Protect 2020 Email Security Sessions

A Blueprint to Defend Against Business Email Compromise (BEC) and Email Account Compromise (EAC)

A Blueprint to Defend Against Business Email Compromise (BEC) and Email Account Compromise (EAC)

BEC and EAC have cost organizations $26B over a three-year-period. How can your organization best protect itself against these costly threats? Join this Proofpoint customer session to hear about strategies, best practices and lessons learned to defend against BEC and EAC.

Speakers:

  • Brian Uhreen, Manager Security Operations, Finning International
  • Sara Pan, Senior Product Marketing Manager, Proofpoint
Watch Now
   
Best Practices: Implementing DMARC for Inbound Email

Best Practices: Implementing DMARC for Inbound Email

Many organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security.

Speakers:

  • Rob Fleming, Principal Consultant, Proofpoint
  • Christophe Wolfhugel, Principal Consultant, Proofpoint
Watch Now
   
Best Practices: Office 365 with Proofpoint

Best Practices: Office 365 with Proofpoint

As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

Speakers:

  • Michael Beninda, Director of Professional Services, Proofpoint
  • James Knight, Principal Consultant, Proofpoint
Watch Now
   
Best Practices: Preventing Business Email Compromise and Email Account Compromise

Best Practices: Preventing Business Email Compromise and Email Account Compromise

Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC.

Speakers:

  • Jessica Greer, Director of Professional Services, Proofpoint
  • Mike Olden, Principal Consultant, Proofpoint
Watch Now
   
   
Leverage VAPs as a Blueprint to Apply Adaptive Controls

Leverage VAPs as a Blueprint to Apply Adaptive Controls

In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks.

Speaker:

  • Brett Shaw, Sr. Product Marketing Manager, Proofpoint
  • Neko Papez, Product Marketing Manager, Proofpoint
  • Gary Hayslip, CISO, Softbank Investment Advisorst
Watch Now
   
Reducing Phishing Attacks and Operational Costs through Automation

Reducing Phishing Attacks and Operational Costs through Automation

With email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

Speakers:

  • Grover Newborn, Sr. Security Engineer, CoStar
  • Tanner Luxner, Product Marketing Manager, Proofpoint
Watch Now
   
Stopping Identity Deception with DMARC

Stopping Identity Deception with DMARC

Identity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC.

Speakers:

  • Jason Carter, IT Manager, Florida State University
  • Tanner Luxner, Product Marketing Manager, Proofpoint
Watch Now
   
Threat Actors' New Blueprint: Combining Email and Cloud Threats

Threat Actors' New Blueprint: Combining Email and Cloud Threats

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

  • Chris Iezzoni, Field Intelligence Director, Proofpoint
  • Roie Cohen Duwek, Director of Security Research, Proofpoint
Watch Now