Delivering the Central Pillars of Zero Trust - Securing Government Data and Ensuring Sovereignty

Securing public sector data and defending against threats with Netskope’s UK cloud services.​

Series Summary

As government organisations and public sector departments increasingly adopt cloud and web services, they benefit from enhanced flexibility, scalability, and cost savings. However, these advantages come with the critical responsibility of ensuring data sovereignty and compliance. With the rising complexity of cyber threats, securing sensitive data and adhering to sovereignty standards has never been more vital.

Join us for a webinar series where we will delve into key strategies for protecting data and maintaining compliance in a rapidly evolving digital landscape. This series is designed for public sector leaders and IT professionals who are tasked with safeguarding their organisations' data while navigating the challenges of modern technology.

Featuring

Timm Sharples from Netskope

Timm Sharples

Solutions Engineer at Netskope UK

Ben Norcutt

Ben Norcutt

Cloud Specialist and Netskope Technical Expert at Somerford

Agenda

Webinar 1: Transforming Legacy Data Centre Access
19th September | 10:00 AM BST (1:00 PM GST) | 30-Minutes
Our first webinar will focus on the legacy methods used to access applications by users when they or the application are located remotely. This applies to both the migration of applications to the cloud and the migration of users to hybrid working environments.

  • Welcome and Introduction
    An overview of the webinar series and the key topics to be discussed in this session.
  • The Legacy Approach
    A detailed look at traditional methods for accessing applications and the challenges they present in modern IT environments.
  • Applying Zero Trust Principles to Application Access
    How Zero Trust principles can be applied to secure application access, ensuring robust security for remote and hybrid work scenarios.
  • The Netskope Solution
    An introduction to how Netskope can help transform legacy data centre access, with a focus on security and compliance.
  • Cover UK Sovereignty
    Discussion on how UK data sovereignty requirements are addressed within the Netskope framework.
  • Showcase Technical Demo
    A live demonstration of the Netskope solution in action, highlighting its capabilities and benefits.
Webinar 2: Securing Data Movement
2nd October | 10:00 AM BST (1:00 PM GST) | 30-Minutes
Webinar 2 will look at the movement of documents around a business in the age of cloud and SaaS services. The use of SaaS applications can bring greater flexibility and productivity gains compared to solely on-premises, but how do we know where our data is now stored and who has access to it?

  • Understanding What We Mean by Data Movement
    Exploring the concept of data movement within modern business environments.
  • Why Should You Care About This
    Discussing the importance and implications of data movement in the context of security and compliance.
  • What Do We Do About Historical Documents? Retroactive Scanning
    Strategies for managing and securing historical documents through retroactive scanning.
  • Applying Zero Trust Principles to Data Movement
    Implementing Zero Trust principles to enhance the security of data movement within your organisation.
  • Showcase Technical Demo
    A live demonstration of the Netskope solution, highlighting its capabilities in securing data movement.
Webinar 3: Controlling the Insider Risk
17th October | 10:00 AM BST (1:00 PM GST) | 30-Minutes
Webinar 3 will look at the threats that come from internal sources within a business. These threats can be both accidental and malicious. We will explore the guardrails that can be put in place to prevent accidental threats and the visibility and control measures for mitigating malicious threats.

  • What is Insider Risk
    An overview of insider risk and its significance in the context of business security.
  • Types of Insider - Accidental, Malicious, etc.
    A discussion on the different types of insider threats and their characteristics.
  • What is the Impact of Insider Risk
    Examining the potential impacts of insider risk on an organisation.
  • Story of KnowBe4
    A case study or example highlighting the real-world implications of insider risk and the solutions provided by KnowBe4.
  • How Can Netskope Help Shine a Light on Risky Users
    Demonstrating how Netskope's solutions can identify and mitigate risks posed by internal users.
  • Showcase Technical Demo
    A live demonstration of Netskope's capabilities in controlling insider risk.
Webinar 4: Securing the Use of AI
7th November | 10:00 AM GMT (2:00 PM GST) | 30-Minutes
The final webinar will look at the use of AI within businesses and how we can harness its power safely. We’ll touch on what AI actually is and some of the differences between the different types. We’ll then look at some of the risks associated with AI and how we can mitigate them with Netskope.

  • A History of AI
    An overview of the development and evolution of artificial intelligence.
  • What are the Different Types of AI
    A discussion on the various types of AI and their applications in business.
  • What Can Be the Risks to AI Use
    Identifying and understanding the potential risks associated with the use of AI.
  • How Can Netskope Enable the Use of AI Securely
    Exploring how Netskope's solutions can help secure the deployment and use of AI in organisations.
  • Showcase Technical Demo
    A live demonstration of Netskope's capabilities in securing AI applications.

Register Below

Additional Resources

Building a Culture of Innovation with Jonathan Mepsted at Netskope

Talking Culture of Innovation, Netskope 'One' Platform and Future of GenAI.

Netskope Cloud Risk Assessment

Get a true picture of your cloud usage with a free Netskope Cloud Risk Assessment.

Netskope Use Cases - Short Video Series

Watch our entire short video series covering Netskope use cases and tutorials.

Have any Questions?

Feel free to reach out to us with any questions about the event.

Scroll to Top

Sign up to our mailing list

Subscribe to our mailing list for exclusive insights and event announcements.