks across government agencies, the Department of Defense and the Intelligence Community for over 20 years. Forcepoint is attuned to how people interact with data and provides secure access while enabling employees to create value. Forcepoint solutions adapt to risk in real time to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders.

    Learn more and schedule a demo with our team today at: www.forcepoint.com/security/government-security
  • Cross Domain Solutions For Live-Virtual Voice Communications Recorded: Jun 9 2020 50 mins
    Charles McCullough, ASTi, Dana Smith, Forcepoint, & Sean Carpenter, Forcepoint
    Live, Virtual, Constructive (LVC) training capabilities must be networked together to form an integrated environment so that warfighters can practice skills needed to overcome the challenges of modern multi-domain threat environments.A common issue that hampers multi-domain training is that military LVC communications assets are connected to networks operating at incompatible sensitivity and classification levels and, as such, are precluded from interoperation to reduce cybersecurity risks.

    Attend this webinar to learn:
    -How Forcepoint and ASTi partner to support Polygone Multinational Aircrew Electronic Warfare Tactics Facility’s voice communications across LVC training assets with Forcepoint SimShield and ASTi Voisus
    -Practical considerations for securely linking intra-services, joint forces, multinational, and interagency partners
    -Additional use cases for Forcepoint and ASTi’s CDS Voice solution to enable voice communication across sensitive classification levels across the government agencies and the DoD.

    Two best in class solution providers, Forcepoint and Advanced Simulation Technology, Inc. (ASTi) have formed a strategic alliance to offer the first-ever, integrated cross domain solution (CDS) voice communications system that’s specifically configured for military training environments.This document does not contain information (e.g., technical data, technology) that is controlled under U.S. International Traffic in Arms Regulations (ITAR) technical data or Export Administration Regulations (EAR). EXIM REF #FPFB-2018-0024”
  • The Power of CSfC with Dylan Conner, ID Technologies Recorded: Jun 5 2020 24 mins
    Dylan Conner, CTO, ID Technologies; Eric Trexler, VP Forcepoint G2CI; ad Carolyn Ford, PMM, Forcepoint G2CI
    Dylan Conner, CTO for ID Technologies and President of its Archon Division, recognizes the power and yet complexity of CSfC. Bad actors are not bound by policy constraints and can take advantage of the latest technology. In order for us to compete, we need to truly commercialize this technology making it more scalable and usable to mission-focused environments. In this episode of To the Point Cybersecurity podcast, Dylan will discuss the value and opportunities for automation across the solution stack for product ordering, management, provisioning, and Certificate renewal. Dylan will likewise discuss ways to make the accreditation cycles shorter and last longer using open source technologies.
  • How Working From Home has Changed Cybersecurity Recorded: Jun 4 2020 20 mins
    Matt Moynahan, CEO, Forcepoint & Eric Trexler, VP Sales, Forcepoint
    CEO Matt Moynahan, discusses how the cybersecurity landscape has changed with the emergency work from home directives many companies are currently following on To the Point Cybersecurity podcast.
  • Forcepoint’s Trusted Thin Client & Trusted Thin Client Remote Solution Sharpener Recorded: May 7 2020 24 mins
    Victor Martinez, Senior Cyber Engineer, Forcepoint
    In this edition of Forcepoint’s GovCyber Solution Sharpeners Series, Victor Martinez, Sr. Cyber Engineer at Forcepoint discusses our Raise the Bar- and CSfC Program-compliant Cross Domain access solutions- Trusted Thin Client & Trusted Thin Client Remote.

    Watch this on-demand solution overview to learn about:
    -Product features, benefits and A&A endorsements
    -Relevant use cases and success stories from agency deployments
    -TTC and TTC:R’s technical components to include its’ architecture

    Forcepoint is a leading cybersecurity company that has been fortifying mission-critical data and networks across government agencies, the Department of Defense and the Intelligence Community for over 20 years. Forcepoint is attuned to how people interact with data and provides secure access while enabling employees to create value. Forcepoint solutions adapt to risk in real time to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders.

    Learn more and schedule a demo with our team today at: www.forcepoint.com/security/government-security
  • Forcepoint’s Cross Domain Solutions Suite Solution Sharpener Recorded: May 7 2020 7 mins
    Victor Martinez, Senior Cyber Engineer, Forcepoint
    In this edition of Forcepoint’s GovCyber Solution Sharpeners Series, Victor Martinez, Sr. Cyber Engineer at Forcepoint discusses our Raise the Bar- and CSfC Program-compliant Cross Domain Solution suite.

    Watch this on-demand solution overview to learn about:
    -Product features, benefits and A&A endorsements
    -Relevant use cases and success stories from agency deployments

    Forcepoint is a leading cybersecurity company that has been fortifying mission-critical data and networks across government agencies, the Department of Defense and the Intelligence Community for over 20 years. Forcepoint is attuned to how people interact with data and provides secure access while enabling employees to create value. Forcepoint solutions adapt to risk in real time to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders.

    Learn more and schedule a demo with our team today at: www.forcepoint.com/security/government-security
  • 5 Strategies for Agencies to Enhance Productivity & Secure Your Remote Workforce Recorded: May 6 2020 51 mins
    Security Engineer, Forcepoint G2CI
    Agencies are pivoting to remote work enablement models at an unprecedented scale. As you navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority.

    Join security engineers Forcepoint's Global Government & Critical Infrastructure as they share five tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes remote.

    Discussions will include strategies for supporting:
    - Roaming users who access highly sensitive information
    - High availability for critical apps
    - Connectivity challenges
    - How to enable collaboration and productivity
    - Increased cloud app usage
  • Accelerating Digital Transformation with Direct-to-Cloud Security Recorded: Aug 13 2019 41 mins
    Jim Fulton, Cloud & Network Security Solution Director
    Accelerating Digital Transformation with Direct-to-Cloud Connectivity and Security

    Secure SD-WAN, Network Security, and Web Security for the Modern Government
  • Align Your Security Efforts with the NIST Cybersecurity Framework Recorded: Jun 11 2019 27 mins
    Homayun Yaqub-Senior Director of Strategy at Forcepoint
    Often, when implementing the NIST Cybersecurity Framework, security teams spend too much time responding to alerts and security events, and far too little on concurrently and continuously focusing on post-breach planning and recovery.

    Watch this webinar to learn how adopting a risk-adaptive security approach can help agencies better align resources and better plan for evolving security requirements.

    Presenter- Homayun Yaqub is Senior Director of Strategy at Forcepoint.

    In this role, he partners with executives across various verticals to architect and deliver Forcepoint solutions to address human-centric business issues and better enable security/risk managers to safeguard their data and people assets. Yaqub brings more than 20 years of experience in the U.S. military, government, and private sector to Forcepoint.
  • Cloud Adoption in the U.S. Federal Government Recorded: May 21 2019 43 mins
    Dr. Larry Ponemon- Founder of The Ponemon Institute
    In 2017, reaffirming the commitment to the cloud, President Trump's Executive Order on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” calls for agency heads to show preference in their procurement for shared IT services, to the extent permitted by law, including email, cloud and cybersecurity services. Under this directive, agencies are continuing to prioritize cloud computing initiatives as part of their IT modernization plans.

    2 years later, in partnership with Ponemon, Forcepoint surveyed cloud influencers within federal agencies to find out more about current cloud adoption trends across federal government to find out where agencies are having successes and what problems they are encountering, especially as it relates to securing the cloud.

    Join this webinar to review and analyze the results of the research survey by Dr. Larry Ponemon.

    Dr. Ponemon earned his Ph.D. at Union College. He has a Master’s degree from Harvard University and attended the doctoral program in system sciences at Carnegie Mellon University.

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute and is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework.
    Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. Dr. Ponemon was also an appointed to two California State task forces on privacy and data security laws. He is a member of Shared Assessments’ Advisory Board.
  • Raising the Bar with Cross Domain Solutions Recorded: Jan 10 2019 26 mins
    Michelle Jordon
    As cyber threats continue to escalate in scale and frequency, it is imperative that cross domain solutions (CDS), which protect the world’s most sensitive data, comply with latest set of guidelines.

    Michelle Jordon, Forcepoint Global Governments Information Principal Cyber Security Manager, discusses “Raise the Bar,” an initiative created by the National Security Agency’s (NSA) and NCDSMO to combat rising threats while continually improving the status quo in the cross domain community.

    Watch the webcast to learn:

    Raise the Bar’s specifications
    Guidance for this initiative, including R.A.I.N
    An overview on Cross Domain Solutions
    Now is the time to prepare.
  • 2019 Government Cybersecurity Predictions, Presented by Forcepoint & Raytheon Recorded: Dec 11 2018 53 mins
    Forcepoint's George Kamis & Raffael Marty; Raytheon's Brett Scarborough
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your agency and the primary source of security breaches driving cyber risk to all-time highs.

    In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we could have ever imagined.

    In this webinar, we'll examine topics such as:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale

    Join Forcepoint's Raffael Marty (VP Research & Intelligence) and George Kamis (CTO Global Governments & Critical Infrastructure) along with Raytheon's Brett Scarborough (Senior Manager, Cyber Business & Strategy Development) for a discussion around the most pressing cybersecurity issues for government – and what agencies can do to protect against them.
  • Rethinking Data Protection for the Gov Cloud Recorded: Dec 6 2018 48 mins
    Ankur Chadda (Sr. Product Marketing Manager, Cloud) & Rob Campbell (Director, Data Security Solutions, Global Governments)
    As agencies modernize their security and data continues to move to the cloud, it’s critical to extend the same protections that you have on premises to the cloud.

    Watch this webinar to learn how Forcepoint CASB, along with DLP for Cloud Applications and Web Security solutions, can help with:

    • Discovery – insight into what cloud apps employees are using
    • Enforcement – automated threat prevention and context-aware policy enforcement
    • Risk Assessment – contextual risk of applications, users, and security configurations
  • Building Digital Transformation from the Network Up Recorded: Nov 27 2018 65 mins
    Mark Bunn (TIC Program Manager, DHS); Bryan Skelton (EIS Program Lead, Forcepoint), Ed Fox (VP Network Services, MetTel)
    Government-wide, agencies are urged to prioritize digital transformation so defense and civilian agencies have reliable and secure digital experiences whenever and wherever they need. But too often, agencies procure new contracts to build on legacy networks that either are inadequate or don’t sufficiently support emerging technologies that can help meet growing cyber demands.

    In this Roundtable Webcast, sponsored by MetTel and Forcepoint, Mark Bunn, program manager for DHS’s Trusted Internet Connections, discusses agency needs in networking and cybersecurity.

    Topics will include:

    - Understanding and preparing for GSA’s Enterprise Infrastructure Solutions (EIS) contract
    - Developing partnerships for getting the widest geographic reach with network-to-network interfaces
    - Designing a firm network foundation that is agile enough to scale for all agency needs
    - Hardening a network for reliable connectivity and resilience
    - Building security into all network needs
    - Effective uses of automation in networking
    - Creating a command and control dashboard
  • Dynamic Data Protection in Action Recorded: Nov 12 2018 10 mins
    Diana Pena, Forcepoint
    Government agencies are challenged to identify valuable risk insights and turn them into actionable protective measures. Often, behavior analytics tools can provide various insights into risky and anomalous activity, but do not enforce agency protection policies.

    Forcepoint is a key partner to government cybersecurity strategy, with solutions scaled to support agency security programs. Our risk-adaptive approach integrates best-in-class products with analytics and behavioral profiling, bringing agencies near real-time risk insights and automated remediation to better protect critical data, wherever it resides.

    In this brief, 10-minute webinar, we will demonstrate how Dynamic Data Protection (DDP) from Forcepoint helps surface anomalies and proactively adjusts individualized data security controls in near real time with proactive, dynamic security.
Fortify Government Networks & Systems with Forcepoint
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and
objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions.

Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Modernizing Federal Networks: How to Align with DHS’ Updated TIC 3.0
  • Live at: Jul 8 2020 6:00 pm
  • Presented by: AD Blanchette, Sales Engineering Manager, Forcepoint & David Hermann, Account Manager, Forcepoint
  • From:
Your email has been sent.
or close