Webinars

Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training

Sean Walker, Enterprise Account Executive

Thu, Jan 23, 2020

99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time. Join our live demo to learn how to: - Assess your users’ susceptibility to phishing attacks as well as other cyber threats - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense - Enable your employees to report suspicious messages with a single mouse click

Live Demo - Proofpoint CASB New Features & Capabilities

Amish Kohli, Cloud Security Solutions Architect

Thu, Jan 23, 2020

Proofpoint Cloud App Security Broker(CASB) is a cloud security platform that helps accelerate migration to the cloud. Proofpoint keeps improving our CASB and tightening our cross-platform integrations to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations. Join us to see how Proofpoint cloud security adds value to and benefits from existing email security when organizations migrate their email and other core apps to the cloud. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss. - Correlate email threats such as phishing to cloud account compromise - Detect and investigate threats using more granular policy rules and forensics capabilities - Find out which apps are being accessed during a risky session via Okta integration - Drill deeper into Shadow IT and third-party apps forensics - Prevent risky file activity in the cloud using browser isolation

Building an Effective Security Awareness Program

Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist

Tue, Jan 28, 2020

Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves? Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss: - Proven best practices for increasing the effectiveness of cybersecurity education - How to build a culture of security within your organization - Actionable guidance on executing security awareness & training initiatives that deliver measurable results

2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions

Chris Dawson, Threat Intelligence Publications Lead

Tue, Jan 28, 2020

Every year, Proofpoint’s threat research team examines trends from the prior year and predicts changes in the threat landscape for the year to come. For 2020, some of the top concerns include a significant evolution in impostor attacks and increasingly sophisticated attacks on cloud applications. Join us for a deep dive into the biggest trends that we’re predicting for the next 12 months, and how you can prepare and protect your most valuable assets: your people and your data. You’ll learn: - Predictions for the 2020 cyber threat landscape - Key actions you can take to prepare your organization - Top resources to help support your security efforts *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.

Email Security: Why Now Is The Time To Review Your Strategy

Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist

Tue, Feb 04, 2020

Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are. Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats. Join us to gain insights into: How the email threat landscape has changed with attackers evading legacy approaches; How leaders like Proofpoint have innovated to keep up; Our recommendations on the steps you must take to protect your people from email-based targeted attacks.

Protecting Your People and Data - Featuring Forrester's Zero Trust Framework

Ryan Kalember, EVP of Cybersecurity Strategy - Proofpoint & Chase Cunningham, Principal Analyst

Wed, Feb 05, 2020

There's lots of noise in the cybersecurity industry around zero-trust, but Forrester Research pioneered the original and most effective framework. It’s never been more important to understand how zero-trust principles applying to your environment, with people becoming the new perimeter, and protecting them and the data they access becoming the new imperative. In our upcoming webinar, we will take a closer look at the original Zero Trust Approach as defined by Forrester Research and applied in practice by leading security teams. The webinar will cover: - An overview of the Zero Trust approach - Concrete first steps for getting started - Guidelines on how to evaluate your standing within the maturity model - How Zero Trust reinforces people-centric security *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.

Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training

Sean Walker, Enterprise Account Executive

Thu, Feb 06, 2020

99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time. Join our live demo to learn how to: - Assess your users’ susceptibility to phishing attacks as well as other cyber threats - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense - Enable your employees to report suspicious messages with a single mouse click

Live Demo: Meta Networks – Implementing Zero Trust Network Access

Michael Kaunitz, Sr. Sales Field Specialist with Proofpoint

Tue, Feb 11, 2020

The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved? Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate: - How to improve security posture and simplify the user experience - How to reduce your operational effort through our flexible and robust security controls - How the platform is adaptive and can work with many use cases, with any application environment end user operating system

Live Demo: Proofpoint Digital Risk Protection

Mike Dempsey, Director of Technical Sales & Kim Bruce, Regional Sales Director for Proofpoint

Wed, Feb 12, 2020

Digital channels such as the web and social media provide a lot of opportunity for people and businesses to connect and communicate. At the same time, these channels provide a lot of opportunity for threat actors to defraud businesses and consumers, through phishing, wire transfer fraud, counterfeit sales and more. So how can you better protect your business from threats across digital channels? Join this live demo and listen to product experts Kim Bruce and Mike Dempsey who will demonstrate how our solution helps customers: · Identify threats such as lookalike domains, domains selling counterfeit goods and domains involved in active phishing attacks · Find threats on social media, including phishing accounts, impersonation accounts, brand scams (like counterfeit goods or fake coupons), and malicious URLs in comments or replies to your posts · Monitor deep web and darknet sources to identify physical threats, credential compromise, confidential information exposure, doxing and more

2020 Cyber Threat Landscape - EMEA & APJ

Adenike Cosgrove, Cybersecurity Strategist, Proofpoint EMEA & Davide Canali, Senior Threat Analyst, Proofpoint EMEA

Thu, Feb 13, 2020

45 min of expert predictions of the 2020 cyber threat landscape across EMEA & APJ. Includes: Key actions you can take to prepare your organization & resources to help support your security efforts. The 2020 Cyber Threat Landscape webinar is a 20/20 look into Cybersecurity predictions for EMEA & APJ. Every year, Proofpoint’s threat research team examines trends from the prior year and predicts upcoming changes in the Threat Landscape. For 2020, top concerns include a significant evolution in impostor attacks and increasingly sophisticated strikes on cloud applications. Join us for a deep dive into the critical threats that we’re expecting in the next 12 months, and how you can identify and protect your VAPs (Very Attacked People). In this 45-minute webinar with Q&A, you’ll learn: - Predictions for the 2020 cyber threat landscape across EMEA & APJ - Key actions you can take to prepare your organization - Top resources to help support your security efforts About Proofpoint ----------------------- Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

Reduce Phishing with Proofpoint’s Messaging Security Best Practices

Brett Shaw, Sr. Product Marketing Manager and Rick Miles Director, Product Management

Thu, Feb 13, 2020

Email is the #1 threat vector and organizations are constantly bombarded by phishing messages. In turn, security teams have a hard time keeping up with these attacks and often times don’t get around to responding to all of them. Join this webinar to see how Proofpoint has reduced phishing attacks for organizations and saved security teams countless hours of cleaning up malicious email. In this webinar, you will see: - How to streamline your incident response process for emails - How to leverage your users to identify and reduce phishing - A deep dive of Proofpoint Solutions and how they help with phishing

Email Fraud Defense

Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint

Tue, Feb 18, 2020

Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. best practice Email Fraud Defense requires a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted. Discover how to: • Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People • Monitor all inbound impostor threats from your domains and those of third parties • Accurately distinguish between legitimate emails and fraudulent emails About Proofpoint Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

Combating Business Email Compromise (BEC) & Email Account Compromise (EAC)

ISSA International

Wed, Feb 19, 2020

Since 2016, Business Email Compromise (BEC) and Email Account Compromise (EAC) have become an exponentially increasing problem, costing organizations over $26 Billion in losses according to the FBI. These very targeted attacks utilize public research and social engineering to target an organization’s people and fraudulently obtain funds and valuable information. So how can you better protect your end users in 2020? Join us for our webinar to learn more about these BEC and EAC attacks and how you can effectively protect your organization's most valuable assets: your people and your data. In this session we'll share: •Techniques for preventing these cyber threats •A framework for understanding where potential gasp exist •What a people-centric approach looks like to better protect your company Speaker: Tanner Luxner, Product Marketing Manager, Proofpoint

Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training

Sean Walker, Enterprise Account Executive

Thu, Feb 20, 2020

99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time. Join our live demo to learn how to: - Assess your users’ susceptibility to phishing attacks as well as other cyber threats - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense - Enable your employees to report suspicious messages with a single mouse click

2020 Cost of Insider Threats Global Report

Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT

Thu, Feb 20, 2020

Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type. Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover: ● What kinds of Insider Threats cost organizations the most ● How investigations are driving up the cost-per-incident for companies ● Which organizations, industries, and regions are being targeted the most ● How companies can potentially save millions by using a dedicated Insider Threat management approach *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.

Improving Email Security: Strategies & Solutions

Jack Koziol (infosec), Tim Choi (Proofpoint) , Rick Holland (Digital Shadows) + Others TBD

Tue, Feb 25, 2020

When it comes to data breaches, phishing is a primary cause, according to the 2019 Verizon's Data Breach Investigations Report. Number two is stolen credentials, so it is not surprising that email security is a key concern for CISOs worldwide.  Join this interactive panel of industry experts as they discuss the latest trends in email security including business email compromise and email account compromise and how to prevent becoming the next headline. Viewers will be able to ask questions and learn more about:  - Emerging trends in email and targeted attacks  - How to stay on top of the latest threats  - Best solutions to protect your organization and your people This panel will be broadcast LIVE during RSA Conference in San Francisco. Speakers: Jack Koziol, CEO & Founder, Infosec (Moderator) Tim Choi, VP Product Marketing, Proofpoint Rick Holland, CISO, Vice President Strategy, Digital Shadows

Insider Threats & People-Centric Approach to Security & Compliance

Tim Choi, VP Product Marketing, Proofpoint & Mayank Choudhary, SVP Product Management, Proofpoint

Tue, Feb 25, 2020

Join Tim Choi, VP Product Marketing and Mayank Choudhary, SVP Product Management from Proofpoint on the growing concerns on insider threats and data loss. A new people-centric approach is needed and in this interview session, the team will share the Proofpoint approach to this security and compliance problem. The audience can learn more about: - What is people-centric security and how does it help organizations view their security and compliance program - What are insider threats and why cross-functional initiatives between cybersecurity, HR, Legal, Ethics are key in 2020 - How to drive deterrence and change user behavior - How to prevent data loss at the endpoint in 2020 This video interview will be broadcast LIVE during RSA Conference in San Francisco.

Bridging the Technology & People Divide with Security Awareness Training

Mark Guntrip, Group Product Marketing Director & Mike Bailey, Sr. Product Marketing Manager

Wed, Feb 26, 2020

The threat landscape is constantly changing and the attacks targeting your people are getting more sophisticated. Threat actors are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even the most savvy users. So how can you better protect yourself, your organization, and your end users? Join us as we walk you through how we're taking Proofpoint's expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you'll get a better understanding of: - How we identify and stop malicious inbound threats - How to better identify end-user risk with our simulated attacks - How we're helping customers stop real attacks in their tracks with our Closed-Loop Email Analysis and Response (CLEAR) solution

Ensuring that Your Users are the Solid Line of Defense Against Cyber Threats

Mark Guntrip, Group Product Marketing Director of Proofpoint & Michael Osterman, President of Osterman Research Inc.

Thu, Feb 27, 2020

Today’s most popular security tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities. But cybercriminals are no longer targeting infrastructure - they are targeting humans. It's the distracted user who clicks on an email attachment, or the eager customer who fills in credentials in a pixel-perfect phishing page who is vulnerable. It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved? Join Proofpoint for a joint presentation with Osterman Research as we deep dive into some of the biggest challenges CISOs face, and why developing a people-centric strategy to security is the most effective way to protect your most valuable assets: your data and your people. In this session, we'll share: - Latest research findings on new methods for solving security attacks such as phishing and business email compromise - Why cybersecurity transformation is critical for protecting your people against today's threat actors - What it means and looks like to have an effective people-centric approach *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.

People-Centric Threats on Digital Channels and How to Stop Them

Amanda Cannata, Product Marketing Manager for Digital Risk and Compliance at Proofpoint

Thu, Mar 05, 2020

Threat actors don’t just target your people via email. They also use digital channels, like the web and social media, to launch attacks targeting your employees, partners and customers. And these socially engineered schemes on digital channels can leave your business just as exposed as those that come through email. Join this webinar to learn about the biggest digital threats to your people, and how you can take steps to block them. You’ll learn: · How attackers register fake web domains to phish customers, conduct targeted email attacks, and more · How malicious content on social media can put your customers and executives at risk · How the deep web and darknet provide tools and opportunities for threat actors to launch digital attacks

Live Demo: Meta Networks – Implementing Zero Trust Network Access

Michael Kaunitz, Sr. Sales Field Specialist with Proofpoint

Thu, Mar 12, 2020

The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved? Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate: - How to improve security posture and simplify the user experience - How to reduce your operational effort through our flexible and robust security controls - How the platform is adaptive and can work with many use cases, with any application environment end user operating system

Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training

Sean Walker, Enterprise Account Executive

Thu, Mar 26, 2020

99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time. Join our live demo to learn how to: - Assess your users’ susceptibility to phishing attacks as well as other cyber threats - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense - Enable your employees to report suspicious messages with a single mouse click

Live Demo: Social Media Compliance


FINRA and the SEC govern marketing communications and advertising practices when communicating with the public. These regulations put broker-dealers squarely in the spotlight of various risks and responsibilities. So how can you mitigate these threats and better manage the process? Learn how to solve for complex social compliance pain points with ease. Proofpoint’s Social Media Compliance solution helps firms and their advisers to engage with customers on social media in a compliant way. Join this demo and listen to product expert Coleem Chestnut, Sr. Integration Engineer, who will demonstrate how our solution: Finds accounts associated with your firm, including rogue adviser accounts Automates reviews and approvals of social profiles Supervises social media activity in real time and notifies you of compliance violations Removes non-compliant social media content Provides detailed reporting and proof of compliance Fill out the form to watch the webinar replay now.

Closing Security Gaps in Office 365


Microsoft offers default security capabilities for all customers in Office 365. Regardless, security threats are still getting through these defenses. The use of third-party solutions can result in higher catch rates for spam, phishing, malware and other threats. Third-party solutions with true advanced capabilities also reduce the likelihood that more sophisticated threats – such as Business Email Compromise (BEC) and Email Account Compromise (EAC). Watch the webinar to learn: How BEC/EAC occurs and can be dangerous What are the short comings of native Office 365 security capabilities How Proofpoint email and cloud solutions can help you secure Office 365 *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit. Fill out the form to watch the webinar replay now.

Live Demo: Security Awareness Training for Healthcare


The 2019 HIMSS Cybersecurity indicated that email is the initial point of compromises for healthcare cyber-attacks – phishing, hacking, BEC – or negligent activity from hospital staff…someone inadvertently clicking on a link or downloading a file. Clearly people are under attack, yet they are also a health system’s first line of defense. So how do you best protect your people and prepare for them for continuous stream of cyber-attacks? Join this live demo to see Proofpoint Security Awareness Training in action, and how it safeguards against advance threats and compliance risks. You’ll learn: The most common attacks in today's healthcare threat landscape Best practices to improve your security posture A people-centric approach to helping you protect patient data Fill out the form to watch the webinar replay now.

Prevention & Response Strategies for Phishing Attacks with Okta + Proofpoint


Today, more than 80% of breaches are caused by compromised credentials; attackers don’t need to hack in – they can just log in. While the rise in adoption of cloud-based applications serves as a catalyst for rethinking modern security, one consistency remains: email-based credential harvesting remains the most fruitful tactic for today’s threat actors. So how can organizations protect against attacks like phishing? Join Lucia Milica, CISO at Proofpoint and Marc Rogers, Executive Director, Cybersecurity at Okta as they share: The anatomy of a phishing attack Various prevention and response strategies Best tools and integrations across authentication and email security Fill out the form to watch the webinar replay now.

Hoodwinked! Why Users are the Preferred Target for Attackers


Manipulation of human beings has been going on since the dawn of time. With the multiple channels and speed that information and data are arriving to every individual, the opportunity to be manipulated or “conned” is at an all-time high. With the continued diligence in hardening system, the attackers have moved to the softer targets, the “human element”. But an educated and aware user is a resilient target. What can an organization due to better harden their users and make them aware of the myriad threats that target them? Join Proofpoint and (ISC)2 on November 21, 2019 at 10:00 AM PST/1:00 PM EST for a panel discussion on how to better defend against threat actors with a cybersecurity strategy that's focused on your organization's most valuable assets: your people. Fill out the form to watch the webinar replay now.

Securing Data in the Cloud Starts with People


Cybersecurity in healthcare is about people, not technology. In the cloud era, keeping your patients safe means protecting clinicians and patients from cloud threats and data loss. A people-centric approach to security helps you identify people and data at-risk and provide the tools needed to stay alert and keep users and their sensitive data safe. A unified data loss prevention (DLP) platform can get you the visibility needed to discover and stop ex-filtration of sensitive data (PII, PHI and more) housed in cloud apps, email and on-premises file shares. So what does a people-centric strategy look like for your healthcare cloud security? Join us for a deep dive into how you can better protect your organization's most valuable assets: your data and your people. In this session, we'll examine the following: Identify which healthcare job functions are most attacked Shorten time to discover and protect sensitive data with out-of-box DLP policies Ensure consistent policy enforcement to lock down access to files with technology shared across email, cloud apps and on-premises file repositories Simplify day-to-day operations by centralizing incident triage and reporting across multiple channels in a single dashboard Fill out the form to watch the webinar replay now.

Digital Risks to Watch Out for In 2020


Threats at the domain registration level are rising fast. So what can you do to stay ahead in 2020? Join Proofpoint’s Ali Mesdaq, Director of Digital Risk Engineering and Research, as he explains some of the digital risks that security leaders are likely to face in the new year ahead. Listen to this webinar and gain valuable insights on how criminals are using domain registrations to enable attacks on your customers, employees and business partners, including: B2B and supply chain fraud Employment scams Sales of counterfeit goods Fill out the form to watch the webinar replay now.

What We Have Learned Working with Compliance


For organizations, building and deploying a corporate compliance program and solution that is ready for the future can be a challenge. So are you ready for something new? Compliance solutions aren’t new and Proofpoint has been providing compliance and legal solutions to customers for almost 15 years. Join the second of the two part webinar series and hear us talk about the lessons we learned and valuable insights from our customers about: Content capture and supervision strategies Content and organizational policies Cross functional departmental collaboration Fill out the form to watch the webinar replay now.

Archive Compliance: Cut Through the Noise - Policy Drives Efficiency


Financial services firms face the world’s toughest regulatory scrutiny. FINRA, SEC and IIROC require formal retention and supervisory review programs for all communications. Not only that, increasing volumes of data and a growing complexity of content sources are putting a strain on organizations to ensure that their data gets managed and reviewed efficiently. So what is the best way for you to ensure compliance and avoid risk? Join this webinar and learn: How regulators are looking at new types of content Best practices on how to set up supervision How to create efficient policies   Webinar ID: 369340

Foundations of People-Centric Cybersecurity


What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to: Protect your people from email-based attacks Gain visibility into who in your organization is getting the most attacks Solve for user awareness through threat simulation and training Fill out the form to watch the webinar replay now.

How to Stop Cloud Threats by Leveraging CASB With a People-Centric Cybersecurity


Once your organization migrates to the cloud, protecting your people and the data they create becomes more challenging and critical than ever. Cybercriminals are launching wide-scale brute force attacks on cloud services to compromise user accounts. 85% of Office 365 and G Suite tenants are targeted. After taking over your trusted accounts, threat actors use social engineering tactics to trick even the most savvy users to install malware, transfer money or hand over sensitive data. That's why a people-centric approach to your cloud security is one of the most effective ways to provide visibility and control over your cloud applications. So what does a people-centric strategy look like and how can you use it to better your overall cloud security? Join our experts for a deep dive into how to use a Cloud Access Security Broker (CASB) to protect your organization's IT-approved applications, such as Office 365 and G Suite that contain your most valuable assets: your people and data. In this session, we'll examine: What the most prevalent cloud attacks are and how they target your VAPs, or Very Attacked People Why a people-centric approach to cloud security is one of the most effective ways to protect your VAPs The different CASB use cases, features, and architectures What to look for in a CASB solution to mitigate the risks you're likely to face Join now to learn more.

Top 5 Lessons I Learned Working with Compliance


Ever wonder what industry leaders are doing with their compliance programs? Listen as Proofpoint’s Dan Nadir (VP of Product, Digital Risk and Compliance) discusses today’s trends in social selling and compliance programs. Building a corporate compliance program that can keep up with changing laws, emerging risks and new regulations is increasingly difficult. Listen to this webinar and gain valuable insights as we cover: Adoption of new communication platforms How to scale a program successfully Supervising for various media types *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.   Fill out the form to watch the webinar replay now.

2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe


More than 99% of attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and trust that leads well-intentioned people to install malware, transfer money or hand over sensitive data is simply more reliable and lucrative to cyber criminals than expensive and quickly patched automated exploits. So how can you better protect yourself, your organization, and your end users from attacks that rely more on social engineering than system vulnerabilities? Join our Director of Threat Intelligence, Patrick Wheeler, as we examine the key findings of Proofpoint's 2019 Human Factor Report. We'll take a close look at how threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that trick even savvy users. In this session we'll share: Trends in volume and types of attacks, providing useful insights for both defenders and organizations Refined techniques and new platforms used by attackers The latest targets that make up an expanding attack including as Office 365 and other cloud accounts, as well as the schemes to which users are most likely to respond The evolution of business email compromise and impostor threats Best practices for layered defenses and user training when, in fact, end users represent the last line of defense against these threats *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.   ID: 369592

Behind the Scenes on Building an Effective Security Awareness Program


Join Dale Zabriskie, Proofpoint’s Security Awareness Training Evangelist, for a Behind the Scenes interview on Building an Effective Security Awareness Program. Dale Zabriskie travels worldwide to help security awareness professionals to overcome challenges, leverage best practices, and implement an effective security awareness program. In this interview, Dale will discuss some of the most frequent challenges he sees in the field and share his expertise on how to overcome these roadblocks.

Switch from Defense to Offense: Why Archiving All Electronic Content is Critical


Electronic content archiving – the process of capturing, indexing and placing data into long-term storage for later search and retrieval – has been a best practice for many years, particularly in industries that are more heavily regulated, such as financial services, energy, life sciences, healthcare, and government. The digital transformation has resulted in the integration of digital technology into all areas of a business, resulting in fundamental changes in how a business operates and the value they deliver to their customers through varied set of communication and collaboration systems. All these new communications have an impact on an organization's compliance and legal readiness. So why is archiving all electronics critical to your organization, and what are some effective ways to approach this? Join Proofpoint's expert Martin Tuip and Michael Osterman of Osterman Research as we deep dive into archiving your electronic content, and what an archiving solution looks like. In this session, we'll share: How an archiving solution can be used for both defensive purposes and as a proactive tool to glean insight and intelligence about an organization’s operations How to use them to detect problems before they turn into big problems Best practices on moving forward with next-generation archiving *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.

How to Solve the $26 Billion Problem of Business Email & Account Compromise


The FBI recently released their latest report detailing reported losses attributed to business email compromise (BEC) and Email Account Compromise (EAC) which totaled over $26B between July 2016 and July 2019. While the scale of losses is staggering, how to best protect against these type of threats, which don’t normally include malware or detectable malicious intent, is not an easy task. There are many facets that an organization must consider across email, cloud, authentication, visibility and education in order to address the different attack tactics and be prepared to limit the potential for financial losses. So what can you do to better protect your people and your organization? Join Proofpoint now as we deep dive into email fraud and how to defend against it. In this session, we'll share: The techniques for preventing these threats A framework for understanding where potential gaps exist How automation is key in resolving incidents

Building an Effective Security Awareness Program


Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves? Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss: Proven best practices for increasing the effectiveness of cybersecurity education How to build a culture of security within your organization Actionable guidance on executing security awareness & training initiatives that deliver measurable results

Key Considerations for Your Future Email Security Solution


The Broadcom acquisition of Symantec’s Enterprise Security Business creates uncertainty for your email security strategy. Unsettled by the acquisition, many Symantec email security customers are reevaluating their email security solution. As you evaluate your options, you may be wondering what critical capabilities your next email security solution must-have. One thing is certain. With today’s threat actors continually refining their tactics, you need an email security solution that can keep pace with today’s rapidly changing threat landscape. But what else do you need to defend against the No. 1 threat vector? Join Proofpoint for an educational webinar to learn: What the threat landscape looks like today What key capabilities you should look for to future proof your email security How Proofpoint we’ve helped customers with their email security

How a Large Financial Services Company Utilizes Email Fraud Defense


Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. As the number one threat vector to businesses, email must be authenticated to restore trust to business communications. So what is the best way to accomplish this? Join us for our case study with one of the largest financial services companies as we examine how they are using Proofpoint's Email Fraud Defense (EFD) to help stop email spoofing attacks in their tracks. In this session, we'll share: The benefits of deploying DMARC email authentication How the organization is utilizing Proofpoint's EFD How to strengthen your secure email gateway to better protect your end users Fill out the form to watch the webinar replay now.

Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service


More than 99% of all targeted cyberattacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance. It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved? Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape. In this session, we'll share: Why cybersecurity transformation is critical for the financial services sector How to identify users who are most at risk of cyberattacks or cause the most compliance risk How to mitigate the risk of adverse inferences and damaged reputations   Fill out the form to watch the webinar replay now.

Never Lose Data Again: Capture, Analyze & Reconcile All Electronic Communication


Regulated organizations must ensure their communications are completely captured and retained. Without the proper tools, proving to regulators that you are not missing data is close to impossible and can lead to fines and penalties. So how can you better manage this? Join this webinar and learn: How to unify content capture across data sources How to ensure completeness of stored and monitored content Common data integrity challenges and how to address them   Fill out the form to watch the webinar replay now.

Behind the Scenes Interview on the 2019 Beyond the Phish Report


You’ve probably seen a headline or two about Proofpoint’s 2019 "Beyond the Phish" report. Hopefully, you’ve taken the time to read the report and found the insights beneficial when developing and deploying your security awareness training program. We are now inviting you to go beyond behind the scenes on the key findings of this report. SecureWorld’s Bruce Sussman interviews Dale Zabriskie, Security Awareness Evangelist at Proofpoint Security Awareness Training as he unpacks key security awareness metrics and strategies you can use at your organization. Fill out the form to watch the webinar replay now.

Web & Email Isolation: Why It Matters to Secure Your Organization and End Users


Threat actors are focused on penetrating your organization through advanced attacks on the very tools that your users employ on a daily basis: corporate email, web browsers, and personal webmail accounts. Just the simple act of visiting a compromised web page means that a user can become a victim of a targeted attack, thereby wreaking havoc on their corporate network. How can security and IT teams enable use of these critical tools for employee productivity, while at the same time ensuring the security of critical data, financial and other assets? We will dive into a new report by Osterman Research: Why You Should Seriously Consider Web Isolation Technology. This report will answer these questions and more: How do you enable a people-centric approach to email and browser security? What are the benefits of isolation technology to safely enable employees’ personal browsing and webmail use? What are the cost benefits of using isolation technology for URL exception handling? How easy and quickly can isolation technology be implemented?   Fill out the form to watch the webinar replay now.

Black Hat USA 2019: How To Build a People-Centric Cybersecurity Strategy


More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the center when building a robust cybersecurity approach in the era of highly sophisticated attacks. Join BrightTalk for a live interview with Tim Choi, the VP of Product Marketing at Proofpoint, as we discuss the key findings of the threat landscape for 2019 and share practical tips on how CISOs can build a truly people-centric cybersecurity strategy. Fill out the form to watch the webinar replay now.

Black Hat USA 2019: Securing the Multi-Cloud in the Age of Threats


How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about: Multi-cloud reality Addressing your cyber risk Managing vulnerabilities, detecting breaches and responding to incidents Automating security tasks across multiple clouds and applications Recommendations for improving enterprise cloud security Speakers: Raj Mallempati, COO, CloudKnox Security Chris Schueler, Senior Vice President of Managed Security Services, Trustwave Tim Choi, VP, Product Marketing, Proofpoint Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams Fill out the form to watch the webinar replay now.

The Role of IT in Compliance: To Serve, Preserve and Protect


The role of IT within the compliance frame work is primarily implementing and managing the systems that protect and control information. From how the content is captured and preserved to the overall system availability. Traditionally these systems were on-premises but most organizations opt for a more efficient way to manage their compliance needs by adopting cloud-based solutions. So how can you better serve, preserve and protect your end users? Join this webinar and learn: What are the differences between on-premises and cloud-based archiving Common mistakes and tips on migration Top things an IT professional should know about Compliance Fill out the form to watch the webinar replay now.

Live Demo: How Email Fraud Defense Authenticates Your Emails Quickly & Safely


Email spoofing attacks are on the rise and email authentication is a proven solution that can block these threats before they reach your employees, customers, and business partners. The challenge is deploying authentication is time-consuming, requires expertise, and brings the risk of blocking legitimate email. So how can you overcome this challenge? Join us for a live product demonstration and learn how Proofpoint’s Email Fraud Defense (EFD) is helping organizations deploy email authentication quickly and confidently. In this session, we'll share: Our 360-degree visibility of the email coming into and being sent from the organization EFD’s proven authentication deployment program How Proofpoint strengthens your secure email gateway to better protect your employees Fill out the form to watch the webinar replay now.

Live Demo: Security Awareness Training


Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.  Join us for a demo of Proofpoint Security Awareness Training to see for yourself!   You'll learn how to:   Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish  customized training to your end users to drive behavior change and make them a stronger last line of defense  Enable your employees to report suspicious messages with a single mouse click Fill out the form to watch the webinar replay now.

Live Demo: Achieve People-Centric Security with a CASB Innovator


Proofpoint provides the only CASB to meet the needs of security people serious about cloud threats, data loss and time-to-value. Proofpoint CASB extends our people-centric security from email to cloud apps. With people-focused threat protection, data security and cloud app governance, Proofpoint CASB protects users from cloud threats, safeguards sensitive data and helps you stay compliant. Your cloud security journey with Proofpoint starts with IT-approved applications, such as Office 365 and G Suite that contain your most valuable assets.  Join us to learn and see how you can: Accelerate cloud adoption by extending people-centric threat detection and defense-in-depth principles to cloud apps. Deploy consistent DLP policies across cloud apps, email and on-premises file repositories and simplify day-to-day operations by centralizing incident management across multiple channels. Discover cloud apps and contain Shadow IT, including third-party OAuth apps that access Office 365 and G Suite data. Fill out the form to watch the webinar replay now.

Live Demo - Enterprise Information Archiving


Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what' the best way for you to develop and implement a new secure approach to your data archiving challenges? Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving: In this demo, we'll share how you can: Mitigate reputational risk Stay compliant with industry rules and regulations  Improve visibility into your archived data Fill out the form to watch the webinar replay now.

Compliance trends and futures – how technology is driving change


The compliance world is changing. Regulations are evolving and new technology addressing compliance challenges are becoming available. From international privacy regulations to new communication channels, how can organizations keep up with those changing regulations and how can they remain nimble.  Join us for a webinar on compliance trends and futures and how regulatory technology and modern-day data behavior is driving change.  Learn about:  What regulators are focusing on these days  New regulatory and compliance technology that can help organizations meet regulatory requirements  External drivers for technology change  Fill out the form to watch the webinar replay now.

Broker-Dealers on Social Media: Understanding the Risks


Regulations put broker-dealers squarely in the spotlight of various risks and responsibilities. FINRA and the SEC govern marketing communications and advertising practices when communicating with the public. Additionally, the cybersecurity threat landscape is evolving and is one of the primary operational risk’s firms face today.  Join Proofpoint to hear the latest in advertising regulations and the cybersecurity threat landscape. Learn how your firm can protect its people and data on social media.  Attend this webinar and learn:  Understand the requirements of advertising regulations on social media  The latest trends in cyber threats facing broker-dealers  How Proofpoint can help protect your firm from today’s risks  Fill out the form to watch the webinar replay now.

What the Symantec Acquisition Means for Your Email Security Future


It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats. As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn: How the email threat landscape has changed with attackers evading legacy approaches How leaders like Proofpoint have innovated to keep up How we have helped customers migrate from legacy products to Proofpoint

How to Design an Adaptable, Flexible and Compliant Social Selling Program


Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.  If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?  Join Hootsuite and Proofpoint now as our experts share: How top firms balance compliance with their adviser experience What experts believe is in store for social selling and compliance in the future How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms

Beyond the Phish: A Snapshot of End-User Behavior


*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit Phishing is one of InfoSec's long-standing threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering? During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.  We’ll share: The importance of assessing and training end-users about cybersecurity threats beyond email-based social engineering The strengths and weaknesses among end-users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization A more holistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks  How you can use this information to reduce the risk of successful cyber attacks within your organization  Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture. Fill out the form to watch the webinar replay now.

Security Awareness Training with Customization Center


Security awareness training is not one size fits all. Every organization, region, and even departments or specific roles can have different training needs. Which is why we introduced our Customization Center to enable administrators to tailor their content and assign it quickly to their end-users. Join us as our experts talk about how you can utilize the Customization Center. This self-service customization enables quick turnaround of changes and the greatest flexibility in personalizing content for your organization at no additional charge to customers. The new version allows administrators the ability to manipulate most visible text, including the questions in the quizzes as well as the text across all supported locales. You'll learn how to: Create customized, role-based training for individual departments, roles, or regions to ensure relevancy to specific users or groups Provide a quality educational experience and continue to drive behavior change while customizing content  Align training with the knowledge level and cybersecurity maturity for your organization  Ensure your training content remains consistent for multinational audiences Edit training to maintain US Section 508 and WCAG 2.0 AA compliance and ensure users with disabilities have the same opportunity to learn Presented by: Shani Mahler, Product Manager Mike Bailey, Sr. Product Marketing Manager Fill out the form to watch the webinar replay now.

Browser & Email Isolation to Protect Your Users in Minutes


When your employees are browsing the web or accessing webmail, your organization can be facing a wide range of online threats. These can include ransomware, web-based & file exploitation, leaks of sensitive and confidential information, and catastrophic data breaches. Web isolation technology is one of the best ways to help you protect against these risks.  Join Proofpoint’s Browser and Email Isolation live demo as we share: How Proofpoint protects your users within minutes from web born threats from risky browsing and malicious email in both corporate and personal email How Proofpoint’s new integration with Targeted Attack Protection (TAP) allows us to provide adaptive controls within corporate emails to enhance security  How Proofpoint’s people-centric approach to Isolation stacks up against competitors Presented by: Eric Schwake, Product Marketing Manager Paul Wang, Technical Product Marketing Manager Fill out the form to watch the webinar replay now.

Securing Your Organization and End-Users with Browser and Email Isolation


Everyday threat actors are trying to infiltrate your organization with advanced attacks by going after your users via corporate email, personal webmail and personal browsing. When your people engage in personal browsing or webmail at work, they can become a target for attackers. IT and Security teams are struggling with the process of exception handling for particular user website while still ensuring their organizations’ security. What can you do to protect your organizations and end-users?  Join Proofpoint as we discuss:  A people-centric approach to browser and email security  The benefits of adopting Isolation for personal browsing and webmail defense Cost benefits using isolation for URL exception handling Fill out the form to watch the webinar replay now.

Behind the Scenes: Selling the Value of Security Awareness Training throughout Your Organization


Listen to the SecureWorld Behind the Scenes interview. Our Security Awareness Evangelist, Zabriskie discusses how to sell the value of security awareness training by speaking the language of your customer. Learn best practices for selling the value of security awareness training internally, how to prepare a business case for your training program, and how to engage employees through creative programming, recognition, and incentives. Fill out the form to watch the webinar replay now.

The Insider Threat: Real Defense for Real Businesses


Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business. Attend this webinar and you’ll learn: What essentials must be in your end user awareness program and how to make those lessons stick Which tools and techniques can be used to enforce security policies when your users unintentionally or maliciously try to break them How you can spot the signs of an impending or ongoing insider data leak and respond Panelists: Katie Burnell – Global Insider Threat Specialist, Dtex Systems Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Sara Peters – Senior Editor, Dark Reading Fill out the form to watch the webinar reply now.

Cloud Threat Research and CASB Capabilities


As more of your organization’s data is stored in the cloud, protecting people and the data they create has become more challenging and critical than ever. Join us as our expert discusses the latest cloud threat research findings and how you can expand Proofpoint’s threat protection and data loss prevention to the cloud.  In this demo, you’ll learn: Why a people-centric approach to cloud security provides better visibility and control over your data and cloud apps How you can leverage your existing Proofpoint products for cloud account compromise detection, cloud DLP & adaptive access controls for Office 365, GSuite and more How Proofpoint’s CASB product capabilities integration with TAP, TRAP, and DLP Fill out the form to watch the webinar replay now.

Trends in Compliance: How IT Should Prepare for the Future


Join this webinar to learn about the need for cross-departmental alliances, and best practices for joining efforts and technology across your organization. How evolving regulations and compliance technology will impact IT How IT can help with your organization's compliance strategy How new RegTech can improve compliance readiness while also improving IT value to an organization Fill out the form to watch the webinar replay now.

How to Stop Cloud Threats by Leveraging CASB with People-Centric Cybersecurity


 As more enterprise data and workloads migrate to the cloud, security needs and practices continue to evolve. The perceived “big risks” -shadow IT and the security practices of SaaS companies – have been surpassed by attacks on individual cloud users and data. The good news? There are reliable, high fidelity ways to detect and mitigate cloud threats and risks to data. Join Garrett Bekker, Principal Security Analyst at 451 Research and Ryan Kalember, SVP of cybersecurity at Proofpoint as they discuss how to leverage a CASB to mitigate cloud threats and risks, and learn about: How the industry’s conceptions of what matters in cloud security have evolved, from the initial emphasis on shadow IT and the security practices of cloud vendors to the current focus on the identity-defined perimeter What the most successful and prevalent attack vectors are in the cloud, from brute force attacks to new forms of phishing that bypass multi-factor authentication What to look for in a CASB solution to mitigate the risks your organization is likely to face Engaging employees through creative programming, recognition, and incentives  Fill out the form to watch the CASB cloud security webinar replay now.

Live Demo: Ramping Up People-Centric Cybersecurity


What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?  Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.  Join us for a live demo to learn about the second phase of this maturity model and see for yourself how the tools work. We'll discuss how to: Identify and remediate account compromise attacks Solve for data loss through email Make your users more resilient against attacks through awareness training Fill out the form to watch the webinar replay now.

Live Demo: Advanced People-Centric Cybersecurity


What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the third phase of this maturity model and see for yourself how the tools work. We'll demonstrate how to: Gain deeper visibility into attacks and respond when things go wrong Solve for unified data protection Defend against email fraud and social media fraud Fill out the form to watch the webinar replay now.

Live Demo: Email Fraud Defense


Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted. Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to: Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People Monitor all inbound impostor threats from your domains and those of third parties Accurately distinguish between legitimate emails and fraudulent emails Fill out the form to watch the webinar replay now.

Strategic Cybersecurity Transformation: Why Now, Why People-Centric


Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change? Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape. You'll learn: How business transformation like the rise of Office 365 has driven cybersecurity transformation Why you should pivot your transformation around people and culture, rather than infrastructure 6 principles for successful cybersecurity transformation Fill out the form to watch the webinar replay now.

Deciphering 2019 Cyber Threat Landscape


In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019. Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join Adenike Cosgrove and Davide Canali as they discuss: Predictions for the 2019 threat landscape with a focus on EMEA and APJ Key actions you can take to prepare your organization Top resources to help support your security efforts Fill out the form to watch the webinar replay now.

State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users


As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways, we need to empower our workforce to be aware and ready to detect them alongside the technology.  Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months. Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn: How to build a people-centric security strategy Steps organizations are taking to mitigate end-user risk from phishing  The most devastating types of phishing emails  The most vulnerable industries and departments Fill out the form to watch the webinar replay now.

2019 Cyber Threat Landscape


In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.  Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss: Predictions for the 2019 threat landscape Key actions you can take to prepare your organization Top resources to help support your security efforts Fill out the form to watch the webinar replay now.

Outside the Network: Protecting People and Customers Against Digital Threats


Bad actors do not just target employee inboxes - they also target the brand itself, key employees and customers on digital channels. Social media, web domains and the deep and dark web pose areas of risk where companies are not directly in control of their communication security. Despite their value, these properties are often left unsecured against fraudulent activity. Since these are emerging threats, digital risks can be blind spots of focus for security teams.  Join this webinar to learn about trends in digital risk including: Executive impersonations targeting your people on LinkedIn Social media protection on Instagram, Facebook, and Twitter Credential threats on the dark web Physical threats to key locations Counterfeit domains in the retail space Visibility into the digital threat landscape How to protect against these threats Fill out the form to watch the webinar replay now.

Email Protection Demo - Staying Secure in Office 365


Anyone can be a VAP: Very Attacked Person™ and they're not always the people you expect. While Microsoft Office 365 allows your people to work anywhere, anytime, on any device, it can also create security issues making your people vulnerable. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Proofpoint’s Email Protection and Targeted Attack Protection solutions can help. Join this webinar and learn about: Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats Approaches for identifying suspicious messages The latest in security software to fight against advanced threats Fill out the form to watch the webinar replay now.

2019 FINRA and SEC Exam Priorities


Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2019 and beyond. Our industry experts will discuss some of the risks spotlighted for 2019: Supervision of Digital Assets Business Regulatory Technology  Adequacy of firms’ cybersecurity programs to protect sensitive information Fill out the form to watch the webinar replay now.

Live Demo: Enterprise Information Archiving


Financial services firms face some of the world’s most stringent and complex regulations. Proofpoint offers solutions that can help financial firms streamline compliance. We provide compliance and supervision solutions that provide easy capture, review and reporting. That means complete visibility across your email, instant messages, collaboration tools and social media.  Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry: Mitigate risk of adverse inferences and damaged reputations Quickly collect, search and retrieve data on demand Stay compliant with industry regulations through Enterprise Archiving, Intelligent Supervision and E-discovery Fill out the form to watch the webinar replay now.

How to Create a People-Centric Cybersecurity Strategy


Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.  But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO. To combat these cybercriminals, learn how to build a strategy that: Reveals who is targeted and how Combats attacks before they reach your users, and Mitigates damage from the attacks that inevitably will reach your people SPEAKER: Ryan Kalember, EVP, Cybersecurity Strategy at Proofpoint. Fill out the form to watch the webinar replay now.

From Skeptics to Champions: Selling the Value of Security Awareness Training throughout Your Organization


The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.  Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.  Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:  Best practices for selling the value of security awareness training internally Preparing a business case for your training program Engaging employees through creative programming, recognition, and incentives    SPEAKERS: Dale Zabriskie, Security Awareness and Training Evangelist, Proofpoint Security Awareness Training  Joe Krock, Cyber Training and Awareness Leader, Enterprise Information Protection (EIP), Humana   Fill out the form to watch the webinar replay now.

The CyberWire: Hacking Humans Podcast


The CyberWire’s Hacking Humans Podcast interviewed Dale Zabriskie, our Security Awareness and Training Evangelist, who shared some surprising insights from the 2019 State of the Phish Report. Fill out the form to watch the webinar replay now.

User Risk Report


We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening. We will discuss the 2018 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide, including: Knowledge of phishing and ransomware Password habits (including password reuse) Safe use of WiFi, location tracking, and social media The types of personal activities (shopping online, playing games, streaming media, etc.) that your organization's devices are being used for by employees and their families and friends Fill out the form to watch the webinar replay now.

State of the Phish™


Phishing continues to be one of the fastest growing and most malicious threats to security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated safeguards through carefully planned, socially-engineered email phishing attacks that are only getting more advanced. In this webinar, we will review the key findings and insights from our 2018 State of the Phish Report: Aggregation and analysis of data from tens of millions of simulated phishing attacks sent through Proofpoint Security Awareness Training over a 12-month period Analysis of more than 10,000 responses from quarterly surveys of infosec professionals from more than 16 industries, as well as data from an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors Insights into current vulnerabilities, industry-specific phishing metrics, and emerging threats Panelist: Gretel Egan – Brand Communications Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.

Closed Loop Email Analysis and Response (CLEAR) Webinar


Proofpoint's Closed-Loop Email Analysis and Response (CLEAR) solution, is a complete closed-loop approach to instant end-user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defenses. Once reported, CLEAR automatically analyzes messages against multiple intelligence and reputation systems, reducing an organization’s typical threat triage time from days to minutes without requiring additional work from human analysts. Proofpoint CLEAR is the first joint solution using Proofpoint Security Awareness Training’s powerful end-user solutions post-acquiring them earlier this year. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Mark Wuslich– Product Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar replay now.

Automating 90 Days of Security Awareness Training Webinar


As a security professional, we know that your time is valuable. At Proofpoint Security Awareness Training, we’ve built some great automation tools directly into our Security Education Platform to help you run an effective security awareness program with minimal setup time. In this webinar, you’ll learn how unique features like auto-enrollment and follow up campaigns can streamline the administrative process while giving your end users a whole quarter of great content. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Colleen Gaffney – Managed Services Supervisor, Proofpoint Security Awareness Training Matt Lane – Product Manager, Proofpoint Security Awareness Training Fill out the form and watch the webinar replay now.

Risky Business: When End-Users Continue Bad Security Behavior


You’ve gone over social engineering scenarios with your end-users. You run quarterly phishing simulations. You use gamification and fun videos to help create a culture of security awareness within your organization. You even have internal champions within the different business units. So why is it that Paul in Accounting got hit with a ransomware attack last week? Why are the sales people continuing to fall for phishing emails? And seriously, why can’t the executives follow the same rules as the rest of the employees? Join this web conference as our expert panelists discuss how to deal with risky behavior from your end-users. When should you escalate this to HR or higher ups? Do extreme cases call for termination of employment? *CPE credit is available. Speakers: Mitchell Sprinsky, CIO - Spectrum Pharmaceuticals Alan Levine, Cybersecurity Advisor - Proofpoint Security Awareness Training Mike Muscatel, Information Security Manager - Snyder's-Lance, Inc. Moderated by: Sam Masiello, CISO- Teletech Key Topics Include: How to deal with risky behavior from your end-users Whether or not to pursue an escalation path for repeat offenders Download now to learn more.   This is a joint presentation of Proofpoint Security Awareness Training and SecureWorld. *Viewing this webinar may be used to earn CPE credit hours, for more information please contact Tom Bechtold at SecureWorld via email at tomb@secureworldexpo.com.

One CISO’s Journey to Cyber Awareness


Whether budgets are robust or restrictive, infosec teams are often skeptical about diverting dollars away from technical tools so they can better fund awareness training. Fortune 500 CISO Alan Levine felt the same — until a nation-state attack on his organization led him to reexamine employees’ roles in cybersecurity and the value of defense-in-depth strategies at users’ desktops. Watch this webinar replay to learn about Levine’s journey from security awareness training skeptic to advocate. Panelist: Alan Levine – Security Advisor, Proofpoint Security Awareness Training. Fill out the form to watch the webinar reply now.

End-User Cybersecurity Behaviors: The Importance of Training Beyond the Phish


Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering. During this session, we will share results from the Proofpoint Security Awareness Training 2018 Beyond the Phish® Report, which analyzes data from nearly 85 million responses to cybersecurity knowledge assessments and training challenges presented to global end users across multiple industries during 2017. We will discuss end users’ strengths and weaknesses across 12 cybersecurity topics — from identifying social engineering scams to protecting confidential information to working safely outside the office. We’ll also highlight variations in end-user knowledge levels across industries, giving you a benchmark against which to compare your organization’s readiness. Attendees will also see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks, and how using these tools together can give a more complete view of susceptibility. Finally, we’ll provide guidance about how to use this information to strengthen your end users and reduce the risk of successful cyberattacks within your organization. Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community. Featured Presenters & Moderator: Amy Baker, VP Marketing, Proofpoint Security Awareness Training Victoria L. Thomas, Cybersecurity Awareness Leader, Fortune 500 Company Mitch Parker, Executive Director InfoSec & Compliance, Indiana University Health James McQuiggan, Product & Solution Security Officer, Siemens Gamesa (moderator) Fill out the form to watch the webinar reply now.

The People Factor: Fight Back Against Phishing


Phishing remains the top attack vector used by cybercriminals, and every end user is a potential target. But with the right security awareness training, these same people can be transformed into a key component in your anti-phishing defense. Kurt Wescoe, Chief Architect of Proofpoint Security Awareness Training, shares his insights and perspectives in this interview hosted by BankInfoSecurity. Listen to the interview to learn more about: Current phishing trends What’s wrong with traditional end-user training How Proofpoint takes a different approach to security awareness training Panelist: Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.

State of Security Education: Healthcare


The healthcare industry faces increased attacks from cybercriminals, and risky end-user behaviors are only exacerbating the threat. A new report from Proofpoint Security Awareness Training, State of Security Education: Healthcare, helps organizations understand the knowledge gaps that affect their security postures and increase risk. Join us for a deep-dive webinar that explores end-user data specific to the healthcare industry. We will analyze responses gathered via nearly 85 million questions asked and answered in our Security Education Platform, as well as data culled from tens of millions of simulated phishing attacks. During this webinar, you’ll learn: How end users in the healthcare space perform on 12 important cybersecurity topics How healthcare organizations use security awareness training to mitigate risk How a regional hospital reduced phishing susceptibility by 86% Panelist: Amy Baker – Vice President of Marketing, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.

Tools for Email Fraud Defense (EFD)


Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you: Block malicious emails spoofing your domains before they reach your employees and customers Monitor all emails (inbound and outbound) from your domains and those of third parties Accurately distinguish between legitimate emails and fraudulent emails About the presenter: Alex Fryback, Product Manager at Proofpoint.

Staying Secure in Office 365


Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.  Proofpoint’s Email Protection and Targeted Attack Protection solutions can help. Join this webinar and learn about: Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats Approaches for identifying suspicious messages The latest in security software to fight against advanced threats About the presenter: Greg McHugh, Sr Engineer at Proofpoint

How to Build your People-Centric Cybersecurity Strategy


Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.  But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO. The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that: Reveals who is targeted Combats attacks before they reach your users Mitigates damage from the attacks that will inevitably reach your people About the presenter: with over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers.

Current Cyber Threat of the Week - 10-Minute Webinar


Each week we host a Cyber Threat of the Week webinar featuring a high-level look at the latest cyber threats, including current malware and ransomware,  to help security teams navigate the attack landscape, in less than 10 minutes. For this week's Interesting Threaty Byte, we bring you the LCG Kit, a new builder for malicious Microsoft Office documents. What's so fascinating about this week’s threat is it allows budding threat actors to create malicious documents of their own. CG Kit or Linear Congruential Generator was first discovered in March of 2018 and began by creating documents that exploited certain CVE's. LCG Kit has now evolved to use macros which are popular for threat actors to use to infect a person's computer. Once infected, the threat actor can further infect the victim's computer with common malwares such as;  Loki Bot, FormBook, Agent Tesla, AZORult, Revcode RAT and Quasar RAT. This Interesting Threat comes to us from our Proofpoint Threat Insight blog; "LCG Kit: Sophisticated builder for Malicious Microsoft Office Documents", located at https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents

Innoculating Against Healthcare Attacks


Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment. Join us for a discussion of: - Just released research that outlines healthcare's most likely threat vectors of 2018 - How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare - Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution - New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow

Your Guide to Staying Secure with Office 365


Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them.  Join Michael Osterman from Osterman Research and our panel of experts, April 26, 10 AM PT as they discuss how to overcome challenges including: --Credential Phishing --Email Fraud --Cloud Access Security --Regulatory Compliance and E-Discovery --Data Loss

Still Falling Foul of Phishing


It has been around for many years, but phishing is not a problem that’s going away any time soon. In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of. Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization.  Join us as we discuss: - Effective security training to help prevent falling for an attack - The right tools and methods for detecting phishing - How to respond when to email threats

Human Factor 2018 - Bad Actors Follow the Money


The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.  Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users. Join Proofpoint Director of Threat Intelligence as we discuss: Trends in volume and type of attack providing useful insights for both defenders and organizations. Ransomware and Email Fraud - how effective have they become and who is being targeted the most. How bad actors are using cloud services  

Quarterly Threat Report November 2017


Malicious URL attacks returned with a vengeance. Ransomware reigned supreme. And fraudsters worked aggressively to impersonate trusted brands in email, social media, and the web. Those are just a few of standout trends we saw in the third quarter within our global customer base and in the wider threat landscape.  Join Ryan Kalember, SVP of Cybersecurity Strategy, and learn: How the threats have shifted quarter over quarter, identifying larger trends across malware, phishing, and fraud Actionable intelligence and advice for managing your security posture About the sophisticated threats across email, the web, social media, and mobile that we continue to see

Filling the GDPR Compliance Gap


GDPR is approaching fast for organizations worldwide. For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. With Proofpoint, you get a complete solution for quickly discovering, controlling, and protecting personal and sensitive EU data. We help you comply with GDPR mandates for collecting, processing, storing, deleting, transferring and using EU personal data. Join us to learn how to: • Drive towards compliance • Embed "privacy by design" to your development lifecycle • Protect all identified EU personal data and prevent data breaches

Archive for Financial Services


Download this on-demand webinar to learn more about the latest with Proofpoint Enterprise Archive's offerings for Financial Services organizations.  You May Also Like: Analyst Report: Protecting Against Advanced Threats and Compliance Risks White Paper: What You Don’t See Could Be Hurting Your Organization Video: Why Proofpoint?

Adopt Office 365 With Modern Data Protection and Compliance Measures


Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk? Watch this webinar to learn: Hear about new types of risk this transformation introduces to your people and data. Learn about the evolution of compliance requirements in the modern workplace. Identify steps and effective countermeasures to protect your people, data, and brand in Office 365, G Suite, and more.

The Phishing Problem - Your Security Sandbox Won't Catch It All


Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.  Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.  Fill out the form to watch this webinar and learn: How phishing has evolved Phishing threat landscape Top phishing lures that impact employees How Proofpoint can effectively address phishing attacks

Protecting Higher Education from Advanced Threats


Recent studies show that attackers are using many different methods to target higher education institutions. Email is the common culprit that enables these advanced threats to breach campuses.  As attackers continue to evolve their techniques to bypass even the latest email security tools, institutions are left to deal with the often costly and time-consuming clean up. To fight back, institutions need a unified solution that solves the entire email threat problem covering both malware and malware-free threats. Fill out the form and join this webinar to learn: The latest cyber threats targeting universities, colleges and other higher education institutions  How to build an advanced email security strategy  Visibility into threats and empowers you to proactively protect your campus

Protecting Data After The Digital Disruption


Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy. Join this lively discussion to learn: Trends and implications for traditional network and endpoint DLP Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently Strategies on how to move forward to protect your critical data

Threat Response Security Automation


Cyber criminals are leveraging automation to launch more efficient and effective campaigns. Manual defense solutions will never be able to scale to fight back. Fill out the form and join us for this webinar to learn: The scope of automation necessary to combat mass campaigns from attackers What automations can be accomplished with the fastest ROI How to apply internal context, 3rd party intelligence, and campaign data to automated defense Shortcuts to integrating with alert sources and enforcement systems

DHS BOD 18-01: Enhance Email and Web Security


DHS BOD 18-01 requires civilian Federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance) within a strict 90 day window. Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud  A quick, safe method to easily implement DMARC authentication at your agency You May Also Like: Data Sheet: Email Fraud Defense Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks Get a DMARC Assessment

What the DHS Mandate Means for Email Security


In recent years, email fraud has cost companies around the world billions of dollars. As a result, U.S. Department of Homeland Security announced a new mandate requiring civilian federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance). While the directive is aimed only at government agencies, it’s a clear indication of how rife email fraud has become across organizations of all sizes and in all industry verticals.    Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud  Why many organizations haven’t implemented DMARC yet How Proofpoint Email Fraud Defense can help you implement DMARC authentication quickly and safely You May Also Like: Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks

Security and Compliance for Office 365


As you plan the big move to the cloud with Office 365, you’ll want to understand the Office 365 security implications, especially when it comes to protection, compliance, and email continuity.  Fill out the form to view our webinar and learn: How to plan for a successful migration to Office 365 How you can protect your Office 365 from advanced threats and targeted attacks How to avoid the hidden costs for IT and compliance staff

Apps are sending your data all over the world. How can you defend against this?


The leaking of corporate data including simple contact data can easily lead to credential phishes and more. Download this on-demand webinar to find out how you can ensure your organization is protected.  You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense

Office 365 Archive & Security Concerns


Download this on-demand webinar and delve into how to meet your archiving, eDiscovery, and compliance needs with Office 365.  You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?

The Return of the Malicious Macro, and the Economics of Cybercrime


Listen in to learn more about the economics of cybercrime and how to protect your organizations from malicious macros and other advanced threats. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account Quarterly Threat Report White Paper: Ransomware Survival Guide

More Threat Vectors, More Security & Compliance Challenges


Listen in to learn how to tackle the measures financial regulators are pushing to guide financial institutions in sharpening information security practices. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense

The Human Factor 2015 Webinar Replay


View this on-demand webinar, The Human Factor 2015: Cybercriminals Go Corporate, and How to Fight Them, to learn more about the latest threats targeting organizations and how to combat them. You May Also Like: Quarterly Threat Summary Ransomware Survival Guide Threat Reports

Solving Puzzles: Threat Intelligence-Fueled Incident Response


View this on-demand webinar to listen in as our experts discuss key context and intelligence applications, gaps, and limitations impacting security teams today and provides a sneak peek at Proofpoint’s new threat intelligence acquisition, Emerging Threats. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense

Data Breach Mitigation: Hardening Against Loss in 2015


Download this on-demand webinar to listen in as Proofpoint's Joe Diamond speaks with guest speaker Mike Osterman, CEO and Founder of Osterman Research, about his recent research into the top challenges IT and Information Security professionals face today, what they expect to see in 2015, and how they are tackling these challenges.  You May Also Like: Data Sheets: Proofpoint Encryption Webinar: Prevent a Data Breach - Stay Out of the Headlines & Save Money Through Encryption Infographic: Is Microsoft Office 365 Secure?

Office 365: What You Need to Know


Download this on-demand webinar to learn key points to consider when looking at Office 365, including what stakeholders to engage, buying criteria, and areas that may require 3rd party support.  You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?

Social Media Risk Management: Best Practices of Top Brands


View this on-demand webinar to hear Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they share Hayes' latest research into brand protection for the modern enterprise and discusses the key corporate social media risks and how the top social brands are managing these risks in the face of a changing social risk landscape. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

Tweets, Feed, & Chatter: Social Media and Regulatory Compliance in 2014


Download this on-demand webinar to learn more about what the top concerns with social media compliance are in 2014, and how your organization can address them. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks


Download this highly recommended on-demand webinar to learn more about phishing and watering holes, the controversy with watering holes as the "phisher's toolkit," and a demo of Threat Response and how it plays into the larger Proofpoint security suite.

Enterprise Social Media Risk and Regulatory Compliance in 2015: Are You in Control?


Download this on-demand webinar for a discussion featuring Proofpoint's Robert Cruz, Senior Director of eDiscovery Solutions and guest speakers Nick Hayes from Forrester Research, Inc. and Devin Redmond, the GM of Nexgate – now a division of Proofpoint – who will be sharing their expertise, client-driven insights, and latest research into enterprise social media risk and how your organization can be better prepared to embrace social in 2015. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

Strategies for Defending Against Targeted Attacks


Download the on-demand webinar, featuring guest speaker Rick Holland of Forrester Research, Inc. as he joins Proofpoint to discuss today's threat environment, advanced targeted attacks, and how to protect your organization against the next generation of rapidly evolving email attacks. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business

When Obscurity and Security Are a Good Idea: How User-Transparent Email Encryption Creates Better Compliance


Download the on-demand webinar for a comprehensive look at when obscurity and security are a good idea and how user-transparent email encryption creates better compliance. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business

Privacy in the Wild: Real Life Stories of Transparent Encryption and DLP


Download the on-demand webinar to listen in as privacy experts cover aspects of outbound email security and compliance controls that enterprises are tackling today, and provide their perspective on avenues for enterprises to investigate for getting around such hurdles. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence

Prevent a Data Breach: Stay Out of the Headlines & Save Money Through Encryption


Download the on-demand webinar to take a closer look at recent noted data breach and the associated costs and risks, the changing regulatory landscape around data breaches, and best practices for implementing encryption without interrupting business.  You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence

Best Practices in Social Media Management and Archiving


Register now for the on-demand webinar with Michael Osterman, Founder and CEO of Osterman Research, where we discuss his recent survey of social media practices best practices, including current state of social media adoption, state of internal social media policies, and recent regulatory guidance on social media. You May Also Like: Reports: Quarterly Threat Summary Reports: Threat Reports White Paper: BEC Survival Guide

Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats


Download the on-demand webinar to learn more about how predictive analytics and defense represent the next generation of protection, what detection technology should be focusing on, and how automated context, verification and containment are accelerating response time by up to 20x. You May Also Like: Quarterly Threat Summary Threat Reports

Plugging the Email Security Gap


Download this on-demand webinar that explores the most recent threats of email and how to prevent those threats. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business

Healthcare Privacy & Security


SECURING INFORMATION PRIVACY Examines best practices for preventing cyber attacks before they happen and remediation when they do. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence

Social Media Risk: Best Practices For Brand Protection


Join Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they discuss Hayes' recent research into brand protection, including how organizations can mitigate social media risk and best practices to ensure that organizations remain safe when engaging with social.  You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

Forester Research - Threat Response Webinar


Download the on-demand webinar and hear from our guest speaker, Forrester Research's Rick Holland, and Proofpoint’s Mike Horn as they discuss how the threat landscape has evolved and how building effective intelligence makes the difference in keeping your organization safe. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence