Building a Successful Security Awareness Month CampaignDo you find yourself scrambling to put together a plan for Cyber Security Awareness Month in October? We will walk you through a new offering, Campaigns, where we outline timelines, engagement ideas, internal communication resources and content to help you deliver a successful program. Speakers:
|
|
Customer Story: Graduating Good Cyber CitizensSaint Louis University started with Proofpoint's technology to reduce IT overhead and exposure to phishing attacks. Learn from their CISO Rebecca Harness how they're educating and empowering their diverse groups of users to be a strong line of defense using Proofpoint Security Awareness Training. Speakers:
|
|
How integrating threat intelligence translates into a superior security awareness programProofpoint threat intelligence, as well as offering valuable insight into how attackers are targeting people can add significant value to a security awareness program. Learn how Proofpoint obtains visibility and translates it into value for your program. Speakers:
|
|
Implementing a people-centric, data driven security awareness programmeWe cannot secure behaviour so we need our employees to behave securely. For a long time awareness campaigns have been focused on sending the same message at the same time to all employees. But people are different — they are targeted differently, behave differently, are incentivised and triggered by different things. Companies can no longer rely on surveys and e-learnings alone to change behaviour. We need to tailor our awareness efforts for each employee. In this session we will walk through how by giving each employee the right training at the right time, ABN AMRO makes the organisation more cyber resilient. Speakers:
|
|
Security Awareness Training: One CISO’s Journey from "Doubter to Believer”Hear from a former Fortune 500 CISO, Alan Levine about how he didn’t believe in security awareness training — until a nation-state attack on his organization revealed the value of including users in a defense-in-depth strategy. Speakers:
|