An Overdue Shift to People-Centric SecurityThe forces of digital transformation are reshaping work and cyber trends at light speed. This session will explain why the shift to people-centric security is relevant, urgent, and long overdue. We will introduce a new framework with practical guidance for CISOs to implement and evolve their strategy. Speakers:
|
|
BEC Attacks in Academia – Who’s Impersonating Whom?The 2020 Verizon DBIR cited BEC as one of the most problematic attack types in academia. This session features a presentation and panel discussion that outlines who cybercriminals are targeting in teaching institutions, the most impactful lures being deployed, and tactics to thwart the bad actors. Speakers:
|
|
Introducing Nexus People Risk ExplorerIdentifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs. Speakers:
|
|
Mitigating Risk in a Distributed WorkforceWhile it would have been nice if threat actors had taken a break during the initial COVID lockdowns, what we actually saw was a significant increase in cyber attacks -- particularly social engineering attacks, such as phishing. As this 'new normal' continues to evolve, businesses need a way to mitigate these attacks and protect their increasingly distributed workforce. In this session, we'll talk through the role of risk-based authentication in modern, zero trust security as well as how integrations across security technologies, such as with Proofpoint, Okta + CrowdStrike, can enhance security and also productivity -- wherever your workers are, and whatever tools they're using. Speakers:
|
|
People-Centric Security from a Government PerspectiveGovernment organizations have unique drivers and compliance requirements. This session will focus on how a people-centric approach can help government organizations make more progress against protecting systems, networks, and people from those who wish to do them harm. Speakers:
|
|
Predictions Beyond 2020 for Financial Services: “What a Long Strange Trip It’s Been” (Grateful Dead)Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve. Attend this session to learn about:
Speaker:
|
|
Protecting Healthcare From Cyberattacks During a Pandemic and BeyondThis past year, Proofpoint researchers noted a surge in attacks with health-related topics, specifically COVID-19, as the lure of choice. Join our speakers as they share:
Speakers:
|
|
Protecting Your Health System from BEC AttacksCybercriminals today are targeting health systems using fraudulent emails to clinical staff, administrators, and business associates within the supply chain. In this panel, we’ll hear more about these frighteningly effective attacks and learn how to empower your people to know a legitimate request from a con. Speakers:
|
|
Speaking Your CFO's LanguageToday’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program. Speakers:
|
|
Strategies for Engaging with Your Board of DirectorsToday’s CISOs must answer to the business and the board. Benchmarks, maturity models, and frameworks help facilitate those conversations. This session will share such strategies, tools, and data to help you build your next presentation and guarantee the attention of your company board. Speakers:
|
|
Technology Strategies to Better Secure the All-Remote EnterpriseThe rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home. Speakers:
|
|
Threat Intelligence Observations for 2020 and BeyondJoin CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve. Attend this session to learn about:
Speakers:
|