Leave with [here’s what you’ll get]

In [five practical 30-minute sessions]

Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.

Panic

Stations

Overcoming the pressure to secure a high-threat, high-complexity cyber landscape.

Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.
Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.

65%

Location

The Forcepoint Cyber Experience Center is located in the Seaport District at: 

22 Thomson Place
Boston, MA 
02210

The Forcepoint Cyber Experience Center is located at: 
22 Thomson Pl
Boston, MA 02210

Parking

Vouchered parking is available at the Stilling Parking Garage adjacent to our facility at 11 Stilling Street.

Vouchered parking is available at the Stilling Parking Garage adjacent to our facility at 11 Stilling Street.

Get Your Free Copy

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time at Manage Subscriptions.

The potential consequences of a successful attack are high due to the risk of widespread disruption to core services. 

All cybersecurity professionals believe an attack on CNI could lead the public to panic.

US professionals believe an attack causing a power outage would cause the greatest panic.

UK professionals believe an attack causing disruption to personal banking services would cause the greatest panic.

As our rapid digitization advances toward a new generation of CNI, we must endeavour to understand the impact of this tension between more advanced technologies and a heightened cyber landscape. Not only on our systems, out on those charged with securing this increasingly complicated environment. This will be essential to improving the resiliency of our CNI - a critical requirement for all of our safety and security 

Daniel Turner | Vice President, Forcepoint

Download Report

REPORT

Download Report

of CNI organizations have fallen victim to a cyberattack in the past 12 months

of Security Ops professionals believe zero trust could reduce the pressure of securing CNI

58%

As we start to better understand the pressures being placed on those responsible for securing CNI, we need to turn our attention to finding solutions that provide support for those struggling. 

In this hostile and evolving threat landscape, it is critical to take steps now to guarantee a more sustainable, secure and safe future for all.

33%

of CNI cybersecurity professionals are feeling stressed and burnt out

How else can we protect our Critical National Infrastructure?

Understand the full picture by downloading Forcepoint’s Panic Stations report: