際際滷shows by User: Forcepoint / http://www.slideshare.net/images/logo.gif 際際滷shows by User: Forcepoint / Mon, 26 Aug 2019 18:42:28 GMT 際際滷Share feed for 際際滷shows by User: Forcepoint Rethinking the concept of trust (DoDIIS 2019 presentation) /slideshow/rethinking-the-concept-of-trust-dodiis-2019-presentation/166616541 dodiis-g2ci-presentation-4x3-rethinking-the-concept-of-trust-eric-trexler-081419-v5-190826184228
Eric Trexler, Vice President of Global Governments & Critical Infrastructure at Forcepoint spoke at DoDIIS 2019. He described how trust is changing, and offered advice for agencies to considering how to balance trust and security. ]]>

Eric Trexler, Vice President of Global Governments & Critical Infrastructure at Forcepoint spoke at DoDIIS 2019. He described how trust is changing, and offered advice for agencies to considering how to balance trust and security. ]]>
Mon, 26 Aug 2019 18:42:28 GMT /slideshow/rethinking-the-concept-of-trust-dodiis-2019-presentation/166616541 Forcepoint@slideshare.net(Forcepoint) Rethinking the concept of trust (DoDIIS 2019 presentation) Forcepoint Eric Trexler, Vice President of Global Governments & Critical Infrastructure at Forcepoint spoke at DoDIIS 2019. He described how trust is changing, and offered advice for agencies to considering how to balance trust and security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dodiis-g2ci-presentation-4x3-rethinking-the-concept-of-trust-eric-trexler-081419-v5-190826184228-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Eric Trexler, Vice President of Global Governments &amp; Critical Infrastructure at Forcepoint spoke at DoDIIS 2019. He described how trust is changing, and offered advice for agencies to considering how to balance trust and security.
Rethinking the concept of trust (DoDIIS 2019 presentation) from Forcepoint LLC
]]>
547 3 https://cdn.slidesharecdn.com/ss_thumbnails/dodiis-g2ci-presentation-4x3-rethinking-the-concept-of-trust-eric-trexler-081419-v5-190826184228-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sparking Curiosity to Change Security Behaviors /slideshow/sparking-curiosity-to-change-security-behaviors/161324831 black-hat-2019-na-speaking-session-curiosity-deck-approved-190805183728
In this presentation Dr. Margaret Cunningham, Principal Research Scientist, Forcepoint X-Labs, explores the topic of curiosity in cybersecurity. Curiosity is a powerful catalyst for behavioral changes, but for the most part, curiosity has been used to exploit users rather than to motivate positive security behaviors. This session explores the science of curiosity, provides examples of how curiosity increases security risks, and discusses strategies for using curiosity to increase engagement and positive security behaviors. Through this session attendees can apply strategies learned for motivating positive security behaviors as a means to mitigate risk and decrease alert fatigue within an organization. Presented at Black Hat USA 2019 on Wednesday August 7, 2019. Related blog: https://www.forcepoint.com/blog/x-labs/sparking-curiosity-change-security-behaviors-bhusa-2019-slides-and-summary]]>

In this presentation Dr. Margaret Cunningham, Principal Research Scientist, Forcepoint X-Labs, explores the topic of curiosity in cybersecurity. Curiosity is a powerful catalyst for behavioral changes, but for the most part, curiosity has been used to exploit users rather than to motivate positive security behaviors. This session explores the science of curiosity, provides examples of how curiosity increases security risks, and discusses strategies for using curiosity to increase engagement and positive security behaviors. Through this session attendees can apply strategies learned for motivating positive security behaviors as a means to mitigate risk and decrease alert fatigue within an organization. Presented at Black Hat USA 2019 on Wednesday August 7, 2019. Related blog: https://www.forcepoint.com/blog/x-labs/sparking-curiosity-change-security-behaviors-bhusa-2019-slides-and-summary]]>
Mon, 05 Aug 2019 18:37:28 GMT /slideshow/sparking-curiosity-to-change-security-behaviors/161324831 Forcepoint@slideshare.net(Forcepoint) Sparking Curiosity to Change Security Behaviors Forcepoint In this presentation Dr. Margaret Cunningham, Principal Research Scientist, Forcepoint X-Labs, explores the topic of curiosity in cybersecurity. Curiosity is a powerful catalyst for behavioral changes, but for the most part, curiosity has been used to exploit users rather than to motivate positive security behaviors. This session explores the science of curiosity, provides examples of how curiosity increases security risks, and discusses strategies for using curiosity to increase engagement and positive security behaviors. Through this session attendees can apply strategies learned for motivating positive security behaviors as a means to mitigate risk and decrease alert fatigue within an organization. Presented at Black Hat USA 2019 on Wednesday August 7, 2019. Related blog: https://www.forcepoint.com/blog/x-labs/sparking-curiosity-change-security-behaviors-bhusa-2019-slides-and-summary <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/black-hat-2019-na-speaking-session-curiosity-deck-approved-190805183728-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation Dr. Margaret Cunningham, Principal Research Scientist, Forcepoint X-Labs, explores the topic of curiosity in cybersecurity. Curiosity is a powerful catalyst for behavioral changes, but for the most part, curiosity has been used to exploit users rather than to motivate positive security behaviors. This session explores the science of curiosity, provides examples of how curiosity increases security risks, and discusses strategies for using curiosity to increase engagement and positive security behaviors. Through this session attendees can apply strategies learned for motivating positive security behaviors as a means to mitigate risk and decrease alert fatigue within an organization. Presented at Black Hat USA 2019 on Wednesday August 7, 2019. Related blog: https://www.forcepoint.com/blog/x-labs/sparking-curiosity-change-security-behaviors-bhusa-2019-slides-and-summary
Sparking Curiosity to Change Security Behaviors from Forcepoint LLC
]]>
465 8 https://cdn.slidesharecdn.com/ss_thumbnails/black-hat-2019-na-speaking-session-curiosity-deck-approved-190805183728-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding the "Intelligence" in AI /slideshow/understanding-the-intelligence-in-ai-150200747/150200747 ai4cybersecurity-april2019-forcepoint-190617160927
In this presentation Raffael Marty, VP of Research of Intelligence, Forcepoint X-Labs, explores the topic of Artificial Intelligence (AI) in cyber security. What is AI and how do we get to real intelligence in a cyber context? Raffael outlines some of the dangers of the way we are using algorithms (AI, Machine Learning) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks. Presented at AI 4 Cybersecurity in NYC on April 30, 2019]]>

In this presentation Raffael Marty, VP of Research of Intelligence, Forcepoint X-Labs, explores the topic of Artificial Intelligence (AI) in cyber security. What is AI and how do we get to real intelligence in a cyber context? Raffael outlines some of the dangers of the way we are using algorithms (AI, Machine Learning) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks. Presented at AI 4 Cybersecurity in NYC on April 30, 2019]]>
Mon, 17 Jun 2019 16:09:27 GMT /slideshow/understanding-the-intelligence-in-ai-150200747/150200747 Forcepoint@slideshare.net(Forcepoint) Understanding the "Intelligence" in AI Forcepoint In this presentation Raffael Marty, VP of Research of Intelligence, Forcepoint X-Labs, explores the topic of Artificial Intelligence (AI) in cyber security. What is AI and how do we get to real intelligence in a cyber context? Raffael outlines some of the dangers of the way we are using algorithms (AI, Machine Learning) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks. Presented at AI 4 Cybersecurity in NYC on April 30, 2019 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ai4cybersecurity-april2019-forcepoint-190617160927-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation Raffael Marty, VP of Research of Intelligence, Forcepoint X-Labs, explores the topic of Artificial Intelligence (AI) in cyber security. What is AI and how do we get to real intelligence in a cyber context? Raffael outlines some of the dangers of the way we are using algorithms (AI, Machine Learning) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks. Presented at AI 4 Cybersecurity in NYC on April 30, 2019
Understanding the "Intelligence" in AI from Forcepoint LLC
]]>
486 3 https://cdn.slidesharecdn.com/ss_thumbnails/ai4cybersecurity-april2019-forcepoint-190617160927-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions /slideshow/weary-warriors-reducing-the-impact-of-wishful-thinking-fatigue-on-information-security-decisions/149304374 mcunningham-forcepoint-wearywarriorsfinalnonotes-190612134903
Wishful thinking wont protect your data and systems. Without understanding two key psychological constructs, motivated reasoning and decision fatigue, people will continue to put their trust in software alone to keep their systems safe and then shift responsibility for adverse events onto end users. For example, those impacted by motivated reasoning will reuse passwords without believing it might actually have an impact. People who experience decision fatigue avoid decisions or choose the least effortful action. However, there are steps organisations and individuals can take to recognise and cope with these parts of human nature are you prepared?]]>

Wishful thinking wont protect your data and systems. Without understanding two key psychological constructs, motivated reasoning and decision fatigue, people will continue to put their trust in software alone to keep their systems safe and then shift responsibility for adverse events onto end users. For example, those impacted by motivated reasoning will reuse passwords without believing it might actually have an impact. People who experience decision fatigue avoid decisions or choose the least effortful action. However, there are steps organisations and individuals can take to recognise and cope with these parts of human nature are you prepared?]]>
Wed, 12 Jun 2019 13:49:03 GMT /slideshow/weary-warriors-reducing-the-impact-of-wishful-thinking-fatigue-on-information-security-decisions/149304374 Forcepoint@slideshare.net(Forcepoint) Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions Forcepoint Wishful thinking wont protect your data and systems. Without understanding two key psychological constructs, motivated reasoning and decision fatigue, people will continue to put their trust in software alone to keep their systems safe and then shift responsibility for adverse events onto end users. For example, those impacted by motivated reasoning will reuse passwords without believing it might actually have an impact. People who experience decision fatigue avoid decisions or choose the least effortful action. However, there are steps organisations and individuals can take to recognise and cope with these parts of human nature are you prepared? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mcunningham-forcepoint-wearywarriorsfinalnonotes-190612134903-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Wishful thinking wont protect your data and systems. Without understanding two key psychological constructs, motivated reasoning and decision fatigue, people will continue to put their trust in software alone to keep their systems safe and then shift responsibility for adverse events onto end users. For example, those impacted by motivated reasoning will reuse passwords without believing it might actually have an impact. People who experience decision fatigue avoid decisions or choose the least effortful action. However, there are steps organisations and individuals can take to recognise and cope with these parts of human nature are you prepared?
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions from Forcepoint LLC
]]>
439 5 https://cdn.slidesharecdn.com/ss_thumbnails/mcunningham-forcepoint-wearywarriorsfinalnonotes-190612134903-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AI and ML in Cybersecurity /slideshow/ai-and-ml-in-cybersecurity/109391337 us-18-marty-ai-and-ml-in-cybersecurity-26jul18-v6ram-180810173206
Every single security company is talking about how they are using machine learningas a security company you have to claim artificial intelligence to be even part of the conversation. However, this approach can be dangerous when we blindly rely on algorithms to do the right thing. Rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and, in turn, discovering wrong insights. In this session, we will discuss: Limitations of machine learning and issues of explainability Where deep learning should never be applied Examples of how the blind application of algorithms can lead to wrong results]]>

Every single security company is talking about how they are using machine learningas a security company you have to claim artificial intelligence to be even part of the conversation. However, this approach can be dangerous when we blindly rely on algorithms to do the right thing. Rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and, in turn, discovering wrong insights. In this session, we will discuss: Limitations of machine learning and issues of explainability Where deep learning should never be applied Examples of how the blind application of algorithms can lead to wrong results]]>
Fri, 10 Aug 2018 17:32:06 GMT /slideshow/ai-and-ml-in-cybersecurity/109391337 Forcepoint@slideshare.net(Forcepoint) AI and ML in Cybersecurity Forcepoint Every single security company is talking about how they are using machine learningas a security company you have to claim artificial intelligence to be even part of the conversation. However, this approach can be dangerous when we blindly rely on algorithms to do the right thing. Rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and, in turn, discovering wrong insights. In this session, we will discuss: Limitations of machine learning and issues of explainability Where deep learning should never be applied Examples of how the blind application of algorithms can lead to wrong results <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/us-18-marty-ai-and-ml-in-cybersecurity-26jul18-v6ram-180810173206-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Every single security company is talking about how they are using machine learningas a security company you have to claim artificial intelligence to be even part of the conversation. However, this approach can be dangerous when we blindly rely on algorithms to do the right thing. Rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and, in turn, discovering wrong insights. In this session, we will discuss: Limitations of machine learning and issues of explainability Where deep learning should never be applied Examples of how the blind application of algorithms can lead to wrong results
AI and ML in Cybersecurity from Forcepoint LLC
]]>
3169 4 https://cdn.slidesharecdn.com/ss_thumbnails/us-18-marty-ai-and-ml-in-cybersecurity-26jul18-v6ram-180810173206-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using Language Modeling to Verify User Identities /slideshow/using-language-modeling-to-verify-user-identities-109389446/109389446 us-18-poirel-luiggi-using-language-modeling-to-verify-user-identity-1aug18-njs-cp-ws-180810171648
How can we verify identity using unstructured data from a user device? While biometrics like fingerprinting and facial recognition are often used for authentication, research around natural language processing has found people's use of language as uniquely identifying. In this session, we will discuss multiple facets of language modeling: Efficacy on different kinds of unstructured text within a corporate network As a technique to detect anomalous user activity, compromised accounts, and stolen credentials As an integral part of a cybersecurity program in addition to UEBA and risk-adaptive protection]]>

How can we verify identity using unstructured data from a user device? While biometrics like fingerprinting and facial recognition are often used for authentication, research around natural language processing has found people's use of language as uniquely identifying. In this session, we will discuss multiple facets of language modeling: Efficacy on different kinds of unstructured text within a corporate network As a technique to detect anomalous user activity, compromised accounts, and stolen credentials As an integral part of a cybersecurity program in addition to UEBA and risk-adaptive protection]]>
Fri, 10 Aug 2018 17:16:48 GMT /slideshow/using-language-modeling-to-verify-user-identities-109389446/109389446 Forcepoint@slideshare.net(Forcepoint) Using Language Modeling to Verify User Identities Forcepoint How can we verify identity using unstructured data from a user device? While biometrics like fingerprinting and facial recognition are often used for authentication, research around natural language processing has found people's use of language as uniquely identifying. In this session, we will discuss multiple facets of language modeling: Efficacy on different kinds of unstructured text within a corporate network As a technique to detect anomalous user activity, compromised accounts, and stolen credentials As an integral part of a cybersecurity program in addition to UEBA and risk-adaptive protection <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/us-18-poirel-luiggi-using-language-modeling-to-verify-user-identity-1aug18-njs-cp-ws-180810171648-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How can we verify identity using unstructured data from a user device? While biometrics like fingerprinting and facial recognition are often used for authentication, research around natural language processing has found people&#39;s use of language as uniquely identifying. In this session, we will discuss multiple facets of language modeling: Efficacy on different kinds of unstructured text within a corporate network As a technique to detect anomalous user activity, compromised accounts, and stolen credentials As an integral part of a cybersecurity program in addition to UEBA and risk-adaptive protection
Using Language Modeling to Verify User Identities from Forcepoint LLC
]]>
191 4 https://cdn.slidesharecdn.com/ss_thumbnails/us-18-poirel-luiggi-using-language-modeling-to-verify-user-identity-1aug18-njs-cp-ws-180810171648-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Driving the successful adoption of Microsoft Office 365 /slideshow/driving-the-successful-adoption-of-microsoft-office-365/105559171 o365customerwebinar20180315-180712150010
For enterprise and mid-sized companies who have deployed Office 365 but have not realized the full value of their investment, Forcepoint removes the barriers to full adoption by enhancing security and compliance, taking back unsanctioned IT, and implementing the right architecture.]]>

For enterprise and mid-sized companies who have deployed Office 365 but have not realized the full value of their investment, Forcepoint removes the barriers to full adoption by enhancing security and compliance, taking back unsanctioned IT, and implementing the right architecture.]]>
Thu, 12 Jul 2018 15:00:10 GMT /slideshow/driving-the-successful-adoption-of-microsoft-office-365/105559171 Forcepoint@slideshare.net(Forcepoint) Driving the successful adoption of Microsoft Office 365 Forcepoint For enterprise and mid-sized companies who have deployed Office 365 but have not realized the full value of their investment, Forcepoint removes the barriers to full adoption by enhancing security and compliance, taking back unsanctioned IT, and implementing the right architecture. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/o365customerwebinar20180315-180712150010-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> For enterprise and mid-sized companies who have deployed Office 365 but have not realized the full value of their investment, Forcepoint removes the barriers to full adoption by enhancing security and compliance, taking back unsanctioned IT, and implementing the right architecture.
Driving the successful adoption of Microsoft Office 365 from Forcepoint LLC
]]>
410 5 https://cdn.slidesharecdn.com/ss_thumbnails/o365customerwebinar20180315-180712150010-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing Beyond the Cloud Generation /slideshow/securing-beyond-the-cloud-generation/105558937 haveyououtgrownyourwebsecurityfinalbw-180712145839
Is your security solution having trouble keeping up? Explore what a modern security solution looks likebuilt to tackle the evolving threat landscape while adapting to todays global, mobile workforce. ]]>

Is your security solution having trouble keeping up? Explore what a modern security solution looks likebuilt to tackle the evolving threat landscape while adapting to todays global, mobile workforce. ]]>
Thu, 12 Jul 2018 14:58:39 GMT /slideshow/securing-beyond-the-cloud-generation/105558937 Forcepoint@slideshare.net(Forcepoint) Securing Beyond the Cloud Generation Forcepoint Is your security solution having trouble keeping up? Explore what a modern security solution looks likebuilt to tackle the evolving threat landscape while adapting to todays global, mobile workforce. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/haveyououtgrownyourwebsecurityfinalbw-180712145839-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Is your security solution having trouble keeping up? Explore what a modern security solution looks likebuilt to tackle the evolving threat landscape while adapting to todays global, mobile workforce.
Securing Beyond the Cloud Generation from Forcepoint LLC
]]>
349 3 https://cdn.slidesharecdn.com/ss_thumbnails/haveyououtgrownyourwebsecurityfinalbw-180712145839-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Forcepoint Advanced Malware Detection /Forcepoint/forcepoint-advanced-malware-detection forcepointamdwebinarapril2018bw-180712145332
JK Lialias discusses the real-time advanced threat defense offered by Forcepoint's Advanced Malware Detection]]>

JK Lialias discusses the real-time advanced threat defense offered by Forcepoint's Advanced Malware Detection]]>
Thu, 12 Jul 2018 14:53:32 GMT /Forcepoint/forcepoint-advanced-malware-detection Forcepoint@slideshare.net(Forcepoint) Forcepoint Advanced Malware Detection Forcepoint JK Lialias discusses the real-time advanced threat defense offered by Forcepoint's Advanced Malware Detection <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/forcepointamdwebinarapril2018bw-180712145332-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> JK Lialias discusses the real-time advanced threat defense offered by Forcepoint&#39;s Advanced Malware Detection
Forcepoint Advanced Malware Detection from Forcepoint LLC
]]>
938 3 https://cdn.slidesharecdn.com/ss_thumbnails/forcepointamdwebinarapril2018bw-180712145332-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Top 5 Information Security Lessons Learned from Transitioning to the Cloud /slideshow/top-5-information-security-lessons-learned-from-transitioning-to-the-cloud/105557640 forcepointidcslides080218bw-180712145035
Speakers from Forcepoint and IDC discuss the top 5 information security lessons learned from transitioning to the cloud]]>

Speakers from Forcepoint and IDC discuss the top 5 information security lessons learned from transitioning to the cloud]]>
Thu, 12 Jul 2018 14:50:35 GMT /slideshow/top-5-information-security-lessons-learned-from-transitioning-to-the-cloud/105557640 Forcepoint@slideshare.net(Forcepoint) Top 5 Information Security Lessons Learned from Transitioning to the Cloud Forcepoint Speakers from Forcepoint and IDC discuss the top 5 information security lessons learned from transitioning to the cloud <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/forcepointidcslides080218bw-180712145035-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Speakers from Forcepoint and IDC discuss the top 5 information security lessons learned from transitioning to the cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud from Forcepoint LLC
]]>
122 2 https://cdn.slidesharecdn.com/ss_thumbnails/forcepointidcslides080218bw-180712145035-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CASB: Securing your cloud applications /Forcepoint/casb-securing-your-cloud-applications casb-securing-your-cloud-applications-apr18-180712144900
How do you secure a world where you operate on the internet but don't own the internet?]]>

How do you secure a world where you operate on the internet but don't own the internet?]]>
Thu, 12 Jul 2018 14:49:00 GMT /Forcepoint/casb-securing-your-cloud-applications Forcepoint@slideshare.net(Forcepoint) CASB: Securing your cloud applications Forcepoint How do you secure a world where you operate on the internet but don't own the internet? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/casb-securing-your-cloud-applications-apr18-180712144900-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How do you secure a world where you operate on the internet but don&#39;t own the internet?
CASB: Securing your cloud applications from Forcepoint LLC
]]>
1081 8 https://cdn.slidesharecdn.com/ss_thumbnails/casb-securing-your-cloud-applications-apr18-180712144900-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data Breaches /slideshow/one-year-after-wannacry-has-anything-changed-a-root-cause-analysis-of-data-breaches/102780124 infeu18speakerpptstrategytalkscarlleonardforcepoint-final-v2-180621144604
This 20 minute talk was delivered by Forcepoint Principal Security Analyst Carl Leonard at Infosecurity Europe 2018. Delivered to the Strategy track this talk provides a review of the macro trends affecting businesses today, reviews root cause of standout data breaches, highlights the security risk presented by employees, and offers guidance on how to protect your business from specific root causes.]]>

This 20 minute talk was delivered by Forcepoint Principal Security Analyst Carl Leonard at Infosecurity Europe 2018. Delivered to the Strategy track this talk provides a review of the macro trends affecting businesses today, reviews root cause of standout data breaches, highlights the security risk presented by employees, and offers guidance on how to protect your business from specific root causes.]]>
Thu, 21 Jun 2018 14:46:04 GMT /slideshow/one-year-after-wannacry-has-anything-changed-a-root-cause-analysis-of-data-breaches/102780124 Forcepoint@slideshare.net(Forcepoint) One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data Breaches Forcepoint This 20 minute talk was delivered by Forcepoint Principal Security Analyst Carl Leonard at Infosecurity Europe 2018. Delivered to the Strategy track this talk provides a review of the macro trends affecting businesses today, reviews root cause of standout data breaches, highlights the security risk presented by employees, and offers guidance on how to protect your business from specific root causes. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/infeu18speakerpptstrategytalkscarlleonardforcepoint-final-v2-180621144604-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This 20 minute talk was delivered by Forcepoint Principal Security Analyst Carl Leonard at Infosecurity Europe 2018. Delivered to the Strategy track this talk provides a review of the macro trends affecting businesses today, reviews root cause of standout data breaches, highlights the security risk presented by employees, and offers guidance on how to protect your business from specific root causes.
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data Breaches from Forcepoint LLC
]]>
129 2 https://cdn.slidesharecdn.com/ss_thumbnails/infeu18speakerpptstrategytalkscarlleonardforcepoint-final-v2-180621144604-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
GDPR is Here. Now What? /slideshow/gdpr-is-here-now-what/100976685 gdprisherenowwhatslides-180606172916
How prepared are you for GDPR today? ]]>

How prepared are you for GDPR today? ]]>
Wed, 06 Jun 2018 17:29:16 GMT /slideshow/gdpr-is-here-now-what/100976685 Forcepoint@slideshare.net(Forcepoint) GDPR is Here. Now What? Forcepoint How prepared are you for GDPR today? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gdprisherenowwhatslides-180606172916-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How prepared are you for GDPR today?
GDPR is Here. Now What? from Forcepoint LLC
]]>
195 3 https://cdn.slidesharecdn.com/ss_thumbnails/gdprisherenowwhatslides-180606172916-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Addressing Future Risks and Legal Challenges of Insider Threats /slideshow/addressing-future-risks-and-legal-challenges-of-insider-threats/78957917 futurerisksandlegalchallengesofinsiderthreatsfinal-170818151445
Get an in-depth analysis of the framework of insider threats, its legal considerations and global privacy implications, and best practices to build an effective insider threat program.]]>

Get an in-depth analysis of the framework of insider threats, its legal considerations and global privacy implications, and best practices to build an effective insider threat program.]]>
Fri, 18 Aug 2017 15:14:45 GMT /slideshow/addressing-future-risks-and-legal-challenges-of-insider-threats/78957917 Forcepoint@slideshare.net(Forcepoint) Addressing Future Risks and Legal Challenges of Insider Threats Forcepoint Get an in-depth analysis of the framework of insider threats, its legal considerations and global privacy implications, and best practices to build an effective insider threat program. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/futurerisksandlegalchallengesofinsiderthreatsfinal-170818151445-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Get an in-depth analysis of the framework of insider threats, its legal considerations and global privacy implications, and best practices to build an effective insider threat program.
Addressing Future Risks and Legal Challenges of Insider Threats from Forcepoint LLC
]]>
640 5 https://cdn.slidesharecdn.com/ss_thumbnails/futurerisksandlegalchallengesofinsiderthreatsfinal-170818151445-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Predictive Precrime Approach Requires a Human Focus /slideshow/a-predictive-precrime-approach-requires-a-human-focus-78509807/78509807 ppt-blackhatusa-richardford-boothcondensed-21july17-lrfinal-170802202838
In Philip K. Dicks 1956 The Minority Report, murder ceased to occur due to the work of the Precrime Division, that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed. Discover the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.]]>

In Philip K. Dicks 1956 The Minority Report, murder ceased to occur due to the work of the Precrime Division, that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed. Discover the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.]]>
Wed, 02 Aug 2017 20:28:38 GMT /slideshow/a-predictive-precrime-approach-requires-a-human-focus-78509807/78509807 Forcepoint@slideshare.net(Forcepoint) A Predictive Precrime Approach Requires a Human Focus Forcepoint In Philip K. Dicks 1956 The Minority Report, murder ceased to occur due to the work of the Precrime Division, that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed. Discover the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ppt-blackhatusa-richardford-boothcondensed-21july17-lrfinal-170802202838-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In Philip K. Dicks 1956 The Minority Report, murder ceased to occur due to the work of the Precrime Division, that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed. Discover the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
A Predictive Precrime Approach Requires a Human Focus from Forcepoint LLC
]]>
276 4 https://cdn.slidesharecdn.com/ss_thumbnails/ppt-blackhatusa-richardford-boothcondensed-21july17-lrfinal-170802202838-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Convergence, Warfare and You /slideshow/cyber-convergence-warfare-and-you-edit/75479317 cyberconvergencewarfareandyouedit-170427191452
A pirate used to have to show up on your shores, now they can stay on the other side of the world and still be a pirate. They are the mercenaries of the modern day hackers who carry out crippling cyberattacks for personal gain, for political motivations, or perhaps on behalf of foreign governments, wittingly or unwittingly. The complexity of the problem also means theres no simple answer for the global community. Mr. Daly looked at how we arrived at this convergence of actors and discussed efforts to get countries cooperating more effectively to prevent international cybercrime and bound cyber warfare.]]>

A pirate used to have to show up on your shores, now they can stay on the other side of the world and still be a pirate. They are the mercenaries of the modern day hackers who carry out crippling cyberattacks for personal gain, for political motivations, or perhaps on behalf of foreign governments, wittingly or unwittingly. The complexity of the problem also means theres no simple answer for the global community. Mr. Daly looked at how we arrived at this convergence of actors and discussed efforts to get countries cooperating more effectively to prevent international cybercrime and bound cyber warfare.]]>
Thu, 27 Apr 2017 19:14:52 GMT /slideshow/cyber-convergence-warfare-and-you-edit/75479317 Forcepoint@slideshare.net(Forcepoint) Cyber Convergence, Warfare and You Forcepoint A pirate used to have to show up on your shores, now they can stay on the other side of the world and still be a pirate. They are the mercenaries of the modern day hackers who carry out crippling cyberattacks for personal gain, for political motivations, or perhaps on behalf of foreign governments, wittingly or unwittingly. The complexity of the problem also means theres no simple answer for the global community. Mr. Daly looked at how we arrived at this convergence of actors and discussed efforts to get countries cooperating more effectively to prevent international cybercrime and bound cyber warfare. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberconvergencewarfareandyouedit-170427191452-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A pirate used to have to show up on your shores, now they can stay on the other side of the world and still be a pirate. They are the mercenaries of the modern day hackers who carry out crippling cyberattacks for personal gain, for political motivations, or perhaps on behalf of foreign governments, wittingly or unwittingly. The complexity of the problem also means theres no simple answer for the global community. Mr. Daly looked at how we arrived at this convergence of actors and discussed efforts to get countries cooperating more effectively to prevent international cybercrime and bound cyber warfare.
Cyber Convergence, Warfare and You from Forcepoint LLC
]]>
231 4 https://cdn.slidesharecdn.com/ss_thumbnails/cyberconvergencewarfareandyouedit-170427191452-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS) /slideshow/securing-the-global-mission-enabling-effective-information-sharing-dod-mpeis/75478198 fclf-mpe-isoverview-2017-final-170427183749
The DoD Mission Partner Environment (MPE) enables Command and Control (C2) for operational support planning and execution residing on a shared network infrastructure at a single security level with a common language. Rory Kinney, OSD DoD CIO, shared his perspectives on how an MPE capability allows Mission Partners (MPs) to share information with all participants within a specific partnership or coalition and the role MPE-IS plays in securing the global mission.]]>

The DoD Mission Partner Environment (MPE) enables Command and Control (C2) for operational support planning and execution residing on a shared network infrastructure at a single security level with a common language. Rory Kinney, OSD DoD CIO, shared his perspectives on how an MPE capability allows Mission Partners (MPs) to share information with all participants within a specific partnership or coalition and the role MPE-IS plays in securing the global mission.]]>
Thu, 27 Apr 2017 18:37:49 GMT /slideshow/securing-the-global-mission-enabling-effective-information-sharing-dod-mpeis/75478198 Forcepoint@slideshare.net(Forcepoint) Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS) Forcepoint The DoD Mission Partner Environment (MPE) enables Command and Control (C2) for operational support planning and execution residing on a shared network infrastructure at a single security level with a common language. Rory Kinney, OSD DoD CIO, shared his perspectives on how an MPE capability allows Mission Partners (MPs) to share information with all participants within a specific partnership or coalition and the role MPE-IS plays in securing the global mission. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fclf-mpe-isoverview-2017-final-170427183749-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The DoD Mission Partner Environment (MPE) enables Command and Control (C2) for operational support planning and execution residing on a shared network infrastructure at a single security level with a common language. Rory Kinney, OSD DoD CIO, shared his perspectives on how an MPE capability allows Mission Partners (MPs) to share information with all participants within a specific partnership or coalition and the role MPE-IS plays in securing the global mission.
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS) from Forcepoint LLC
]]>
666 5 https://cdn.slidesharecdn.com/ss_thumbnails/fclf-mpe-isoverview-2017-final-170427183749-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Insights for Mission-Critical Networks /slideshow/security-insights-for-missioncritical-networks/75478151 fclf-networksecurity-breakout-2017-final-170427183622
Networks are at the heart of the most critical missions. In environments where network availability and increased comprehensive security seem to be at odds, what are the options? Learn why traditional firewall solutions have been replaced with next gen technologies that mitigate the management burden while offering even more robust security and protection.]]>

Networks are at the heart of the most critical missions. In environments where network availability and increased comprehensive security seem to be at odds, what are the options? Learn why traditional firewall solutions have been replaced with next gen technologies that mitigate the management burden while offering even more robust security and protection.]]>
Thu, 27 Apr 2017 18:36:22 GMT /slideshow/security-insights-for-missioncritical-networks/75478151 Forcepoint@slideshare.net(Forcepoint) Security Insights for Mission-Critical Networks Forcepoint Networks are at the heart of the most critical missions. In environments where network availability and increased comprehensive security seem to be at odds, what are the options? Learn why traditional firewall solutions have been replaced with next gen technologies that mitigate the management burden while offering even more robust security and protection. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fclf-networksecurity-breakout-2017-final-170427183622-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Networks are at the heart of the most critical missions. In environments where network availability and increased comprehensive security seem to be at odds, what are the options? Learn why traditional firewall solutions have been replaced with next gen technologies that mitigate the management burden while offering even more robust security and protection.
Security Insights for Mission-Critical Networks from Forcepoint LLC
]]>
260 6 https://cdn.slidesharecdn.com/ss_thumbnails/fclf-networksecurity-breakout-2017-final-170427183622-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Maintaining Visibility and Control as Workers and Apps Scatter /slideshow/maintaining-visibility-and-control-as-workers-and-apps-scatter/75478108 fclf-cloudbreakout2017-final1-170427183458
Balancing productivity and security has been an age old challenge for IT. Nowadays, tight budgets and a shortage of skilled security personnel are further complicating the security equation at a time when mobile workers and cloud applications require effective defenses beyond traditional perimeters. Fortunately, there are new perspectives and best practices to help Government IT security leaders secure systems and users everywhere, with the same level of mission-critical protection that Federal networks require.]]>

Balancing productivity and security has been an age old challenge for IT. Nowadays, tight budgets and a shortage of skilled security personnel are further complicating the security equation at a time when mobile workers and cloud applications require effective defenses beyond traditional perimeters. Fortunately, there are new perspectives and best practices to help Government IT security leaders secure systems and users everywhere, with the same level of mission-critical protection that Federal networks require.]]>
Thu, 27 Apr 2017 18:34:58 GMT /slideshow/maintaining-visibility-and-control-as-workers-and-apps-scatter/75478108 Forcepoint@slideshare.net(Forcepoint) Maintaining Visibility and Control as Workers and Apps Scatter Forcepoint Balancing productivity and security has been an age old challenge for IT. Nowadays, tight budgets and a shortage of skilled security personnel are further complicating the security equation at a time when mobile workers and cloud applications require effective defenses beyond traditional perimeters. Fortunately, there are new perspectives and best practices to help Government IT security leaders secure systems and users everywhere, with the same level of mission-critical protection that Federal networks require. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fclf-cloudbreakout2017-final1-170427183458-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Balancing productivity and security has been an age old challenge for IT. Nowadays, tight budgets and a shortage of skilled security personnel are further complicating the security equation at a time when mobile workers and cloud applications require effective defenses beyond traditional perimeters. Fortunately, there are new perspectives and best practices to help Government IT security leaders secure systems and users everywhere, with the same level of mission-critical protection that Federal networks require.
Maintaining Visibility and Control as Workers and Apps Scatter from Forcepoint LLC
]]>
206 2 https://cdn.slidesharecdn.com/ss_thumbnails/fclf-cloudbreakout2017-final1-170427183458-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Embracing the Millennial Tsunami /slideshow/embracing-the-millennial-tsunami/75477740 fclf-crouse-cyberchat07apr17dae-170427182344
By 2025, millennials are projected to make up 75% of the total workforce. Organizations have been adapting their processes, policies and environments to match the millennial culture, but are they truly prepared to handle millennial technology practices? Michael Crouse Forcepoint VP, Insider Threat explains.]]>

By 2025, millennials are projected to make up 75% of the total workforce. Organizations have been adapting their processes, policies and environments to match the millennial culture, but are they truly prepared to handle millennial technology practices? Michael Crouse Forcepoint VP, Insider Threat explains.]]>
Thu, 27 Apr 2017 18:23:44 GMT /slideshow/embracing-the-millennial-tsunami/75477740 Forcepoint@slideshare.net(Forcepoint) Embracing the Millennial Tsunami Forcepoint By 2025, millennials are projected to make up 75% of the total workforce. Organizations have been adapting their processes, policies and environments to match the millennial culture, but are they truly prepared to handle millennial technology practices? Michael Crouse Forcepoint VP, Insider Threat explains. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fclf-crouse-cyberchat07apr17dae-170427182344-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> By 2025, millennials are projected to make up 75% of the total workforce. Organizations have been adapting their processes, policies and environments to match the millennial culture, but are they truly prepared to handle millennial technology practices? Michael Crouse Forcepoint VP, Insider Threat explains.
Embracing the Millennial Tsunami from Forcepoint LLC
]]>
177 3 https://cdn.slidesharecdn.com/ss_thumbnails/fclf-crouse-cyberchat07apr17dae-170427182344-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Forcepoint-48x48.jpg?cb=1690226156 Forcepoint, powered by Raytheon, safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. www.forcepoint.com https://cdn.slidesharecdn.com/ss_thumbnails/dodiis-g2ci-presentation-4x3-rethinking-the-concept-of-trust-eric-trexler-081419-v5-190826184228-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/rethinking-the-concept-of-trust-dodiis-2019-presentation/166616541 Rethinking the concept... https://cdn.slidesharecdn.com/ss_thumbnails/black-hat-2019-na-speaking-session-curiosity-deck-approved-190805183728-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/sparking-curiosity-to-change-security-behaviors/161324831 Sparking Curiosity to ... https://cdn.slidesharecdn.com/ss_thumbnails/ai4cybersecurity-april2019-forcepoint-190617160927-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/understanding-the-intelligence-in-ai-150200747/150200747 Understanding the &quot;Int...