The Human Factor in Today’s Modern Attacks

Tuesday, June 20 at 10 AM PT / 1 PM ET

The Human Factor 20231 takes a closer look at the combination of technology and psychology that makes modern cyber attacks so dangerous. The report draws on one of the largest and most diverse data sets in cybersecurity, covering threats detected, mitigated and resolved during 2022 among Proofpoint deployments worldwide.

Join our Threat Detection team for this special 45-minute webinar and learn how to break the attack chain against today’s modern attacks. We’ll examine key findings of our latest report, and you’ll learn:

  • The top threats that targeted people in 2022
  • How a people-centric defense can make users more resilient, mitigate attacks and manage privilege
  • Understand how cyber attackers target and exploit users


1 -The threat report will be available in June. Register for this webinar to receive a copy.

Featured Speakers

Daniel Blackford

Senior Threat Researcher

Daniel Blackford is a Senior Threat Researcher at Proofpoint. He spends his days hunting through massive amounts of maliflow and cloud data to identify malign threat activity in order to surface and provide context for those threats both directly to clients as well as through tools such as TAP. Daniel also tracks the various actors and TTPs that comprise the threat landscape. Prior to his work at Proofpoint, Daniel worked as a malware analyst at the National Cyber Forensics and Training Alliance (NCFTA) on site in Pittsburgh, PA.

Andrew Northern

Senior Threat Researcher

Andrew Northern is a Senior Security Researcher at Proofpoint, bringing over a decade of hands-on experience in the information security field to his role. His comprehensive expertise spans numerous technical disciplines, including threat intelligence, digital forensics, incident response, penetration testing, and red team engagements. Recognized for his significant contribution in demystifying SocGholish, Andrew remains deeply committed to identifying new malware, unmasking emerging threat actors, and uncovering innovative techniques utilized by cybercriminals in the rapidly evolving cybersecurity landscape.