Hi [[ session.user.profile.firstName ]]

Proofpoint

  • Date
  • Rating
  • Views
  • Live Demo: Enterprise Information Archiving
    Live Demo: Enterprise Information Archiving
    John Pepe, Market Development Principle - Financial Services. Micah Wyenn, Sales Engineer Recorded: May 2 2019 32 mins
    Financial services firms face some of the world’s most stringent and complex regulations. Proofpoint offers solutions that can help financial firms streamline compliance. We provide compliance and supervision solutions that provide easy capture, review, and reporting. That means complete visibility across your email, instant messages, collaboration tools, and social media.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    •Mitigate risk of adverse inferences and damaged reputations
    •Quickly collect, search and retrieve data on demand
    •Stay compliant with industry regulations through Enterprise Archiving, Intelligent Supervision and E-discovery
  • How to Leverage CASBs to Stop Next Generation Cloud Attacks
    How to Leverage CASBs to Stop Next Generation Cloud Attacks
    Ryan Kalember, SVP of Cybersecurity Strategy - Proofpoint. Garrett Bekker, Principal Analyst Info Security - 451 Research. Recorded: May 2 2019 60 mins
    As more enterprise data and workloads migrate to the cloud, security needs and practices continue to evolve. The perceived “big risks” -shadow IT and the security practices of SaaS companies – have been surpassed by attacks on individual cloud users and data. The good news? There are reliable, high fidelity ways to detect and mitigate cloud threats and risks to data.

    Join Garrett Bekker from 451 Group and Ryan Kalember, SVP of Cybersecurity at Proofpoint, as they discuss:

    - How the industry’s conceptions of what matters in cloud security have evolved, from the initial emphasis on shadow IT and the security practices of cloud vendors to the current focus on the identity-defined perimeter
    - What the most successful and prevalent attack vectors are in the cloud, from brute force attacks to new forms of phishing that bypass multi-factor authentication
    - What to look for in a CASB solution to mitigate the risks your organization is likely to face
  • Live Demo: Advanced People-Centric Cybersecurity
    Live Demo: Advanced People-Centric Cybersecurity
    Joel Sierra, Security Sales Engineer, Proofpoint Recorded: May 1 2019 39 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Live Demo: Email Fraud Defense
    Live Demo: Email Fraud Defense
    Ash Valeski, Director Product Management, Proofpoint Recorded: Apr 25 2019 30 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Strategic Cybersecurity Transformation: Why Now, Why People-Centric
    Strategic Cybersecurity Transformation: Why Now, Why People-Centric
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint Recorded: Apr 24 2019 66 mins
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    You'll learn:
    · How business transformation like the rise of Office 365 has driven cybersecurity transformation
    · Why you should pivot your transformation around people and culture, rather than infrastructure
    · 6 principles for successful cybersecurity transformation
  • Live Demo: Ramping Up People-Centric Cybersecurity
    Live Demo: Ramping Up People-Centric Cybersecurity
    Craig Morell, Security Sales Engineer, Proofpoint Recorded: Apr 23 2019 37 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    1. Identify and remediate account compromise attacks
    2. Solve for data loss through email
    3. Make your users more resilient against attacks through awareness training
  • Hacking Human Nature - The truth about today's European threat landscape
    Hacking Human Nature - The truth about today's European threat landscape
    Paul McKay, Senior Analyst, Forrester and Adenike Cosgrove, Cybersecurity Strategist, Proofpoint Recorded: Apr 18 2019 61 mins
    Join Paul MacKay, Senior Analyst at Forrester, and Nikki Cosgrove, Cybersecurity Strategist at Proofpoint, as they discuss the latest European cybersecurity trends and what you can do to guard against them.
    53% of European companies have reported experiencing a data breach in the last 12 months. Companies are increasingly using cloud applications, making it easier for hackers to obtain credentials, and with email remaining the most common attack vector (over 90% of worldwide cyberattacks start with an email), it’s vital that organisations defend not just their networks, but their employees too.

    This webinar focuses on both Forrester European cyberattack landscape research and Proofpoint’s own threat insights. Discover what’s needed to build a cybersecurity strategy that will protect your most valuable asset- your people.
  • Analyst Webinar: Best Practices to Defend Against Phishing Attacks
    Analyst Webinar: Best Practices to Defend Against Phishing Attacks
    Joseph Blankenship, Principal Analyst, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint Recorded: Apr 4 2019 55 mins
    In today's shifting threat landscape, cyber criminals increasingly target individuals rather than infrastructure.

    How can you defend against highly targeted and effective attacks like phishing?

    Join guest Forrester speaker Joseph Blankenship and Proofpoint for an interactive discussion about best practices around phishing and security awareness training.

    You'll learn:

    1. The latest research on breaches and why phishing stands out as one of the riskiest attack vectors
    2. Today's most common phishing methods and outcomes
    3. Proven best practices to defend against phishing
  • Strategic Cybersecurity Transformation: Why Now, Why People-Centric
    Strategic Cybersecurity Transformation: Why Now, Why People-Centric
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint Recorded: Apr 4 2019 66 mins
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    You'll learn:
    · How business transformation like the rise of Office 365 has driven cybersecurity transformation
    · Why you should pivot your transformation around people and culture, rather than infrastructure
    · 6 principles for successful cybersecurity transformation
  • Live Demo: Email Fraud Defense
    Live Demo: Email Fraud Defense
    Ash Valeski, Director Product Management, Proofpoint Recorded: Apr 2 2019 31 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails

Embed in website or blog