Webinars

Webinars

Live Demo: Proofpoint Security Awareness Training

Sean Walker, Enterprise Account Executive

Tue, Jun 25, 2019

Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time. Join us for a live demo of Proofpoint Security Awareness Training to see for yourself!  You'll learn how to:  - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense - Enable your employees to report suspicious messages with a single mouse click

Live Demo: Email Fraud Defense

Ash Valeski, Director Product Management, Proofpoint

Tue, Jun 25, 2019

Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted. Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to: •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People •Monitor all inbound impostor threats from your domains and those of third parties •Accurately distinguish between legitimate emails and fraudulent emails

Webisode 2: Strategic Cybersecurity Transformation - Why Now, Why People-Centric

Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint

Wed, Jun 26, 2019

Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change? Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape. In this session, you'll learn: - How business transformation like the rise of Office 365 has driven cybersecurity transformation - Why you should pivot your transformation around people and culture, rather than infrastructure - 6 principles for successful cybersecurity transformation

Webisode 1: 2019 FINRA and SEC Compliance

Raymond Mcgrath, Services, Supervision Policy Consultant; Roman Tobe, Manager, Product Marketing

Thu, Jun 27, 2019

Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for the rest of 2019 and beyond. Attend our first of four webisodes to learn how you can help your firm meet these and other regulatory challenges in the year ahead. Our industry experts will discuss some of the risks spotlighted for 2019: - Supervision of Digital Assets Business - Regulatory technology - Adequacy of firms’ cybersecurity programs to protect sensitive information

State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users

Paul Down, Senior Director Proofpoint Security Awareness Training

Tue, Jul 09, 2019

As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology. Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months. Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn: - How to build a people centric security strategy - Steps organizations are taking to mitigate end-user risk from phishing - The most devastating types of phishing emails - The most vulnerable industries and departments

Webisode 3: Email Fraud - Case Studies & Defense Strategies w/ US Secret Service

Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service

Wed, Jul 10, 2019

Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on. What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks? Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies. We’ll share: - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers - How fraudsters use social engineering to reach the right person at the right time - How to identify and stop email fraud attacks before they reach the inbox

Webisode 2: On-Premises Archives - A Breach Waiting To Happen?

Martin Tuip - Senior Information Archive Strategist

Thu, Jul 11, 2019

The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades but there also come these days with some inherit increasing risks. What do these risks look like and what can you do to defend against them? Join this second of four webisodes to learn about: - Why cyber criminals might be targeting your archive - The top security risks of on-premises archives - How to reduce your risk

Securing Your Organization & End-Users with Browser and Email Isolation

Paul Wang, Technical Product Marketing Manager

Tue, Jul 16, 2019

Everyday threat actors are trying to infiltrate your organization with advanced attacks by going after your users via corporate email, personal web mail and personal browsing. When your people engage in personal browsing or webmail at work, they can become a target for attackers. IT and Security teams are struggling with the process of exception handling for particular user website while still ensuring their organizations’ security. What can you do to protect your organizations and end-users? Join Proofpoint as we discuss: • A people-centric approach to browser and email security • The benefits of adopting Isolation for personal browsing and webmail defense • Cost benefits using isolation for URL exception handling

Email Fraud Case Study: Real Attacks & Defense Strategies With US Secret Service

Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service

Tue, Jul 16, 2019

Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on. What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks? Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies. We’ll share: - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers - How fraudsters use social engineering to reach the right person at the right time - How to identify and stop email fraud attacks before they reach the inbox

EMEA Threat Landscape: Volumes, Focus, & Shifting Targets

Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales Engineer

Wed, Jul 17, 2019

2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data. While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.

2019 State of the Phish: Impacts and Opportunities

Dale Zabriskie, Security Awareness and Training Evangelist

Thu, Jul 18, 2019

Phishing continues to be the number one attack vector. Why? Because it works — all too well. Industries of every kind fall prey to these scams — from financial organizations to government contractors to healthcare firms. Today’s cybercriminals manage to evade even the most sophisticated security technology through carefully planned, socially engineered email attacks that are only getting more advanced. The fifth annual State of the Phish Report provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this report, our focus mirrors that of cyber attackers: people. You will see data related to the following: Tens of millions of simulated phishing emails: We compiled and analyzed data from tens of millions of simulated phishing emails sent to end users via our cloud-based Security Education Platform between October 2017 and September 2018. 16 industries: We compare and contrast activities and results from organizations and their employees across 16 industries. Nearly 15,000 survey responses from InfoSec professionals: We sent quarterly surveys to our database of InfoSec professionals (customers and non-customers) throughout 2018. Their responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks. 7,000+ technology user insights: Our third-party survey of more than 7,000 working adults — 1,000 each in the US, UK, France, Germany, Italy, Australia, and Japan — reveals understanding of common social engineering terms and attack vectors. The results provide a global perspective on the awareness levels of the average end user.

Webisode 4: Live Demo - Foundations of People-Centric Cybersecurity

Dustin Anderson, Senior Sales Engineer, Proofpoint

Wed, Jul 24, 2019

What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to: - Protect your people from email-based attacks - Gain visibility into who in your organization is getting the most attacks - Solve for user awareness through threat simulation and training

Webisode 3: Future-Proof Your Legacy and Cloud Archive

John Pepe Archiving Specialist; Martin Tuip, Sr Product Marketing Manager

Thu, Jul 25, 2019

Many organizations have already deployed a compliance solution but continuing adoption of the cloud for business processes eventually results in the reevaluation of the existing compliance infrastructure. With email and collaboration data in Office 365 growing daily and the need to meet compliance and legal requirements, you need to come up with a strategy of how to address legacy and cloud archive data that is future-proof. Join the third of four webisodes to discuss what a modern archiving strategy looks like, and how you can get there. In this session we'll discuss: - What’s involved in the move – policy, planning, and people - Challenges with O365 from a compliance and legal view - The ins and outs of archiving with Office 365 - Industry trends

Live Demo – Browser & Email Isolation to Protect Your Users in Minutes

Paul Wang, Technical Product Marketing Manager

Tue, Jul 30, 2019

When your employees are browsing the web or accessing webmail, your organization can be facing a wide range of online threats. These can include ransomware, web-based & file exploitation, leaks of sensitive and confidential information, and catastrophic data breaches. Web isolation technology is one of the best ways to help you protect against these risks. Join Proofpoint’s Browser and Email Isolation live demo as we share: • How Proofpoint protects your users within minutes from web born threats from risky browsing and malicious email in both corporate and personal email • How Proofpoint’s new integration with Targeted Attack Protection (TAP) allows us to provide adaptive controls within corporate email to enhance security • How Proofpoint’s people-centric approach to Isolation stacks up against competitors

Beyond the Phish: A Snapshot of End-User Behavior

Gretel Egan, Security Awareness and Training Strategist & Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist

Wed, Jul 31, 2019

Phishing is one of InfoSec's longstanding threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering? During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications. We’ll share: - The importance of assessing and training end users about cybersecurity threats beyond email-based social engineering - The strengths and weaknesses among end users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization - A more wholistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks - How you can use this information to reduce the risk of successful cyberattacks within your organization Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.

Webisode 5: Live Demo - Ramping Up People-Centric Cybersecurity

Craig Morell, Security Sales Engineer, Proofpoint

Wed, Aug 07, 2019

What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to: - Identify and remediate account compromise attacks - Solve for data loss through email - Make your users more resilient against attacks through awareness training

Webisode 4: Live Demo - Enterprise Information Archiving

Tom Mahoney, Senior Archiving Sales Specialist; Jason Colvin, Senior Systems Engineer

Thu, Aug 08, 2019

Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. Join us for the last of four webisodes to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving: In this demo, we'll share how you can: - Mitigate reputational risk - Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance

From Skeptics to Champions: Selling the Value of Security Awareness Training

Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader

Thu, Aug 15, 2019

The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key. Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work. Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about: - Best practices for selling the value of security awareness training internally - Preparing a business case for your training program - Engaging employees through creative programming, recognition, and incentives

Webisode 6: Live Demo - Advanced People-Centric Cybersecurity

Joel Sierra, Security Sales Engineer, Proofpoint

Wed, Aug 21, 2019

What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to: 1. Gain deeper visibility into attacks and respond when things go wrong 2. Solve for unified data protection 3. Defend against email fraud and social media fraud

Building a Culture of Security within Healthcare Organizations

Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice

Tue, Aug 27, 2019

Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security. In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security. Join us to learn: - What we mean by a “patient-centric” cybersecurity mindset - How to overcome common training obstacles and deliver the most effective cybersecurity education program - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry

Trends in Compliance: How IT Should Prepare for the Future

Join this webinar to learn about the need for cross-departmental alliances, and best practices for joining efforts and technology across your organization. How evolving regulations and compliance technology will impact IT How IT can help with your organization's compliance strategy How new RegTech can improve compliance readiness while also improving IT value to an organization Fill out the form to watch the webinar replay now.

Cloud Threat Research and CASB Capabilities

As more of your organization’s data is stored in the cloud, protecting people and the data they create has become more challenging and critical than ever. Join us as our expert discusses the latest cloud threat research findings and how you can expand Proofpoint’s threat protection and data loss prevention to the cloud.  In this demo, you’ll learn: Why a people-centric approach to cloud security provides better visibility and control over your data and cloud apps How you can leverage your existing Proofpoint products for cloud account compromise detection, cloud DLP & adaptive access controls for Office 365, GSuite and more How Proofpoint’s CASB product capabilities integration with TAP, TRAP, and DLP Fill out the form to watch the webinar replay now.

Behind the Scenes: Selling the Value of Security Awareness Training throughout Your Organization

Listen to the SecureWorld Behind the Scenes interview. Our Security Awareness Evangelist, Zabriskie discusses how to sell the value of security awareness training by speaking the language of your customer. Learn best practices for selling the value of security awareness training internally, how to prepare a business case for your training program, and how to engage employees through creative programming, recognition, and incentives. Fill out the form to watch the webinar replay now.

The Insider Threat: Real Defense for Real Businesses

Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business. Attend this webinar and you’ll learn: What essentials must be in your end user awareness program and how to make those lessons stick Which tools and techniques can be used to enforce security policies when your users unintentionally or maliciously try to break them How you can spot the signs of an impending or ongoing insider data leak and respond Panelists: Katie Burnell – Global Insider Threat Specialist, Dtex Systems Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Sara Peters – Senior Editor, Dark Reading Fill out the form to watch the webinar reply now.

How to Leverage CASBs to Stop Next Generation Cloud Attacks

 As more enterprise data and workloads migrate to the cloud, security needs and practices continue to evolve. The perceived “big risks” -shadow IT and the security practices of SaaS companies – have been surpassed by attacks on individual cloud users and data. The good news? There are reliable, high fidelity ways to detect and mitigate cloud threats and risks to data. Join Garrett Bekker, Principal Security Analyst at 451 Research and Ryan Kalember, SVP of cybersecurity at Proofpoint as they discuss: How the industry’s conceptions of what matters in cloud security have evolved, from the initial emphasis on shadow IT and the security practices of cloud vendors to the current focus on the identity-defined perimeter What the most successful and prevalent attack vectors are in the cloud, from brute force attacks to new forms of phishing that bypass multi-factor authentication What to look for in a CASB solution to mitigate the risks your organization is likely to face Engaging employees through creative programming, recognition, and incentives  Fill out the form to watch the webinar replay now.

Live Demo: Email Fraud Defense

Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted. Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to: Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People Monitor all inbound impostor threats from your domains and those of third parties Accurately distinguish between legitimate emails and fraudulent emails Fill out the form to watch the webinar replay now.

Strategic Cybersecurity Transformation: Why Now, Why People-Centric

Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change? Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape. You'll learn: How business transformation like the rise of Office 365 has driven cybersecurity transformation Why you should pivot your transformation around people and culture, rather than infrastructure 6 principles for successful cybersecurity transformation Fill out the form to watch the webinar replay now.

Live Demo: Ramping Up People-Centric Cybersecurity

What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?  Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.  Join us for a live demo to learn about the second phase of this maturity model and see for yourself how the tools work. We'll discuss how to: Identify and remediate account compromise attacks Solve for data loss through email Make your users more resilient against attacks through awareness training Fill out the form to watch the webinar replay now.

Live Demo: Advanced People-Centric Cybersecurity

What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the third phase of this maturity model and see for yourself how the tools work. We'll demonstrate how to: Gain deeper visibility into attacks and respond when things go wrong Solve for unified data protection Defend against email fraud and social media fraud Fill out the form to watch the webinar replay now.

Live Demo: Foundations of People-Centric Cybersecurity

What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.  Join us for a live demo to learn about the first phase of this maturity model and see for yourself how the tools work. We'll demonstrate how to: Protect your people from email-based attacks Gain visibility into who in your organization is getting the most attacks Solve for user awareness through threat simulation and training Fill out the form to watch the webinar replay now.

State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users

As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways, we need to empower our workforce to be aware and ready to detect them alongside the technology.  Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months. Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn: How to build a people-centric security strategy Steps organizations are taking to mitigate end-user risk from phishing  The most devastating types of phishing emails  The most vulnerable industries and departments Fill out the form to watch the webinar replay now.

Outside the Network: Protecting People and Customers Against Digital Threats

Bad actors do not just target employee inboxes - they also target the brand itself, key employees and customers on digital channels. Social media, web domains and the deep and dark web pose areas of risk where companies are not directly in control of their communication security. Despite their value, these properties are often left unsecured against fraudulent activity. Since these are emerging threats, digital risks can be blind spots of focus for security teams.  Join this webinar to learn about trends in digital risk including: Executive impersonations targeting your people on LinkedIn Social media protection on Instagram, Facebook, and Twitter Credential threats on the dark web Physical threats to key locations Counterfeit domains in the retail space Visibility into the digital threat landscape How to protect against these threats Fill out the form to watch the webinar replay now.

2019 Cyber Threat Landscape

In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.  Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss: Predictions for the 2019 threat landscape Key actions you can take to prepare your organization Top resources to help support your security efforts Fill out the form to watch the webinar replay now.

Deciphering 2019 Cyber Threat Landscape

In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019. Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join Adenike Cosgrove and Davide Canali as they discuss: Predictions for the 2019 threat landscape with a focus on EMEA and APJ Key actions you can take to prepare your organization Top resources to help support your security efforts Fill out the form to watch the webinar replay now.

Email Protection Demo - Staying Secure in Office 365

Anyone can be a VAP: Very Attacked Person™ and they're not always the people you expect. While Microsoft Office 365 allows your people to work anywhere, anytime, on any device, it can also create security issues making your people vulnerable. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Proofpoint’s Email Protection and Targeted Attack Protection solutions can help. Join this webinar and learn about: Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats Approaches for identifying suspicious messages The latest in security software to fight against advanced threats Fill out the form to watch the webinar replay now.

Live Demo: Enterprise Information Archiving

Financial services firms face some of the world’s most stringent and complex regulations. Proofpoint offers solutions that can help financial firms streamline compliance. We provide compliance and supervision solutions that provide easy capture, review and reporting. That means complete visibility across your email, instant messages, collaboration tools and social media.  Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry: Mitigate risk of adverse inferences and damaged reputations Quickly collect, search and retrieve data on demand Stay compliant with industry regulations through Enterprise Archiving, Intelligent Supervision and E-discovery Fill out the form to watch the webinar replay now.

Live Demo: Security Awareness Training for Healthcare

The latest threat data for the healthcare industry shows a significant shift away from attacks on infrastructure towards personalized attacks like phishing. What are the key components of a best-in-class solution for phishing simulation and training? Join this live demo to see Proofpoint Security Awareness Training in action and learn how it addresses the most common attacks in today's healthcare threat landscape. Fill out the form to watch the webinar replay now.

2019 FINRA and SEC Exam Priorities

Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2019 and beyond. Our industry experts will discuss some of the risks spotlighted for 2019: Supervision of Digital Assets Business Regulatory Technology  Adequacy of firms’ cybersecurity programs to protect sensitive information Fill out the form to watch the webinar replay now.

How to Create a People-Centric Cybersecurity Strategy

Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.  But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO. To combat these cybercriminals, learn how to build a strategy that: Reveals who is targeted and how Combats attacks before they reach your users, and Mitigates damage from the attacks that inevitably will reach your people SPEAKER: Ryan Kalember, EVP, Cybersecurity Strategy at Proofpoint. Fill out the form to watch the webinar replay now.

From Skeptics to Champions: Selling the Value of Security Awareness Training throughout Your Organization

The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.  Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.  Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:  Best practices for selling the value of security awareness training internally Preparing a business case for your training program Engaging employees through creative programming, recognition, and incentives    SPEAKERS: Dale Zabriskie, Security Awareness and Training Evangelist, Proofpoint Security Awareness Training  Joe Krock, Cyber Training and Awareness Leader, Enterprise Information Protection (EIP), Humana   Fill out the form to watch the webinar replay now.

The CyberWire: Hacking Humans Podcast

The CyberWire’s Hacking Humans Podcast interviewed Dale Zabriskie, our Security Awareness and Training Evangelist, who shared some surprising insights from the 2019 State of the Phish Report. Fill out the form to watch the webinar replay now.

Phishing Simulation and Security Awareness Training

Kicking the security awareness bucket down the road? Planning for 2019? Your people are the most important aspect of security – don’t leave them unprepared when they come face to face with cyberattacks. Grab your popcorn and watch a 30-minute demo of our award-winning phishing simulations and security awareness training. We’ll give you an overview of our products and show how they work together to deliver up to a 90% reduction in successful phishing attacks and malware infections: ThreatSim® Phishing Simulations CyberStrength® Knowledge Assessments 35+ Interactive Training Modules PhishAlarm® Email Reporting Button and PhishAlarm® Analyzer Email Prioritization Tool Security Awareness Materials and Videos Fill out the form now to try our products for a hands-on experience.

User Risk Report

We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening. We will discuss the 2018 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide, including: Knowledge of phishing and ransomware Password habits (including password reuse) Safe use of WiFi, location tracking, and social media The types of personal activities (shopping online, playing games, streaming media, etc.) that your organization's devices are being used for by employees and their families and friends Fill out the form to watch the webinar replay now.

State of the Phish™

Phishing continues to be one of the fastest growing and most malicious threats to security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated safeguards through carefully planned, socially-engineered email phishing attacks that are only getting more advanced. In this webinar, we will review the key findings and insights from our 2018 State of the Phish Report: Aggregation and analysis of data from tens of millions of simulated phishing attacks sent through Proofpoint Security Awareness Training over a 12-month period Analysis of more than 10,000 responses from quarterly surveys of infosec professionals from more than 16 industries, as well as data from an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors Insights into current vulnerabilities, industry-specific phishing metrics, and emerging threats Panelist: Gretel Egan – Brand Communications Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.

Closed Loop Email Analysis and Response (CLEAR) Webinar

Proofpoint's Closed-Loop Email Analysis and Response (CLEAR) solution, is a complete closed-loop approach to instant end-user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defenses. Once reported, CLEAR automatically analyzes messages against multiple intelligence and reputation systems, reducing an organization’s typical threat triage time from days to minutes without requiring additional work from human analysts. Proofpoint CLEAR is the first joint solution using Proofpoint Security Awareness Training’s powerful end-user solutions post-acquiring them earlier this year. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Mark Wuslich– Product Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar replay now.

Automating 90 Days of Security Awareness Training Webinar

As a security professional, we know that your time is valuable. At Proofpoint Security Awareness Training, we’ve built some great automation tools directly into our Security Education Platform to help you run an effective security awareness program with minimal setup time. In this webinar, you’ll learn how unique features like auto-enrollment and follow up campaigns can streamline the administrative process while giving your end users a whole quarter of great content. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Colleen Gaffney – Managed Services Supervisor, Proofpoint Security Awareness Training Matt Lane – Product Manager, Proofpoint Security Awareness Training Fill out the form and watch the webinar replay now.

Risky Business: When End-Users Continue Bad Security Behavior

You’ve gone over social engineering scenarios with your end-users. You run quarterly phishing simulations. You use gamification and fun videos to help create a culture of security awareness within your organization. You even have internal champions within the different business units. So why is it that Paul in Accounting got hit with a ransomware attack last week? Why are the sales people continuing to fall for phishing emails? And seriously, why can’t the executives follow the same rules as the rest of the employees? Join this web conference as our expert panelists discuss how to deal with risky behavior from your end-users. When should you escalate this to HR or higher ups? Do extreme cases call for termination of employment? *CPE credit is available. Speakers: Mitchell Sprinsky, CIO - Spectrum Pharmaceuticals Alan Levine, Cybersecurity Advisor - Proofpoint Security Awareness Training Mike Muscatel, Information Security Manager - Snyder's-Lance, Inc. Moderated by: Sam Masiello, CISO- Teletech Key Topics Include: How to deal with risky behavior from your end-users Whether or not to pursue an escalation path for repeat offenders Download now to learn more.   This is a joint presentation of Proofpoint Security Awareness Training and SecureWorld. *Viewing this webinar may be used to earn CPE credit hours, for more information please contact Tom Bechtold at SecureWorld via email at tomb@secureworldexpo.com.

One CISO’s Journey to Cyber Awareness

Whether budgets are robust or restrictive, infosec teams are often skeptical about diverting dollars away from technical tools so they can better fund awareness training. Fortune 500 CISO Alan Levine felt the same — until a nation-state attack on his organization led him to reexamine employees’ roles in cybersecurity and the value of defense-in-depth strategies at users’ desktops. Watch this webinar replay to learn about Levine’s journey from security awareness training skeptic to advocate. Panelist: Alan Levine – Security Advisor, Proofpoint Security Awareness Training. Fill out the form to watch the webinar reply now.

End-User Cybersecurity Behaviors: The Importance of Training Beyond the Phish

Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering. During this session, we will share results from the Proofpoint Security Awareness Training 2018 Beyond the Phish® Report, which analyzes data from nearly 85 million responses to cybersecurity knowledge assessments and training challenges presented to global end users across multiple industries during 2017. We will discuss end users’ strengths and weaknesses across 12 cybersecurity topics — from identifying social engineering scams to protecting confidential information to working safely outside the office. We’ll also highlight variations in end-user knowledge levels across industries, giving you a benchmark against which to compare your organization’s readiness. Attendees will also see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks, and how using these tools together can give a more complete view of susceptibility. Finally, we’ll provide guidance about how to use this information to strengthen your end users and reduce the risk of successful cyberattacks within your organization. Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community. Featured Presenters & Moderator: Amy Baker, VP Marketing, Proofpoint Security Awareness Training Victoria L. Thomas, Cybersecurity Awareness Leader, Fortune 500 Company Mitch Parker, Executive Director InfoSec & Compliance, Indiana University Health James McQuiggan, Product & Solution Security Officer, Siemens Gamesa (moderator) Fill out the form to watch the webinar reply now.

The People Factor: Fight Back Against Phishing

Phishing remains the top attack vector used by cybercriminals, and every end user is a potential target. But with the right security awareness training, these same people can be transformed into a key component in your anti-phishing defense. Kurt Wescoe, Chief Architect of Proofpoint Security Awareness Training, shares his insights and perspectives in this interview hosted by BankInfoSecurity. Listen to the interview to learn more about: Current phishing trends What’s wrong with traditional end-user training How Proofpoint takes a different approach to security awareness training Panelist: Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.

State of Security Education: Healthcare

The healthcare industry faces increased attacks from cybercriminals, and risky end-user behaviors are only exacerbating the threat. A new report from Proofpoint Security Awareness Training, State of Security Education: Healthcare, helps organizations understand the knowledge gaps that affect their security postures and increase risk. Join us for a deep-dive webinar that explores end-user data specific to the healthcare industry. We will analyze responses gathered via nearly 85 million questions asked and answered in our Security Education Platform, as well as data culled from tens of millions of simulated phishing attacks. During this webinar, you’ll learn: How end users in the healthcare space perform on 12 important cybersecurity topics How healthcare organizations use security awareness training to mitigate risk How a regional hospital reduced phishing susceptibility by 86% Panelist: Amy Baker – Vice President of Marketing, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.

Tools for Email Fraud Defense (EFD)

Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you: Block malicious emails spoofing your domains before they reach your employees and customers Monitor all emails (inbound and outbound) from your domains and those of third parties Accurately distinguish between legitimate emails and fraudulent emails About the presenter: Alex Fryback, Product Manager at Proofpoint.

Staying Secure in Office 365

Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.  Proofpoint’s Email Protection and Targeted Attack Protection solutions can help. Join this webinar and learn about: Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats Approaches for identifying suspicious messages The latest in security software to fight against advanced threats About the presenter: Greg McHugh, Sr Engineer at Proofpoint

How to Build your People-Centric Cybersecurity Strategy

Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.  But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO. The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that: Reveals who is targeted Combats attacks before they reach your users Mitigates damage from the attacks that will inevitably reach your people About the presenter: with over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers.

Current Cyber Threat of the Week - 10-Minute Webinar

Each week we host a Cyber Threat of the Week webinar featuring a high-level look at the latest cyber threats, including current malware and ransomware,  to help security teams navigate the attack landscape, in less than 10 minutes. For this week's Interesting Threaty Byte, we bring you the LCG Kit, a new builder for malicious Microsoft Office documents. What's so fascinating about this week’s threat is it allows budding threat actors to create malicious documents of their own. CG Kit or Linear Congruential Generator was first discovered in March of 2018 and began by creating documents that exploited certain CVE's. LCG Kit has now evolved to use macros which are popular for threat actors to use to infect a person's computer. Once infected, the threat actor can further infect the victim's computer with common malwares such as;  Loki Bot, FormBook, Agent Tesla, AZORult, Revcode RAT and Quasar RAT. This Interesting Threat comes to us from our Proofpoint Threat Insight blog; "LCG Kit: Sophisticated builder for Malicious Microsoft Office Documents", located at https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents

Your Guide to Staying Secure with Office 365

Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them.  Join Michael Osterman from Osterman Research and our panel of experts, April 26, 10 AM PT as they discuss how to overcome challenges including: --Credential Phishing --Email Fraud --Cloud Access Security --Regulatory Compliance and E-Discovery --Data Loss

Innoculating Against Healthcare Attacks

Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment. Join us for a discussion of: - Just released research that outlines healthcare's most likely threat vectors of 2018 - How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare - Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution - New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow

Still Falling Foul of Phishing

It has been around for many years, but phishing is not a problem that’s going away any time soon. In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of. Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization.  Join us as we discuss: - Effective security training to help prevent falling for an attack - The right tools and methods for detecting phishing - How to respond when to email threats

Human Factor 2018 - Bad Actors Follow the Money

The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.  Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users. Join Proofpoint Director of Threat Intelligence as we discuss: Trends in volume and type of attack providing useful insights for both defenders and organizations. Ransomware and Email Fraud - how effective have they become and who is being targeted the most. How bad actors are using cloud services  

Quarterly Threat Report November 2017

Malicious URL attacks returned with a vengeance. Ransomware reigned supreme. And fraudsters worked aggressively to impersonate trusted brands in email, social media, and the web. Those are just a few of standout trends we saw in the third quarter within our global customer base and in the wider threat landscape.  Join Ryan Kalember, SVP of Cybersecurity Strategy, and learn: How the threats have shifted quarter over quarter, identifying larger trends across malware, phishing, and fraud Actionable intelligence and advice for managing your security posture About the sophisticated threats across email, the web, social media, and mobile that we continue to see

Filling the GDPR Compliance Gap

GDPR is approaching fast for organizations worldwide. For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. With Proofpoint, you get a complete solution for quickly discovering, controlling, and protecting personal and sensitive EU data. We help you comply with GDPR mandates for collecting, processing, storing, deleting, transferring and using EU personal data. Join us to learn how to: • Drive towards compliance • Embed "privacy by design" to your development lifecycle • Protect all identified EU personal data and prevent data breaches

Archive for Financial Services

Download this on-demand webinar to learn more about the latest with Proofpoint Enterprise Archive's offerings for Financial Services organizations.  You May Also Like: Analyst Report: Protecting Against Advanced Threats and Compliance Risks White Paper: What You Don’t See Could Be Hurting Your Organization Video: Why Proofpoint?

The Human Factor 2017

Ransomware. Email Fraud. Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure. In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it. Register for the webinar now to learn about: The latest social engineering targeting trends and techniques Top email fraud tactics, including email fraud and social media account phishing The rise of fraudulent mobile apps and how criminals target users on the go

Threat Response Security Automation

Cyber criminals are leveraging automation to launch more efficient and effective campaigns. Manual defense solutions will never be able to scale to fight back. Fill out the form and join us for this webinar to learn: The scope of automation necessary to combat mass campaigns from attackers What automations can be accomplished with the fastest ROI How to apply internal context, 3rd party intelligence, and campaign data to automated defense Shortcuts to integrating with alert sources and enforcement systems

Adopt Office 365 With Modern Data Protection and Compliance Measures

Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk? Watch this webinar to learn: Hear about new types of risk this transformation introduces to your people and data. Learn about the evolution of compliance requirements in the modern workplace. Identify steps and effective countermeasures to protect your people, data, and brand in Office 365, G Suite, and more.

The Phishing Problem - Your Security Sandbox Won't Catch It All

Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.  Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.  Fill out the form to watch this webinar and learn: How phishing has evolved Phishing threat landscape Top phishing lures that impact employees How Proofpoint can effectively address phishing attacks

Protecting Higher Education from Advanced Threats

Recent studies show that attackers are using many different methods to target higher education institutions. Email is the common culprit that enables these advanced threats to breach campuses.  As attackers continue to evolve their techniques to bypass even the latest email security tools, institutions are left to deal with the often costly and time-consuming clean up. To fight back, institutions need a unified solution that solves the entire email threat problem covering both malware and malware-free threats. Fill out the form and join this webinar to learn: The latest cyber threats targeting universities, colleges and other higher education institutions  How to build an advanced email security strategy  Visibility into threats and empowers you to proactively protect your campus

Protecting Data After The Digital Disruption

Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy. Join this lively discussion to learn: Trends and implications for traditional network and endpoint DLP Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently Strategies on how to move forward to protect your critical data

DHS BOD 18-01: Enhance Email and Web Security

DHS BOD 18-01 requires civilian Federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance) within a strict 90 day window. Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud  A quick, safe method to easily implement DMARC authentication at your agency You May Also Like: Data Sheet: Email Fraud Defense Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks Get a DMARC Assessment

What the DHS Mandate Means for Email Security

In recent years, email fraud has cost companies around the world billions of dollars. As a result, U.S. Department of Homeland Security announced a new mandate requiring civilian federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance). While the directive is aimed only at government agencies, it’s a clear indication of how rife email fraud has become across organizations of all sizes and in all industry verticals.    Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud  Why many organizations haven’t implemented DMARC yet How Proofpoint Email Fraud Defense can help you implement DMARC authentication quickly and safely You May Also Like: Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks

Security and Compliance for Office 365

As you plan the big move to the cloud with Office 365, you’ll want to understand the Office 365 security implications, especially when it comes to protection, compliance, and email continuity.  Fill out the form to view our webinar and learn: How to plan for a successful migration to Office 365 How you can protect your Office 365 from advanced threats and targeted attacks How to avoid the hidden costs for IT and compliance staff

Apps are sending your data all over the world. How can you defend against this?

The leaking of corporate data including simple contact data can easily lead to credential phishes and more. Download this on-demand webinar to find out how you can ensure your organization is protected.  You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense

Archive Concerns with Office 365

Download this on-demand webinar and delve into how to meet your archiving, eDiscovery, and compliance needs with Office 365.  You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?

The Return of the Malicious Macro, and the Economics of Cybercrime

Listen in to learn more about the economics of cybercrime and how to protect your organizations from malicious macros and other advanced threats. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account Quarterly Threat Report White Paper: Ransomware Survival Guide

More Threat Vectors, More Security & Compliance Challenges

Listen in to learn how to tackle the measures financial regulators are pushing to guide financial institutions in sharpening information security practices. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense

The Human Factor 2015 Webinar Replay

View this on-demand webinar, The Human Factor 2015: Cybercriminals Go Corporate, and How to Fight Them, to learn more about the latest threats targeting organizations and how to combat them. You May Also Like: Quarterly Threat Summary Ransomware Survival Guide Threat Reports

Data Breach Mitigation: Hardening Against Loss in 2015

Download this on-demand webinar to listen in as Proofpoint's Joe Diamond speaks with guest speaker Mike Osterman, CEO and Founder of Osterman Research, about his recent research into the top challenges IT and Information Security professionals face today, what they expect to see in 2015, and how they are tackling these challenges.  You May Also Like: Data Sheets: Proofpoint Encryption Webinar: Prevent a Data Breach - Stay Out of the Headlines & Save Money Through Encryption Infographic: Is Microsoft Office 365 Secure?

Office 365: What You Need to Know

Download this on-demand webinar to learn key points to consider when looking at Office 365, including what stakeholders to engage, buying criteria, and areas that may require 3rd party support.  You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?

Social Media Risk Management: Best Practices of Top Brands

View this on-demand webinar to hear Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they share Hayes' latest research into brand protection for the modern enterprise and discusses the key corporate social media risks and how the top social brands are managing these risks in the face of a changing social risk landscape. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

Solving Puzzles: Threat Intelligence-Fueled Incident Response

View this on-demand webinar to listen in as our experts discuss key context and intelligence applications, gaps, and limitations impacting security teams today and provides a sneak peek at Proofpoint’s new threat intelligence acquisition, Emerging Threats. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense

Tweets, Feed, & Chatter: Social Media and Regulatory Compliance in 2014

Download this on-demand webinar to learn more about what the top concerns with social media compliance are in 2014, and how your organization can address them. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

When Obscurity and Security Are a Good Idea: How User-Transparent Email Encryption Creates Better Compliance

Download the on-demand webinar for a comprehensive look at when obscurity and security are a good idea and how user-transparent email encryption creates better compliance. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business

Strategies for Defending Against Targeted Attacks

Download the on-demand webinar, featuring guest speaker Rick Holland of Forrester Research, Inc. as he joins Proofpoint to discuss today's threat environment, advanced targeted attacks, and how to protect your organization against the next generation of rapidly evolving email attacks. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business

Prevent a Data Breach: Stay Out of the Headlines & Save Money Through Encryption

Download the on-demand webinar to take a closer look at recent noted data breach and the associated costs and risks, the changing regulatory landscape around data breaches, and best practices for implementing encryption without interrupting business.  You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence

Privacy in the Wild: Real Life Stories of Transparent Encryption and DLP

Download the on-demand webinar to listen in as privacy experts cover aspects of outbound email security and compliance controls that enterprises are tackling today, and provide their perspective on avenues for enterprises to investigate for getting around such hurdles. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence

Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats

Download the on-demand webinar to learn more about how predictive analytics and defense represent the next generation of protection, what detection technology should be focusing on, and how automated context, verification and containment are accelerating response time by up to 20x. You May Also Like: Quarterly Threat Summary Threat Reports

Best Practices in Social Media Management and Archiving

Register now for the on-demand webinar with Michael Osterman, Founder and CEO of Osterman Research, where we discuss his recent survey of social media practices best practices, including current state of social media adoption, state of internal social media policies, and recent regulatory guidance on social media. You May Also Like: Reports: Quarterly Threat Summary Reports: Threat Reports White Paper: BEC Survival Guide

Enterprise Social Media Risk and Regulatory Compliance in 2015: Are You in Control?

Download this on-demand webinar for a discussion featuring Proofpoint's Robert Cruz, Senior Director of eDiscovery Solutions and guest speakers Nick Hayes from Forrester Research, Inc. and Devin Redmond, the GM of Nexgate – now a division of Proofpoint – who will be sharing their expertise, client-driven insights, and latest research into enterprise social media risk and how your organization can be better prepared to embrace social in 2015. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks

Download this highly recommended on-demand webinar to learn more about phishing and watering holes, the controversy with watering holes as the "phisher's toolkit," and a demo of Threat Response and how it plays into the larger Proofpoint security suite.

Plugging the Email Security Gap

Download this on-demand webinar that explores the most recent threats of email and how to prevent those threats. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business

Healthcare Privacy & Security

SECURING INFORMATION PRIVACY Examines best practices for preventing cyber attacks before they happen and remediation when they do. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence

Social Media Risk: Best Practices For Brand Protection

Join Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they discuss Hayes' recent research into brand protection, including how organizations can mitigate social media risk and best practices to ensure that organizations remain safe when engaging with social.  You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

Forester Research - Threat Response Webinar

Download the on-demand webinar and hear from our guest speaker, Forrester Research's Rick Holland, and Proofpoint’s Mike Horn as they discuss how the threat landscape has evolved and how building effective intelligence makes the difference in keeping your organization safe. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence