![]() |
Best Practices: Building an Information Protection ProgramProtecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program. Speakers:
|
![]() |
Best Practices: Detecting, Notifying, and Alerting on Account CompromiseProofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment. Speakers:
|
![]() |
Best Practices: Office 365 Security with ProofpointAs organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization. Speakers:
|
![]() |
Deep Dive: The Future of People-Centric Information ProtectionThe campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack. Speakers:
|
![]() |
Modern Approaches to Information Protection, Privacy and Cloud SecurityDLP and CASB are two of the most frustrating technologies on the market, yet every organization needs to implement cloud security and protect their data. Join us for this interactive session to learn about more modern approaches to these challenges. Speakers:
|
![]() |
Introducing the Next Generation of People-Centric Insider Threat Management TechnologyProofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat. Speaker:
|
![]() |
Panel discussion: The Evolution of the Insider ThreatBuilding practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutions related to insider threat management. Speakers:
|
![]() |
Practitioner Strategies for the Work From Home EnterpriseThe rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint customers sharing their stories and strategies related to their experience adapting to the new normal of work from home. Speakers:
|
![]() |
Protecting Your Cloud Data with Proofpoint CASBThe campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack. Speakers:
|
![]() |
Technology Strategies to Better Secure the All-Remote EnterpriseThe rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home. Speakers:
|
![]() |
The New Blue Print: The Future of People-Centric Information ProtectionA people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy for Enterprise DLP and Insider Threat Management. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era. Speakers:
|