Webinars

Live Demo: Advanced People-Centric Cybersecurity

Joel Sierra, Sales Engineer at Proofpoint

Tue, Nov 12, 2019

What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to: 1. Gain deeper visibility into attacks and respond when things go wrong 2. Solve for unified data protection 3. Defend against email fraud and social media fraud

Digital Risks to Watch Out for In 2020

Ali Mesdaq, Director of Digital Risk Engineering and Research of Proofpoint

Wed, Nov 13, 2019

Threats at the domain registration level are rising fast. So what can you do to stay ahead in 2020? Join Proofpoint’s Ali Mesdaq, Director of Digital Risk Engineering and Research, as he explains some of the digital risks that security leaders are likely to face in the new year ahead. Listen to this webinar and gain valuable insights on how criminals are using domain registrations to enable attacks on your customers, employees and business partners, including: - B2B and supply chain fraud - Employment scams - Sales of counterfeit goods

Security Awareness Training by ProofPoint - Live Demo

Sean Walker, Enterprise Account Executive

Thu, Nov 14, 2019

Watch this demonstration of how you can engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time. Register to see an in-depth demo of Proofpoint Security Awareness Training to see for yourself!  You'll learn how to:  - Assess your users’ susceptibility to email phishing attacks and knowledge of cybersecurity beyond the phish - Deliver customized online training to your end users to drive behavior change and make them a strong last line of cyber defense - Enable your employees to report suspicious messages with a single mouse click This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you. ------------------------------------------------------------------------------------------------------------- About Proofpoint. A next-generation cybersecurity company protecting people, data, and brands from advanced threats and compliance risks. We collect and analyze more than 100 billion data points a day from more than 100 million email boxes, 200 million social-media accounts, and 7 million mobile apps.  Proofpoint was named a leader by Gartner: Magic Quadrant for Security Awareness (https://www.proofpoint.com/us/resources/analyst-reports/gartner-magic-quadrant-security-awareness-training) Computer-Based Training, Joanna Huisman, 18 July 2019.

Cyber Resilience in the age of Targeted Attacks

Thu, Nov 14, 2019

As a CISO, you already know that the bad actors are shifting their targets from technology to people. Instead of attacking your infrastructure, they’re now more focused on people, their roles within an organisation, the data to which they have access, and their likelihood to “click here.” Your role not only comprises of building an excellent cybersecurity strategy but also consider resources, technology stack, training end users, managing expectations of the board and the big C – compliance. In midst of all this, you also need to think about what happens after an attack? With all these targeted threats lurking in your users’ inboxes, how can you make your business more cyber resilient? Join Loic Guezo, a celebrated expert in cybersecurity and Senior Director at Proofpoint as he shares his expertise on some of the pain points faced by CISOs and how to overcome them. He’ll cover: - Latest trends from the threat landscape and what they mean for businesses - How to strike a balance between security, compliance, technology and processes while keeping people in the centre of it all - Considerations for building cybersecurity and resiliency strategies ------------------------------------------------------------------- Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

Cyber Resilience in the age of Targeted Attacks

Thu, Nov 14, 2019

As a CISO, you already know that the bad actors are shifting their targets from technology to people. Instead of attacking your infrastructure, they’re now more focused on people, their roles within an organisation, the data to which they have access, and their likelihood to “click here.” Your role not only comprises of building an excellent cybersecurity strategy but also consider resources, technology stack, training end users, managing expectations of the board and the big C – compliance. In midst of all this, you also need to think about what happens after an attack? With all these targeted threats lurking in your users’ inboxes, how can you make your business more cyber resilient? Join Loic Guezo, a celebrated expert in cybersecurity and Senior Director at Proofpoint as he shares his expertise on some of the pain points faced by CISOs and how to overcome them. He’ll cover: - Latest trends from the threat landscape and what they mean for businesses - How to strike a balance between security, compliance, technology and processes while keeping people in the centre of it all - Considerations for building cybersecurity and resiliency strategies ------------------------------------------------------------------- Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

Cyber Resilience in the age of Targeted Attacks

Thu, Nov 14, 2019

As a CISO, you already know that the bad actors are shifting their targets from technology to people. Instead of attacking your infrastructure, they’re now more focused on people, their roles within an organisation, the data to which they have access, and their likelihood to “click here.” Your role not only comprises of building an excellent cybersecurity strategy but also consider resources, technology stack, training end users, managing expectations of the board and the big C – compliance. In midst of all this, you also need to think about what happens after an attack? With all these targeted threats lurking in your users’ inboxes, how can you make your business more cyber resilient? Join Loic Guezo, a celebrated expert in cybersecurity and Senior Director at Proofpoint as he shares his expertise on some of the pain points faced by CISOs and how to overcome them. He’ll cover: - Latest trends from the threat landscape and what they mean for businesses - How to strike a balance between security, compliance, technology and processes while keeping people in the centre of it all - Considerations for building cybersecurity and resiliency strategies ------------------------------------------------------------------- Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

Cyber Resilience in the age of Targeted Attacks

Thu, Nov 14, 2019

As a CISO, you already know that the bad actors are shifting their targets from technology to people. Instead of attacking your infrastructure, they’re now more focused on people, their roles within an organisation, the data to which they have access, and their likelihood to “click here.” Your role not only comprises of building an excellent cybersecurity strategy but also consider resources, technology stack, training end users, managing expectations of the board and the big C – compliance. In midst of all this, you also need to think about what happens after an attack? With all these targeted threats lurking in your users’ inboxes, how can you make your business more cyber resilient? Join Loic Guezo, a celebrated expert in cybersecurity and Senior Director at Proofpoint as he shares his expertise on some of the pain points faced by CISOs and how to overcome them. He’ll cover: - Latest trends from the threat landscape and what they mean for businesses - How to strike a balance between security, compliance, technology and processes while keeping people in the centre of it all - Considerations for building cybersecurity and resiliency strategies ------------------------------------------------------------------- Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

Cyber Resilience in the age of Targeted Attacks

Thu, Nov 14, 2019

As a CISO, you already know that the bad actors are shifting their targets from technology to people. Instead of attacking your infrastructure, they’re now more focused on people, their roles within an organisation, the data to which they have access, and their likelihood to “click here.” Your role not only comprises of building an excellent cybersecurity strategy but also consider resources, technology stack, training end users, managing expectations of the board and the big C – compliance. In midst of all this, you also need to think about what happens after an attack? With all these targeted threats lurking in your users’ inboxes, how can you make your business more cyber resilient? Join Loic Guezo, a celebrated expert in cybersecurity and Senior Director at Proofpoint as he shares his expertise on some of the pain points faced by CISOs and how to overcome them. He’ll cover: - Latest trends from the threat landscape and what they mean for businesses - How to strike a balance between security, compliance, technology and processes while keeping people in the centre of it all - Considerations for building cybersecurity and resiliency strategies ------------------------------------------------------------------- Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

Cyber Resilience in the age of Targeted Attacks

Thu, Nov 14, 2019

As a CISO, you already know that the bad actors are shifting their targets from technology to people. Instead of attacking your infrastructure, they’re now more focused on people, their roles within an organisation, the data to which they have access, and their likelihood to “click here.” Your role not only comprises of building an excellent cybersecurity strategy but also consider resources, technology stack, training end users, managing expectations of the board and the big C – compliance. In midst of all this, you also need to think about what happens after an attack? With all these targeted threats lurking in your users’ inboxes, how can you make your business more cyber resilient? Join Loic Guezo, a celebrated expert in cybersecurity and Senior Director at Proofpoint as he shares his expertise on some of the pain points faced by CISOs and how to overcome them. He’ll cover: - Latest trends from the threat landscape and what they mean for businesses - How to strike a balance between security, compliance, technology and processes while keeping people in the centre of it all - Considerations for building cybersecurity and resiliency strategies ------------------------------------------------------------------- Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

Live Demo: Proofpoint Security Awareness Training

Sean Walker, Enterprise Account Executive

Thu, Nov 14, 2019

Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time. Join us for a demo of Proofpoint Security Awareness Training to see for yourself!  You'll learn how to:  - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense - Enable your employees to report suspicious messages with a single mouse click

What We Have Learned Working with Compliance

Martin Tuip - Senior Information Archive Strategist & John Pepe - Market Development Principle

Thu, Nov 14, 2019

For organizations, building and deploying a corporate compliance program and solution that is ready for the future can be a challenge. So are you ready for something new? Compliance solutions aren’t new and Proofpoint has been providing compliance and legal solutions to customers for almost 15 years. Join the second of the two part webinar series and hear us talk about the lessons we learned and valuable insights from our customers about: - Content capture and supervision strategies - Content and organizational policies - Cross functional departmental collaboration

Building an Effective Security Awareness Program

Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist

Tue, Nov 19, 2019

Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves? Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss: - Proven best practices for increasing the effectiveness of cybersecurity education - How to build a culture of security within your organization - Actionable guidance on executing security awareness & training initiatives that deliver measurable results

Live Demo - Email Fraud Defense

Ash Valeski, Director, Product Marketing, Proofpoint

Wed, Nov 20, 2019

Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted. Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to: •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People •Monitor all inbound impostor threats from your domains and those of third parties •Accurately distinguish between legitimate emails and fraudulent emails

Closing Security Gaps in Office 365

Mark Guntrip-Group Product Mktg Dir & Itir Clarke-Sr. Product Mktg Proofpoint & Mike Osterman-President of Osterman Research

Thu, Nov 21, 2019

Microsoft offers default security capabilities for all customers in Office 365. Regardless, security threats are still getting through these defenses. The use of third-party solutions can result in higher catch rates for spam, phishing, malware and other threats. Third-party solutions with true advanced capabilities also reduce the likelihood that more sophisticated threats – such as Business Email Compromise (BEC) and Email Account Compromise (EAC). Watch the webinar to learn: - How BEC/EAC occurs and can be dangerous - What are the short comings of native Office 365 security capabilities - How Proofpoint email and cloud solutions can help you secure Office 365 *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.

Hoodwinked! Why Users are the Preferred Target for Attackers

Mark Guntrip, Group Prod. Mktg Director, ProofPoint; Chrysa Freeman, Code42; Charles Gaughf, (ISC)²; Brandon Dunlap

Thu, Nov 21, 2019

Manipulation of human beings has been going on since the dawn of time. With the multiple channels and speed that information and data are arriving to every individual, the opportunity to be manipulated or “conned” is at an all-time high. With the continued diligence in hardening system, the attackers have moved to the softer targets, the “human element”. But an educated and aware user is a resilient target. What can an organization due to better harden their users and make them aware of the myriad threats that target them? Join Proofpoint and (ISC)2 on November 21, 2019 at 10:00 AM PST/1:00 PM EST for a panel discussion on how to better defend against threat actors with a cybersecurity strategy that's focused on your organization's most valuable assets: your people.

Beyond the Phish: A Snapshot of End-User Behavior

Maiwand Youssofzay, Security Awareness Training Leader, Australia and New Zealand

Wed, Nov 27, 2019

You're invited to our most exciting webinar of the year - Beyond the Phish: A snapshot of end-user behaviour! During this webinar, we will address key findings from our Beyond the Phish Report that explores end-user knowledge across topics such as cyber hygiene, security, and compliance. The report analyses millions of responses gathered from our Security Education Platform. Join us live to learn: • The importance of assessing and training end-users on cybersecurity threats beyond email-based social engineering • Common strengths and weaknesses among end-users across 14 cybersecurity topics • How to gain a holistic view of susceptibility by looking beyond knowledge assessments and training activities --------------------------------------------- BONUS! All attendees will receive a free download of Beyond the Phish, Proofpoint's most wide-ranging report on user knowledge of cyber-hygiene, security and compliance. --------------------------------------------- About Proofpoint Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint. Proofpoint has offices in Sydney, Tokyo and Singapore https://www.proofpoint.com/au/contact/office-locations

Beyond the Phish: A Snapshot of End-User Behavior

Paul Down, Senior Director, Proofpoint EMEA

Thu, Nov 28, 2019

You're invited to our most exciting webinar of the year - Beyond the Phish: A snapshot of end-user behaviour! During this webinar, we will address key findings from our Beyond the Phish Report that explores end-user knowledge across topics such as cyber hygiene, security, and compliance. The report analyses millions of responses gathered from our Security Education Platform. Join us live to learn: • The importance of assessing and training end-users on cybersecurity threats beyond email-based social engineering • Common strengths and weaknesses among end-users across 14 cybersecurity topics • How to gain a holistic view of susceptibility by looking beyond knowledge assessments and training activities --------------------------------------------- BONUS! All attendees will receive a free download of Beyond the Phish, Proofpoint's most wide-ranging report on user knowledge of cyber-hygiene, security and compliance. --------------------------------------------- About Proofpoint Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

Live Demo - Enterprise Information Archiving

Shannon Smith, Archiving Sales Specialist

Tue, Dec 03, 2019

Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what' the best way for you to develop and implement a new secure approach to your data archiving challenges? Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving: In this demo, we'll share how you can: - Mitigate reputational risk - Stay compliant with industry rules and regulations - Improve visibility into your archived data

Building a People-Centric Cybersecurity Strategy for Healthcare

ISSA International

Wed, Dec 04, 2019

More than 99% of all targeted cyber-attacks rely on users to activate them. Nowadays, threat actors are not going after an organization's technology and infrastructure. They are going after your most valuable assets - your people and your data. So, do you know when or how your people are being targeted? Do you know who the most cyber-attacked people are in your organization? Are your Very Attacked People (VAPs) the same as your Very Important People (VIPs)? Join our cybersecurity experts for a deep dive into what the current healthcare threat landscape looks like, how a people-centric approach can help institutions identify and protect your end users, and the latest findings in healthcare threat research. In this session, we’ll share: •Why cybersecurity transformation is critical right now •What a people-centric approach means to today's healthcare threat landscape •How hospitals are leveraging a people-centric strategy to improve their security posture •How to better protect your patients' data and improve your end-users' safety

Live Demo: Proofpoint Security Awareness Training

Sean Walker, Enterprise Account Executive

Thu, Dec 05, 2019

Engage your colleagues and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity training to the right people at the right time. Sign up to see this in-depth demo of Proofpoint Security Awareness Training to see for yourself!  You'll learn how to:  - Assess your users’ susceptibility to email phishing attacks and knowledge of cybersecurity beyond the phish - Deliver customized training to your end users to drive behavior change and make them a strong last line of cyber defense - Enable your employees to report suspicious messages with a single mouse click This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you. ------------------------------------------------------------------------------------------------------------- About Proofpoint. A next-generation cybersecurity company protecting people, data, and brands from advanced threats and compliance risks. We collect and analyze more than 100 billion data points a day from more than 100 million email boxes, 200 million social-media accounts, and 7 million mobile apps.  Proofpoint was named a leader by Gartner: Magic Quadrant for Security Awareness (https://www.proofpoint.com/us/resources/analyst-reports/gartner-magic-quadrant-security-awareness-training) Computer-Based Training, Joanna Huisman, 18 July 2019.

Live Demo: Proofpoint Security Awareness Training

Sean Walker, Enterprise Account Executive

Thu, Dec 05, 2019

Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time. Join us for a demo of Proofpoint Security Awareness Training to see for yourself!  You'll learn how to:  - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense - Enable your employees to report suspicious messages with a single mouse click

Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service

Jennifer Cheng, Dir. of Product Marketing & Catherine Hwang, Dir. of Product Marketing at Proofpoint

Tue, Dec 10, 2019

More than 99% of all targeted cyber attacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance. It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved? Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape. In this session, we'll share: - Why cybersecurity transformation is critical for the financial services sector - How to identify users who are most at-risk of cyberattacks or cause the most compliance risk - How to mitigate risk of adverse inferences and damaged reputations *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.

Security Awareness Training from ProofPoint - Live Demo

Sean Walker, Enterprise Account Executive

Thu, Dec 19, 2019

See this demonstration of how you can engage your colleagues and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity training to the right people at the right time. Register to see this demo of Proofpoint Security Awareness Training to see for yourself!  You'll learn how to:  - Assess your users’ susceptibility to email phishing attacks and their knowledge of cybersecurity beyond the phish - Deliver customized online training to your end users to drive behavior change and make them a strong last line of cyber defense - Enable your employees to report suspicious messages with a single mouse click This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you.

Live Demo: Proofpoint Security Awareness Training

Sean Walker, Enterprise Account Executive

Thu, Dec 19, 2019

Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time. Join us for a demo of Proofpoint Security Awareness Training to see for yourself!  You'll learn how to:  - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense - Enable your employees to report suspicious messages with a single mouse click

Foundations of People-Centric Cybersecurity


What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to: Protect your people from email-based attacks Gain visibility into who in your organization is getting the most attacks Solve for user awareness through threat simulation and training Fill out the form to watch the webinar replay now.

2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe


More than 99% of attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and trust that leads well-intentioned people to install malware, transfer money or hand over sensitive data is simply more reliable and lucrative to cyber criminals than expensive and quickly patched automated exploits. So how can you better protect yourself, your organization, and your end users from attacks that rely more on social engineering than system vulnerabilities? Join our Director of Threat Intelligence, Patrick Wheeler, as we examine the key findings of Proofpoint's 2019 Human Factor Report. We'll take a close look at how threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that trick even savvy users. In this session we'll share: Trends in volume and types of attacks, providing useful insights for both defenders and organizations Refined techniques and new platforms used by attackers The latest targets that make up an expanding attack including as Office 365 and other cloud accounts, as well as the schemes to which users are most likely to respond The evolution of business email compromise and impostor threats Best practices for layered defenses and user training when, in fact, end users represent the last line of defense against these threats *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.   ID: 369592

Behind the Scenes on Building an Effective Security Awareness Program


Join Dale Zabriskie, Proofpoint’s Security Awareness Training Evangelist, for a Behind the Scenes interview on Building an Effective Security Awareness Program. Dale Zabriskie travels worldwide to help security awareness professionals to overcome challenges, leverage best practices, and implement an effective security awareness program. In this interview, Dale will discuss some of the most frequent challenges he sees in the field and share his expertise on how to overcome these roadblocks.

Switch from Defense to Offense: Why Archiving All Electronic Content is Critical


Electronic content archiving – the process of capturing, indexing and placing data into long-term storage for later search and retrieval – has been a best practice for many years, particularly in industries that are more heavily regulated, such as financial services, energy, life sciences, healthcare, and government. The digital transformation has resulted in the integration of digital technology into all areas of a business, resulting in fundamental changes in how a business operates and the value they deliver to their customers through varied set of communication and collaboration systems. All these new communications have an impact on an organization's compliance and legal readiness. So why is archiving all electronics critical to your organization, and what are some effective ways to approach this? Join Proofpoint's expert Martin Tuip and Michael Osterman of Osterman Research as we deep dive into archiving your electronic content, and what an archiving solution looks like. In this session, we'll share: How an archiving solution can be used for both defensive purposes and as a proactive tool to glean insight and intelligence about an organization’s operations How to use them to detect problems before they turn into big problems Best practices on moving forward with next-generation archiving *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.

How to Solve the $26 Billion Problem of Business Email & Account Compromise


The FBI recently released their latest report detailing reported losses attributed to business email compromise (BEC) and Email Account Compromise (EAC) which totaled over $26B between July 2016 and July 2019. While the scale of losses is staggering, how to best protect against these type of threats, which don’t normally include malware or detectable malicious intent, is not an easy task. There are many facets that an organization must consider across email, cloud, authentication, visibility and education in order to address the different attack tactics and be prepared to limit the potential for financial losses. So what can you do to better protect your people and your organization? Join Proofpoint now as we deep dive into email fraud and how to defend against it. In this session, we'll share: The techniques for preventing these threats A framework for understanding where potential gaps exist How automation is key in resolving incidents

Building an Effective Security Awareness Program


Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves? Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss: Proven best practices for increasing the effectiveness of cybersecurity education How to build a culture of security within your organization Actionable guidance on executing security awareness & training initiatives that deliver measurable results

Key Considerations for Your Future Email Security Solution


The Broadcom acquisition of Symantec’s Enterprise Security Business creates uncertainty for your email security strategy. Unsettled by the acquisition, many Symantec email security customers are reevaluating their email security solution. As you evaluate your options, you may be wondering what critical capabilities your next email security solution must-have. One thing is certain. With today’s threat actors continually refining their tactics, you need an email security solution that can keep pace with today’s rapidly changing threat landscape. But what else do you need to defend against the No. 1 threat vector? Join Proofpoint for an educational webinar to learn: What the threat landscape looks like today What key capabilities you should look for to future proof your email security How Proofpoint we’ve helped customers with their email security

How a Large Financial Services Company Utilizes Email Fraud Defense


Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. As the number one threat vector to businesses, email must be authenticated to restore trust to business communications. So what is the best way to accomplish this? Join us for our case study with one of the largest financial services companies as we examine how they are using Proofpoint's Email Fraud Defense (EFD) to help stop email spoofing attacks in their tracks. In this session, we'll share: The benefits of deploying DMARC email authentication How the organization is utilizing Proofpoint's EFD How to strengthen your secure email gateway to better protect your end users Fill out the form to watch the webinar replay now.

Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service


More than 99% of all targeted cyberattacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance. It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved? Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape. In this session, we'll share: Why cybersecurity transformation is critical for the financial services sector How to identify users who are most at risk of cyberattacks or cause the most compliance risk How to mitigate the risk of adverse inferences and damaged reputations   Fill out the form to watch the webinar replay now.

Never Lose Data Again: Capture, Analyze & Reconcile All Electronic Communication


Regulated organizations must ensure their communications are completely captured and retained. Without the proper tools, proving to regulators that you are not missing data is close to impossible and can lead to fines and penalties. So how can you better manage this? Join this webinar and learn: How to unify content capture across data sources How to ensure completeness of stored and monitored content Common data integrity challenges and how to address them   Fill out the form to watch the webinar replay now.

Behind the Scenes Interview on the 2019 Beyond the Phish Report


You’ve probably seen a headline or two about Proofpoint’s 2019 "Beyond the Phish" report. Hopefully, you’ve taken the time to read the report and found the insights beneficial when developing and deploying your security awareness training program. We are now inviting you to go beyond behind the scenes on the key findings of this report. SecureWorld’s Bruce Sussman interviews Dale Zabriskie, Security Awareness Evangelist at Proofpoint Security Awareness Training as he unpacks key security awareness metrics and strategies you can use at your organization. Fill out the form to watch the webinar replay now.

Web & Email Isolation: Why It Matters to Secure Your Organization and End Users


Threat actors are focused on penetrating your organization through advanced attacks on the very tools that your users employ on a daily basis: corporate email, web browsers, and personal webmail accounts. Just the simple act of visiting a compromised web page means that a user can become a victim of a targeted attack, thereby wreaking havoc on their corporate network. How can security and IT teams enable use of these critical tools for employee productivity, while at the same time ensuring the security of critical data, financial and other assets? We will dive into a new report by Osterman Research: Why You Should Seriously Consider Web Isolation Technology. This report will answer these questions and more: How do you enable a people-centric approach to email and browser security? What are the benefits of isolation technology to safely enable employees’ personal browsing and webmail use? What are the cost benefits of using isolation technology for URL exception handling? How easy and quickly can isolation technology be implemented?   Fill out the form to watch the webinar replay now.

Black Hat USA 2019: How To Build a People-Centric Cybersecurity Strategy


More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the center when building a robust cybersecurity approach in the era of highly sophisticated attacks. Join BrightTalk for a live interview with Tim Choi, the VP of Product Marketing at Proofpoint, as we discuss the key findings of the threat landscape for 2019 and share practical tips on how CISOs can build a truly people-centric cybersecurity strategy. Fill out the form to watch the webinar replay now.

Black Hat USA 2019: Securing the Multi-Cloud in the Age of Threats


How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about: Multi-cloud reality Addressing your cyber risk Managing vulnerabilities, detecting breaches and responding to incidents Automating security tasks across multiple clouds and applications Recommendations for improving enterprise cloud security Speakers: Raj Mallempati, COO, CloudKnox Security Chris Schueler, Senior Vice President of Managed Security Services, Trustwave Tim Choi, VP, Product Marketing, Proofpoint Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams Fill out the form to watch the webinar replay now.

The Role of IT in Compliance: To Serve, Preserve and Protect


The role of IT within the compliance frame work is primarily implementing and managing the systems that protect and control information. From how the content is captured and preserved to the overall system availability. Traditionally these systems were on-premises but most organizations opt for a more efficient way to manage their compliance needs by adopting cloud-based solutions. So how can you better serve, preserve and protect your end users? Join this webinar and learn: What are the differences between on-premises and cloud-based archiving Common mistakes and tips on migration Top things an IT professional should know about Compliance Fill out the form to watch the webinar replay now.

Live Demo: How Email Fraud Defense Authenticates Your Emails Quickly & Safely


Email spoofing attacks are on the rise and email authentication is a proven solution that can block these threats before they reach your employees, customers, and business partners. The challenge is deploying authentication is time-consuming, requires expertise, and brings the risk of blocking legitimate email. So how can you overcome this challenge? Join us for a live product demonstration and learn how Proofpoint’s Email Fraud Defense (EFD) is helping organizations deploy email authentication quickly and confidently. In this session, we'll share: Our 360-degree visibility of the email coming into and being sent from the organization EFD’s proven authentication deployment program How Proofpoint strengthens your secure email gateway to better protect your employees Fill out the form to watch the webinar replay now.

Live Demo: Security Awareness Training


Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.  Join us for a demo of Proofpoint Security Awareness Training to see for yourself!   You'll learn how to:   Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish  customized training to your end users to drive behavior change and make them a stronger last line of defense  Enable your employees to report suspicious messages with a single mouse click Fill out the form to watch the webinar replay now.

Live Demo: Achieve People-Centric Security with a CASB Innovator


Proofpoint provides the only CASB to meet the needs of security people serious about cloud threats, data loss and time-to-value. Proofpoint CASB extends our people-centric security from email to cloud apps. With people-focused threat protection, data security and cloud app governance, Proofpoint CASB protects users from cloud threats, safeguards sensitive data and helps you stay compliant. Your cloud security journey with Proofpoint starts with IT-approved applications, such as Office 365 and G Suite that contain your most valuable assets.  Join us to learn and see how you can: Accelerate cloud adoption by extending people-centric threat detection and defense-in-depth principles to cloud apps. Deploy consistent DLP policies across cloud apps, email and on-premises file repositories and simplify day-to-day operations by centralizing incident management across multiple channels. Discover cloud apps and contain Shadow IT, including third-party OAuth apps that access Office 365 and G Suite data. Fill out the form to watch the webinar replay now.

Live Demo - Enterprise Information Archiving


Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what' the best way for you to develop and implement a new secure approach to your data archiving challenges? Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving: In this demo, we'll share how you can: Mitigate reputational risk Stay compliant with industry rules and regulations  Improve visibility into your archived data Fill out the form to watch the webinar replay now.

Compliance trends and futures – how technology is driving change


The compliance world is changing. Regulations are evolving and new technology addressing compliance challenges are becoming available. From international privacy regulations to new communication channels, how can organizations keep up with those changing regulations and how can they remain nimble.  Join us for a webinar on compliance trends and futures and how regulatory technology and modern-day data behavior is driving change.  Learn about:  What regulators are focusing on these days  New regulatory and compliance technology that can help organizations meet regulatory requirements  External drivers for technology change  Fill out the form to watch the webinar replay now.

Broker-Dealers on Social Media: Understanding the Risks


Regulations put broker-dealers squarely in the spotlight of various risks and responsibilities. FINRA and the SEC govern marketing communications and advertising practices when communicating with the public. Additionally, the cybersecurity threat landscape is evolving and is one of the primary operational risk’s firms face today.  Join Proofpoint to hear the latest in advertising regulations and the cybersecurity threat landscape. Learn how your firm can protect its people and data on social media.  Attend this webinar and learn:  Understand the requirements of advertising regulations on social media  The latest trends in cyber threats facing broker-dealers  How Proofpoint can help protect your firm from today’s risks  Fill out the form to watch the webinar replay now.

What the Symantec Acquisition Means for Your Email Security Future


It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats. As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn: How the email threat landscape has changed with attackers evading legacy approaches How leaders like Proofpoint have innovated to keep up How we have helped customers migrate from legacy products to Proofpoint

How to Design an Adaptable, Flexible and Compliant Social Selling Program


Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.  If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?  Join Hootsuite and Proofpoint now as our experts share: How top firms balance compliance with their adviser experience What experts believe is in store for social selling and compliance in the future How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms

Beyond the Phish: A Snapshot of End-User Behavior


*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit Phishing is one of InfoSec's long-standing threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering? During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.  We’ll share: The importance of assessing and training end-users about cybersecurity threats beyond email-based social engineering The strengths and weaknesses among end-users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization A more holistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks  How you can use this information to reduce the risk of successful cyber attacks within your organization  Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture. Fill out the form to watch the webinar replay now.

Security Awareness Training with Customization Center


Security awareness training is not one size fits all. Every organization, region, and even departments or specific roles can have different training needs. Which is why we introduced our Customization Center to enable administrators to tailor their content and assign it quickly to their end-users. Join us as our experts talk about how you can utilize the Customization Center. This self-service customization enables quick turnaround of changes and the greatest flexibility in personalizing content for your organization at no additional charge to customers. The new version allows administrators the ability to manipulate most visible text, including the questions in the quizzes as well as the text across all supported locales. You'll learn how to: Create customized, role-based training for individual departments, roles, or regions to ensure relevancy to specific users or groups Provide a quality educational experience and continue to drive behavior change while customizing content  Align training with the knowledge level and cybersecurity maturity for your organization  Ensure your training content remains consistent for multinational audiences Edit training to maintain US Section 508 and WCAG 2.0 AA compliance and ensure users with disabilities have the same opportunity to learn Presented by: Shani Mahler, Product Manager Mike Bailey, Sr. Product Marketing Manager Fill out the form to watch the webinar replay now.

Browser & Email Isolation to Protect Your Users in Minutes


When your employees are browsing the web or accessing webmail, your organization can be facing a wide range of online threats. These can include ransomware, web-based & file exploitation, leaks of sensitive and confidential information, and catastrophic data breaches. Web isolation technology is one of the best ways to help you protect against these risks.  Join Proofpoint’s Browser and Email Isolation live demo as we share: How Proofpoint protects your users within minutes from web born threats from risky browsing and malicious email in both corporate and personal email How Proofpoint’s new integration with Targeted Attack Protection (TAP) allows us to provide adaptive controls within corporate emails to enhance security  How Proofpoint’s people-centric approach to Isolation stacks up against competitors Presented by: Eric Schwake, Product Marketing Manager Paul Wang, Technical Product Marketing Manager Fill out the form to watch the webinar replay now.

Securing Your Organization and End-Users with Browser and Email Isolation


Everyday threat actors are trying to infiltrate your organization with advanced attacks by going after your users via corporate email, personal webmail and personal browsing. When your people engage in personal browsing or webmail at work, they can become a target for attackers. IT and Security teams are struggling with the process of exception handling for particular user website while still ensuring their organizations’ security. What can you do to protect your organizations and end-users?  Join Proofpoint as we discuss:  A people-centric approach to browser and email security  The benefits of adopting Isolation for personal browsing and webmail defense Cost benefits using isolation for URL exception handling Fill out the form to watch the webinar replay now.

Behind the Scenes: Selling the Value of Security Awareness Training throughout Your Organization


Listen to the SecureWorld Behind the Scenes interview. Our Security Awareness Evangelist, Zabriskie discusses how to sell the value of security awareness training by speaking the language of your customer. Learn best practices for selling the value of security awareness training internally, how to prepare a business case for your training program, and how to engage employees through creative programming, recognition, and incentives. Fill out the form to watch the webinar replay now.

The Insider Threat: Real Defense for Real Businesses


Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business. Attend this webinar and you’ll learn: What essentials must be in your end user awareness program and how to make those lessons stick Which tools and techniques can be used to enforce security policies when your users unintentionally or maliciously try to break them How you can spot the signs of an impending or ongoing insider data leak and respond Panelists: Katie Burnell – Global Insider Threat Specialist, Dtex Systems Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Sara Peters – Senior Editor, Dark Reading Fill out the form to watch the webinar reply now.

Cloud Threat Research and CASB Capabilities


As more of your organization’s data is stored in the cloud, protecting people and the data they create has become more challenging and critical than ever. Join us as our expert discusses the latest cloud threat research findings and how you can expand Proofpoint’s threat protection and data loss prevention to the cloud.  In this demo, you’ll learn: Why a people-centric approach to cloud security provides better visibility and control over your data and cloud apps How you can leverage your existing Proofpoint products for cloud account compromise detection, cloud DLP & adaptive access controls for Office 365, GSuite and more How Proofpoint’s CASB product capabilities integration with TAP, TRAP, and DLP Fill out the form to watch the webinar replay now.

Trends in Compliance: How IT Should Prepare for the Future


Join this webinar to learn about the need for cross-departmental alliances, and best practices for joining efforts and technology across your organization. How evolving regulations and compliance technology will impact IT How IT can help with your organization's compliance strategy How new RegTech can improve compliance readiness while also improving IT value to an organization Fill out the form to watch the webinar replay now.

How to Leverage CASBs to Stop Cloud Security Threats & Attacks


 As more enterprise data and workloads migrate to the cloud, security needs and practices continue to evolve. The perceived “big risks” -shadow IT and the security practices of SaaS companies – have been surpassed by attacks on individual cloud users and data. The good news? There are reliable, high fidelity ways to detect and mitigate cloud threats and risks to data. Join Garrett Bekker, Principal Security Analyst at 451 Research and Ryan Kalember, SVP of cybersecurity at Proofpoint as they discuss how to leverage a CASB to mitigate cloud threats and risks, and learn about: How the industry’s conceptions of what matters in cloud security have evolved, from the initial emphasis on shadow IT and the security practices of cloud vendors to the current focus on the identity-defined perimeter What the most successful and prevalent attack vectors are in the cloud, from brute force attacks to new forms of phishing that bypass multi-factor authentication What to look for in a CASB solution to mitigate the risks your organization is likely to face Engaging employees through creative programming, recognition, and incentives  Fill out the form to watch the CASB cloud security webinar replay now.

Live Demo: Ramping Up People-Centric Cybersecurity


What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?  Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.  Join us for a live demo to learn about the second phase of this maturity model and see for yourself how the tools work. We'll discuss how to: Identify and remediate account compromise attacks Solve for data loss through email Make your users more resilient against attacks through awareness training Fill out the form to watch the webinar replay now.

Live Demo: Advanced People-Centric Cybersecurity


What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them? Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program. Join us for a live demo to learn about the third phase of this maturity model and see for yourself how the tools work. We'll demonstrate how to: Gain deeper visibility into attacks and respond when things go wrong Solve for unified data protection Defend against email fraud and social media fraud Fill out the form to watch the webinar replay now.

Live Demo: Email Fraud Defense


Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted. Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to: Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People Monitor all inbound impostor threats from your domains and those of third parties Accurately distinguish between legitimate emails and fraudulent emails Fill out the form to watch the webinar replay now.

Strategic Cybersecurity Transformation: Why Now, Why People-Centric


Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change? Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape. You'll learn: How business transformation like the rise of Office 365 has driven cybersecurity transformation Why you should pivot your transformation around people and culture, rather than infrastructure 6 principles for successful cybersecurity transformation Fill out the form to watch the webinar replay now.

Deciphering 2019 Cyber Threat Landscape


In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019. Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join Adenike Cosgrove and Davide Canali as they discuss: Predictions for the 2019 threat landscape with a focus on EMEA and APJ Key actions you can take to prepare your organization Top resources to help support your security efforts Fill out the form to watch the webinar replay now.

State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users


As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways, we need to empower our workforce to be aware and ready to detect them alongside the technology.  Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months. Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn: How to build a people-centric security strategy Steps organizations are taking to mitigate end-user risk from phishing  The most devastating types of phishing emails  The most vulnerable industries and departments Fill out the form to watch the webinar replay now.

2019 Cyber Threat Landscape


In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.  Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss: Predictions for the 2019 threat landscape Key actions you can take to prepare your organization Top resources to help support your security efforts Fill out the form to watch the webinar replay now.

Outside the Network: Protecting People and Customers Against Digital Threats


Bad actors do not just target employee inboxes - they also target the brand itself, key employees and customers on digital channels. Social media, web domains and the deep and dark web pose areas of risk where companies are not directly in control of their communication security. Despite their value, these properties are often left unsecured against fraudulent activity. Since these are emerging threats, digital risks can be blind spots of focus for security teams.  Join this webinar to learn about trends in digital risk including: Executive impersonations targeting your people on LinkedIn Social media protection on Instagram, Facebook, and Twitter Credential threats on the dark web Physical threats to key locations Counterfeit domains in the retail space Visibility into the digital threat landscape How to protect against these threats Fill out the form to watch the webinar replay now.

Email Protection Demo - Staying Secure in Office 365


Anyone can be a VAP: Very Attacked Person™ and they're not always the people you expect. While Microsoft Office 365 allows your people to work anywhere, anytime, on any device, it can also create security issues making your people vulnerable. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Proofpoint’s Email Protection and Targeted Attack Protection solutions can help. Join this webinar and learn about: Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats Approaches for identifying suspicious messages The latest in security software to fight against advanced threats Fill out the form to watch the webinar replay now.

2019 FINRA and SEC Exam Priorities


Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2019 and beyond. Our industry experts will discuss some of the risks spotlighted for 2019: Supervision of Digital Assets Business Regulatory Technology  Adequacy of firms’ cybersecurity programs to protect sensitive information Fill out the form to watch the webinar replay now.

Live Demo: Security Awareness Training for Healthcare


The latest threat data for the healthcare industry shows a significant shift away from attacks on infrastructure towards personalized attacks like phishing. What are the key components of a best-in-class solution for phishing simulation and training? Join this live demo to see Proofpoint Security Awareness Training in action and learn how it addresses the most common attacks in today's healthcare threat landscape. Fill out the form to watch the webinar replay now.

Live Demo: Enterprise Information Archiving


Financial services firms face some of the world’s most stringent and complex regulations. Proofpoint offers solutions that can help financial firms streamline compliance. We provide compliance and supervision solutions that provide easy capture, review and reporting. That means complete visibility across your email, instant messages, collaboration tools and social media.  Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry: Mitigate risk of adverse inferences and damaged reputations Quickly collect, search and retrieve data on demand Stay compliant with industry regulations through Enterprise Archiving, Intelligent Supervision and E-discovery Fill out the form to watch the webinar replay now.

How to Create a People-Centric Cybersecurity Strategy


Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.  But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO. To combat these cybercriminals, learn how to build a strategy that: Reveals who is targeted and how Combats attacks before they reach your users, and Mitigates damage from the attacks that inevitably will reach your people SPEAKER: Ryan Kalember, EVP, Cybersecurity Strategy at Proofpoint. Fill out the form to watch the webinar replay now.

From Skeptics to Champions: Selling the Value of Security Awareness Training throughout Your Organization


The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.  Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.  Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:  Best practices for selling the value of security awareness training internally Preparing a business case for your training program Engaging employees through creative programming, recognition, and incentives    SPEAKERS: Dale Zabriskie, Security Awareness and Training Evangelist, Proofpoint Security Awareness Training  Joe Krock, Cyber Training and Awareness Leader, Enterprise Information Protection (EIP), Humana   Fill out the form to watch the webinar replay now.

The CyberWire: Hacking Humans Podcast


The CyberWire’s Hacking Humans Podcast interviewed Dale Zabriskie, our Security Awareness and Training Evangelist, who shared some surprising insights from the 2019 State of the Phish Report. Fill out the form to watch the webinar replay now.

Phishing Simulation and Security Awareness Training


Kicking the security awareness bucket down the road? Planning for 2019? Your people are the most important aspect of security – don’t leave them unprepared when they come face to face with cyberattacks. Grab your popcorn and watch a 30-minute demo of our award-winning phishing simulations and security awareness training. We’ll give you an overview of our products and show how they work together to deliver up to a 90% reduction in successful phishing attacks and malware infections: ThreatSim® Phishing Simulations CyberStrength® Knowledge Assessments 35+ Interactive Training Modules PhishAlarm® Email Reporting Button and PhishAlarm® Analyzer Email Prioritization Tool Security Awareness Materials and Videos Fill out the form now to try our products for a hands-on experience.

User Risk Report


We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening. We will discuss the 2018 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide, including: Knowledge of phishing and ransomware Password habits (including password reuse) Safe use of WiFi, location tracking, and social media The types of personal activities (shopping online, playing games, streaming media, etc.) that your organization's devices are being used for by employees and their families and friends Fill out the form to watch the webinar replay now.

State of the Phish™


Phishing continues to be one of the fastest growing and most malicious threats to security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated safeguards through carefully planned, socially-engineered email phishing attacks that are only getting more advanced. In this webinar, we will review the key findings and insights from our 2018 State of the Phish Report: Aggregation and analysis of data from tens of millions of simulated phishing attacks sent through Proofpoint Security Awareness Training over a 12-month period Analysis of more than 10,000 responses from quarterly surveys of infosec professionals from more than 16 industries, as well as data from an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors Insights into current vulnerabilities, industry-specific phishing metrics, and emerging threats Panelist: Gretel Egan – Brand Communications Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.

Closed Loop Email Analysis and Response (CLEAR) Webinar


Proofpoint's Closed-Loop Email Analysis and Response (CLEAR) solution, is a complete closed-loop approach to instant end-user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defenses. Once reported, CLEAR automatically analyzes messages against multiple intelligence and reputation systems, reducing an organization’s typical threat triage time from days to minutes without requiring additional work from human analysts. Proofpoint CLEAR is the first joint solution using Proofpoint Security Awareness Training’s powerful end-user solutions post-acquiring them earlier this year. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Mark Wuslich– Product Manager, Proofpoint Security Awareness Training Fill out the form to watch the webinar replay now.

Automating 90 Days of Security Awareness Training Webinar


As a security professional, we know that your time is valuable. At Proofpoint Security Awareness Training, we’ve built some great automation tools directly into our Security Education Platform to help you run an effective security awareness program with minimal setup time. In this webinar, you’ll learn how unique features like auto-enrollment and follow up campaigns can streamline the administrative process while giving your end users a whole quarter of great content. Panelists: Chip Homer – Product Marketing Manager, Proofpoint Security Awareness Training Colleen Gaffney – Managed Services Supervisor, Proofpoint Security Awareness Training Matt Lane – Product Manager, Proofpoint Security Awareness Training Fill out the form and watch the webinar replay now.

Risky Business: When End-Users Continue Bad Security Behavior


You’ve gone over social engineering scenarios with your end-users. You run quarterly phishing simulations. You use gamification and fun videos to help create a culture of security awareness within your organization. You even have internal champions within the different business units. So why is it that Paul in Accounting got hit with a ransomware attack last week? Why are the sales people continuing to fall for phishing emails? And seriously, why can’t the executives follow the same rules as the rest of the employees? Join this web conference as our expert panelists discuss how to deal with risky behavior from your end-users. When should you escalate this to HR or higher ups? Do extreme cases call for termination of employment? *CPE credit is available. Speakers: Mitchell Sprinsky, CIO - Spectrum Pharmaceuticals Alan Levine, Cybersecurity Advisor - Proofpoint Security Awareness Training Mike Muscatel, Information Security Manager - Snyder's-Lance, Inc. Moderated by: Sam Masiello, CISO- Teletech Key Topics Include: How to deal with risky behavior from your end-users Whether or not to pursue an escalation path for repeat offenders Download now to learn more.   This is a joint presentation of Proofpoint Security Awareness Training and SecureWorld. *Viewing this webinar may be used to earn CPE credit hours, for more information please contact Tom Bechtold at SecureWorld via email at tomb@secureworldexpo.com.

One CISO’s Journey to Cyber Awareness


Whether budgets are robust or restrictive, infosec teams are often skeptical about diverting dollars away from technical tools so they can better fund awareness training. Fortune 500 CISO Alan Levine felt the same — until a nation-state attack on his organization led him to reexamine employees’ roles in cybersecurity and the value of defense-in-depth strategies at users’ desktops. Watch this webinar replay to learn about Levine’s journey from security awareness training skeptic to advocate. Panelist: Alan Levine – Security Advisor, Proofpoint Security Awareness Training. Fill out the form to watch the webinar reply now.

End-User Cybersecurity Behaviors: The Importance of Training Beyond the Phish


Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering. During this session, we will share results from the Proofpoint Security Awareness Training 2018 Beyond the Phish® Report, which analyzes data from nearly 85 million responses to cybersecurity knowledge assessments and training challenges presented to global end users across multiple industries during 2017. We will discuss end users’ strengths and weaknesses across 12 cybersecurity topics — from identifying social engineering scams to protecting confidential information to working safely outside the office. We’ll also highlight variations in end-user knowledge levels across industries, giving you a benchmark against which to compare your organization’s readiness. Attendees will also see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks, and how using these tools together can give a more complete view of susceptibility. Finally, we’ll provide guidance about how to use this information to strengthen your end users and reduce the risk of successful cyberattacks within your organization. Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community. Featured Presenters & Moderator: Amy Baker, VP Marketing, Proofpoint Security Awareness Training Victoria L. Thomas, Cybersecurity Awareness Leader, Fortune 500 Company Mitch Parker, Executive Director InfoSec & Compliance, Indiana University Health James McQuiggan, Product & Solution Security Officer, Siemens Gamesa (moderator) Fill out the form to watch the webinar reply now.

The People Factor: Fight Back Against Phishing


Phishing remains the top attack vector used by cybercriminals, and every end user is a potential target. But with the right security awareness training, these same people can be transformed into a key component in your anti-phishing defense. Kurt Wescoe, Chief Architect of Proofpoint Security Awareness Training, shares his insights and perspectives in this interview hosted by BankInfoSecurity. Listen to the interview to learn more about: Current phishing trends What’s wrong with traditional end-user training How Proofpoint takes a different approach to security awareness training Panelist: Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.

State of Security Education: Healthcare


The healthcare industry faces increased attacks from cybercriminals, and risky end-user behaviors are only exacerbating the threat. A new report from Proofpoint Security Awareness Training, State of Security Education: Healthcare, helps organizations understand the knowledge gaps that affect their security postures and increase risk. Join us for a deep-dive webinar that explores end-user data specific to the healthcare industry. We will analyze responses gathered via nearly 85 million questions asked and answered in our Security Education Platform, as well as data culled from tens of millions of simulated phishing attacks. During this webinar, you’ll learn: How end users in the healthcare space perform on 12 important cybersecurity topics How healthcare organizations use security awareness training to mitigate risk How a regional hospital reduced phishing susceptibility by 86% Panelist: Amy Baker – Vice President of Marketing, Proofpoint Security Awareness Training Fill out the form to watch the webinar reply now.

Tools for Email Fraud Defense (EFD)


Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you: Block malicious emails spoofing your domains before they reach your employees and customers Monitor all emails (inbound and outbound) from your domains and those of third parties Accurately distinguish between legitimate emails and fraudulent emails About the presenter: Alex Fryback, Product Manager at Proofpoint.

Staying Secure in Office 365


Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.  Proofpoint’s Email Protection and Targeted Attack Protection solutions can help. Join this webinar and learn about: Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats Approaches for identifying suspicious messages The latest in security software to fight against advanced threats About the presenter: Greg McHugh, Sr Engineer at Proofpoint

How to Build your People-Centric Cybersecurity Strategy


Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.  But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO. The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that: Reveals who is targeted Combats attacks before they reach your users Mitigates damage from the attacks that will inevitably reach your people About the presenter: with over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers.

Current Cyber Threat of the Week - 10-Minute Webinar


Each week we host a Cyber Threat of the Week webinar featuring a high-level look at the latest cyber threats, including current malware and ransomware,  to help security teams navigate the attack landscape, in less than 10 minutes. For this week's Interesting Threaty Byte, we bring you the LCG Kit, a new builder for malicious Microsoft Office documents. What's so fascinating about this week’s threat is it allows budding threat actors to create malicious documents of their own. CG Kit or Linear Congruential Generator was first discovered in March of 2018 and began by creating documents that exploited certain CVE's. LCG Kit has now evolved to use macros which are popular for threat actors to use to infect a person's computer. Once infected, the threat actor can further infect the victim's computer with common malwares such as;  Loki Bot, FormBook, Agent Tesla, AZORult, Revcode RAT and Quasar RAT. This Interesting Threat comes to us from our Proofpoint Threat Insight blog; "LCG Kit: Sophisticated builder for Malicious Microsoft Office Documents", located at https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents

Innoculating Against Healthcare Attacks


Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment. Join us for a discussion of: - Just released research that outlines healthcare's most likely threat vectors of 2018 - How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare - Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution - New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow

Your Guide to Staying Secure with Office 365


Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them.  Join Michael Osterman from Osterman Research and our panel of experts, April 26, 10 AM PT as they discuss how to overcome challenges including: --Credential Phishing --Email Fraud --Cloud Access Security --Regulatory Compliance and E-Discovery --Data Loss

Still Falling Foul of Phishing


It has been around for many years, but phishing is not a problem that’s going away any time soon. In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of. Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization.  Join us as we discuss: - Effective security training to help prevent falling for an attack - The right tools and methods for detecting phishing - How to respond when to email threats

Human Factor 2018 - Bad Actors Follow the Money


The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.  Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users. Join Proofpoint Director of Threat Intelligence as we discuss: Trends in volume and type of attack providing useful insights for both defenders and organizations. Ransomware and Email Fraud - how effective have they become and who is being targeted the most. How bad actors are using cloud services  

Quarterly Threat Report November 2017


Malicious URL attacks returned with a vengeance. Ransomware reigned supreme. And fraudsters worked aggressively to impersonate trusted brands in email, social media, and the web. Those are just a few of standout trends we saw in the third quarter within our global customer base and in the wider threat landscape.  Join Ryan Kalember, SVP of Cybersecurity Strategy, and learn: How the threats have shifted quarter over quarter, identifying larger trends across malware, phishing, and fraud Actionable intelligence and advice for managing your security posture About the sophisticated threats across email, the web, social media, and mobile that we continue to see

Filling the GDPR Compliance Gap


GDPR is approaching fast for organizations worldwide. For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. With Proofpoint, you get a complete solution for quickly discovering, controlling, and protecting personal and sensitive EU data. We help you comply with GDPR mandates for collecting, processing, storing, deleting, transferring and using EU personal data. Join us to learn how to: • Drive towards compliance • Embed "privacy by design" to your development lifecycle • Protect all identified EU personal data and prevent data breaches

Archive for Financial Services


Download this on-demand webinar to learn more about the latest with Proofpoint Enterprise Archive's offerings for Financial Services organizations.  You May Also Like: Analyst Report: Protecting Against Advanced Threats and Compliance Risks White Paper: What You Don’t See Could Be Hurting Your Organization Video: Why Proofpoint?

Protecting Higher Education from Advanced Threats


Recent studies show that attackers are using many different methods to target higher education institutions. Email is the common culprit that enables these advanced threats to breach campuses.  As attackers continue to evolve their techniques to bypass even the latest email security tools, institutions are left to deal with the often costly and time-consuming clean up. To fight back, institutions need a unified solution that solves the entire email threat problem covering both malware and malware-free threats. Fill out the form and join this webinar to learn: The latest cyber threats targeting universities, colleges and other higher education institutions  How to build an advanced email security strategy  Visibility into threats and empowers you to proactively protect your campus

Protecting Data After The Digital Disruption


Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy. Join this lively discussion to learn: Trends and implications for traditional network and endpoint DLP Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently Strategies on how to move forward to protect your critical data

The Human Factor 2017


Ransomware. Email Fraud. Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure. In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it. Register for the webinar now to learn about: The latest social engineering targeting trends and techniques Top email fraud tactics, including email fraud and social media account phishing The rise of fraudulent mobile apps and how criminals target users on the go

Threat Response Security Automation


Cyber criminals are leveraging automation to launch more efficient and effective campaigns. Manual defense solutions will never be able to scale to fight back. Fill out the form and join us for this webinar to learn: The scope of automation necessary to combat mass campaigns from attackers What automations can be accomplished with the fastest ROI How to apply internal context, 3rd party intelligence, and campaign data to automated defense Shortcuts to integrating with alert sources and enforcement systems

The Phishing Problem - Your Security Sandbox Won't Catch It All


Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.  Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.  Fill out the form to watch this webinar and learn: How phishing has evolved Phishing threat landscape Top phishing lures that impact employees How Proofpoint can effectively address phishing attacks

Adopt Office 365 With Modern Data Protection and Compliance Measures


Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk? Watch this webinar to learn: Hear about new types of risk this transformation introduces to your people and data. Learn about the evolution of compliance requirements in the modern workplace. Identify steps and effective countermeasures to protect your people, data, and brand in Office 365, G Suite, and more.

DHS BOD 18-01: Enhance Email and Web Security


DHS BOD 18-01 requires civilian Federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance) within a strict 90 day window. Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud  A quick, safe method to easily implement DMARC authentication at your agency You May Also Like: Data Sheet: Email Fraud Defense Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks Get a DMARC Assessment

What the DHS Mandate Means for Email Security


In recent years, email fraud has cost companies around the world billions of dollars. As a result, U.S. Department of Homeland Security announced a new mandate requiring civilian federal agencies to upgrade encryption protocols and strengthen email security with DMARC (Domain-based Message Authentication Reporting & Conformance). While the directive is aimed only at government agencies, it’s a clear indication of how rife email fraud has become across organizations of all sizes and in all industry verticals.    Tune into this short on-demand webinar as we discuss: The latest trends and techniques that cybercriminals use to perpetrate email fraud How DMARC prevents email fraud  Why many organizations haven’t implemented DMARC yet How Proofpoint Email Fraud Defense can help you implement DMARC authentication quickly and safely You May Also Like: Solutions Briefs: Advanced Email Security Analyst Report: Preventing, Detecting, and Responding to Advanced Email-based Attacks

Security and Compliance for Office 365


As you plan the big move to the cloud with Office 365, you’ll want to understand the Office 365 security implications, especially when it comes to protection, compliance, and email continuity.  Fill out the form to view our webinar and learn: How to plan for a successful migration to Office 365 How you can protect your Office 365 from advanced threats and targeted attacks How to avoid the hidden costs for IT and compliance staff

Apps are sending your data all over the world. How can you defend against this?


The leaking of corporate data including simple contact data can easily lead to credential phishes and more. Download this on-demand webinar to find out how you can ensure your organization is protected.  You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense

Office 365 Archive & Security Concerns


Download this on-demand webinar and delve into how to meet your archiving, eDiscovery, and compliance needs with Office 365.  You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?

The Return of the Malicious Macro, and the Economics of Cybercrime


Listen in to learn more about the economics of cybercrime and how to protect your organizations from malicious macros and other advanced threats. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account Quarterly Threat Report White Paper: Ransomware Survival Guide

More Threat Vectors, More Security & Compliance Challenges


Listen in to learn how to tackle the measures financial regulators are pushing to guide financial institutions in sharpening information security practices. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense

The Human Factor 2015 Webinar Replay


View this on-demand webinar, The Human Factor 2015: Cybercriminals Go Corporate, and How to Fight Them, to learn more about the latest threats targeting organizations and how to combat them. You May Also Like: Quarterly Threat Summary Ransomware Survival Guide Threat Reports

Office 365: What You Need to Know


Download this on-demand webinar to learn key points to consider when looking at Office 365, including what stakeholders to engage, buying criteria, and areas that may require 3rd party support.  You May Also Like: White Paper: The risks of moving to Microsoft Office 365 Anaylst Report: Deploying and Managing Security in the Cloud Infographic: Is Microsoft Office 365 Secure?

Social Media Risk Management: Best Practices of Top Brands


View this on-demand webinar to hear Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they share Hayes' latest research into brand protection for the modern enterprise and discusses the key corporate social media risks and how the top social brands are managing these risks in the face of a changing social risk landscape. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

Solving Puzzles: Threat Intelligence-Fueled Incident Response


View this on-demand webinar to listen in as our experts discuss key context and intelligence applications, gaps, and limitations impacting security teams today and provides a sneak peek at Proofpoint’s new threat intelligence acquisition, Emerging Threats. You May Also Like: Report: Quarterly Threat Report White Paper: Ransomware Survival Guide Podcast: Omnichannel Digital Risk Defense

Data Breach Mitigation: Hardening Against Loss in 2015


Download this on-demand webinar to listen in as Proofpoint's Joe Diamond speaks with guest speaker Mike Osterman, CEO and Founder of Osterman Research, about his recent research into the top challenges IT and Information Security professionals face today, what they expect to see in 2015, and how they are tackling these challenges.  You May Also Like: Data Sheets: Proofpoint Encryption Webinar: Prevent a Data Breach - Stay Out of the Headlines & Save Money Through Encryption Infographic: Is Microsoft Office 365 Secure?

Privacy in the Wild: Real Life Stories of Transparent Encryption and DLP


Download the on-demand webinar to listen in as privacy experts cover aspects of outbound email security and compliance controls that enterprises are tackling today, and provide their perspective on avenues for enterprises to investigate for getting around such hurdles. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence

Prevent a Data Breach: Stay Out of the Headlines & Save Money Through Encryption


Download the on-demand webinar to take a closer look at recent noted data breach and the associated costs and risks, the changing regulatory landscape around data breaches, and best practices for implementing encryption without interrupting business.  You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence

Best Practices in Social Media Management and Archiving


Register now for the on-demand webinar with Michael Osterman, Founder and CEO of Osterman Research, where we discuss his recent survey of social media practices best practices, including current state of social media adoption, state of internal social media policies, and recent regulatory guidance on social media. You May Also Like: Reports: Quarterly Threat Summary Reports: Threat Reports White Paper: BEC Survival Guide

Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats


Download the on-demand webinar to learn more about how predictive analytics and defense represent the next generation of protection, what detection technology should be focusing on, and how automated context, verification and containment are accelerating response time by up to 20x. You May Also Like: Quarterly Threat Summary Threat Reports

Tweets, Feed, & Chatter: Social Media and Regulatory Compliance in 2014


Download this on-demand webinar to learn more about what the top concerns with social media compliance are in 2014, and how your organization can address them. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks


Download this highly recommended on-demand webinar to learn more about phishing and watering holes, the controversy with watering holes as the "phisher's toolkit," and a demo of Threat Response and how it plays into the larger Proofpoint security suite.

Enterprise Social Media Risk and Regulatory Compliance in 2015: Are You in Control?


Download this on-demand webinar for a discussion featuring Proofpoint's Robert Cruz, Senior Director of eDiscovery Solutions and guest speakers Nick Hayes from Forrester Research, Inc. and Devin Redmond, the GM of Nexgate – now a division of Proofpoint – who will be sharing their expertise, client-driven insights, and latest research into enterprise social media risk and how your organization can be better prepared to embrace social in 2015. You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

Strategies for Defending Against Targeted Attacks


Download the on-demand webinar, featuring guest speaker Rick Holland of Forrester Research, Inc. as he joins Proofpoint to discuss today's threat environment, advanced targeted attacks, and how to protect your organization against the next generation of rapidly evolving email attacks. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business

When Obscurity and Security Are a Good Idea: How User-Transparent Email Encryption Creates Better Compliance


Download the on-demand webinar for a comprehensive look at when obscurity and security are a good idea and how user-transparent email encryption creates better compliance. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business

Plugging the Email Security Gap


Download this on-demand webinar that explores the most recent threats of email and how to prevent those threats. You May Also Like: Analyst Reports: ESG Lab Review - Proofpoint Advanced Threat Protection White Paper: Definitive Email Security Strategy Guide Solutions Briefs: Encryption Fundamentals for Small Business

Healthcare Privacy & Security


SECURING INFORMATION PRIVACY Examines best practices for preventing cyber attacks before they happen and remediation when they do. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence

Social Media Risk: Best Practices For Brand Protection


Join Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they discuss Hayes' recent research into brand protection, including how organizations can mitigate social media risk and best practices to ensure that organizations remain safe when engaging with social.  You May Also Like: Infographic: The Anatomy of a Fraudulent Social Media Account White Paper: Social Media - Risk Or Reward For Your Brand? Solution Brief: Hashtag Hijacking Brand Fraud Attacks

Forester Research - Threat Response Webinar


Download the on-demand webinar and hear from our guest speaker, Forrester Research's Rick Holland, and Proofpoint’s Mike Horn as they discuss how the threat landscape has evolved and how building effective intelligence makes the difference in keeping your organization safe. You May Also Like: Analyst Report: Digital Risk Monitoring - Forrester Wave White Paper: How to Stop Social Media Hacks Data Sheet: Emerging Threats Intelligence