Protect 2020 Cloud Security Sessions

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

Speakers:

  • Justin Collins, Senior Director of Professional Services, Proofpoint
  • Jessica Greer, Director of Professional Services, Proofpoint
Watch Now
   
Best Practices: Governing third-party OAuth apps and scripts

Best Practices: Governing third-party OAuth apps and scripts

If you are looking for a framework to governing third-party OAuth apps and reducing your attack surface, look no further than Proofpoint CASB. In this workshop, you will learn how to defend against malicious apps, evaluate new authorizations and existing apps for risk and define app governance policies.

Speakers:

  • Izak Karmona, Principal Consultant, Proofpoint
  • Nikos Nikolaou, Director of Professional Services, Proofpoint
Watch Now
   
Best Practices: Office 365 Security with Proofpoint

Best Practices: Office 365 Security with Proofpoint

As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

Speakers:

  • Michael Beninda, Director of Professional Services, Proofpoint
  • James Knight, Principal Consultant, Proofpoint
Watch Now
   
   
Deploying Zero Trust with Proofpoint

Deploying Zero Trust with Proofpoint

Zero trust is a term that is being used broadly, but what does it really mean? And what does it take for an organization to adopt a zero trust architecture? For many, starting the deployment of zero trust technology can be quick - see how Proofpoint can start you on your journey.

Speakers:

  • Yacov (Jack) Kotev, Security Engineer, Outbrain
  • Kobi Seviliya, Director of Global IT, Outbrain
  • Chen Nisnkorn,Sr. Director, Technical Sales, Proofpoint
  • Eric Schwake, Sr. Manager, Product Marketing, Proofpoint
Watch Now
   
Leverage VAPs as a Blueprint to Apply Adaptive Controls

Leverage VAPs as a Blueprint to Apply Adaptive Controls

In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks.

Speaker:

  • Gary Haysli, CISO, Softbank Investment Advisors
  • Brett Shaw, Sr. Product Marketing Manager, Proofpoint
  • Neko Papez, Product Marketing Manager, Proofpoint
Watch Now
   
Protecting Your Cloud Data with Proofpoint CASB

Protecting Your Cloud Data with Proofpoint CASB

With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

Speakers:

  • Brian Tschinkel, CISO, Higher Education
  • Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
  • Itir Clarke, Sr. Product Marketing Manager, Proofpoint
Watch Now
   
Technology Strategies to Better Secure the All-Remote Enterprise

Technology Strategies to Better Secure the All-Remote Enterprise

Identity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC.

Speakers:

  • Lucia Milica, Resident CISO, Proofpoint
  • John Checco, Resident CISO, Proofpoint
Watch Now
   
Threat Actors' New Blueprint: Combining Email and Cloud Threats

Threat Actors' New Blueprint: Combining Email and Cloud Threats

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

  • Chris Iezzoni, Field Intelligence Director, Proofpoint
  • Roie Cohen Duwek, Director of Security Research, Proofpoint
Watch Now