Networking Pavilion

Learn how you can adopt a Zero Trust architecture

The data economy renders today’s network, perimeter-based security useless.

– Forrester Research, Future-Proof Your Digital Business With Zero Trust Security, Oct 2019 

Register Now →

Americas
October 27 • 9 AM CDT

Leave with a blueprint for a data-aware Zero Trust approach

In three practical, 30-minute sessions

8:30 am

Networking Pavilion Opens | Learn More
Welcome Remarks & Opening Keynote: Moving Beyond Zero Trust
Matt Moynahan
Chief Executive Officer
Forcepoint
Chase Cunningham

VP, Principal Analyst
Forrester

9:00 am

Enabling Safe Remote Working with Zero Trust
Getting to the web and public cloud is easy; getting to private apps is a lot trickier, especially when we’re working from home. Doing it all safely is even harder. Keeping advanced threats out and sensitive data in when people are outside the traditional boundaries of enterprise security is more important than ever.

Zero Trust Network Access (ZTNA) is the modern approach to giving remote workers access to private apps. It eliminates the complexities and bottlenecks of using VPNs. Delivering ZTNA from a cloud platform also provides enterprises with the latest capabilities for safeguarding against internet-based attacks, compromised endpoints, “dirty” Wi-Fi networks, and even risky users.

In this session, you’ll learn how a Zero Trust approach to providing access to web, cloud, and private apps can:

Carl Eberling
Chief Information Officer 
Forcepoint

9:30 am

Ravi Srinivasan
VP, Solutions Marketing
Forcepoint

Make your users everywhere more productive and lower your operations costs  

Keep advanced threats out so you can safely move to the cloud

Give you visibility into and control over data in your cloud

Make your users everywhere more productive and lower your operations costs  

Keep advanced threats out so you can safely move to the cloud 


Give you visibility into and control over data in your cloud

Merritt Baer
Principal Security Architect
Amazon Web Services
Bringing the Zero Trust Mindset to Data Protection

10:00 am

Nico Popp
Chief Product Officer
Forcepoint
Sean Sweeney
Chief Security Advisor
Microsoft
The traditional approach to data security is increasingly inadequate. Old solutions introduce too much business friction, yet they still fall short when it comes to preventing data exfiltration. We need to approach data protection differently to make tools like DLP, encryption, and tokenization more responsive to the security needs of the decentralized, cloud-driven workplace.

Introducing the core concepts of Zero Trust to your data protection posture ensures that all people in your organization are continuously being authenticated and authorized to have access to applications and data. A successful Zero Trust approach leverages dynamic, proactive, ongoing user risk assessment based on behavioral analytics to consistently prevent data breaches, while enhancing productivity rather than hindering it.

In this session, you’ll learn more about bolstering data security with the Zero Trust mindset, including: 

How Zero Trust and behavioral analytics can maximize the effectiveness of data protection solutions for increasingly mobile and remote workforces

How data security traveling with data (like fingerprinting) can help in today’s distributed environment

How security leaders are implementing these concepts in their environments and solutions

Mitigating Risk in Real-Time with an Identity Aware Approach
In today’s decentralized workplace, it’s a challenge to safeguard people connecting via personal devices and to protect the data they are working with remotely and in the cloud. We can use Identity Access Management (IAM) to onboard employees with legitimate credentials onto the network—but authenticating and authorizing users isn’t enough to ensure that everybody is acting in our best interests … or is even who they say they are.

Learn how to best protect against compromised identities and how Zero Trust can secure enterprises from the risky behaviors of different users so you can shift left of breach, with tools and tactics including:

Homayun Yaqub 
Global Security
Strategist
Lambert ASAP, LLC.

10:30 am

Multi-factor authentication, single sign-on, and other Unified Access   Management (UAM) functions 

Continuous, automated analysis and scoring of user behavior to identify risky users

Automated, dynamic responses to risky behavior ranging from warnings and credential checks to limited or full blocking of user access and data usage

Multi-factor authentication, single sign-on, and other Unified Access   Management (UAM) functions 

Continuous, automated analysis and scoring of user behavior to identify risky users

Automated, dynamic responses to risky behavior ranging from warnings and credential checks to limited or full blocking of user access and data usage

Leslie K. Lambert
Chief Executive
Officer
Forcepoint
Forcepoint
Cybersecurity Research Manager
Carolyn Ford
Register now to succeed with Zero Trust
Join cybersecurity leaders to learn, connect and collaborate.

By submitting this registration form, you confirm you intend to interact with and disclose personal information to us, and you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time in the Preference Center.

Europe
October 28 • 9 AM CET

11:00 am

Networking Pavilion | Demo Sessions | Learn More

12:00 pm

A CISO’s Perspective on Zero Trust
Myrna Soto
Chief Strategy & Trust Officer
Forcepoint
Andy Vautier
Chief Information Security Officer
Accenture

12:30 pm

12:30 pm

Closing Remarks

12:40 pm
- 2:00 pm

Networking Pavilion | Demo Sessions | Learn More

Matt Moynahan
Chief Executive Officer
Forcepoint

Featured Speakers

Andy Vautier
Chief Information Security Officer
Accenture

Leslie K. Lambert
Chief Executive Officer
Lambert ASAP, LLC.

Sean Sweeney
Chief Security Advisor

Microsoft

Merritt Baer
Principal Security Architect
AWS

Placeholder
CEO 
Forcepoint

Learn about Forcepoint’s partnerships

See technology demonstrations

Connect live with experts in instant meetings

Brought to you by

CYBER VOICES 
ZERO TRUST SUMMIT

by Forcepoint

Register Now →

Chase Cunningham

VP, Principal 


Forrester

Analyst

Myrna Soto
Chief Strategy & Trust Officer
Forcepoint

Carl Eberling
Chief Information
Officer
Forcepoint

October 27: Central Daylight Time
October 28: Central European Time

Brought to you by

Security teams are struggling with the acceleration of digital transformation and the sudden shift to remote working. Learn how you can adopt a Zero Trust architecture that focuses on cloud-based workloads, is aware of critical data and intellectual property usage, and takes a risk-based approach to protecting identities on your network.