Breach Detection: Becoming as Agile as The Attackers

Presented by

U.S. Navy, U.S. Dept. of Transportation, U.S. Dept of Labor, USPS, Ponemon Institute, ATARC, Forcepoint

About this talk

Moving “left of breach” is the modern cybersecurity path forward that every agency should be striving for. That means focusing cybersecurity resources more on detecting and preventing potential breaches rather than cleaning up after a breach has already occurred. ATARC, Government experts and Forcepoint recently had a robust discussion on how agencies are innovating to stay ahead of advisories. Hear from Dr Larry Ponemon of the Ponemon institute as he shares the latest results of a 2021 Government Breach Trends Study that examines the problems and what innovation is happening across government to move to a more proactive security posture. Then learn what our panel of experts are doing to improve breach detection and response in a landscape where they are inundated by new, rapidly-evolving challenges as well as lessons learned.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (66)
Subscribers (2255)
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions. Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.