Register Now

Leave with [here’s what you’ll get]

In [five practical 30-minute sessions]

Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.
Register now

Hybrid Workforce Security

Bring Security to Users, No Matter Where They Are

Wed, Sept 15 • 10am CT | 4pm BST

Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.
Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.

See how SASE makes it possible for security to follow remote workers everywhere.

Matt Moynahan

CEO

Forcepoint

Sandy Carter

Vice President, Public Sector Partners and Programs

Amazon Web Services (AWS)

Ramin Beheshti

Chief Product and Technology Officer 

Dow Jones

Presenters

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time at Manage Subscriptions.

Location

The Forcepoint Cyber Experience Center is located in the Seaport District at: 

22 Thomson Place
Boston, MA 
02210

The Forcepoint Cyber Experience Center is located at: 
22 Thomson Pl
Boston, MA 02210

Parking

Vouchered parking is available at the Stilling Parking Garage adjacent to our facility at 11 Stilling Street.

Vouchered parking is available at the Stilling Parking Garage adjacent to our facility at 11 Stilling Street.

Businesses are embracing hybrid work models that allow people to divide their time between remote and in-office work, but for people to work anywhere and be safe everywhere, connectivity and data security have to follow--seamlessly.

Join us for a look at real-life examples that demonstrate how a Secure Service Access Edge (SASE) architecture makes it possible for people to work safely anywhere and, with zero trust principles applied, lets you ensure explicit permissions for the user. 

Secure Hybrid Work—Everywhere 

Register Now

Jim Fulton

Senior Director, SASE and Zero Trust Solutions 

Forcepoint

Presenter

Matt Moynahan

CEO

Forcepoint

Sandy Carter

Vice President, Public Sector Partners and Programs

Amazon Web Services (AWS)

Ramin Beheshti

Chief Product and Technology Officer 

Dow Jones

Presenters

Name TBD

Role TBD

Company TBD