Brought to you by

With all of the devices, locations, connection types, and opportunities for compromise we have today, user accounts and connected devices should not be trusted by default. In fact, information access should only be provided in limited or as-needed fashion.

This “Zero Trust” approach to network security is uniquely suited to safeguarding organizations in an age of cloud applications, virtualized desktops, and widespread network access. 

Join John Grady, Senior Analyst, ESG and Petko Stoyanov, CTO, Global Governments, Forcepoint and see why a modern approach to Zero Trust just makes good sense.

What you’ll learn

Sign up Now

Leave with [here’s what you’ll get]

In [five practical 30-minute sessions]

Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.
Register Now

Webinar: Zero Trust

Get a Modern Approach to Zero Trust

Wed, Apr 28 • 11am CT

Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.
Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.

Join cybersecurity leaders to learn, connect and collaborate.

Matt Moynahan

CEO

Forcepoint

Sandy Carter

Vice President, Public Sector Partners and Programs

Amazon Web Services (AWS)

Ramin Beheshti

Chief Product and Technology Officer 

Dow Jones

Presenters

John Grady

Senior Analyst

Enterprise Strategy Group

Petko Stoyanov

Chief Technology Officer, Global Governments 

Forcepoint

Presenters

Matt Moynahan

CEO

Forcepoint

Sandy Carter

Vice President, Public Sector Partners and Programs

Amazon Web Services (AWS)

Ramin Beheshti

Chief Product and Technology Officer 

Dow Jones

Presenters

Name TBD

Role TBD

Company TBD

Ramin Beheshti

Chief Product and Technology Officer 

Dow Jones

Presenter

Bio here Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in cul deserunt mollit anim id est laborum.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time at Manage Subscriptions.

Agenda

Networking happy hour
5:00-6:00 PM

Ribbon cutting ceremony with distinguished guests
6:00-6:20 PM

Fireside chat with Admiral Mike Rogers and Matt Moynahan
6:30-7:15 PM

Showcase Tours
7:15-8:30 PM 

Location

The Forcepoint Cyber Experience Center is located in the Seaport District at: 

22 Thomson Place
Boston, MA 
02210

The Forcepoint Cyber Experience Center is located at: 
22 Thomson Pl
Boston, MA 02210

Parking

Vouchered parking is available at the Stilling Parking Garage adjacent to our facility at 11 Stilling Street.

Vouchered parking is available at the Stilling Parking Garage adjacent to our facility at 11 Stilling Street.

  • What is resonating with security leaders today as it relates to Zero Trust
  • Understand where to start and the catalyst to the Zero Trust movement
  • The importance of data protection to your Zero Trust approach

Your takeaways: