Hi [[ session.user.profile.firstName ]]

Proofpoint

  • Date
  • Rating
  • Views
  • Threat Actors Are Using Automation.. Are You Automating Threat Response? Threat Actors Are Using Automation.. Are You Automating Threat Response? Joseph Yun, Sr. Product Evangelist, ProofPoint Recorded: Feb 21 2017 43 mins
    Threat Actors figured out long ago that automating and orchestrating their attacks gives them the ability to conduct their campaigns more efficiently and effectively. The byproduct of these automated attacks is a high volume of events and alerts meant to overwhelm enterprises. Enterprises conducting predominantly manual investigations and remediations will never be able to scale to the level of those attackers utilizing automated tactics.

    Join us on February 21, 2017 at 1 PM PT and learn how to quickly and easily


    •Understand the scope of automation necessary to combat mass campaigns from attackers
    •Understand which automations can be accomplished with the fastest ROI
    •Understand how,you can automate and apply internal context, 3rd party intelligence, campaign data, and investigations
    •Deploy powerful and proven shortcuts to integrate with alert sources and enforcement systems
  • Responding to Cybersecurity Challenges in Higher Education Responding to Cybersecurity Challenges in Higher Education Proofpoint, Duane Kurada, Curtis Wray Recorded: Feb 15 2017 52 mins
    Universities are faced with a constantly evolving cyber threat landscape as well as an ever-changing faculty and student body. With limited budgets and a shortage of skilled security staff, doing less with more is not a mantra, it's a way of life that requires smart choices and maximizing resource efficiency.

    Join us on February 15th to hear Proofpoint cybersecurity experts discuss:

    •Explore threats that specifically target Higher Education
    •Discuss the challenges faced when dealing with these threats
    •Demonstrate incident response focused technology
  • Bridging the Office 365 Security Gap Bridging the Office 365 Security Gap Jennifer Cheng Director, Product Marketing, Proofpoint Recorded: Feb 14 2017 52 mins
    Threat Protection and Compliance for Microsoft Office 365

    As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.

    Join Jennifer Cheng, Proofpoint Product Marketing Director, to hear how you can mitigating security and compliance risks to secure your Office 365 email environment.

    Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:

    •Superior blocking of advanced threats
    •Immediate threat visibility and rapid response
    •Greater protection from compliance violations and information loss
    •Uninterrupted access to live and historic email
  • Live Demo: Protecting Your Healthcare Data from Attack Live Demo: Protecting Your Healthcare Data from Attack Proofpoint Recorded: Feb 9 2017 45 mins
    You know the situation: healthcare is becoming one of the primary targets for cyber attacks. What will it take to protect your organization? Find out by attending a live demo of Proofpoint Information Protection Suite.

    Learn about our products:

    •Email Data Loss Prevention to help you quickly discover exposed sensitive and confidential data and quickly resolve any issues
    •Email Encryption to ensure your clinicians and patients’ messages and attachments are communicated securely
    •Data Discover that provides the visibility to accurately discover, monitor and protect sensitive data on file shares, data stores and SharePoint sites

    The demo will include a live Q&A.
  • Improve Your Cybersecurity Visibility by Thinking Beyond the Network Improve Your Cybersecurity Visibility by Thinking Beyond the Network SVP, Cybersecurity Strategy, David Jevans, VP Mobile Security, Celeste Wynchopen, Social Media Strategist, ProofPoint Recorded: Feb 8 2017 53 mins
    Today’s cyber attackers exploit human weakness more often than infrastructure gaps: 90% of attacks target email, but social media links and mobile apps are also fair game.

    In this webinar you will learn:

    • How cyber attackers gain visibility into organizations.
    • How you can see across all major threat entry points and stop attacks.
    • How to stop business email compromise (BEC), credential phishing, ransomware and other advanced threats.
    • How to eliminate social media risk so you can focus on social success.
    • How to protect against malicious apps that mishandle data or install malware.
  • Preparing for Cyber Threats in 2017 Preparing for Cyber Threats in 2017 Richard Davis, Director Cybersecurity & Adenike Cosgrove, Snr. Product Marketing Manager, Proofpoint Recorded: Feb 2 2017 51 mins
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Proofpoint for "How to Prepare for Cyber Threats in 2017" and learn:

    * What we predict for the threat landscape in 2017

    * Key actions you can take to prepare

    * What top resources will help support your security efforts
  • How to Leverage Proofpoint and Splunk How to Leverage Proofpoint and Splunk Alok Ojha and Jeff Burstein from Proofpoint and Vijay Chauhan from Splunk Recorded: Jan 31 2017 34 mins
    By integrating Proofpoint Emerging Threat® (ET) intelligence, to include email and social media together with Splunk’s analytics-driven platform, visibility is now expanded across your entire organization, enabling your teams to delve into granular new use cases.

    Register now to attend this live webinar on January 31st at 10:00 a.m. PT to get a closer look at the benefits of the integration. You’ll learn how joint customers of Proofpoint and Splunk will be able to:

    * Ingest logs from Proofpoint Email Protection and Social Media Protection for increased visibility into email and social threats

    * Leverage Proofpoint Emerging Threats (ET) Technical Add-On (TA) to enhance Splunk correlation rules and search, using the Adaptive Response framework

    * Simplify incident investigation, discovery and hunting

    * Create consolidated reports for both security and compliance

    We’ll also take you “behind the scenes” to demonstrate how the technology works and why our partnership is truly Better Together!
  • How to Prepare for Cyber Threats in 2017 How to Prepare for Cyber Threats in 2017 Patrick Wheeler Director,Threat Intelligence, Proofpoint Recorded: Jan 24 2017 54 mins
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Patrick Wheeler, Proofpoint's Director of Threat Intelligence, for "How to Prepare for Cyber Threats in 2017" and learn:


    - What we predict for the threat landscape in 2017

    - Key actions you can take to prepare

    - What top resources will help support your security efforts
  • Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst Recorded: Dec 14 2016 62 mins
    The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.

    Join guest speaker, Forrester’s Joseph Blackenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.

    Topics include:
    - How to grapple with “malware-free” threats, like BEC spoofing
    - Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
    - Managing a move to the cloud without losing visibility into attacks
  • Eradicating Malware Emails After Delivery Eradicating Malware Emails After Delivery Duane Kuroda, Group Product Marketing Manager at Proofpoint Recorded: Dec 13 2016 57 mins
    Cyber criminals continue to innovate and find ways to bypass security. By apply social engineering, rapid software updates and VM evasion techniques, or even poisoning links after emails are sent, criminals find ways to get malicious email delivered and even clicked on.

    Join us for this live webinar, we’ll look at the techniques attackers use to get through security defenses and a new countermeasure for clawing back delivered and internally forwarded malicious emails.

    You will also learn:
    • How bad actors bypass security to get malicious email into the inbox
    • Which business pressures increase the ability of attackers bypassing security measures
    • How other enterprises are taking-on and drastically reducing the impact of malicious email that bypassed security

Embed in website or blog