2020 Cost of Insider Threats Global Report
Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT
Thu, Feb 20, 2020
Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type. Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover: ● What kinds of Insider Threats cost organizations the most ● How investigations are driving up the cost-per-incident for companies ● Which organizations, industries, and regions are being targeted the most ● How companies can potentially save millions by using a dedicated Insider Threat management approach *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
State of the Phish 2020
Paul Down, Director, Proofpoint EMEA
Tue, Feb 25, 2020
PLEASE NOTE AUDIO STARTS AT 2m30s - APOLOGIES BUT THIS IS A LIVE WEBINAR RECORDING. ================================================================================== Do you have a good sense of how well your users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks? Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including: - End-user awareness and knowledge gaps that could be hurting your cybersecurity defences - Impacts of phishing attacks and the ways infosec pros are trying to combat these threats - How Proofpoint customers are approaching phishing awareness training, and the ways we’re helping them measure success - Download our report to learn how organizations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence. Join us for an in-depth look at user awareness, vulnerability and resilience. Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
Improving Email Security: Strategies & Solutions
Steve Stocks (infosec), Tim Choi (Proofpoint) , Dr. Richard Ford (Cyren) & Rick Holland (Digital Shadows)
Tue, Feb 25, 2020
When it comes to data breaches, phishing is a primary cause, according to the 2019 Verizon's Data Breach Investigations Report. Number two is stolen credentials, so it is not surprising that email security is a key concern for CISOs worldwide. Join this interactive panel of industry experts as they discuss the latest trends in email security including business email compromise and email account compromise and how to prevent becoming the next headline. Viewers will be able to ask questions and learn more about: - Emerging trends in email and targeted attacks - How to stay on top of the latest threats - Best solutions to protect your organization and your people This panel will be broadcast LIVE during RSA Conference in San Francisco. Speakers: Steve Stocks, Solutions Engineering Manager, Infosec (Moderator) Tim Choi, VP Product Marketing, Proofpoint Dr. Richard Ford, Chief Technology Officer, Cyren Rick Holland, CISO, Vice President Strategy, Digital Shadows
Insider Threats & People-Centric Approach to Security & Compliance
Tim Choi, VP Product Marketing, Proofpoint & Mayank Choudhary, SVP Product Management, ObserveIT
Tue, Feb 25, 2020
Join Tim Choi and Mayank Choudhary for a conversation about the growing concerns on insider threats and data loss. A new people-centric approach is needed and in this interview session, we will share the suggested approach to this security and compliance problem. The audience can learn more about: - What is people-centric security and how does it help organizations view their security and compliance program - What are insider threats and why cross-functional initiatives between cybersecurity, HR, Legal, Ethics are key in 2020 - How to drive deterrence and change user behavior - How to prevent data loss at the endpoint in 2020 This video interview will be broadcast LIVE during RSA Conference in San Francisco.
Bridging the Technology & People Divide with Security Awareness Training
Mark Guntrip, Group Product Marketing Director & Mike Bailey, Sr. Product Marketing Manager
Wed, Feb 26, 2020
The threat landscape is constantly changing and the attacks targeting your people are getting more sophisticated. Threat actors are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even the most savvy users. So how can you better protect yourself, your organization, and your end users? Join us as we walk you through how we're taking Proofpoint's expertise in the email security space and applying it to our security awareness training solutions to lower your people-centric risk. With this webinar you'll get a better understanding of: · The evolution of email security · What’s behind Proofpoint threat intelligence · How this technology is integrated into Proofpoint Security Awareness Training · Strategies for unifying your email and security awareness efforts
Security Awareness Training – Your best line of defence
Andrew Warren-Nicholls, Cyber Security Specialist, APJ
Wed, Feb 26, 2020
Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code. So how can you better protect yourself, your organisation, and your end users? Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of: • How to measure your susceptibility to attack through the number 1 threat vector, email. • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence • How to enable your employees to quickly report suspicious email messages with one tap • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
Sean Walker, Enterprise Account Executive
Thu, Feb 27, 2020
2019 Results: 99% of the phishing attacks require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. So it will be a user who will unwittingly trigger a cyber attack by clicking on an email or downloading a fake attachment. Your users, staff, contractors and management should be empowered to be your organisation's last line of defense. Backed by threat intelligence, Proofpoint’s industry-leading Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time. Join Proofpoint's Security Awareness training demonstartion to: - Assess your users’ susceptibility to phishing attacks as well as other cyber threats from emails and downloads - Deliver tailored, just-in-time training to your users to educate and ensure new behaviors, building that vital last line of defense - Empower your employees to report suspicious messages with a single mouse click ==================================================================== About Proofpoint Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
eCommunications Monitoring: Doing More with Less
John Pepe, JD Regulatory Counsel
Thu, Feb 27, 2020
Join us for a short, TED-style talk on what low-tech approaches firms are employing to keep up with the ever growing demands of eCommunications review. Highlights include: - Using Risk Assessments to drastically reduce review queues - Framing risk scenarios and objectives to balance regulatory obligations against limited resources - Rethinking your monitoring program to keep up with the pace of change
Ensuring that Your Users are the Solid Line of Defense Against Cyber Threats
Mark Guntrip, Group Product Marketing Director of Proofpoint & Michael Osterman, President of Osterman Research Inc.
Thu, Feb 27, 2020
Today’s most popular security tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities. But cybercriminals are no longer targeting infrastructure - they are targeting humans. It's the distracted user who clicks on an email attachment, or the eager customer who fills in credentials in a pixel-perfect phishing page who is vulnerable. It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved? Join Proofpoint for a joint presentation with Osterman Research as we deep dive into some of the biggest challenges CISOs face, and why developing a people-centric strategy to security is the most effective way to protect your most valuable assets: your data and your people. In this session, we'll share: - Latest research findings on new methods for solving security attacks such as phishing and business email compromise - Why cybersecurity transformation is critical for protecting your people against today's threat actors - What it means and looks like to have an effective people-centric approach *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Security Awareness-Training – die beste Verteidigung gegen Cyberangriffe
Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz
Tue, Mar 03, 2020
Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet. Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen? In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein: - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind. - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen. - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können. - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.
Formation de sensibilisation à la sécurité – Votre meilleure ligne de défense
Quentin Habert, Expert en cybersécurité, région SEMEA, Proofpoint
Tue, Mar 03, 2020
Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés. D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code. Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ? Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs. Dans ce webinaire, vous découvrirez comment : • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ; • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ; • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ; • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR). Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.
Live Demo: Proofpoint CASB Adaptive Access Controls
Bo Mendenhall, Cloud Security Solutions Architect from Proofpoint
Tue, Mar 03, 2020
Proofpoint Cloud App Security Broker(CASB) is a people-centric cloud security platform that helps defend your data in the cloud with adaptive access controls. Proofpoint keeps improving our CASB and expanding our integrations with leading cloud service providers to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations. Join us to see how Proofpoint cloud security helps you monitor for and control risky user access and data handling. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss. - TAP SaaS Defense monitoring for cloud risks - Third-party apps risks and governance - ServiceNow login and event monitoring, including DLP - Adaptive access controls including risk-based access
Zero Trust Network Access: The People-Centric Alternative to VPN
Gabriel Meekins, Sr. Sales Acct Mgr & William Guilherme, Sr. Sales Engineer
Wed, Mar 04, 2020
The network perimeter is dissolving, and applications are migrating to the cloud. The number of users working remotely has grown exponentially over the last decade and to keep up, enterprises need people-centric solutions to protect users and data both on and off-premise. Join us for our upcoming webinar where we will take a look at how Zero Trust Network Access (ZTNA) replaces traditional remote access VPNs, which did a great job 20 years ago, but no longer meet the secure remote access needs of today’s enterprise. In today’s work environment, people are becoming the new perimeter, and protecting them and the data they access is the new imperative. In this webinar, you will learn how ZTNA solutions: ● Microsegment network access and reduce the attack surface ● Simplify management across all data centers and clouds ● Deliver superior end-user experience around the world ● Drive cloud-scale efficiency and agility
People-Centric Threats on Digital Channels and How to Stop Them
Amanda Cannata, Product Marketing Manager for Digital Risk and Compliance
Thu, Mar 05, 2020
Threat actors don’t just target your people via email. They also use digital channels, like the web and social media, to launch attacks targeting your employees, partners and customers. And these socially engineered schemes on digital channels can leave your business just as exposed as those that come through email. Join this webinar to learn about the biggest digital threats to your people, and how you can take steps to block them. You’ll learn: · How attackers register fake web domains to phish customers, conduct targeted email attacks, and more · How malicious content on social media can put your customers and executives at risk · How the deep web and darknet provide tools and opportunities for threat actors to launch digital attacks
Live Demo - Countering Business Email Compromise (BEC) with Email Fraud Defense
Tanner Luxner, Product Marketing Manager of Proofpoint
Wed, Mar 11, 2020
With staggering losses of $1.7 billion in 2019, business email compromise (BEC) is a crucial attack issue organizations to protect against. As these threats don't typically include malware or detectable malicious intent, protecting against them is not an easy task. One very essential component of full protection against BEC is email authentication. How can you use this to better protect your people and your organization? Join Proofpoint as we dive into BEC and how Email Authentication can help defend against it. In this session, we'll share: - The many components of BEC - A framework for understanding where potential gaps exist - A live demo of how Email Authentication can help provide protection for these gaps.
Live Demo: Meta Networks – Implementing Zero Trust Network Access
Michael Kaunitz, Sr. Sales Field Specialist with Proofpoint
Thu, Mar 12, 2020
The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved? Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate: - How to improve security posture and simplify the user experience - How to reduce your operational effort through our flexible and robust security controls - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
Live Demo: A People-Centric Approach to Insider Threat Management
Kevin Donovan, Sr. Solutions Architect
Tue, Mar 24, 2020
Accordingly to McKinsey more than 50% of all data breaches are the result of insider threats. As more companies look to successfully transition to the cloud, traditional ways of protecting data and intellectual property aren’t enough. Context is key when incidents occur to understand intent from the user-perspective and enable a streamlined investigative process. So how is this achieved? Join this live demo as we discuss: · Methodologies that reduce investigation times by 60-90% · The value behind correlating user activity + data movement in insider related incidents · Communication techniques to measure risk when involving other business stakeholders
Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
Sean Walker, Enterprise Account Executive
Thu, Mar 26, 2020
99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time. Join our live demo to learn how to: - Assess your users’ susceptibility to phishing attacks as well as other cyber threats - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense - Enable your employees to report suspicious messages with a single mouse click
Protecting Your Health System from Imposter-Based Emails
Most CISOs agree that the greatest vulnerability to their networks comes not from their technology, but their people. Since the cyber-criminals know this too, it’s no surprise they’ve been targeting health systems using business-compromise emails. These emails target specific pre-selected individuals - based on their roles and likely access - and appear to be coming directly from leaders inside the organization. In this timely webinar, we’ll hear more about these frighteningly effective attacks and learn just how IT professionals can empower their people to know a legitimate request from a con. Fill out the form to watch the webinar replay now.
Protecting Your People and Data - Featuring Forrester's Zero Trust Framework
There's lots of noise in the cybersecurity industry around zero-trust, but Forrester Research pioneered the original and most effective framework. It’s never been more important to understand how zero-trust principles apply to your environment, with people becoming the new perimeter, and protecting them and the data they access becoming the new imperative. In our upcoming webinar, we will take a closer look at the original Zero Trust Approach as defined by Forrester Research and applied in practice by leading security teams. The webinar will cover: An overview of the Zero Trust approach Concrete first steps for getting started Guidelines on how to evaluate your standing within the maturity model How Zero Trust reinforces people-centric security *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit. Fill out the form to watch the webinar replay now.
A People-Centric Approach to Managing Insider Threats: Introducing ObserveIT
Insider Threats are quickly becoming one of the greatest cyber security threats that organizations face today. They are responsible for three million records are stolen every day and at the heart of 57% of all database breaches last year (Verizon 2019). Research also shows that the average time to spot and contain an insider threat is a massive 77 days -- just 13% of incidents are caught within 30 days (Ponemon 2020). The reason they are so prolific and take so long to deal with is because anyone with legitimate, trusted access to an organization’s systems and data – whether full-time employee, part-time contractor or strategic business partner – can be an Insider Threat. Managing insider threats fundamentally requires a people-centric approach. With the acquisition of ObserveIT, Proofpoint adds a powerful Insider Threat Management platform to our portfolio of People Centric cybersecurity solutions. The ObserveIT platform delivers unique capability to monitor both user and file activity, enabling security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach. Join ObserveIT | Proofpoint SVP Mayank Choudhary, in this webinar to: Learn how the key components of full visibility - user activity, data activity, and behavior analytics – provide the necessary context to understanding Insider Threats Discover how an organization’s risk of an Insider Threat can be reduced through always-on monitoring, without compromising user privacy and compliance; with real-life case studies to illustrate See a demo explaining of how out-of-policy user activity is detected and investigated on-the-spot Learn about the different types of Insider Threats and find out what steps you can take to build your own Insider Threat Management program Fill out the form to watch the webinar replay now.
Bridging the Technology & People Divide with Security Awareness Training
The threat landscape is constantly changing and the attacks targeting your people are getting more sophisticated. Threat actors are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even the most savvy users. So how can you better protect yourself, your organization, and your end users? Join us as we walk you through how we're taking Proofpoint's expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you'll get a better understanding of: How we identify and stop malicious inbound threats How to better identify end-user risk with our simulated attacks How we're helping customers stop real attacks in their tracks with our Closed-Loop Email Analysis and Response (CLEAR) solution Fill out the form to watch the webinar replay now.
Rethinking DLP as You Move to the Cloud
Whether it’s financial, bank or credit card data, customer or patient information, or intellectual property, the goal of cybersecurity is to protect sensitive data and prevent unwanted access or theft. Legacy DLP solutions often fall short of that goal when you move to the cloud. With the adoption of SaaS applications such as Office 365, G Suite, Slack or Box, the cloud has become the other major channel of data sharing next to email. Securing access to a cloud app such as Office 365 in itself presents a new and significant challenge, let alone protecting sensitive data in the cloud. It is time to rethink DLP and adopt a solution that can unify DLP for email and cloud apps, but is also risk-aware. How can you better your approach in 2020? Join us as Proofpoint’s Senior Director of Professional Services, Justin Collins and CSA's CEO, Jim Reavis, discusses the steps for you to consider when transforming your DLP solution. In this session you will learn: How to better discover and protect your organization’s sensitive data with CASB How to unify DLP incident management for cloud apps, email and more How to better identify sensitive data exposures and ex-filtration when an account is compromised Fill out the form to watch the webinar replay now.
2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions
Every year, Proofpoint’s threat research team examines trends from the prior year and predicts changes in the threat landscape for the year to come. For 2020, some of the top concerns include a significant evolution in impostor attacks and increasingly sophisticated attacks on cloud applications. Join us for a deep dive into the biggest trends that we’re predicting for the next 12 months, and how you can prepare and protect your most valuable assets: your people and your data. You’ll learn: Predictions for the 2020 cyber threat landscape Key actions you can take to prepare your organization Top resources to help support your security efforts *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit. Fill out the form to watch the webinar replay now.
Live Demo: Social Media Compliance
FINRA and the SEC govern marketing communications and advertising practices when communicating with the public. These regulations put broker-dealers squarely in the spotlight of various risks and responsibilities. So how can you mitigate these threats and better manage the process? Learn how to solve for complex social compliance pain points with ease. Proofpoint’s Social Media Compliance solution helps firms and their advisers to engage with customers on social media in a compliant way. Join this demo and listen to product expert Coleem Chestnut, Sr. Integration Engineer, who will demonstrate how our solution: Finds accounts associated with your firm, including rogue adviser accounts Automates reviews and approvals of social profiles Supervises social media activity in real time and notifies you of compliance violations Removes non-compliant social media content Provides detailed reporting and proof of compliance Fill out the form to watch the webinar replay now.
Closing Security Gaps in Office 365
Microsoft offers default security capabilities for all customers in Office 365. Regardless, security threats are still getting through these defenses. The use of third-party solutions can result in higher catch rates for spam, phishing, malware and other threats. Third-party solutions with true advanced capabilities also reduce the likelihood that more sophisticated threats – such as Business Email Compromise (BEC) and Email Account Compromise (EAC). Watch the webinar to learn: How BEC/EAC occurs and can be dangerous What are the short comings of native Office 365 security capabilities How Proofpoint email and cloud solutions can help you secure Office 365 *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit. Fill out the form to watch the webinar replay now.
Live Demo: Security Awareness Training for Healthcare
The 2019 HIMSS Cybersecurity indicated that email is the initial point of compromises for healthcare cyber-attacks – phishing, hacking, BEC – or negligent activity from hospital staff…someone inadvertently clicking on a link or downloading a file. Clearly people are under attack, yet they are also a health system’s first line of defense. So how do you best protect your people and prepare for them for continuous stream of cyber-attacks? Join this live demo to see Proofpoint Security Awareness Training in action, and how it safeguards against advance threats and compliance risks. You’ll learn: The most common attacks in today's healthcare threat landscape Best practices to improve your security posture A people-centric approach to helping you protect patient data Fill out the form to watch the webinar replay now.
Prevention & Response Strategies for Phishing Attacks with Okta + Proofpoint
Today, more than 80% of breaches are caused by compromised credentials; attackers don’t need to hack in – they can just log in. While the rise in adoption of cloud-based applications serves as a catalyst for rethinking modern security, one consistency remains: email-based credential harvesting remains the most fruitful tactic for today’s threat actors. So how can organizations protect against attacks like phishing? Join Lucia Milica, CISO at Proofpoint and Marc Rogers, Executive Director, Cybersecurity at Okta as they share: The anatomy of a phishing attack Various prevention and response strategies Best tools and integrations across authentication and email security Fill out the form to watch the webinar replay now.
Hoodwinked! Why Users are the Preferred Target for Attackers
Manipulation of human beings has been going on since the dawn of time. With the multiple channels and speed that information and data are arriving to every individual, the opportunity to be manipulated or “conned” is at an all-time high. With the continued diligence in hardening system, the attackers have moved to the softer targets, the “human element”. But an educated and aware user is a resilient target. What can an organization due to better harden their users and make them aware of the myriad threats that target them? Join Proofpoint and (ISC)2 on November 21, 2019 at 10:00 AM PST/1:00 PM EST for a panel discussion on how to better defend against threat actors with a cybersecurity strategy that's focused on your organization's most valuable assets: your people. Fill out the form to watch the webinar replay now.
Securing Data in the Cloud Starts with People
Cybersecurity in healthcare is about people, not technology. In the cloud era, keeping your patients safe means protecting clinicians and patients from cloud threats and data loss. A people-centric approach to security helps you identify people and data at-risk and provide the tools needed to stay alert and keep users and their sensitive data safe. A unified data loss prevention (DLP) platform can get you the visibility needed to discover and stop ex-filtration of sensitive data (PII, PHI and more) housed in cloud apps, email and on-premises file shares. So what does a people-centric strategy look like for your healthcare cloud security? Join us for a deep dive into how you can better protect your organization's most valuable assets: your data and your people. In this session, we'll examine the following: Identify which healthcare job functions are most attacked Shorten time to discover and protect sensitive data with out-of-box DLP policies Ensure consistent policy enforcement to lock down access to files with technology shared across email, cloud apps and on-premises file repositories Simplify day-to-day operations by centralizing incident triage and reporting across multiple channels in a single dashboard Fill out the form to watch the webinar replay now.
Digital Risks to Watch Out for In 2020
Threats at the domain registration level are rising fast. So what can you do to stay ahead in 2020? Join Proofpoint’s Ali Mesdaq, Director of Digital Risk Engineering and Research, as he explains some of the digital risks that security leaders are likely to face in the new year ahead. Listen to this webinar and gain valuable insights on how criminals are using domain registrations to enable attacks on your customers, employees and business partners, including: B2B and supply chain fraud Employment scams Sales of counterfeit goods Fill out the form to watch the webinar replay now.
What We Have Learned Working with Compliance
For organizations, building and deploying a corporate compliance program and solution that is ready for the future can be a challenge. So are you ready for something new? Compliance solutions aren’t new and Proofpoint has been providing compliance and legal solutions to customers for almost 15 years. Join the second of the two part webinar series and hear us talk about the lessons we learned and valuable insights from our customers about: Content capture and supervision strategies Content and organizational policies Cross functional departmental collaboration Fill out the form to watch the webinar replay now.
Archive Compliance: Cut Through the Noise - Policy Drives Efficiency
Financial services firms face the world’s toughest regulatory scrutiny. FINRA, SEC and IIROC require formal retention and supervisory review programs for all communications. Not only that, increasing volumes of data and a growing complexity of content sources are putting a strain on organizations to ensure that their data gets managed and reviewed efficiently. So what is the best way for you to ensure compliance and avoid risk? Join this webinar and learn: How regulators are looking at new types of content Best practices on how to set up supervision How to create efficient policies Webinar ID: 369340
Foundations of People-Centric Cybersecurity
What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to: Protect your people from email-based attacks Gain visibility into who in your organization is getting the most attacks Solve for user awareness through threat simulation and training Fill out the form to watch the webinar replay now.
How to Stop Cloud Threats by Leveraging CASB With a People-Centric Cybersecurity
Once your organization migrates to the cloud, protecting your people and the data they create becomes more challenging and critical than ever. Cybercriminals are launching wide-scale brute force attacks on cloud services to compromise user accounts. 85% of Office 365 and G Suite tenants are targeted. After taking over your trusted accounts, threat actors use social engineering tactics to trick even the most savvy users to install malware, transfer money or hand over sensitive data. That's why a people-centric approach to your cloud security is one of the most effective ways to provide visibility and control over your cloud applications. So what does a people-centric strategy look like and how can you use it to better your overall cloud security? Join our experts for a deep dive into how to use a Cloud Access Security Broker (CASB) to protect your organization's IT-approved applications, such as Office 365 and G Suite that contain your most valuable assets: your people and data. In this session, we'll examine: What the most prevalent cloud attacks are and how they target your VAPs, or Very Attacked People Why a people-centric approach to cloud security is one of the most effective ways to protect your VAPs The different CASB use cases, features, and architectures What to look for in a CASB solution to mitigate the risks you're likely to face Join now to learn more.
Top 5 Lessons I Learned Working with Compliance
Ever wonder what industry leaders are doing with their compliance programs? Listen as Proofpoint’s Dan Nadir (VP of Product, Digital Risk and Compliance) discusses today’s trends in social selling and compliance programs. Building a corporate compliance program that can keep up with changing laws, emerging risks and new regulations is increasingly difficult. Listen to this webinar and gain valuable insights as we cover: Adoption of new communication platforms How to scale a program successfully Supervising for various media types *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit. Fill out the form to watch the webinar replay now.
2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe
More than 99% of attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and trust that leads well-intentioned people to install malware, transfer money or hand over sensitive data is simply more reliable and lucrative to cyber criminals than expensive and quickly patched automated exploits. So how can you better protect yourself, your organization, and your end users from attacks that rely more on social engineering than system vulnerabilities? Join our Director of Threat Intelligence, Patrick Wheeler, as we examine the key findings of Proofpoint's 2019 Human Factor Report. We'll take a close look at how threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that trick even savvy users. In this session we'll share: Trends in volume and types of attacks, providing useful insights for both defenders and organizations Refined techniques and new platforms used by attackers The latest targets that make up an expanding attack including as Office 365 and other cloud accounts, as well as the schemes to which users are most likely to respond The evolution of business email compromise and impostor threats Best practices for layered defenses and user training when, in fact, end users represent the last line of defense against these threats *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit. ID: 369592
Switch from Defense to Offense: Why Archiving All Electronic Content is Critical
Electronic content archiving – the process of capturing, indexing and placing data into long-term storage for later search and retrieval – has been a best practice for many years, particularly in industries that are more heavily regulated, such as financial services, energy, life sciences, healthcare, and government. The digital transformation has resulted in the integration of digital technology into all areas of a business, resulting in fundamental changes in how a business operates and the value they deliver to their customers through varied set of communication and collaboration systems. All these new communications have an impact on an organization's compliance and legal readiness. So why is archiving all electronics critical to your organization, and what are some effective ways to approach this? Join Proofpoint's expert Martin Tuip and Michael Osterman of Osterman Research as we deep dive into archiving your electronic content, and what an archiving solution looks like. In this session, we'll share: How an archiving solution can be used for both defensive purposes and as a proactive tool to glean insight and intelligence about an organization’s operations How to use them to detect problems before they turn into big problems Best practices on moving forward with next-generation archiving *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Behind the Scenes on Building an Effective Security Awareness Program
Join Dale Zabriskie, Proofpoint’s Security Awareness Training Evangelist, for a Behind the Scenes interview on Building an Effective Security Awareness Program. Dale Zabriskie travels worldwide to help security awareness professionals to overcome challenges, leverage best practices, and implement an effective security awareness program. In this interview, Dale will discuss some of the most frequent challenges he sees in the field and share his expertise on how to overcome these roadblocks.
How to Solve the $26 Billion Problem of Business Email & Account Compromise
The FBI recently released their latest report detailing reported losses attributed to business email compromise (BEC) and Email Account Compromise (EAC) which totaled over $26B between July 2016 and July 2019. While the scale of losses is staggering, how to best protect against these type of threats, which don’t normally include malware or detectable malicious intent, is not an easy task. There are many facets that an organization must consider across email, cloud, authentication, visibility and education in order to address the different attack tactics and be prepared to limit the potential for financial losses. So what can you do to better protect your people and your organization? Join Proofpoint now as we deep dive into email fraud and how to defend against it. In this session, we'll share: The techniques for preventing these threats A framework for understanding where potential gaps exist How automation is key in resolving incidents
Building an Effective Security Awareness Program
Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves? Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss: Proven best practices for increasing the effectiveness of cybersecurity education How to build a culture of security within your organization Actionable guidance on executing security awareness & training initiatives that deliver measurable results
Key Considerations for Your Future Email Security Solution
The Broadcom acquisition of Symantec’s Enterprise Security Business creates uncertainty for your email security strategy. Unsettled by the acquisition, many Symantec email security customers are reevaluating their email security solution. As you evaluate your options, you may be wondering what critical capabilities your next email security solution must-have. One thing is certain. With today’s threat actors continually refining their tactics, you need an email security solution that can keep pace with today’s rapidly changing threat landscape. But what else do you need to defend against the No. 1 threat vector? Join Proofpoint for an educational webinar to learn: What the threat landscape looks like today What key capabilities you should look for to future proof your email security How Proofpoint we’ve helped customers with their email security
How a Large Financial Services Company Utilizes Email Fraud Defense
Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. As the number one threat vector to businesses, email must be authenticated to restore trust to business communications. So what is the best way to accomplish this? Join us for our case study with one of the largest financial services companies as we examine how they are using Proofpoint's Email Fraud Defense (EFD) to help stop email spoofing attacks in their tracks. In this session, we'll share: The benefits of deploying DMARC email authentication How the organization is utilizing Proofpoint's EFD How to strengthen your secure email gateway to better protect your end users Fill out the form to watch the webinar replay now.
Never Lose Data Again: Capture, Analyze & Reconcile All Electronic Communication
Regulated organizations must ensure their communications are completely captured and retained. Without the proper tools, proving to regulators that you are not missing data is close to impossible and can lead to fines and penalties. So how can you better manage this? Join this webinar and learn: How to unify content capture across data sources How to ensure completeness of stored and monitored content Common data integrity challenges and how to address them Fill out the form to watch the webinar replay now.
Behind the Scenes Interview on the 2019 Beyond the Phish Report
You’ve probably seen a headline or two about Proofpoint’s 2019 "Beyond the Phish" report. Hopefully, you’ve taken the time to read the report and found the insights beneficial when developing and deploying your security awareness training program. We are now inviting you to go beyond behind the scenes on the key findings of this report. SecureWorld’s Bruce Sussman interviews Dale Zabriskie, Security Awareness Evangelist at Proofpoint Security Awareness Training as he unpacks key security awareness metrics and strategies you can use at your organization. Fill out the form to watch the webinar replay now.
Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service
More than 99% of all targeted cyberattacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance. It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved? Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape. In this session, we'll share: Why cybersecurity transformation is critical for the financial services sector How to identify users who are most at risk of cyberattacks or cause the most compliance risk How to mitigate the risk of adverse inferences and damaged reputations Fill out the form to watch the webinar replay now.
Web & Email Isolation: Why It Matters to Secure Your Organization and End Users
Threat actors are focused on penetrating your organization through advanced attacks on the very tools that your users employ on a daily basis: corporate email, web browsers, and personal webmail accounts. Just the simple act of visiting a compromised web page means that a user can become a victim of a targeted attack, thereby wreaking havoc on their corporate network. How can security and IT teams enable use of these critical tools for employee productivity, while at the same time ensuring the security of critical data, financial and other assets? We will dive into a new report by Osterman Research: Why You Should Seriously Consider Web Isolation Technology. This report will answer these questions and more: How do you enable a people-centric approach to email and browser security? What are the benefits of isolation technology to safely enable employees’ personal browsing and webmail use? What are the cost benefits of using isolation technology for URL exception handling? How easy and quickly can isolation technology be implemented? Fill out the form to watch the webinar replay now.
Black Hat USA 2019: Securing the Multi-Cloud in the Age of Threats
How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about: Multi-cloud reality Addressing your cyber risk Managing vulnerabilities, detecting breaches and responding to incidents Automating security tasks across multiple clouds and applications Recommendations for improving enterprise cloud security Speakers: Raj Mallempati, COO, CloudKnox Security Chris Schueler, Senior Vice President of Managed Security Services, Trustwave Tim Choi, VP, Product Marketing, Proofpoint Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams Fill out the form to watch the webinar replay now.
Black Hat USA 2019: How To Build a People-Centric Cybersecurity Strategy
More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the center when building a robust cybersecurity approach in the era of highly sophisticated attacks. Join BrightTalk for a live interview with Tim Choi, the VP of Product Marketing at Proofpoint, as we discuss the key findings of the threat landscape for 2019 and share practical tips on how CISOs can build a truly people-centric cybersecurity strategy. Fill out the form to watch the webinar replay now.
Live Demo: How Email Fraud Defense Authenticates Your Emails Quickly & Safely
Email spoofing attacks are on the rise and email authentication is a proven solution that can block these threats before they reach your employees, customers, and business partners. The challenge is deploying authentication is time-consuming, requires expertise, and brings the risk of blocking legitimate email. So how can you overcome this challenge? Join us for a live product demonstration and learn how Proofpoint’s Email Fraud Defense (EFD) is helping organizations deploy email authentication quickly and confidently. In this session, we'll share: Our 360-degree visibility of the email coming into and being sent from the organization EFD’s proven authentication deployment program How Proofpoint strengthens your secure email gateway to better protect your employees Fill out the form to watch the webinar replay now.
The Role of IT in Compliance: To Serve, Preserve and Protect
The role of IT within the compliance frame work is primarily implementing and managing the systems that protect and control information. From how the content is captured and preserved to the overall system availability. Traditionally these systems were on-premises but most organizations opt for a more efficient way to manage their compliance needs by adopting cloud-based solutions. So how can you better serve, preserve and protect your end users? Join this webinar and learn: What are the differences between on-premises and cloud-based archiving Common mistakes and tips on migration Top things an IT professional should know about Compliance Fill out the form to watch the webinar replay now.
Live Demo: Achieve People-Centric Security with a CASB Innovator
Proofpoint provides the only CASB to meet the needs of security people serious about cloud threats, data loss and time-to-value. Proofpoint CASB extends our people-centric security from email to cloud apps. With people-focused threat protection, data security and cloud app governance, Proofpoint CASB protects users from cloud threats, safeguards sensitive data and helps you stay compliant. Your cloud security journey with Proofpoint starts with IT-approved applications, such as Office 365 and G Suite that contain your most valuable assets. Join us to learn and see how you can: Accelerate cloud adoption by extending people-centric threat detection and defense-in-depth principles to cloud apps. Deploy consistent DLP policies across cloud apps, email and on-premises file repositories and simplify day-to-day operations by centralizing incident management across multiple channels. Discover cloud apps and contain Shadow IT, including third-party OAuth apps that access Office 365 and G Suite data. Fill out the form to watch the webinar replay now.
Live Demo - Enterprise Information Archiving
Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what' the best way for you to develop and implement a new secure approach to your data archiving challenges? Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving: In this demo, we'll share how you can: Mitigate reputational risk Stay compliant with industry rules and regulations Improve visibility into your archived data Fill out the form to watch the webinar replay now.
Live Demo: Security Awareness Training
Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time. Join us for a demo of Proofpoint Security Awareness Training to see for yourself! You'll learn how to: Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish customized training to your end users to drive behavior change and make them a stronger last line of defense Enable your employees to report suspicious messages with a single mouse click Fill out the form to watch the webinar replay now.
Compliance trends and futures – how technology is driving change
The compliance world is changing. Regulations are evolving and new technology addressing compliance challenges are becoming available. From international privacy regulations to new communication channels, how can organizations keep up with those changing regulations and how can they remain nimble. Join us for a webinar on compliance trends and futures and how regulatory technology and modern-day data behavior is driving change. Learn about: What regulators are focusing on these days New regulatory and compliance technology that can help organizations meet regulatory requirements External drivers for technology change Fill out the form to watch the webinar replay now.
Broker-Dealers on Social Media: Understanding the Risks
Regulations put broker-dealers squarely in the spotlight of various risks and responsibilities. FINRA and the SEC govern marketing communications and advertising practices when communicating with the public. Additionally, the cybersecurity threat landscape is evolving and is one of the primary operational risk’s firms face today. Join Proofpoint to hear the latest in advertising regulations and the cybersecurity threat landscape. Learn how your firm can protect its people and data on social media. Attend this webinar and learn: Understand the requirements of advertising regulations on social media The latest trends in cyber threats facing broker-dealers How Proofpoint can help protect your firm from today’s risks Fill out the form to watch the webinar replay now.
What the Symantec Acquisition Means for Your Email Security Future
It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats. As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn: How the email threat landscape has changed with attackers evading legacy approaches How leaders like Proofpoint have innovated to keep up How we have helped customers migrate from legacy products to Proofpoint
How to Design an Adaptable, Flexible and Compliant Social Selling Program
Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether. If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable? Join Hootsuite and Proofpoint now as our experts share: How top firms balance compliance with their adviser experience What experts believe is in store for social selling and compliance in the future How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
Beyond the Phish: A Snapshot of End-User Behavior
*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit Phishing is one of InfoSec's long-standing threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering? During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications. We’ll share: The importance of assessing and training end-users about cybersecurity threats beyond email-based social engineering The strengths and weaknesses among end-users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization A more holistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks How you can use this information to reduce the risk of successful cyber attacks within your organization Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture. Fill out the form to watch the webinar replay now.
Browser & Email Isolation to Protect Your Users in Minutes
When your employees are browsing the web or accessing webmail, your organization can be facing a wide range of online threats. These can include ransomware, web-based & file exploitation, leaks of sensitive and confidential information, and catastrophic data breaches. Web isolation technology is one of the best ways to help you protect against these risks. Join Proofpoint’s Browser and Email Isolation live demo as we share: How Proofpoint protects your users within minutes from web born threats from risky browsing and malicious email in both corporate and personal email How Proofpoint’s new integration with Targeted Attack Protection (TAP) allows us to provide adaptive controls within corporate emails to enhance security How Proofpoint’s people-centric approach to Isolation stacks up against competitors Presented by: Eric Schwake, Product Marketing Manager Paul Wang, Technical Product Marketing Manager Fill out the form to watch the webinar replay now.
Security Awareness Training with Customization Center
Security awareness training is not one size fits all. Every organization, region, and even departments or specific roles can have different training needs. Which is why we introduced our Customization Center to enable administrators to tailor their content and assign it quickly to their end-users. Join us as our experts talk about how you can utilize the Customization Center. This self-service customization enables quick turnaround of changes and the greatest flexibility in personalizing content for your organization at no additional charge to customers. The new version allows administrators the ability to manipulate most visible text, including the questions in the quizzes as well as the text across all supported locales. You'll learn how to: Create customized, role-based training for individual departments, roles, or regions to ensure relevancy to specific users or groups Provide a quality educational experience and continue to drive behavior change while customizing content Align training with the knowledge level and cybersecurity maturity for your organization Ensure your training content remains consistent for multinational audiences Edit training to maintain US Section 508 and WCAG 2.0 AA compliance and ensure users with disabilities have the same opportunity to learn Presented by: Shani Mahler, Product Manager Mike Bailey, Sr. Product Marketing Manager Fill out the form to watch the webinar replay now.
Securing Your Organization and End-Users with Browser and Email Isolation
Everyday threat actors are trying to infiltrate your organization with advanced attacks by going after your users via corporate email, personal webmail and personal browsing. When your people engage in personal browsing or webmail at work, they can become a target for attackers. IT and Security teams are struggling with the process of exception handling for particular user website while still ensuring their organizations’ security. What can you do to protect your organizations and end-users? Join Proofpoint as we discuss: A people-centric approach to browser and email security The benefits of adopting Isolation for personal browsing and webmail defense Cost benefits using isolation for URL exception handling Fill out the form to watch the webinar replay now.
Behind the Scenes: Selling the Value of Security Awareness Training throughout Your Organization
Listen to the SecureWorld Behind the Scenes interview. Our Security Awareness Evangelist, Zabriskie discusses how to sell the value of security awareness training by speaking the language of your customer. Learn best practices for selling the value of security awareness training internally, how to prepare a business case for your training program, and how to engage employees through creative programming, recognition, and incentives. Fill out the form to watch the webinar replay now.
The Insider Threat: Real Defense for Real Businesses
Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business. Attend this webinar and you’ll learn: What essentials must be in your end user awareness program and how to make those lessons stick Which tools and techniques can be used to enforce security policies when your users unintentionally or maliciously try to break them How you can spot the signs of an impending or ongoing insider data leak and respond Panelists: Katie Burnell – Global Insider Threat Specialist, Dtex Systems Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Sara Peters – Senior Editor, Dark Reading Fill out the form to watch the webinar reply now.
Cloud Threat Research and CASB Capabilities
As more of your organization’s data is stored in the cloud, protecting people and the data they create has become more challenging and critical than ever. Join us as our expert discusses the latest cloud threat research findings and how you can expand Proofpoint’s threat protection and data loss prevention to the cloud. In this demo, you’ll learn: Why a people-centric approach to cloud security provides better visibility and control over your data and cloud apps How you can leverage your existing Proofpoint products for cloud account compromise detection, cloud DLP & adaptive access controls for Office 365, GSuite and more How Proofpoint’s CASB product capabilities integration with TAP, TRAP, and DLP Fill out the form to watch the webinar replay now.
Trends in Compliance: How IT Should Prepare for the Future
Join this webinar to learn about the need for cross-departmental alliances, and best practices for joining efforts and technology across your organization. How evolving regulations and compliance technology will impact IT How IT can help with your organization's compliance strategy How new RegTech can improve compliance readiness while also improving IT value to an organization Fill out the form to watch the webinar replay now.
How to Stop Cloud Threats by Leveraging CASB with People-Centric Cybersecurity
As more enterprise data and workloads migrate to the cloud, security needs and practices continue to evolve. The perceived “big risks” -shadow IT and the security practices of SaaS companies – have been surpassed by attacks on individual cloud users and data. The good news? There are reliable, high fidelity ways to detect and mitigate cloud threats and risks to data. Join Garrett Bekker, Principal Security Analyst at 451 Research and Ryan Kalember, SVP of cybersecurity at Proofpoint as they discuss how to leverage a CASB to mitigate cloud threats and risks, and learn about: How the industry’s conceptions of what matters in cloud security have evolved, from the initial emphasis on shadow IT and the security practices of cloud vendors to the current focus on the identity-defined perimeter What the most successful and prevalent attack vectors are in the cloud, from brute force attacks to new forms of phishing that bypass multi-factor authentication What to look for in a CASB solution to mitigate the risks your organization is likely to face Engaging employees through creative programming, recognition, and incentives Fill out the form to watch the CASB cloud security webinar replay now.
Live Demo: Email Fraud Defense
Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted. Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to: Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People Monitor all inbound impostor threats from your domains and those of third parties Accurately distinguish between legitimate emails and fraudulent emails Fill out the form to watch the webinar replay now.
Strategic Cybersecurity Transformation: Why Now, Why People-Centric
Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change? Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape. You'll learn: How business transformation like the rise of Office 365 has driven cybersecurity transformation Why you should pivot your transformation around people and culture, rather than infrastructure 6 principles for successful cybersecurity transformation Fill out the form to watch the webinar replay now.
Live Demo: Ramping Up People-Centric Cybersecurity
What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the second phase of this maturity model and see for yourself how the tools work. We'll discuss how to: Identify and remediate account compromise attacks Solve for data loss through email Make your users more resilient against attacks through awareness training Fill out the form to watch the webinar replay now.
Live Demo: Advanced People-Centric Cybersecurity
What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the third phase of this maturity model and see for yourself how the tools work. We'll demonstrate how to: Gain deeper visibility into attacks and respond when things go wrong Solve for unified data protection Defend against email fraud and social media fraud Fill out the form to watch the webinar replay now.
State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users
As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways, we need to empower our workforce to be aware and ready to detect them alongside the technology. Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months. Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn: How to build a people-centric security strategy Steps organizations are taking to mitigate end-user risk from phishing The most devastating types of phishing emails The most vulnerable industries and departments Fill out the form to watch the webinar replay now.
2019 Cyber Threat Landscape
In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019. Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss: Predictions for the 2019 threat landscape Key actions you can take to prepare your organization Top resources to help support your security efforts Fill out the form to watch the webinar replay now.
Outside the Network: Protecting People and Customers Against Digital Threats
Bad actors do not just target employee inboxes - they also target the brand itself, key employees and customers on digital channels. Social media, web domains and the deep and dark web pose areas of risk where companies are not directly in control of their communication security. Despite their value, these properties are often left unsecured against fraudulent activity. Since these are emerging threats, digital risks can be blind spots of focus for security teams. Join this webinar to learn about trends in digital risk including: Executive impersonations targeting your people on LinkedIn Social media protection on Instagram, Facebook, and Twitter Credential threats on the dark web Physical threats to key locations Counterfeit domains in the retail space Visibility into the digital threat landscape How to protect against these threats Fill out the form to watch the webinar replay now.
Deciphering 2019 Cyber Threat Landscape
In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019. Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join Adenike Cosgrove and Davide Canali as they discuss: Predictions for the 2019 threat landscape with a focus on EMEA and APJ Key actions you can take to prepare your organization Top resources to help support your security efforts Fill out the form to watch the webinar replay now.
Email Protection Demo - Staying Secure in Office 365
Anyone can be a VAP: Very Attacked Person™ and they're not always the people you expect. While Microsoft Office 365 allows your people to work anywhere, anytime, on any device, it can also create security issues making your people vulnerable. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Proofpoint’s Email Protection and Targeted Attack Protection solutions can help. Join this webinar and learn about: Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats Approaches for identifying suspicious messages The latest in security software to fight against advanced threats Fill out the form to watch the webinar replay now.
Live Demo: Enterprise Information Archiving
Financial services firms face some of the world’s most stringent and complex regulations. Proofpoint offers solutions that can help financial firms streamline compliance. We provide compliance and supervision solutions that provide easy capture, review and reporting. That means complete visibility across your email, instant messages, collaboration tools and social media. Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry: Mitigate risk of adverse inferences and damaged reputations Quickly collect, search and retrieve data on demand Stay compliant with industry regulations through Enterprise Archiving, Intelligent Supervision and E-discovery Fill out the form to watch the webinar replay now.
2019 FINRA and SEC Exam Priorities
Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2019 and beyond. Our industry experts will discuss some of the risks spotlighted for 2019: Supervision of Digital Assets Business Regulatory Technology Adequacy of firms’ cybersecurity programs to protect sensitive information Fill out the form to watch the webinar replay now.
How to Create a People-Centric Cybersecurity Strategy
Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities. But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO. To combat these cybercriminals, learn how to build a strategy that: Reveals who is targeted and how Combats attacks before they reach your users, and Mitigates damage from the attacks that inevitably will reach your people SPEAKER: Ryan Kalember, EVP, Cybersecurity Strategy at Proofpoint. Fill out the form to watch the webinar replay now.
From Skeptics to Champions: Selling the Value of Security Awareness Training throughout Your Organization
The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key. Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work. Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about: Best practices for selling the value of security awareness training internally Preparing a business case for your training program Engaging employees through creative programming, recognition, and incentives SPEAKERS: Dale Zabriskie, Security Awareness and Training Evangelist, Proofpoint Security Awareness Training Joe Krock, Cyber Training and Awareness Leader, Enterprise Information Protection (EIP), Humana Fill out the form to watch the webinar replay now.
The CyberWire: Hacking Humans Podcast
The CyberWire’s Hacking Humans Podcast interviewed Dale Zabriskie, our Security Awareness and Training Evangelist, who shared some surprising insights from the 2019 State of the Phish Report. Fill out the form to watch the webinar replay now.
User Risk Report
We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening. We will discuss the 2018 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide, including: Knowledge of phishing and ransomware Password habits (including password reuse) Safe use of WiFi, location tracking, and social media The types of personal activities (shopping online, playing games, streaming media, etc.) that your organization's devices are being used for by employees and their families and friends Fill out the form to watch the webinar replay now.
State of the Phish™
Phishing continues to be one of the fastest growing and most malicious threats to security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated safeguards through carefully planned, socially-engineered email phishing attacks that are only getting more advanced. In this webinar, we will review the key findings and insights from our 2018 State of the Phish Report: Aggregation and analysis of data from tens of millions of simulated phishing attacks sent through Proofpoint Security Awareness Training over a 12-month period Analysis of more than 10,000 responses from quarterly surveys of infosec professionals from more than 16 industries, as well as data from an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors Insights into current vulnerabilities, industry-specific phishing metrics, and emerging threats Panelist: Gretel Egan – Brand Communications Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.
Automating 90 Days of Security Awareness Training Webinar
As a security professional, we know that your time is valuable. At Proofpoint Security Awareness Training, we’ve built some great automation tools directly into our Security Education Platform to help you run an effective security awareness program with minimal setup time. In this webinar, you’ll learn how unique features like auto-enrollment and follow up campaigns can streamline the administrative process while giving your end users a whole quarter of great content. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Colleen Gaffney – Managed Services Supervisor, Proofpoint Security Awareness Training Matt Lane – Product Manager, Proofpoint Security Awareness Training Fill out the form and watch the webinar replay now.
Closed Loop Email Analysis and Response (CLEAR) Webinar
Proofpoint's Closed-Loop Email Analysis and Response (CLEAR) solution, is a complete closed-loop approach to instant end-user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defenses. Once reported, CLEAR automatically analyzes messages against multiple intelligence and reputation systems, reducing an organization’s typical threat triage time from days to minutes without requiring additional work from human analysts. Proofpoint CLEAR is the first joint solution using Proofpoint Security Awareness Training’s powerful end-user solutions post-acquiring them earlier this year. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Mark Wuslich– Product Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar replay now.
Risky Business: When End-Users Continue Bad Security Behavior
You’ve gone over social engineering scenarios with your end-users. You run quarterly phishing simulations. You use gamification and fun videos to help create a culture of security awareness within your organization. You even have internal champions within the different business units. So why is it that Paul in Accounting got hit with a ransomware attack last week? Why are the sales people continuing to fall for phishing emails? And seriously, why can’t the executives follow the same rules as the rest of the employees? Join this web conference as our expert panelists discuss how to deal with risky behavior from your end-users. When should you escalate this to HR or higher ups? Do extreme cases call for termination of employment? *CPE credit is available. Speakers: Mitchell Sprinsky, CIO - Spectrum Pharmaceuticals Alan Levine, Cybersecurity Advisor - Proofpoint Security Awareness Training Mike Muscatel, Information Security Manager - Snyder's-Lance, Inc. Moderated by: Sam Masiello, CISO- Teletech Key Topics Include: How to deal with risky behavior from your end-users Whether or not to pursue an escalation path for repeat offenders Download now to learn more. This is a joint presentation of Proofpoint Security Awareness Training and SecureWorld. *Viewing this webinar may be used to earn CPE credit hours, for more information please contact Tom Bechtold at SecureWorld via email at firstname.lastname@example.org.
End-User Cybersecurity Behaviors: The Importance of Training Beyond the Phish
Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering. During this session, we will share results from the Proofpoint Security Awareness Training 2018 Beyond the Phish® Report, which analyzes data from nearly 85 million responses to cybersecurity knowledge assessments and training challenges presented to global end users across multiple industries during 2017. We will discuss end users’ strengths and weaknesses across 12 cybersecurity topics — from identifying social engineering scams to protecting confidential information to working safely outside the office. We’ll also highlight variations in end-user knowledge levels across industries, giving you a benchmark against which to compare your organization’s readiness. Attendees will also see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks, and how using these tools together can give a more complete view of susceptibility. Finally, we’ll provide guidance about how to use this information to strengthen your end users and reduce the risk of successful cyberattacks within your organization. Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community. Featured Presenters & Moderator: Amy Baker, VP Marketing, Proofpoint Security Awareness Training Victoria L. Thomas, Cybersecurity Awareness Leader, Fortune 500 Company Mitch Parker, Executive Director InfoSec & Compliance, Indiana University Health James McQuiggan, Product & Solution Security Officer, Siemens Gamesa (moderator) Fill out the form to watch the webinar reply now.
The People Factor: Fight Back Against Phishing
Phishing remains the top attack vector used by cybercriminals, and every end user is a potential target. But with the right security awareness training, these same people can be transformed into a key component in your anti-phishing defense. Kurt Wescoe, Chief Architect of Proofpoint Security Awareness Training, shares his insights and perspectives in this interview hosted by BankInfoSecurity. Listen to the interview to learn more about: Current phishing trends What’s wrong with traditional end-user training How Proofpoint takes a different approach to security awareness training Panelist: Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.
One CISO’s Journey to Cyber Awareness
Whether budgets are robust or restrictive, infosec teams are often skeptical about diverting dollars away from technical tools so they can better fund awareness training. Fortune 500 CISO Alan Levine felt the same — until a nation-state attack on his organization led him to reexamine employees’ roles in cybersecurity and the value of defense-in-depth strategies at users’ desktops. Watch this webinar replay to learn about Levine’s journey from security awareness training skeptic to advocate. Panelist: Alan Levine – Security Advisor, Proofpoint Security Awareness Training. Fill out the form to watch the webinar reply now.
State of Security Education: Healthcare
The healthcare industry faces increased attacks from cybercriminals, and risky end-user behaviors are only exacerbating the threat. A new report from Proofpoint Security Awareness Training, State of Security Education: Healthcare, helps organizations understand the knowledge gaps that affect their security postures and increase risk. Join us for a deep-dive webinar that explores end-user data specific to the healthcare industry. We will analyze responses gathered via nearly 85 million questions asked and answered in our Security Education Platform, as well as data culled from tens of millions of simulated phishing attacks. During this webinar, you’ll learn: How end users in the healthcare space perform on 12 important cybersecurity topics How healthcare organizations use security awareness training to mitigate risk How a regional hospital reduced phishing susceptibility by 86% Panelist: Amy Baker – Vice President of Marketing, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.
Tools for Email Fraud Defense (EFD)
Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you: Block malicious emails spoofing your domains before they reach your employees and customers Monitor all emails (inbound and outbound) from your domains and those of third parties Accurately distinguish between legitimate emails and fraudulent emails About the presenter: Alex Fryback, Product Manager at Proofpoint.
Staying Secure in Office 365
Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Proofpoint’s Email Protection and Targeted Attack Protection solutions can help. Join this webinar and learn about: Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats Approaches for identifying suspicious messages The latest in security software to fight against advanced threats About the presenter: Greg McHugh, Sr Engineer at Proofpoint
How to Build your People-Centric Cybersecurity Strategy
Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities. But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO. The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that: Reveals who is targeted Combats attacks before they reach your users Mitigates damage from the attacks that will inevitably reach your people About the presenter: with over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers.
Current Cyber Threat of the Week - 10-Minute Webinar
Each week we host a Cyber Threat of the Week webinar featuring a high-level look at the latest cyber threats, including current malware and ransomware, to help security teams navigate the attack landscape, in less than 10 minutes. For this week's Interesting Threaty Byte, we bring you the LCG Kit, a new builder for malicious Microsoft Office documents. What's so fascinating about this week’s threat is it allows budding threat actors to create malicious documents of their own. CG Kit or Linear Congruential Generator was first discovered in March of 2018 and began by creating documents that exploited certain CVE's. LCG Kit has now evolved to use macros which are popular for threat actors to use to infect a person's computer. Once infected, the threat actor can further infect the victim's computer with common malwares such as; Loki Bot, FormBook, Agent Tesla, AZORult, Revcode RAT and Quasar RAT. This Interesting Threat comes to us from our Proofpoint Threat Insight blog; "LCG Kit: Sophisticated builder for Malicious Microsoft Office Documents", located at https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents
Innoculating Against Healthcare Attacks
Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment. Join us for a discussion of: - Just released research that outlines healthcare's most likely threat vectors of 2018 - How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare - Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution - New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow
Your Guide to Staying Secure with Office 365
Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them. Join Michael Osterman from Osterman Research and our panel of experts, April 26, 10 AM PT as they discuss how to overcome challenges including: --Credential Phishing --Email Fraud --Cloud Access Security --Regulatory Compliance and E-Discovery --Data Loss
Still Falling Foul of Phishing
It has been around for many years, but phishing is not a problem that’s going away any time soon. In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of. Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization. Join us as we discuss: - Effective security training to help prevent falling for an attack - The right tools and methods for detecting phishing - How to respond when to email threats
Human Factor 2018 - Bad Actors Follow the Money
The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives. Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users. Join Proofpoint Director of Threat Intelligence as we discuss: Trends in volume and type of attack providing useful insights for both defenders and organizations. Ransomware and Email Fraud - how effective have they become and who is being targeted the most. How bad actors are using cloud services
Quarterly Threat Report November 2017
Malicious URL attacks returned with a vengeance. Ransomware reigned supreme. And fraudsters worked aggressively to impersonate trusted brands in email, social media, and the web. Those are just a few of standout trends we saw in the third quarter within our global customer base and in the wider threat landscape. Join Ryan Kalember, SVP of Cybersecurity Strategy, and learn: How the threats have shifted quarter over quarter, identifying larger trends across malware, phishing, and fraud Actionable intelligence and advice for managing your security posture About the sophisticated threats across email, the web, social media, and mobile that we continue to see
Filling the GDPR Compliance Gap
GDPR is approaching fast for organizations worldwide. For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. With Proofpoint, you get a complete solution for quickly discovering, controlling, and protecting personal and sensitive EU data. We help you comply with GDPR mandates for collecting, processing, storing, deleting, transferring and using EU personal data. Join us to learn how to: • Drive towards compliance • Embed "privacy by design" to your development lifecycle • Protect all identified EU personal data and prevent data breaches
Archive for Financial Services
Download this on-demand webinar to learn more about the latest with Proofpoint Enterprise Archive's offerings for Financial Services organizations. You May Also Like: Analyst Report: Protecting Against Advanced Threats and Compliance Risks White Paper: What You Don’t See Could Be Hurting Your Organization Video: Why Proofpoint?
Protecting Data After The Digital Disruption
Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy. Join this lively discussion to learn: Trends and implications for traditional network and endpoint DLP Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently Strategies on how to move forward to protect your critical data
Threat Response Security Automation
Cyber criminals are leveraging automation to launch more efficient and effective campaigns. Manual defense solutions will never be able to scale to fight back. Fill out the form and join us for this webinar to learn: The scope of automation necessary to combat mass campaigns from attackers What automations can be accomplished with the fastest ROI How to apply internal context, 3rd party intelligence, and campaign data to automated defense Shortcuts to integrating with alert sources and enforcement systems
Adopt Office 365 With Modern Data Protection and Compliance Measures
Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk? Watch this webinar to learn: Hear about new types of risk this transformation introduces to your people and data. Learn about the evolution of compliance requirements in the modern workplace. Identify steps and effective countermeasures to protect your people, data, and brand in Office 365, G Suite, and more.
The Phishing Problem - Your Security Sandbox Won't Catch It All
Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless. Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers. Fill out the form to watch this webinar and learn: How phishing has evolved Phishing threat landscape Top phishing lures that impact employees How Proofpoint can effectively address phishing attacks
Protecting Higher Education from Advanced Threats
Recent studies show that attackers are using many different methods to target higher education institutions. Email is the common culprit that enables these advanced threats to breach campuses. As attackers continue to evolve their techniques to bypass even the latest email security tools, institutions are left to deal with the often costly and time-consuming clean up. To fight back, institutions need a unified solution that solves the entire email threat problem covering both malware and malware-free threats. Fill out the form and join this webinar to learn: The latest cyber threats targeting universities, colleges and other higher education institutions How to build an advanced email security strategy Visibility into threats and empowers you to proactively protect your campus
DHS BOD 18-01: Enhance Email and Web Security
DHS BOD 18-01 requires civilian Federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance) within a strict 90 day window. Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud A quick, safe method to easily implement DMARC authentication at your agency You May Also Like: Data Sheet: Email Fraud Defense Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks Get a DMARC Assessment
What the DHS Mandate Means for Email Security
In recent years, email fraud has cost companies around the world billions of dollars. As a result, U.S. Department of Homeland Security announced a new mandate requiring civilian federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance). While the directive is aimed only at government agencies, it’s a clear indication of how rife email fraud has become across organizations of all sizes and in all industry verticals. Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud Why many organizations haven’t implemented DMARC yet How Proofpoint Email Fraud Defense can help you implement DMARC authentication quickly and safely You May Also Like: Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks
Security and Compliance for Office 365
As you plan the big move to the cloud with Office 365, you’ll want to understand the Office 365 security implications, especially when it comes to protection, compliance, and email continuity. Fill out the form to view our webinar and learn: How to plan for a successful migration to Office 365 How you can protect your Office 365 from advanced threats and targeted attacks How to avoid the hidden costs for IT and compliance staff
Apps are sending your data all over the world. How can you defend against this?
The leaking of corporate data including simple contact data can easily lead to credential phishes and more. Download this on-demand webinar to find out how you can ensure your organization is protected. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense
Office 365 Archive & Security Concerns
Download this on-demand webinar and delve into how to meet your archiving, eDiscovery, and compliance needs with Office 365. You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?
The Return of the Malicious Macro, and the Economics of Cybercrime
Listen in to learn more about the economics of cybercrime and how to protect your organizations from malicious macros and other advanced threats. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account Quarterly Threat Report White Paper: Ransomware Survival Guide
More Threat Vectors, More Security & Compliance Challenges
Listen in to learn how to tackle the measures financial regulators are pushing to guide financial institutions in sharpening information security practices. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense
The Human Factor 2015 Webinar Replay
View this on-demand webinar, The Human Factor 2015: Cybercriminals Go Corporate, and How to Fight Them, to learn more about the latest threats targeting organizations and how to combat them. You May Also Like: Quarterly Threat Summary Ransomware Survival Guide Threat Reports
Office 365: What You Need to Know
Download this on-demand webinar to learn key points to consider when looking at Office 365, including what stakeholders to engage, buying criteria, and areas that may require 3rd party support. You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?
Social Media Risk Management: Best Practices of Top Brands
View this on-demand webinar to hear Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they share Hayes' latest research into brand protection for the modern enterprise and discusses the key corporate social media risks and how the top social brands are managing these risks in the face of a changing social risk landscape. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks
Solving Puzzles: Threat Intelligence-Fueled Incident Response
View this on-demand webinar to listen in as our experts discuss key context and intelligence applications, gaps, and limitations impacting security teams today and provides a sneak peek at Proofpoint’s new threat intelligence acquisition, Emerging Threats. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense
Data Breach Mitigation: Hardening Against Loss in 2015
Download this on-demand webinar to listen in as Proofpoint's Joe Diamond speaks with guest speaker Mike Osterman, CEO and Founder of Osterman Research, about his recent research into the top challenges IT and Information Security professionals face today, what they expect to see in 2015, and how they are tackling these challenges. You May Also Like: Data Sheets: Proofpoint Encryption Webinar: Prevent a Data Breach - Stay Out of the Headlines & Save Money Through Encryption Infographic: Is Microsoft Office 365 Secure?
Privacy in the Wild: Real Life Stories of Transparent Encryption and DLP
Download the on-demand webinar to hear real life stories of transparent encryption and DLP. Listen in as privacy experts cover aspects of outbound email security and compliance controls that enterprises are tackling today, and provide their perspective on avenues for enterprises to investigate for getting around such hurdles. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence
Prevent a Data Breach: Stay Out of the Headlines & Save Money Through Encryption
Download the on-demand webinar to take a closer look at recent noted data breach and the associated costs and risks, the changing regulatory landscape around data breaches, and best practices for implementing encryption without interrupting business. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence
Best Practices in Social Media Management and Archiving
Register now for the on-demand webinar with Michael Osterman, Founder and CEO of Osterman Research, where we discuss his recent survey of social media practices best practices, including current state of social media adoption, state of internal social media policies, and recent regulatory guidance on social media. You May Also Like: Reports: Quarterly Threat Summary Reports: Threat Reports White Paper: BEC Survival Guide
Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats
Download the on-demand webinar to learn more about how predictive analytics and defense represent the next generation of protection, what detection technology should be focusing on, and how automated context, verification and containment are accelerating response time by up to 20x. You May Also Like: Quarterly Threat Summary Threat Reports
Tweets, Feed, & Chatter: Social Media and Regulatory Compliance in 2014
Download this on-demand webinar to learn more about what the top concerns with social media compliance are in 2014, and how your organization can address them. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks
How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks
Download this highly recommended on-demand webinar to learn more about phishing and watering holes, the controversy with watering holes as the "phisher's toolkit," and a demo of Threat Response and how it plays into the larger Proofpoint security suite.
Enterprise Social Media Risk and Regulatory Compliance in 2015: Are You in Control?
Download this on-demand webinar for a discussion featuring Proofpoint's Robert Cruz, Senior Director of eDiscovery Solutions and guest speakers Nick Hayes from Forrester Research, Inc. and Devin Redmond, the GM of Nexgate – now a division of Proofpoint – who will be sharing their expertise, client-driven insights, and latest research into enterprise social media risk and how your organization can be better prepared to embrace social in 2015. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks
Strategies for Defending Against Targeted Attacks
Download the on-demand webinar, featuring guest speaker Rick Holland of Forrester Research, Inc. as he joins Proofpoint to discuss today's threat environment, advanced targeted attacks, and how to protect your organization against the next generation of rapidly evolving email attacks. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business
When Obscurity and Security Are a Good Idea: How User-Transparent Email Encryption Creates Better Compliance
Download the on-demand webinar for a comprehensive look at when obscurity and security are a good idea and how user-transparent email encryption creates better compliance. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business
Plugging the Email Security Gap
Download this on-demand webinar that explores the most recent threats of email and how to prevent those threats. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business
Healthcare Privacy & Security
SECURING INFORMATION PRIVACY Examines best practices for preventing cyber attacks before they happen and remediation when they do. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence
Social Media Risk: Best Practices For Brand Protection
Join Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they discuss Hayes' recent research into brand protection, including how organizations can mitigate social media risk and best practices to ensure that organizations remain safe when engaging with social. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks
Forester Research - Threat Response Webinar
Download the on-demand webinar and hear from our guest speaker, Forrester Research's Rick Holland, and Proofpoint’s Mike Horn as they discuss how the threat landscape has evolved and how building effective intelligence makes the difference in keeping your organization safe. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence