Brought to you by

Gone are the days of cyber risk as the sole responsibility of the IT department. Today, we’re seeing ransomware attacks every 11 seconds and more than 80% of organizations that pay ransoms are attacked a second time. With cyber thieves and criminals more sophisticated and aggressive, cyber risks continue to be a top threat and priority for business leaders.

Boards of directors around the world are recognizing that adapting to cyber risk is the cost of doing business today. But how do they move forward? 

This webcast brings together cybersecurity experts from the World Economic Forum, Swiss Reinsurance and Forcepoint to provide insights on the realities of cyber risk facing boards today. Our panelists highlight globally applicable principles to aid directors in governing cyber risk. Uncover why enterprise decision-making requires analysis of the economics behind cyber risk.

Join the panel discussion

View On Demand

Leave with [here’s what you’ll get]

In [five practical 30-minute sessions]

Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.
Register Now

Webinar: Principles for Board Governance of Cyber Risk

Get a Modern Approach to Zero Trust

Wed, July 21 • 11am CT

Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.
Powerful insider threat programs include all relevant stakeholders
Security alone can’t manage and drive a robust insider threat program —you need a broad team to properly manage and address these sophisticated threats.
Jackson Shaw
VP, Product Management - Cloud Access and Network
Forcepoint
John Peterson
Ericom
Chief Product Officer
The correct stakeholders vary depending upon your organization, but could include: Human Resources, Legal, Governance, Board Members, Business Continuity Officers, Information Technology, and Security.
The National Institute of Standards and Technology (NIST) recognizes the need for formal controls to address organizational risk.

Join cybersecurity leaders to learn, connect and collaborate.

Matt Moynahan

CEO

Forcepoint

Sandy Carter

Vice President, Public Sector Partners and Programs

Amazon Web Services (AWS)

Ramin Beheshti

Chief Product and Technology Officer 

Dow Jones

Presenters

John Holmes

Chief Legal Officer

Forcepoint

Maya Bundt

Head of Cyber and Digital Solutions

Swiss Reinsurance

Presenters

Matt Moynahan

CEO

Forcepoint

Sandy Carter

Vice President, Public Sector Partners and Programs

Amazon Web Services (AWS)

Ramin Beheshti

Chief Product and Technology Officer 

Dow Jones

Presenters

Name TBD

Role TBD

Company TBD

Ramin Beheshti

Chief Product and Technology Officer 

Dow Jones

Presenter

Bio here Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in cul deserunt mollit anim id est laborum.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time at Manage Subscriptions.

Agenda

Networking happy hour
5:00-6:00 PM

Ribbon cutting ceremony with distinguished guests
6:00-6:20 PM

Fireside chat with Admiral Mike Rogers and Matt Moynahan
6:30-7:15 PM

Showcase Tours
7:15-8:30 PM 

Location

The Forcepoint Cyber Experience Center is located in the Seaport District at: 

22 Thomson Place
Boston, MA 
02210

The Forcepoint Cyber Experience Center is located at: 
22 Thomson Pl
Boston, MA 02210

Parking

Vouchered parking is available at the Stilling Parking Garage adjacent to our facility at 11 Stilling Street.

Vouchered parking is available at the Stilling Parking Garage adjacent to our facility at 11 Stilling Street.

  • The economic drivers and impact of cyber risk
  • Alignment of cyber risk management with business needs
  • How cybersecurity is a strategic business enabler
  • Ways to incorporate cybersecurity expertise into board governance

Join us to learn:

Daniel Dobrygowski

Attorney and Head of Governance and Trust, Center for Cybersecurity

World Economic Forum

  • The economic drivers and impact of cyber risk
  • Alignment of cyber risk management with business needs
  • How cybersecurity is a strategic business enabler
  • Ways to incorporate cybersecurity expertise into board governance