![]() |
Best Practices: Detecting, Notifying, and Alerting on Account CompromiseProofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment. Speakers:
|
![]() |
Best Practices: Governing third-party OAuth apps and scriptsIf you are looking for a framework to governing third-party OAuth apps and reducing your attack surface, look no further than Proofpoint CASB. In this workshop, you will learn how to defend against malicious apps, evaluate new authorizations and existing apps for risk and define app governance policies. Speakers:
|
![]() |
Best Practices: Office 365 Security with ProofpointAs organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization. Speakers:
|
![]() |
Deploying Zero Trust with ProofpointZero trust is a term that is being used broadly, but what does it really mean? And what does it take for an organization to adopt a zero trust architecture? For many, starting the deployment of zero trust technology can be quick - see how Proofpoint can start you on your journey. Speakers:
|
![]() |
Leverage VAPs as a Blueprint to Apply Adaptive ControlsIn this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks. Speaker:
|
![]() |
Protecting Your Cloud Data with Proofpoint CASBWith migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB. Speakers:
|
![]() |
Technology Strategies to Better Secure the All-Remote EnterpriseIdentity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC. Speakers:
|
![]() |
Threat Actors' New Blueprint: Combining Email and Cloud ThreatsThe campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack. Speakers:
|