51 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Implementing Zero-Trust in the Enterprise
Perimeter security is now longer sufficient. The cloud adds complexity, fluidity, and nuance to network security. A zero-trust network helps keep your people and data safe by treating all networks as untrusted. Join us as Dr. Cunningham, Principal Analyst at Forrester, and Nico Popp, Forcepoint’s Chief Product Officer, discuss the disconnect between security, operations and business and offer insights on how to build and implement a zero...
May 13, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Why Lead with Risk? Defining a Risk-Bas...
Effective governance requires a proactive approach. So when creating a cybersecurity strategy, it’s best to address the primary issue–risk–head on. Watch this webcast to learn: How to define cybersecurity success Steps you can take now to help avoid compliance issues later Common approaches that fall short
April 1, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Keeping Remote Workers Safe and Your Wo...
Organizations are pivoting to remote work enablement models at an unprecedented scale. As global organizations navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority. Join security strategists Carl Leonard and Mike Smart as they share six security tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes re...
March 25, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Beyond GDPR: America wakes up to privacy
GDPR may have stolen the limelight in 2018, but it could be America’s turn in 2019: With the California Consumer Privacy Act (CCPA) coming into effect in Jan 2020 and a recent Government Accountability Office (GAO) recommendation that Congress consider enacting a federal internet privacy law, big changes could be coming. In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European S...
July 10, 2019
Organizer: Forcepoint
Location: Webcast
Add Favorite
GDPR One Year On- 5 Lessons Learned
We are now one year on from when GDPR became law, but the compliance race is far from over. Many organizations undoubtedly made a huge effort to revamp their processes and security around personal data—but how effective have they been? In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss where we succeeded, where mistakes were made,...
June 19, 2019
Organizer: Forcepoint
Location: Webcast
Add Favorite
Enterprise Innovation Symposium
Hear fron Forcepoint's Michael Tolliver on "Flipping the Paradigm: Human-centric Cybersecurity for The Era Of Digital Transformation" at TENICA's 2019 Enterprise Innovation Symposium. Learn more and register today at: https://bit.ly/2Dwvnfr. At Forcepoint, we believe that organizations need to place users and data at the center of their design thinking. By making humans, and not events, the units of analysis, you can now use events as data inp...
May 1-2, 2019
Organizer: Forcepoint
Location: Atlanta, GA
Add Favorite
2018 Cybersecurity Leadership Forum
From the battlefield to the ballot box, the most vital aspect of your organization's cybersecurity is the people and how they interact with your data — the Human Point. Join us at the 2018 Cybersecurity Leadership Forum to learn how the best minds in government and tech are changing the paradigm when it comes to cybersecurity. Leaders from across government will share what is working today and what they are focused on next when it comes...
June 13, 2018
Organizer: cyberscoop | fedscoop
Location: Washington, DC
Add Favorite
Insider Threat and Security Luncheon fo...
THIS EVENT HAS BEEN CANCELLED. Improving Security for Classified and Unclassified Networks: Steps Agencies Can Take to Enhance their Insider Threat Program Agencies rely on external-looking tools to detect and provide data on their insider threats. Yet most agencies struggle to track and account for additional factors, including unfavorable behavioral patterns, employee negligence, and accidental occurrences. Join us to hear lessons learned an...
August 3, 2017
Organizer: Optiv
Location: Ft Collins, CO
Add Favorite
Securing Government in an Interconnecte...
The push for innovation has made our world more interconnected than ever. IT advancements in cloud, IoT and mobility have forced interdependency among federal agencies and reliance on various outside vendors and contractors to enhance productivity and ensure efficiency. With innovation comes vulnerability, such as cyber breaches and compromised information - so how can federal agencies stay technologically progressive, but still remain secure?...
April 20, 2016
Organizer: Forcepoint
Location: Webcast
Add Favorite
Reduce Risk & the Administrative Nightm...
Reduce Risk & the Administrative Nightmare: Key Management for Storage Encryption Explosive data growth, sophisticated data breaches, government regulations, and data storage requirements have caused agencies to deploy a combination of storage security solutions. Often, agencies rely on vendor-specific key management, which leads to fragmented, unsecure key stores and policies that need to be managed and maintained individually. Disparate...
June 12, 2014
Organizer: SafeNet, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search