Hi [[ session.user.profile.firstName ]]

Work securely anywhere, keep data safe everywhere

Businesses are facing new drivers, organisations have had to adjust, adapt and evolve to allow their users to work from anywhere in a secure manner and protect company data everywhere.
SASE provides a new starting point in the cloud, but not every SASE is the same.
Listen to Nicolas Fischbach, Forcepoint CTO, as he discusses why SASE and Zero Trust has gained so much momentum recently and explains why a risk adaptive, data-centric policy provides enhanced security, creates more agility and a better user experience.
Recorded Jul 8 2021 22 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nicolas Fischbach, Forcepoint CTO
Presentation preview: Work securely anywhere, keep data safe everywhere

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 3 Key Considerations to Secure the Workforce of the Future Recorded: Jul 15 2021 22 mins
    Indi Birak, Managing Security Consultant at Fujitsu
    Innovative security technologies play a crucial role in securing the workforce of the future. But it is not a stand-alone role. Organizations have to consider how to strengthen the people, process and technology elements in order to build a truly secure posture.
    Listen to Indi Birak, Managing Security Consultant at Fujitsu as she explores the three key factors that must be addressed to capitalize on the value of your security investments and secure the Future Workplace
  • Work securely anywhere, keep data safe everywhere Recorded: Jul 8 2021 22 mins
    Nicolas Fischbach, Forcepoint CTO
    Businesses are facing new drivers, organisations have had to adjust, adapt and evolve to allow their users to work from anywhere in a secure manner and protect company data everywhere.
    SASE provides a new starting point in the cloud, but not every SASE is the same.
    Listen to Nicolas Fischbach, Forcepoint CTO, as he discusses why SASE and Zero Trust has gained so much momentum recently and explains why a risk adaptive, data-centric policy provides enhanced security, creates more agility and a better user experience.
  • Securing the Evolving Workplace [Fireside Chat] Recorded: Jul 1 2021 20 mins
    Nico Popp, Chief Product Officer [Forcepoint] & Andy Davis, Head of Strategy Growth, Workforce & Workspace Services [Fujitsu]
    The new opportunities created for the workforce by the recent shift in working practices are mirrored by new opportunities for cyber criminals. Security teams need to move with these changes and provide security controls that allow staff to embrace new ways of working empowering a distributed workforce to stay productive, whilst keeping the business secure.
    Join Nico Popp, Chief Product Officer at Forcepoint and Fujitsu’s Head of Strategy & Growth, Workforce & Workspace Services, Andy Davis, as they discuss these changes, the measures organizations need to consider to stay secure and how a human-centric approach can help build a secure and sustainable future.
  • Why Your Cyber Budget is Being Wasted: Building a Cyber Smart Culture Recorded: May 4 2021 51 mins
    Clive Tillotson, Fujitsu Filipa Arenga, Fujitsu Martin Holzworth, Fujitsu
    In this webcast discover why security investments can easily be wasted if the human factor is not properly considered, and how you can redress the balance to build a cyber smart culture.

    The strength of an organization’s cyber security lies in the behaviors of every individual. Our expert panel comes from across business disciplines to explore the findings of our recent global research report, ‘Building a Cyber Smart Culture´ and consider why and how businesses need to go beyond the traditional cyber security awareness methods to prioritize and reinforce strong security behaviors and mindsets.

    Join us for this highly interactive panel session to hear from our Global Delivery Group CISO, Internal Communications Expert and the Head of Fujitsu’s Cyber Security Portfolio in Australia, as they share exclusive insights about:
    - Why security technologies must work with the human surface to protect the organization
    - Why many users do not practice good cyber security behaviors
    - How to build an effective cyber smart culture that benefits the whole business.

    This session provides a fresh vision into making the most of your cyber security technology investments as well as your people.
  • Hitting the Moving Target of Cloud Security Recorded: Dec 10 2020 33 mins
    Shaun Keeling, Lead Cloud Security Architect, Fujitsu and Stuart Green, Cloud Security Architect, Check Point.
    As organizations embrace the Cloud they must understand their responsibilities for the security of their data, or they risk opening up vulnerabilities for cyber criminals to exploit. By understanding the responsibilities and risks they face organizations can implement the right measures to allow them to securely enjoy the benefits of cloud adoption.

    Join Fujitsu's Cyber Security expert Shaun Keeling, and Check Point’s Stuart Green as they discuss the steps to understanding your cyber security posture in the Cloud.
  • Identity and Access Management and CASB for Multi-Cloud Security Recorded: Nov 17 2020 46 mins
    Andy Baines, Chief Security Architect | Petri Heinälä, Security Offerings Architect | Mark Wilson IAM Business Lead
    In this webinar, Fujitsu's experts discuss the importance of secure Identity and Access Management (IAM), as well as CASB, in creating a secure and sustainable Multi-Cloud environment for your business.

    During this session you will learn:
    - How the threatscape has changed for organizations in a digitally transforming world
    - The key ingredients for an effective Identity and Access Management strategy
    - How CASB helps organizations address the issue of shared responsibility for security in the cloud.
  • Securing Digital Transformation Recorded: Nov 10 2020 56 mins
    Alex Hilton - Cloud Industry Forum | Clive Finlay - Broadcom | Max Faun - Okta | Fiona Boyd - Fujitsu
    “As businesses look to Digital Transformation, they also need to look at security transformation”, says InformationAge. With DX initiatives including increasing the number of IoT devices and moving data to the cloud, the more a business digitally transforms, the more it's susceptible to security threats. In fact, 85% of chief information security officers view security issues related to Digital Transformation as having a somewhat to extremely large effect on their companies, according to a recent survey by Fortinet.

    However, security architectures are complex - especially when they sit in the context of new and evolving technologies underpinning a business and its product suite. Join episode 13 of Digital Transformation in Action, where host Alex Hilton and guest experts share insights on how to securely enable Digital Transformation.

    Points of discussion will include:
    - Why a proactive, continuously integrated and automated approach to cyber security is critical to Digital Transformation success
    - The importance of ‘baking in’ security to DX projects throughout the entire lifecycle
    - The importance of championing robust attitudes to security throughout organizations and transforming the IT culture

    Guest experts:
    - Clive Finlay, Head of EMEA Solution Engineering - Symantec Enterprise Division, Broadcom
    - Max Faun, Head of EMEA Consulting at Okta
    - Fiona Boyd, Head of Enterprise and Cyber Security at Fujitsu Services
  • Illuminating Shadow IT to Accelerate Growth Recorded: Oct 27 2020 47 mins
    Andy Baines - Chief Security Architect at Fujitsu and Dave Barnett - Head of the Edge Protection at Forcepoint
    Fujitsu's Andy Baines is joined by Dave Barnett, Head of the Edge Protection portfolio at Forcepoint, to discuss how organisations can securely embrace Shadow IT to allow innovation and drive future growth.
  • Cyber Security for Industrial Control Systems: Best Practices & Lessons Learned Recorded: Oct 1 2020 57 mins
    Stephen Pichocki, Fujitsu. Jamie Wilkie, Fujitsu. Rob Falzon, Check Point
    In this guest webinar, run jointly with our partner Check Point, our experts examine the Cyber Security implications for connected Industrial Control Systems. What are the best practices & lessons learned to keep these assets safe from attack.
  • Stay Securely Connected and Collaborative with Fujitsu and Microsoft Recorded: Aug 11 2020 57 mins
    Presented by: Adrian Keasey, Microsoft Security Practice Manager, Fujitsu Scott Calder, Workplace Solution Architect, Fujitsu
    The anywhere workplace is the way forward for many organizations. Whether the motivation is business continuity during a global pandemic, a change in consumer preferences or an appetite to collaborate better with your third-party suppliers - the most rapid acceleration of digital transformation has been in remote working and collaboration. All these factors come with a new set of complex security issues, brand-new business models and distributed staff.

    In this webinar, Fujitsu and Microsoft experts will share exclusive insights on how to enable appropriate levels of access and protection while ensuring a seamless collaboration and maintaining productivity. The secure by design principles will allow you to extend your protection to more devices, connect to apps and prevent data from going where it should not.
  • Implementing a game-changing technology in the fight against cyber threats Recorded: Jul 24 2020 37 mins
    Steve Pye, SOAR Technical Lead, Fujitsu and Patrick Bayle, Systems Engineer, Palo Alto Networks
    Watch our expert webinar to learn about how you can use Security Orchestration, Automation & Response (SOAR) to provide a game-changing boost to your threat response capabilities, and the tangible benefits that this innovation brings.

    During this webinar, you will learn:

    - How Fujitsu has been using SOAR to enhance our threat response capabilities and the benefits
    - The 6 key steps to implementing SOAR technology
    - How SOAR reduces the time to respond to incidents and ensures cyber security analysts are always focused on the priority threats
    - How you can start using SOAR to improve your cyber security posture.
  • Using SIEM and EDR to strengthen cyber defense Recorded: Jul 22 2020 50 mins
    Sam Curry, CISO, Cybereason
    ​Fujitsu welcomes Sam Curry, CISO at Cybereason, to discuss the issue of 'security tool overload', compare and contrast different security technologies and how mapping technologies to requirements enables effective security operations and empowers your people to face the ever-rising tide of cyber threats.
Security is everyone's business
Get the latest insights from Fujitsu's Cyber Security division to understand the key industry trends and how you can empower your business to stay ahead of threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Work securely anywhere, keep data safe everywhere
  • Live at: Jul 8 2021 9:00 am
  • Presented by: Nicolas Fischbach, Forcepoint CTO
  • From:
Your email has been sent.
or close