Hi [[ session.user.profile.firstName ]]

5 Ways Agencies Can Improve Cybersecurity Posture to Meet Biden EO Requirements

President Biden's recent Executive Order outlines steps the US Federal Government must take to improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors the United States’ Cybersecurity.
Join Forcepoint's CTO and VP of Global Governments & Critical Infrastructure as they discuss the recent Executive Order, including
- what it means for Zero Trust
- how agencies can modernize and implement stronger cyber standards
- strategies for removing barriers to sharing information
- and more
Jun 15 2:30 pm UTC 43 mins
Starting in 00:00:00
Your place is confirmed,
we'll send you email reminders
Presented by
Petko Stoyanov, CTO, Forcepoint & Eric Trexler, Vice President, Forcepoint Global Governments & Critical Infrastructure
Presentation preview: 5 Ways Agencies Can Improve Cybersecurity Posture to Meet Biden EO Requirements

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 5 Ways Agencies Can Improve Cybersecurity Posture to Meet Biden EO Requirements Jun 15 2021 2:30 pm UTC 43 mins
    Petko Stoyanov, CTO, Forcepoint & Eric Trexler, Vice President, Forcepoint Global Governments & Critical Infrastructure
    President Biden's recent Executive Order outlines steps the US Federal Government must take to improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors the United States’ Cybersecurity.
    Join Forcepoint's CTO and VP of Global Governments & Critical Infrastructure as they discuss the recent Executive Order, including
    - what it means for Zero Trust
    - how agencies can modernize and implement stronger cyber standards
    - strategies for removing barriers to sharing information
    - and more
  • Breach Detection: Becoming as Agile as The Attackers Recorded: Jun 1 2021 63 mins
    U.S. Navy, U.S. Dept. of Transportation, U.S. Dept of Labor, USPS, Ponemon Institute, ATARC, Forcepoint
    Moving “left of breach” is the modern cybersecurity path forward that every agency should be striving for. That means focusing cybersecurity resources more on detecting and preventing potential breaches rather than cleaning up after a breach has already occurred.

    ATARC, Government experts and Forcepoint recently had a robust discussion on how agencies are innovating to stay ahead of advisories. Hear from Dr Larry Ponemon of the Ponemon institute as he shares the latest results of a 2021 Government Breach Trends Study that examines the problems and what innovation is happening across government to move to a more proactive security posture. Then learn what our panel of experts are doing to improve breach detection and response in a landscape where they are inundated by new, rapidly-evolving challenges as well as lessons learned.
  • Enabling a secure connected infrastructure - CDS Lessons Learned Recorded: May 4 2021 17 mins
    Lisa Hawes, Sr. Product Manager & Autumn-Dawn Blanchette, Systems Engineering Manager, Forcepoint G2CI
    Find out DOD lessons learned from deploying CDS at scale.
  • Enabling a secure connected infrastructure - Blueprint for the Future of CDS Recorded: Apr 30 2021 20 mins
    Nik Scalise, Sr. VP, Sales & Operations, CMA Technology | George Kamis, CTO, Forcepoint G2CI
    Develop a plan for the future where Cross Domain Solutions are deployed in the cloud
  • Enabling a secure connected infrastructure - Where to Diode, Where to Guard Recorded: Apr 30 2021 26 mins
    Steven Tessler, Sr. Solutions Architect & Praphul Kumar, Product Manager, Forcepoint G2CI
    Technical & engineering experts methodically bursts urban legends around Diodes, revealing when you need them and when you don’t.
  • Government 2021 Cybersecurity Insights And Predictions Recorded: Feb 8 2021 67 mins
    Mike Gruss, Exec Editor, Defense News C4ISRNET & Phil Goldstein, Sr. Editor FedTech Mag & StateTech Mag
    What were the biggest trends and headlines in 2020 in cybersecurity and what trends and programs updates lie ahead in 2021 for government cybersecurity? Join this webinar as cyber pros from To the Point Cybersecurity podcast, FedTech, StateTech, Defense News and C4ISRNET discuss:
    - The SolarWinds Orion breach
    - The immediate and long-term implications of COVID-19 for government agency cybersecurity
    - How remote work has accelerated the move to the Cloud
    - Strategies for improving federal cybersecurity in 2021+
    - Predictions about AI, government taking the lead, technology and security overall in 2021
    - and more.
  • How to Securely Enable Remote Collaboration Across Multiple Domains Recorded: Jan 27 2021 15 mins
    Jason Osterman, Chief Engineer, Forcepoint & Carolyn Ford, Host, To the Point Cybersecurity
    Collaboration in disparate federal agencies has been a challenge for year. In 2020, we saw the challenges come to light even more as they relate to accessing and collaborating across multiple classification levels while working remotely.

    Join this webinar to hear Jason Osterman, Chief Engineer, Forcepoint & Carolyn Ford, Host, To the Point Cybersecurity, discuss how agency workers can securely communicate across networks with multiple classification levels via chat, voice, telecon and more with Forcepoint's Raise the Bar-compliant Trusted Thin Client Cross Domain Solution.
  • 3 Differentiators of Forcepoint Next Generation Firewall & Why You Should Care Recorded: Jan 19 2021 42 mins
    Chris Sather, Product Management, Forcepoint & Derrick Wilson, Sr. Network Security Specialist, Forcepoint
    The old tried-and-true network approach is fragmented, labor intensive, and inconsistent to operate—and it’s inhibiting your agency from protecthing and securing your networks in the cloud-era. Digital transformation is a great way to innovate in today’s hyper-competitive world. But doing it successfully requires a new approach, combining agile, direct-to-cloud connectivity, strong security anywhere your systems touch the internet, and the ability to control and manage it all efficiently.

    Next-generation firewalls filter network traffic to protect an organization from external threats, but in this webcast we will focus on 3 primary areas that make Forcepoint next-generation firewalls stand out as you look to ensure better protection of your networks against emerging exploits and malware, accelerate cloud adoption and performance, and boost network resilience without sacrificing security
  • Filling the Cybersecurity Talent Gap Recorded: Jan 5 2021 36 mins
    George Randle, Strategic Advisor, EF Overwatch, former US Army & VP Global Talent Acquisition at Forcepoint
    In our modern business landscape, the war for talent is more complex than ever. You need to attract and retain the best talent for your organization to win, but without the right strategy or mindset, you won't be able to compete. If your revenue is declining, you're losing market share to your competition, or your organizational health is deteriorating, it's time to evolve how you approach this never-ending war. After all, your PEOPLE-not your product or service-are your strongest competitive advantage. Applying the logic of "The Talent War: How Special Operations and Great Organizations Win on Talent" to the cybersecurity job market.
  • Components of a Blueprint for Human and Organizational Resilience Recorded: Dec 14 2020 38 mins
    Dr. John Zangardi, Redhorse Corp & former CIO, DHS; Dr. Margaret Cunningham, Forcepoint's X-Lab & Petko Stoyanov, Forcepoint
    As the global cost of cybercrime continues to rise, millions of people’s personal data is being exposed, and our government and infrastructure are actively being targeted. Issues such as noisy data, human motivation and its impact on behavior, and complex data and systems increase the risk for human error in today’s environments- making it increasingly important for agencies to build a better understanding of how to identify individual and systemic risk factors that impact human performance. This session will discuss how to frame these problems and begin to design balanced intervention strategies to improve overall organizational resilience.
  • Get the best from DLP - Strengthen your strategy with these new features Recorded: Dec 8 2020 34 mins
    Ankur Chadda, Product Marketing, Forcepoint; Carl Eberling, CIO, Forcepoint & Eric Jackson, Product Management, Forcepoint
    Today’s Enterprise DLP has evolved many new and advanced capabilities that put it at the heart of a data protection strategy. Ankur Chadda is joined by Carl Eberling and Eric Jackson to discuss how these advancements can help us address the challenges of the new working landscape, accelerate your strategy and re-think what is possible.
  • Ponemon Institute US & UK Privileged User Survey Results Recorded: Dec 2 2020 41 mins
    Dr. Larry Ponemon, Ponemon Institute; Mike Crouse, Forcepoint & Jared Quance, U.S. Coast Guard
    Government organizations are struggling to improve their privileged access governance practices and reduce the likelihood of a data breach or other security incidents caused by insiders. According a recent Ponemon Institute survey, many individuals admit they have privileged access rights that are not necessary to complete their current job assignments.
    •49% of Privileged users access sensitive or confidential data because of their curiosity
    •44% of Privileged users can be pressured to share their access rights with others in the organization
    •36% of Privileged users believe they are empowered to access all the information they can view
    On this webinar Dr Ponemon presents key findings and discusses what they mean for Government agencies with Mike Crouse, Director Insider Threat Strategies, Forcepoint and as an implementer, Jared Quance, Insider Threat Program Manager, U.S. Coast Guard provides real-world understanding of what they mean for insider threat programs.
  • How to know if you're ready for enterprise DLP Recorded: Nov 19 2020 34 mins
    Ankur Chadda, Product Marketing, Forcepoint; Nico Fischbach, CTO, Forcepoint & John Stringer, Product Management, Forcepoint
    DLP technology is now everywhere – often found integrated in other security products like Web and Email Security, whilst many Cloud Aps will offer it as part of their service. But is it enough to rely on a myriad of providers to fulfill this critical security need? Ankur is joined by guests Nico Fischbach and John Stringer to discuss why an organization to discuss why Enterprise DLP is still the best option.
  • Mission Enablement Shorts: Operations Center Modernization Recorded: Nov 16 2020 4 mins
    Carolyn Ford, Product Marketing Manager, Forcepoint
    Understand How We Can Fortify Government Networks, Systems, & Missions in 5 minutes or less with actual customer deployments.
  • Increase Enterprise Visibility with an Adaptive Software Enabled Architecture Recorded: Nov 11 2020 47 mins
    Duke Butler, CommScope
    Agency IT teams must balance new workforce productivity and BYOD trends with security demands essential for evolving compliance and ‘work from home” requirements. By integrating Forcepoint Dynamic Edge Protection (DEP) and CommScope’s RUCKUS SmartZone, Cloudpath and Analytics, agencies can realize increased visibility over sources of network traffic and increased control from the campus across the entire enterprise.

    Join Forcepoint and CommScope to learn about how their Adaptive Software Enabled Architecture solution
    - Delivers policy-based secure network access for BYOD, guest users, and IT-owned devices—including IP-enabled IoT devices
    - Creates policy-based security network access that adapts based on the actions of end users or mission needs.
    - Enforce adaptive security policies with per-user or per-device granular control.
    - Raises the bar on network and data security with a SASE solution that is greater than the sum of its parts

    CommScope is the only global manufacturer of every technology required for tomorrow’s ultra-efficient converged networks consisting of wired and wireless networks. The RUCKUS portfolio of products drives every level of network infrastructure, and bring interoperability, ease of deployment and simplicity of management to mission needs. Forcepoint Dynamic Edge Protection (DEP) provides true SASE security-as-a-service that is ideal for safeguarding branch offices, SD-WAN connections, and Wi-Fi networks without deploying security hardware. When combined, their comprehensive solution enables greater user productivity and simplified management control across complex government agencies.
  • Blueprint for Cloud Multi Domain Operations Recorded: Nov 2 2020 19 mins
    George Kamis, CTO G2CI, Forcepoint & MG (ret.) Joseph Brendler, Principal, Brendler Consulting, LLC
    Work-from-home has become the “new normal” and pose unique challenges for those whose jobs require a higher level of security and sensitive data access. Remote Work has created an increasingly urgent struggle to securely manage information sharing required to confidently make mission-critical decisions in real time. Cross Domain Solutions enable agencies to fortify and manage multi-network environments, reduce risk and provide access to mission critical data no matter where personal are located. Cross Domain Solutions embed security and leverage automation to facilitate end-user collaboration, reduce mission errors, and enable quicker decision making. Moving those capabilities to the cloud speeds deployment and reduces infrastructure costs. George Kamis, Forcepoint CTO Global Governments & Critical Infrastructure, and Maj. Gen. Joseph Brendler (Ret.) discuss how and why deploying Cross Domain Solutions in the cloud will enable secure information sharing for remote workers and mission partners no matter where they are located.
  • Blueprint for Zero Trust in a Remote World Recorded: Oct 26 2020 25 mins
    Steven Hernandez, Dept of Ed; Brandon Wales, DHS; Myrna Soto, Forcepoint
    This year there has been growing interest in Zero Trust among Federal Agencies. In fact, 44 federal agencies now have dedicated, funded tiger teams to either research or start implementing zero trust strategically. As agencies accelerate work from home programs and consider Zero Trust, this panel will discuss real world examples and advice to help you create an effective blueprint for implementing zero trust within your environment.
  • A Technical Blueprint for Data Protection Recorded: Oct 21 2020 36 mins
    Ankur Chadda, Principal Data Protection Solutions Manager & Bob Mechler, Principal Security Strategist , Forcepoint
    Principal Data Protection Solutions Manager Ankur Chadda is joined by Principal Security Strategist Bob Mechler to discuss a 9-Step Strategy for Success.
  • Applying "Team of Teams" Logic to Cyber with General Stanley McChrystal Recorded: Oct 13 2020 45 mins
    Stanley McChrystal, Retired General, U.S. Army & Eric Trexler and Carolyn Ford, Forcepoint
    100th episode with retired, four-star General Stanley McChrystal, discussing his bestselling book "Team of Teams" and the similarities between the landscape he encountered in Iraq and today's Cyber landscape and how we can apply the lessons and tactics used to defend against Al Qaeda to cyber.
  • Are Our COVID Vaccines Safe From Hackers? Recorded: Oct 1 2020 21 mins
    Sean Kelley, EVP of Operations at Unissant, Carolyn Ford & Eric Trexler, Forcepoint
    Sean Kelley, Executive Vice President of Operations at Unissant leverages his 25 years experience in the Healthcare industry to weigh in on the security of the COVID-19 vaccine and healthcare in general during a pandemic. He offers the top things he would do as a CISO right now to make healthcare more secure.
Connect & protect your global, multi-domain workforce
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and
objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions.

Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 5 Ways Agencies Can Improve Cybersecurity Posture to Meet Biden EO Requirements
  • Live at: Jun 15 2021 2:30 pm
  • Presented by: Petko Stoyanov, CTO, Forcepoint & Eric Trexler, Vice President, Forcepoint Global Governments & Critical Infrastructure
  • From:
Your email has been sent.
or close