51 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Cyber Voices Zero Trust Summit
Security teams are struggling with the acceleration of digital transformation and the sudden shift to remote working. Learn how you can adopt a Zero Trust architecture that focuses on cloud-based workloads, is aware of critical data and intellectual property usage, and takes a risk-based approach to protecting identities on your network.
October 27, 2020
Organizer: Forcepoint
Location: Virtual
Add Favorite
Strategies for Implementing and Operati...
The sophistication and volume of cyber-attacks that government agencies face on a daily basis requires more than just technology to combat it. Zero Trust offers a holistic strategy and framework that is not tied to a single decision of technology, but rather enables IT and agency leaders to promote and support enterprise wide shifts in where and how it provides access to data and/or systems and applications. As agencies consider a zero trust m...
October 14, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Government at the Edge 2020 - Forcepoin...
In today’s environment, government leaders face a myriad of urgent cybersecurity challenges. Endpoints and their associated vulnerabilities are expanding with the newly remote workforce. Traditional network perimeters are dissolving, requiring new strategies to protect users and data. Nefarious actors seeking to exploit critical government data are threatening to disrupt the 2020 election. How can leaders mitigate these critical threats?...
September 24, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
On the Cybersecurity Forefront - Behavi...
Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioral analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world.Join IDG’s Bob Bragdon and Forcepoint’s Jim Fu...
September 16, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Building an Insider Threat Program, Les...
Forcepoint’s Dan Velez, Director of Insider Threat Consulting Services discusses the components of a well-constructed Insider Threat defense program. Dan has helped stand up insider threat programs for the US Government for over a decade. During this discussion he draws on his experience to share best practices.
September 15, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Strategies for Enhancing your Conduct R...
Join us as we discuss best practices around developing your own strategy for enhancing your conduct risk management. With most employees having to shift to remote working overnight, it has become even more challenging to strike the balance between maximizing employee productivity and minimizing your risk.In this webinar we’ll cover: Covid-19 impact and the need for insider risk management in the financial services industry. Modern conduc...
September 9, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
How the FBI Achieved Remote Multi Domai...
Learn how agencies can deftly boost collaborative cross domain operations when end-users meet mission partners; simplify their data security protocols; and how industry is automating the provisioning, certificate management and deployment of CSfC.
September 8, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
3 Differentiators of Forcepoint Next Ge...
3 Differentiators of Forcepoint Next Generation Firewall & Why You Should Care
September 1, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Government at the Edge: Forcepoint Cybe...
At this half-day digital summit, government agency leaders will gain tools to align their cybersecurity priorities for the next 1, 5, and 10 years. What makes cybersecurity human-centric, agile, and sustainable? How can agencies turn their internal and external cybersecurity practices into methods that reflect these values? Attendees will have the opportunity to learn how to take their cybersecurity plans and priorities from idea to reality....
June 24, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
The Voice of the CPO: The Case for Movi...
A trillion dollars spent on perimeter protection is clearly not effective in securing organisations against breaches. The inspiring Nico Popp elucidates the need to move from outside-in to inside-out security on a whiteboard. You will learn: What every security practitioner will be encountering in the not so distant future Where the limits of endpoint, network, cloud or email security lie Why the most successful strategies involve a focus on people
May 20, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Back to Search Begin New Search