Hi [[ session.user.profile.firstName ]]

Applying "Team of Teams" Logic to Cyber with General Stanley McChrystal

100th episode with retired, four-star General Stanley McChrystal, discussing his bestselling book "Team of Teams" and the similarities between the landscape he encountered in Iraq and today's Cyber landscape and how we can apply the lessons and tactics used to defend against Al Qaeda to cyber.
Recorded Oct 13 2020 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stanley McChrystal, Retired General, U.S. Army & Eric Trexler and Carolyn Ford, Forcepoint
Presentation preview: Applying "Team of Teams" Logic to Cyber with General Stanley McChrystal

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Filling the Cybersecurity Talent Gap Jan 5 2021 7:30 pm UTC 36 mins
    George Randle, Strategic Advisor, EF Overwatch, former US Army & VP Global Talent Acquisition at Forcepoint
    In our modern business landscape, the war for talent is more complex than ever. You need to attract and retain the best talent for your organization to win, but without the right strategy or mindset, you won't be able to compete. If your revenue is declining, you're losing market share to your competition, or your organizational health is deteriorating, it's time to evolve how you approach this never-ending war. After all, your PEOPLE-not your product or service-are your strongest competitive advantage. Applying the logic of "The Talent War: How Special Operations and Great Organizations Win on Talent" to the cybersecurity job market.
  • Components of a Blueprint for Human and Organizational Resilience Dec 14 2020 2:30 pm UTC 38 mins
    Dr. John Zangardi, Redhorse Corp & former CIO, DHS; Dr. Margaret Cunningham, Forcepoint's X-Lab & Petko Stoyanov, Forcepoint
    As the global cost of cybercrime continues to rise, millions of people’s personal data is being exposed, and our government and infrastructure are actively being targeted. Issues such as noisy data, human motivation and its impact on behavior, and complex data and systems increase the risk for human error in today’s environments- making it increasingly important for agencies to build a better understanding of how to identify individual and systemic risk factors that impact human performance. This session will discuss how to frame these problems and begin to design balanced intervention strategies to improve overall organizational resilience.
  • Get the best from DLP - Strengthen your strategy with these new features Dec 8 2020 6:30 pm UTC 34 mins
    Ankur Chadda, Product Marketing, Forcepoint; Carl Eberling, CIO, Forcepoint & Eric Jackson, Product Management, Forcepoint
    Today’s Enterprise DLP has evolved many new and advanced capabilities that put it at the heart of a data protection strategy. Ankur Chadda is joined by Carl Eberling and Eric Jackson to discuss how these advancements can help us address the challenges of the new working landscape, accelerate your strategy and re-think what is possible.
  • Ponemon Institute US & UK Privileged User Survey Results Dec 2 2020 4:00 pm UTC 41 mins
    Dr. Larry Ponemon, Ponemon Institute; Mike Crouse, Forcepoint & Jared Quance, U.S. Coast Guard
    Government organizations are struggling to improve their privileged access governance practices and reduce the likelihood of a data breach or other security incidents caused by insiders. According a recent Ponemon Institute survey, many individuals admit they have privileged access rights that are not necessary to complete their current job assignments.
    •49% of Privileged users access sensitive or confidential data because of their curiosity
    •44% of Privileged users can be pressured to share their access rights with others in the organization
    •36% of Privileged users believe they are empowered to access all the information they can view
    On this webinar Dr Ponemon presents key findings and discusses what they mean for Government agencies with Mike Crouse, Director Insider Threat Strategies, Forcepoint and as an implementer, Jared Quance, Insider Threat Program Manager, U.S. Coast Guard provides real-world understanding of what they mean for insider threat programs.
  • How to know if you're ready for enterprise DLP Nov 19 2020 8:30 pm UTC 34 mins
    Ankur Chadda, Product Marketing, Forcepoint; Nico Fischbach, CTO, Forcepoint & John Stringer, Product Management, Forcepoint
    DLP technology is now everywhere – often found integrated in other security products like Web and Email Security, whilst many Cloud Aps will offer it as part of their service. But is it enough to rely on a myriad of providers to fulfill this critical security need? Ankur is joined by guests Nico Fischbach and John Stringer to discuss why an organization to discuss why Enterprise DLP is still the best option.
  • Mission Enablement Shorts: Operations Center Modernization Nov 16 2020 3:30 pm UTC 4 mins
    Carolyn Ford, Product Marketing Manager, Forcepoint
    Understand How We Can Fortify Government Networks, Systems, & Missions in 5 minutes or less with actual customer deployments.
  • Increase Enterprise Visibility with an Adaptive Software Enabled Architecture Nov 11 2020 4:00 pm UTC 60 mins
    Forcepoint & Commscope
    Agency IT teams must balance new workforce productivity and BYOD trends with security demands essential for evolving compliance and ‘work from home” requirements. By integrating Forcepoint Dynamic Edge Protection (DEP) and CommScope’s RUCKUS SmartZone, Cloudpath and Analytics, agencies can realize increased visibility over sources of network traffic and increased control from the campus across the entire enterprise.

    Join Forcepoint and CommScope to learn about how their Adaptive Software Enabled Architecture solution
    - Delivers policy-based secure network access for BYOD, guest users, and IT-owned devices—including IP-enabled IoT devices
    - Creates policy-based security network access that adapts based on the actions of end users or mission needs.
    - Enforce adaptive security policies with per-user or per-device granular control.
    - Raises the bar on network and data security with a SASE solution that is greater than the sum of its parts

    CommScope is the only global manufacturer of every technology required for tomorrow’s ultra-efficient converged networks consisting of wired and wireless networks. The RUCKUS portfolio of products drives every level of network infrastructure, and bring interoperability, ease of deployment and simplicity of management to mission needs. Forcepoint Dynamic Edge Protection (DEP) provides true SASE security-as-a-service that is ideal for safeguarding branch offices, SD-WAN connections, and Wi-Fi networks without deploying security hardware. When combined, their comprehensive solution enables greater user productivity and simplified management control across complex government agencies.
  • Blueprint for Cloud Multi Domain Operations Nov 2 2020 7:30 pm UTC 19 mins
    George Kamis, CTO G2CI, Forcepoint & MG (ret.) Joseph Brendler, Principal, Brendler Consulting, LLC
    Work-from-home has become the “new normal” and pose unique challenges for those whose jobs require a higher level of security and sensitive data access. Remote Work has created an increasingly urgent struggle to securely manage information sharing required to confidently make mission-critical decisions in real time. Cross Domain Solutions enable agencies to fortify and manage multi-network environments, reduce risk and provide access to mission critical data no matter where personal are located. Cross Domain Solutions embed security and leverage automation to facilitate end-user collaboration, reduce mission errors, and enable quicker decision making. Moving those capabilities to the cloud speeds deployment and reduces infrastructure costs. George Kamis, Forcepoint CTO Global Governments & Critical Infrastructure, and Maj. Gen. Joseph Brendler (Ret.) discuss how and why deploying Cross Domain Solutions in the cloud will enable secure information sharing for remote workers and mission partners no matter where they are located.
  • Blueprint for Zero Trust in a Remote World Oct 26 2020 2:00 pm UTC 25 mins
    Steven Hernandez, Dept of Ed; Brandon Wales, DHS; Myrna Soto, Forcepoint
    This year there has been growing interest in Zero Trust among Federal Agencies. In fact, 44 federal agencies now have dedicated, funded tiger teams to either research or start implementing zero trust strategically. As agencies accelerate work from home programs and consider Zero Trust, this panel will discuss real world examples and advice to help you create an effective blueprint for implementing zero trust within your environment.
  • A Technical Blueprint for Data Protection Recorded: Oct 21 2020 36 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Bob Mechler, Principal Security Strategist , Forcepoint
    Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.
  • Applying "Team of Teams" Logic to Cyber with General Stanley McChrystal Recorded: Oct 13 2020 45 mins
    Stanley McChrystal, Retired General, U.S. Army & Eric Trexler and Carolyn Ford, Forcepoint
    100th episode with retired, four-star General Stanley McChrystal, discussing his bestselling book "Team of Teams" and the similarities between the landscape he encountered in Iraq and today's Cyber landscape and how we can apply the lessons and tactics used to defend against Al Qaeda to cyber.
  • Are Our COVID Vaccines Safe From Hackers? Recorded: Oct 1 2020 21 mins
    Sean Kelley, EVP of Operations at Unissant, Carolyn Ford & Eric Trexler, Forcepoint
    Sean Kelley, Executive Vice President of Operations at Unissant leverages his 25 years experience in the Healthcare industry to weigh in on the security of the COVID-19 vaccine and healthcare in general during a pandemic. He offers the top things he would do as a CISO right now to make healthcare more secure.
  • The Next Chapter of CDM with Jason DeShano, Chief Architect, Booz Allen Hamilton Recorded: Sep 22 2020 25 mins
    Jason DeShano, Chief Technologist, Booz Allen Hamilton; Eric Trexler, VP, Forcepoint; Carolyn Ford, PMM, Forcepoint
    The Continuous Diagnostics and Mitigation (CDM) program is evolving to lead the effort to reduce cyber risk and provide visibility across the federal government. Jason DeShano, Chief Architect for the Continuous Diagnostics and Mitigation (CDM) Booz Allen Hamilton answers the hard questions.
  • Building an Insider Threat Program, Lessons Learned Recorded: Sep 15 2020 38 mins
    Dan Velez, Director of Insider Threat Consulting Services, Forcepoint
    Forcepoint’s Dan Velez, Director of Insider Threat Consulting Services discusses the components of a well-constructed Insider Threat defense program. Dan has helped stand up insider threat programs for the US Government for over a decade. During this discussion he draws on his experience to share best practices.
  • How the FBI Achieved Remote Multi Domain Access Recorded: Sep 8 2020 22 mins
    George Kamis, CTO Forcepoint Global Governments & Critical Infrastructure
    Learn how agencies can deftly boost collaborative cross domain operations when end-users meet mission partners; simplify their data security protocols; and how industry is automating the provisioning, certificate management and deployment of CSfC
  • Extending Data Protection to the Cloud Recorded: Aug 25 2020 46 mins
    David White, Sr. Account Manager & Guy Crumpley. Cloud Solutions Architect
    Federal agencies are rapidly moving to the cloud. In fact, there are over 228 cloud providers being used by Federal Government today and federal email is rapidly moving to the cloud with over 70% of all federal email now being hosted in the cloud.

    For agencies making the transition to the cloud, security threats are constantly evolving and becoming more sophisticated, and the cloud is equally at risk than an on-premises environment. In this webinar, we’ll discuss top cloud risks you need to be aware of, the importance of consistent data protection across all environments, and data protection strategies you can use today to secure Office 365 and other SaaS apps.
  • Human Behavior: The Heart of an Insider Threat Program Recorded: Aug 18 2020 40 mins
    Michael Crouse, Director of Insider Risk Programs, Forcepoint
    What does “Insider Threat” mean to you? For some it means user activity monitoring; some insider risk or data loss protection; for others: risk compliance, and for the adventurous, continuous evaluation and verification. No matter what you name your insider threat program, or what your mission is, all insider threat programs center around human behavior and visibility. In fact, the cybersecurity industry overall is recognizing the need to center around human behavior. Nothing identifies this new understanding better than RSA’s theme: “Human Element”. Human behavior is complex and voluminous, a successful program requires automated and adaptive risk management to rapidly respond to constantly changing threats independent of the individual mission. A successful program must also take a holistic approach, rather than point solutions, to address the mobile workforce, and organizations shift to cloud storage. In this session Mike addresses these unifying elements of a successful program.
  • War, Sabotage & Fear in the Cyber Age Recorded: Aug 11 2020 46 mins
    David Sanger, New York Times; Eric Trexler, Forcepoint; Carolyn Ford, Forcepoint
    New York Times reporter, Pulitzer prize winner and best selling author, David Sanger discusses his latest book, soon to be an HBO special "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age", which focuses on cyberwarfare. This week gets to David’s list of things we must do when it comes to cyberwarfare and his take on the security of the upcoming elections.
  • Federal Cybersecurity in a Changing World: How to Create an Ideal Cyber Strategy Recorded: Aug 4 2020 60 mins
    Brittany Johnston, MeriTalk, Dr. Barry West, West Wing Advisory Services, LLC. & George Kamis, Forcepoint
    Federal cybersecurity is more critical than ever as agencies quickly adapt to a “maximized telework” environment. But, how effective are Feds’ current cybersecurity efforts? Underwritten by Forcepoint, MeriTalk surveyed 150 Federal IT managers and compiled qualitative data from in-depth interviews with Federal cybersecurity leaders to understand the state of cybersecurity in Federal agencies and offer recommendations to advance cyber progress.

    Attend the webinar to learn about:
    - What is working well in agencies’ cybersecurity strategies, and what needs to change
    - If agencies could rebuild their strategies from the ground up, what would they look like
    - Strategies for overcoming common challenges in federal agency modernization efforts.
  • Forcepoint Cross Domain Solutions Forum Recorded: Jul 28 2020 49 mins
    Steve Stratton, Senior Director Product Management Forcepoint, Lisa Hawes, Product Management Forcepoint
    Latest Industry Trends, Initiatives & Solutions and Capability Updates
Connect & protect your global, multi-domain workforce
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and
objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions.

Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Applying "Team of Teams" Logic to Cyber with General Stanley McChrystal
  • Live at: Oct 13 2020 2:30 pm
  • Presented by: Stanley McChrystal, Retired General, U.S. Army & Eric Trexler and Carolyn Ford, Forcepoint
  • From:
Your email has been sent.
or close