Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Appearances / Forcepoint Presents at Tech Field Day 16

Forcepoint Presents at Tech Field Day 16



Tech Field Day 16

Richard Ford presents with Forcepoint

This Presentation date is February 21, 2018 at 15:00-17:00.

Presenters: Antti Kuvaja, David Coffey, Jim Birmingham, Liem Nguyen, Richard Ford, Sarah Vela


Follow on Twitter using the following hashtags or usernames: #TFD16, @ForcepointSec

Forcepoint Welcome and Introduction with Richard Ford


Watch on YouTube
Watch on Vimeo

Richard Ford, Chief Scientist at Forcepoint, discuss the current state of Forcepoint, and where the company plans to go in the near future. They approach security from the perspective that traditional security has failed. This is based on the idea of identifying the good from the bad with certainty. Forcepoint instead focuses on the point at which humans interact with data, and try to understand how people and data interact over networks of variable trust.

Personnel: Richard Ford

Forcepoint User and Entity Behavior Analytics with Jim Birmingham


Watch on Vimeo

Jim Birmingham, VP Research & Development, starts the session by defining what insider threats are for organizations, which constitute the majority of security threats against an organization. He then reviews how Forcepoint’s User and Entity Behavior Analytics platform provides a holistic view of insider behavior to help detect threats.

Personnel: Jim Birmingham

Forcepoint Networking Security with Antti Kuvaja


Watch on YouTube
Watch on Vimeo

Antti Kuvaja, Senior Director, Product Management, reviews Forcepoint’s capabilities for Human Point Security. This includes an overview of their Endpoint Context Agent to collect endpoint metadata and a dedicated dashboard to view user network activity,

Personnel: Antti Kuvaja

Forcepoint Cloud Application Security Broker and Web Security with David Coffey


Watch on Vimeo

David Coffey, VP Research & Development, reviews how Forcepoint approaches securing a global network an organization doesn’t own or fully manage. Their solution is the Cloud Application Security Broker, which sits between a user and the cloud, and is able to implement security policies.

Personnel: David Coffey


  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • May 28-May 29 — Security Field Day 13
  • Jun 4-Jun 5 — Cloud Field Day 23
  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Jul 16-Jul 17 — Edge Field Day 4
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Oct 29-Oct 30 — AI Field Day 7

Latest Links

  • Exploring Cloud Resilience, AI, and Data at Cloud Field Day 23
  • Compliance Does Not Equal Security
  • Meraki Campus Gateway: Cloud-Managed Overlay for Complex Networks
  • Exploring the Future of Cybersecurity at Security Field Day 13
  • 5G Neutral Host: Solving Enterprise Cellular Coverage Gaps

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in