Hacking Human Nature - The truth about today's European threat landscape
Paul McKay, Senior Analyst, Forrester and Adenike Cosgrove, Cybersecurity Strategist, Proofpoint
Thu, Apr 18, 2019
Join Paul MacKay, Senior Analyst at Forrester, and Nikki Cosgrove, Cybersecurity Strategist at Proofpoint, as they discuss the latest European cybersecurity trends and what you can do to guard against them. 53% of European companies have reported experiencing a data breach in the last 12 months. Companies are increasingly using cloud applications, making it easier for hackers to obtain credentials, and with email remaining the most common attack vector (over 90% of worldwide cyberattacks start with an email), it’s vital that organisations defend not just their networks, but their employees too. This webinar focuses on both Forrester European cyberattack landscape research and Proofpoint’s own threat insights. Discover what’s needed to build a cybersecurity strategy that will protect your most valuable asset- your people.
Live Demo: Ramping Up People-Centric Cybersecurity
Craig Morell, Security Sales Engineer, Proofpoint
Tue, Apr 23, 2019
What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to: 1. Identify and remediate account compromise attacks 2. Solve for data loss through email 3. Make your users more resilient against attacks through awareness training
Strategic Cybersecurity Transformation: Why Now, Why People-Centric
Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
Wed, Apr 24, 2019
Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change? Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape. You'll learn: · How business transformation like the rise of Office 365 has driven cybersecurity transformation · Why you should pivot your transformation around people and culture, rather than infrastructure · 6 principles for successful cybersecurity transformation
Live Demo: Email Fraud Defense
Ash Valeski, Director Product Management, Proofpoint
Thu, Apr 25, 2019
Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted. Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to: •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People •Monitor all inbound impostor threats from your domains and those of third parties •Accurately distinguish between legitimate emails and fraudulent emails
Live Demo: Advanced People-Centric Cybersecurity
Joel Sierra, Security Sales Engineer, Proofpoint
Wed, May 01, 2019
What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to: 1. Gain deeper visibility into attacks and respond when things go wrong 2. Solve for unified data protection 3. Defend against email fraud and social media fraud
Live Demo: Enterprise Information Archiving
Tom Mahoney, Senior Archiving Sales Specialist Sales
Thu, May 02, 2019
Financial services firms face some of the world’s most stringent and complex regulations. Proofpoint offers solutions that can help financial firms streamline compliance. We provide compliance and supervision solutions that provide easy capture, review, and reporting. That means complete visibility across your email, instant messages, collaboration tools, and social media. Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry: •Mitigate risk of adverse inferences and damaged reputations •Quickly collect, search and retrieve data on demand •Stay compliant with industry regulations through Enterprise Archiving, Intelligent Supervision and E-discovery
Analyst Webinar: Best Practices to Defend Against Phishing Attacks
Joseph Blankenship, Principal Analyst, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
Wed, May 29, 2019
In today's shifting threat landscape, cyber criminals increasingly target individuals rather than infrastructure. How can you defend against highly targeted and effective attacks like phishing? Join guest Forrester speaker Joseph Blankenship and Proofpoint for an interactive discussion about best practices around phishing and security awareness training. You'll learn: 1. The latest research on breaches and why phishing stands out as one of the riskiest attack vectors 2. Today's most common phishing methods and outcomes 3. Proven best practices to defend against phishing
Panel Discussion: CISO Challenges and How to Solve Them
Yotam Gutman | David Boda, Camelot Group | George Patsis, Obrela Security Industries |
Wed, Jun 05, 2019
Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools. Join security experts across the industry for an interactive discussion on: - What keeps CISOs up at night - Strategies for breach prevention - Strategies for making the most of AI technology and human talent - Coping with analyst fatigue - Threats on the horizon - Recommendations for strengthening security Panellists David Boda, CISO, Camelot Group George Patsis, CEO, Obrela Security Industries Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
The CyberWire: Hacking Humans Podcast
The CyberWire’s Hacking Humans Podcast interviewed Dale Zabriskie, our Security Awareness and Training Evangelist, who shared some surprising insights from the 2019 State of the Phish Report. Fill out the form to watch the webinar replay now.
Phishing Simulation and Security Awareness Training
Kicking the security awareness bucket down the road? Planning for 2019? Your people are the most important aspect of security – don’t leave them unprepared when they come face to face with cyberattacks. Grab your popcorn and watch a 30-minute demo of our award-winning phishing simulations and security awareness training. We’ll give you an overview of our products and show how they work together to deliver up to a 90% reduction in successful phishing attacks and malware infections: ThreatSim® Phishing Simulations CyberStrength® Knowledge Assessments 35+ Interactive Training Modules PhishAlarm® Email Reporting Button and PhishAlarm® Analyzer Email Prioritization Tool Security Awareness Materials and Videos Fill out the form now to try our products for a hands-on experience.
User Risk Report
We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening. We will discuss the 2018 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide, including: Knowledge of phishing and ransomware Password habits (including password reuse) Safe use of WiFi, location tracking, and social media The types of personal activities (shopping online, playing games, streaming media, etc.) that your organization's devices are being used for by employees and their families and friends Fill out the form to watch the webinar replay now.
State of the Phish™
Phishing continues to be one of the fastest growing and most malicious threats to security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated safeguards through carefully planned, socially-engineered email phishing attacks that are only getting more advanced. In this webinar, we will review the key findings and insights from our 2018 State of the Phish Report: Aggregation and analysis of data from tens of millions of simulated phishing attacks sent through Proofpoint Security Awareness Training over a 12-month period Analysis of more than 10,000 responses from quarterly surveys of infosec professionals from more than 16 industries, as well as data from an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors Insights into current vulnerabilities, industry-specific phishing metrics, and emerging threats Panelist: Gretel Egan – Brand Communications Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.
Closed Loop Email Analysis and Response (CLEAR) Webinar
Proofpoint's Closed-Loop Email Analysis and Response (CLEAR) solution, is a complete closed-loop approach to instant end user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defenses. Once reported, CLEAR automatically analyzes messages against multiple intelligence and reputation systems, reducing an organization’s typical threat triage time from days to minutes without requiring additional work from human analysts. Proofpoint CLEAR is the first joint solution using Proofpoint Security Awareness Training’s powerful end-user solutions post-acquiring them earlier this year. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Mark Wuslich– Product Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar replay now.
Automating 90 Days of Security Awareness Training Webinar
As a security professional, we know that your time is valuable. At Proofpoint Security Awareness Training, we’ve built some great automation tools directly into our Security Education Platform to help you run an effective security awareness program with minimal setup time. In this webinar, you’ll learn how unique features like auto-enrollment and follow up campaigns can streamline the administrative process while giving your end users a whole quarter of great content. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Colleen Gaffney – Managed Services Supervisor, Proofpoint Security Awareness Training Matt Lane – Product Manager, Proofpoint Security Awareness Training Fill out the form and watch the webinar replay now.
The Insider Threat: Real Defense for Real Businesses
Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business. Attend this webinar and you’ll learn: What essentials must be in your end user awareness program and how to make those lessons stick Which tools and techniques can be used to enforce security policies when your users unintentionally or maliciously try to break them How you can spot the signs of an impending or ongoing insider data leak and respond Panelists: Katie Burnell – Global Insider Threat Specialist, Dtex Systems Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Sara Peters – Senior Editor, Dark Reading Fill out the form to watch the webinar reply now.
Risky Business: When End-Users Continue Bad Security Behavior
You’ve gone over social engineering scenarios with your end-users. You run quarterly phishing simulations. You use gamification and fun videos to help create a culture of security awareness within your organization. You even have internal champions within the different business units. So why is it that Paul in Accounting got hit with a ransomware attack last week? Why are the sales people continuing to fall for phishing emails? And seriously, why can’t the executives follow the same rules as the rest of the employees? Join this web conference as our expert panelists discuss how to deal with risky behavior from your end-users. When should you escalate this to HR or higher ups? Do extreme cases call for termination of employment? *CPE credit is available. Speakers: Mitchell Sprinsky, CIO - Spectrum Pharmaceuticals Alan Levine, Cybersecurity Advisor - Proofpoint Security Awareness Training Mike Muscatel, Information Security Manager - Snyder's-Lance, Inc. Moderated by: Sam Masiello, CISO- Teletech Key Topics Include: How to deal with risky behavior from your end-users Whether or not to pursue an escalation path for repeat offenders Download now to learn more. This is a joint presentation of Proofpoint Security Awareness Training and SecureWorld. *Viewing this webinar may be used to earn CPE credit hours, for more information please contact Tom Bechtold at SecureWorld via email at firstname.lastname@example.org.
One CISO’s Journey to Cyber Awareness
Whether budgets are robust or restrictive, infosec teams are often skeptical about diverting dollars away from technical tools so they can better fund awareness training. Fortune 500 CISO Alan Levine felt the same — until a nation-state attack on his organization led him to reexamine employees’ roles in cybersecurity and the value of defense-in-depth strategies at users’ desktops. Watch this webinar replay to learn about Levine’s journey from security awareness training skeptic to advocate. Panelist: Alan Levine – Security Advisor, Proofpoint Security Awareness Training. Fill out the form to watch the webinar reply now.
End-User Cybersecurity Behaviors: The Importance of Training Beyond the Phish
Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering. During this session, we will share results from the Proofpoint Security Awareness Training 2018 Beyond the Phish® Report, which analyzes data from nearly 85 million responses to cybersecurity knowledge assessments and training challenges presented to global end users across multiple industries during 2017. We will discuss end users’ strengths and weaknesses across 12 cybersecurity topics — from identifying social engineering scams to protecting confidential information to working safely outside the office. We’ll also highlight variations in end-user knowledge levels across industries, giving you a benchmark against which to compare your organization’s readiness. Attendees will also see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks, and how using these tools together can give a more complete view of susceptibility. Finally, we’ll provide guidance about how to use this information to strengthen your end users and reduce the risk of successful cyberattacks within your organization. Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community. Featured Presenters & Moderator: Amy Baker, VP Marketing, Proofpoint Security Awareness Training Victoria L. Thomas, Cybersecurity Awareness Leader, Fortune 500 Company Mitch Parker, Executive Director InfoSec & Compliance, Indiana University Health James McQuiggan, Product & Solution Security Officer, Siemens Gamesa (moderator) Fill out the form to watch the webinar reply now.
The People Factor: Fight Back Against Phishing
Phishing remains the top attack vector used by cybercriminals, and every end user is a potential target. But with the right security awareness training, these same people can be transformed into a key component in your anti-phishing defense. Kurt Wescoe, Chief Architect of Proofpoint Security Awareness Training, shares his insights and perspectives in this interview hosted by BankInfoSecurity. Listen to the interview to learn more about: Current phishing trends What’s wrong with traditional end-user training How Proofpoint takes a different approach to security awareness training Panelist: Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.
State of Security Education: Healthcare
The healthcare industry faces increased attacks from cybercriminals, and risky end-user behaviors are only exacerbating the threat. A new report from Proofpoint Security Awareness Training, State of Security Education: Healthcare, helps organizations understand the knowledge gaps that affect their security postures and increase risk. Join us for a deep-dive webinar that explores end-user data specific to the healthcare industry. We will analyze responses gathered via nearly 85 million questions asked and answered in our Security Education Platform, as well as data culled from tens of millions of simulated phishing attacks. During this webinar, you’ll learn: How end users in the healthcare space perform on 12 important cybersecurity topics How healthcare organizations use security awareness training to mitigate risk How a regional hospital reduced phishing susceptibility by 86% Panelist: Amy Baker – Vice President of Marketing, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.
Tools for Email Fraud Defense (EFD)
Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you: Block malicious emails spoofing your domains before they reach your employees and customers Monitor all emails (inbound and outbound) from your domains and those of third parties Accurately distinguish between legitimate emails and fraudulent emails About the presenter: Alex Fryback, Product Manager at Proofpoint.
Staying Secure in Office 365
Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Proofpoint’s Email Protection and Targeted Attack Protection solutions can help. Join this webinar and learn about: Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats Approaches for identifying suspicious messages The latest in security software to fight against advanced threats About the presenter: Greg McHugh, Sr Engineer at Proofpoint
How to Build your People-Centric Cybersecurity Strategy
Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities. But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO. The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that: Reveals who is targeted Combats attacks before they reach your users Mitigates damage from the attacks that will inevitably reach your people About the presenter: with over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers.
Current Cyber Threat of the Week - 10-Minute Webinar
Each week we host a Cyber Threat of the Week webinar featuring a high-level look at the latest cyber threats, including current malware and ransomware, to help security teams navigate the attack landscape, in less than 10 minutes. For this week's Interesting Threaty Byte, we bring you the LCG Kit, a new builder for malicious Microsoft Office documents. What's so fascinating about this week’s threat is it allows budding threat actors to create malicious documents of their own. CG Kit or Linear Congruential Generator was first discovered in March of 2018 and began by creating documents that exploited certain CVE's. LCG Kit has now evolved to use macros which are popular for threat actors to use to infect a person's computer. Once infected, the threat actor can further infect the victim's computer with common malwares such as; Loki Bot, FormBook, Agent Tesla, AZORult, Revcode RAT and Quasar RAT. This Interesting Threat comes to us from our Proofpoint Threat Insight blog; "LCG Kit: Sophisticated builder for Malicious Microsoft Office Documents", located at https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents
Innoculating Against Healthcare Attacks
Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment. Join us for a discussion of: - Just released research that outlines healthcare's most likely threat vectors of 2018 - How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare - Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution - New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow
Your Guide to Staying Secure with Office 365
Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them. Join Michael Osterman from Osterman Research and our panel of experts, April 26, 10 AM PT as they discuss how to overcome challenges including: --Credential Phishing --Email Fraud --Cloud Access Security --Regulatory Compliance and E-Discovery --Data Loss
Still Falling Foul of Phishing
It has been around for many years, but phishing is not a problem that’s going away any time soon. In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of. Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization. Join us as we discuss: - Effective security training to help prevent falling for an attack - The right tools and methods for detecting phishing - How to respond when to email threats
Human Factor 2018 - Bad Actors Follow the Money
The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives. Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users. Join Proofpoint Director of Threat Intelligence as we discuss: Trends in volume and type of attack providing useful insights for both defenders and organizations. Ransomware and Email Fraud - how effective have they become and who is being targeted the most. How bad actors are using cloud services
Quarterly Threat Report November 2017
Malicious URL attacks returned with a vengeance. Ransomware reigned supreme. And fraudsters worked aggressively to impersonate trusted brands in email, social media, and the web. Those are just a few of standout trends we saw in the third quarter within our global customer base and in the wider threat landscape. Join Ryan Kalember, SVP of Cybersecurity Strategy, and learn: How the threats have shifted quarter over quarter, identifying larger trends across malware, phishing, and fraud Actionable intelligence and advice for managing your security posture About the sophisticated threats across email, the web, social media, and mobile that we continue to see
Filling the GDPR Compliance Gap
GDPR is approaching fast for organizations worldwide. For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. With Proofpoint, you get a complete solution for quickly discovering, controlling, and protecting personal and sensitive EU data. We help you comply with GDPR mandates for collecting, processing, storing, deleting, transferring and using EU personal data. Join us to learn how to: • Drive towards compliance • Embed "privacy by design" to your development lifecycle • Protect all identified EU personal data and prevent data breaches
Archive for Financial Services
Download this on-demand webinar to learn more about the latest with Proofpoint Enterprise Archive's offerings for Financial Services organizations. You May Also Like: Analyst Report: Protecting Against Advanced Threats and Compliance Risks White Paper: What You Don’t See Could Be Hurting Your Organization Video: Why Proofpoint?
Threat Response Security Automation
Cyber criminals are leveraging automation to launch more efficient and effective campaigns. Manual defense solutions will never be able to scale to fight back. Fill out the form and join us for this webinar to learn: The scope of automation necessary to combat mass campaigns from attackers What automations can be accomplished with the fastest ROI How to apply internal context, 3rd party intelligence, and campaign data to automated defense Shortcuts to integrating with alert sources and enforcement systems
Adopt Office 365 With Modern Data Protection and Compliance Measures
Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk? Watch this webinar to learn: Hear about new types of risk this transformation introduces to your people and data. Learn about the evolution of compliance requirements in the modern workplace. Identify steps and effective countermeasures to protect your people, data, and brand in Office 365, G Suite, and more.
The Phishing Problem - Your Security Sandbox Won't Catch It All
Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless. Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers. Fill out the form to watch this webinar and learn: How phishing has evolved Phishing threat landscape Top phishing lures that impact employees How Proofpoint can effectively address phishing attacks
Protecting Higher Education from Advanced Threats
Recent studies show that attackers are using many different methods to target higher education institutions. Email is the common culprit that enables these advanced threats to breach campuses. As attackers continue to evolve their techniques to bypass even the latest email security tools, institutions are left to deal with the often costly and time-consuming clean up. To fight back, institutions need a unified solution that solves the entire email threat problem covering both malware and malware-free threats. Fill out the form and join this webinar to learn: The latest cyber threats targeting universities, colleges and other higher education institutions How to build an advanced email security strategy Visibility into threats and empowers you to proactively protect your campus
Protecting Data After The Digital Disruption
Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy. Join this lively discussion to learn: Trends and implications for traditional network and endpoint DLP Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently Strategies on how to move forward to protect your critical data
The Human Factor 2017
Ransomware. Email Fraud. Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure. In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it. Register for the webinar now to learn about: The latest social engineering targeting trends and techniques Top email fraud tactics, including email fraud and social media account phishing The rise of fraudulent mobile apps and how criminals target users on the go
DHS BOD 18-01: Enhance Email and Web Security
DHS BOD 18-01 requires civilian Federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance) within a strict 90 day window. Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud A quick, safe method to easily implement DMARC authentication at your agency You May Also Like: Data Sheet: Email Fraud Defense Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks Get a DMARC Assessment
What the DHS Mandate Means for Email Security
In recent years, email fraud has cost companies around the world billions of dollars. As a result, U.S. Department of Homeland Security announced a new mandate requiring civilian federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance). While the directive is aimed only at government agencies, it’s a clear indication of how rife email fraud has become across organizations of all sizes and in all industry verticals. Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud Why many organizations haven’t implemented DMARC yet How Proofpoint Email Fraud Defense can help you implement DMARC authentication quickly and safely You May Also Like: Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks
Security and Compliance for Office 365
As you plan the big move to the cloud with Office 365, you’ll want to understand the Office 365 security implications, especially when it comes to protection, compliance, and email continuity. Fill out the form to view our webinar and learn: How to plan for a successful migration to Office 365 How you can protect your Office 365 from advanced threats and targeted attacks How to avoid the hidden costs for IT and compliance staff You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?
Apps are sending your data all over the world. How can you defend against this?
The leaking of corporate data including simple contact data can easily lead to credential phishes and more. Download this on-demand webinar to find out how you can ensure your organization is protected. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense
Archive Concerns with Office 365
Download this on-demand webinar and delve into how to meet your archiving, eDiscovery, and compliance needs with Office 365. You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?
The Return of the Malicious Macro, and the Economics of Cybercrime
Listen in to learn more about the economics of cybercrime and how to protect your organizations from malicious macros and other advanced threats. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account Quarterly Threat Report White Paper: Ransomware Survival Guide
More Threat Vectors, More Security & Compliance Challenges
Listen in to learn how to tackle the measures financial regulators are pushing to guide financial institutions in sharpening information security practices. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense
The Human Factor 2015 Webinar Replay
View this on-demand webinar, The Human Factor 2015: Cybercriminals Go Corporate, and How to Fight Them, to learn more about the latest threats targeting organizations and how to combat them. You May Also Like: Quarterly Threat Summary Ransomware Survival Guide Threat Reports
Office 365: What You Need to Know
Download this on-demand webinar to learn key points to consider when looking at Office 365, including what stakeholders to engage, buying criteria, and areas that may require 3rd party support. You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?
Social Media Risk Management: Best Practices of Top Brands
View this on-demand webinar to hear Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they share Hayes' latest research into brand protection for the modern enterprise and discusses the key corporate social media risks and how the top social brands are managing these risks in the face of a changing social risk landscape. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks
Solving Puzzles: Threat Intelligence-Fueled Incident Response
View this on-demand webinar to listen in as our experts discuss key context and intelligence applications, gaps, and limitations impacting security teams today and provides a sneak peek at Proofpoint’s new threat intelligence acquisition, Emerging Threats. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense
Data Breach Mitigation: Hardening Against Loss in 2015
Download this on-demand webinar to listen in as Proofpoint's Joe Diamond speaks with guest speaker Mike Osterman, CEO and Founder of Osterman Research, about his recent research into the top challenges IT and Information Security professionals face today, what they expect to see in 2015, and how they are tackling these challenges. You May Also Like: Data Sheets: Proofpoint Encryption Webinar: Prevent a Data Breach - Stay Out of the Headlines & Save Money Through Encryption Infographic: Is Microsoft Office 365 Secure?
Prevent a Data Breach: Stay Out of the Headlines & Save Money Through Encryption
Download the on-demand webinar to take a closer look at recent noted data breach and the associated costs and risks, the changing regulatory landscape around data breaches, and best practices for implementing encryption without interrupting business. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence
Privacy in the Wild: Real Life Stories of Transparent Encryption and DLP
Download the on-demand webinar to listen in as privacy experts cover aspects of outbound email security and compliance controls that enterprises are tackling today, and provide their perspective on avenues for enterprises to investigate for getting around such hurdles. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence
Enabling Advanced Security and Compliance for Office 365
Download the on-demand webinar for a discussion on the top questions revolving around Office 365, complex security requirements, and protection from advanced email security threats. You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?
Best Practices in Social Media Management and Archiving
Register now for the on-demand webinar with Michael Osterman, Founder and CEO of Osterman Research, where we discuss his recent survey of social media practices best practices, including current state of social media adoption, state of internal social media policies, and recent regulatory guidance on social media. You May Also Like: Reports: Quarterly Threat Summary Reports: Threat Reports White Paper: BEC Survival Guide
Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats
Download the on-demand webinar to learn more about how predictive analytics and defense represent the next generation of protection, what detection technology should be focusing on, and how automated context, verification and containment are accelerating response time by up to 20x. You May Also Like: Quarterly Threat Summary Threat Reports
How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks
Download this highly recommended on-demand webinar to learn more about phishing and watering holes, the controversy with watering holes as the "phisher's toolkit," and a demo of Threat Response and how it plays into the larger Proofpoint security suite. You May ALso Like: Analyst Report: Protecting Against Advanced Threats and Compliance Risks White Paper: What You Don’t See Could Be Hurting Your Organization Video: Why Proofpoint?
Enterprise Social Media Risk and Regulatory Compliance in 2015: Are You in Control?
Download this on-demand webinar for a discussion featuring Proofpoint's Robert Cruz, Senior Director of eDiscovery Solutions and guest speakers Nick Hayes from Forrester Research, Inc. and Devin Redmond, the GM of Nexgate – now a division of Proofpoint – who will be sharing their expertise, client-driven insights, and latest research into enterprise social media risk and how your organization can be better prepared to embrace social in 2015. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks
Tweets, Feed, & Chatter: Social Media and Regulatory Compliance in 2014
Download this on-demand webinar to learn more about what the top concerns with social media compliance are in 2014, and how your organization can address them. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks
When Obscurity and Security Are a Good Idea: How User-Transparent Email Encryption Creates Better Compliance
Download the on-demand webinar for a comprehensive look at when obscurity and security are a good idea and how user-transparent email encryption creates better compliance. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business
Strategies for Defending Against Targeted Attacks
Download the on-demand webinar, featuring guest speaker Rick Holland of Forrester Research, Inc. as he joins Proofpoint to discuss today's threat environment, advanced targeted attacks, and how to protect your organization against the next generation of rapidly evolving email attacks. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business
Plugging the Email Security Gap
Download this on-demand webinar that explores the most recent threats of email and how to prevent those threats. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business
Healthcare Privacy & Security
SECURING INFORMATION PRIVACY Examines best practices for preventing cyber attacks before they happen and remediation when they do. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence
Social Media Risk: Best Practices For Brand Protection
Join Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they discuss Hayes' recent research into brand protection, including how organizations can mitigate social media risk and best practices to ensure that organizations remain safe when engaging with social. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks
Forester Research - Threat Response Webinar
Download the on-demand webinar and hear from our guest speaker, Forrester Research's Rick Holland, and Proofpoint’s Mike Horn as they discuss how the threat landscape has evolved and how building effective intelligence makes the difference in keeping your organization safe. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence