Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Building Your Modern Security Strategy - Email Protection Live Demo
    Building Your Modern Security Strategy - Email Protection Live Demo Matt Walier, SR Sales Engineer Recorded: Oct 18 2018 51 mins
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Monitoring Communications for Insider Risk
    Monitoring Communications for Insider Risk John Pepe, Monitoring Compliance Specialist, Proofpoint; Steve Prokai, SE Director, Archiving and Compliance, Proofpoint Recorded: Oct 17 2018 60 mins
    People-centric protection goes beyond the usual threats.

    Businesses are becoming aware that they need to monitor employee communications and mitigate risk associated with electronic communications. Discover the latest approach to protect your organization from legal, regulatory and reputational risk.

    Join this webinar and learn :
    • How Communications can expose organizations to risks
    • Considerations for establish a monitoring program
    • Monitoring strategies to detect and prevent risks
    • How to utilize Proofpoint solutions to protect your organization
  • Phishing Prevention Training Demo
    Phishing Prevention Training Demo Proofpoint Recorded: Oct 16 2018 53 mins
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!
    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.

    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Cybersecurity Helden werden nicht geboren ... Sie werden gemacht!
    Cybersecurity Helden werden nicht geboren ... Sie werden gemacht! Giovanni Pascale, Associate Sales Engineer, Proofpoint Recorded: Oct 16 2018 47 mins
    Phishing ist nach wie vor eine der am schnellsten wachsenden und bösartigsten Bedrohungen für die Sicherheit von Unternehmen aller Branchen. Denn der versierte „Phisher“ von heute schafft es, selbst die ausgefeiltesten technischen Sicherheitsvorkehrungen durch sorgfältig geplante, sozial ausgerichtete E-Mails zu umgehen, die sich immer weiterentwickeln.

    Wie also Mitarbeiter und Unternehmen vor diesen gezielten Angriffen schützen?
    Das Phishing-Simulation- und Sicherheits-Awareness-Training von Proofpoint bietet Organisationen eine zusätzliche Sicherheitsebene, indem es Mitarbeiter auf die neuesten E-Mail-Sicherheitstaktiken testet und informiert. Dies hilft, das Bewusstsein zu erhöhen, die Anzahl erfolgreicher Phishing-Angriffe und Malware-Infektionen zu reduzieren und zukünftige Sicherheitsverletzungen zu verhindern.

    Erfahren Sie in unserem Live-Webcast, mehr über die marktführende Lösung für computerbasierte Security Awareness Trainings und Phishing-Simulation und informieren Sie sich über

    •E-Mail Fraud – Ein Omnipräsentes Thema
    •Proofpoint und Wombat – Eine optimale Ergänzung
    •Maturitätslevel von Security Awareness
    •Wombat Methodologe & Live Demo
  • Weekly Threat Byte | Brain Food is Bad
    Weekly Threat Byte | Brain Food is Bad Proofpoint Recorded: Oct 4 2018 12 mins

    The interesting threat byte this week is called Brain Food. Brain Food refers to a botnet of thousands of compromised web servers with fake diet and brain enhancing pills advertised on the compromised web servers. This form of phishing is not new and uses a common marketing activity called a Call To Action (CTA) to attract potential victims. Brain Food also uses URL Shortening, which uses services to shorten URLs to help avoid detection of known compromised web servers.

    Learn all about it in the video
  • Beat the top 3 security challenges in Office 365
    Beat the top 3 security challenges in Office 365 Celeste Kinswood, Cybersecurity Strategist, Proofpoint Recorded: Sep 27 2018 38 mins
    If you are migrating to Office 365 or you already run your business in the cloud, you know the benefits of cloud collaboration tools. But new tools bring new risks. Compromised accounts can be used to launch fraud and phishing attacks or access sensitive data in cloud storage. Protecting your people and data is vital to making your Office 365 migration a success.

    Join Proofpoint security experts as they discuss top security threats affecting organizations today. You’ll learn how to address challenges including:

    Account compromise
    Email fraud and phishing
    Data protection in the cloud
  • Threat Bytes | FlawedAmmy
    Threat Bytes | FlawedAmmy Proofpoint Recorded: Sep 27 2018 9 mins
    Threat Bytes is a weekly series covering the most interesting threats out there in 5 minutes or less.


    This week's Threat Byte focuses on a new file type called SettingContent-ms. SettingContent-ms files are used to create shortcuts to the Settings page in Windows 8 and 10. Unfortunately, double-clicking on a SettingContent-ms file does not prompt the user and is automatically executed.

    What happens next can lead to a remote access trojan called FlawedAmmy.

    Get the whole story in this week's video.
  • Tools for Email Fraud Defense | Live demo
    Tools for Email Fraud Defense | Live demo Alex Fryback, Product Manager @ Proofpoint Recorded: Sep 20 2018 47 mins
    Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • Comment gagner la bataille contre les comptes Office 365 compromis
    Comment gagner la bataille contre les comptes Office 365 compromis Laura Peytavin : Senior Sales Engineer, CISSP, Proofpoint & Miguel Battais : Manager Commercial Sales France, Proofpoint Recorded: Sep 19 2018 37 mins
    Office 365 est aujourd’hui en France et en Europe la solution collaborative la plus adoptée par les organisations. Les cybercriminels l’ont bien compris et les entreprises subissent des attaques de plus en plus réussies sur leurs comptes utilisateurs Office 365.

    Ces comptes tombent dans les mains des fraudeurs, qui, à partir d’une compromission, lancent des attaques horizontales pour toucher les utilisateurs les plus à risque dans l’entreprise. La mise en place de solutions de gestion d’accès par double authentification et par « one time password » ne règle pas pour autant ce problème.

    Ce webinaire va repasser en détail la réalité du phénomène et les véritables enjeux des comptes Office 365 compromis. Nous verrons comment notre approche « People-Centric » qui se fonde sur la gestion et le suivi des personnes ciblées permet d’éviter et de remédier à cette compromission de comptes O365.
  • Cybersecurity Now: A Guide to Building a People-Centric Strategy
    Cybersecurity Now: A Guide to Building a People-Centric Strategy Ryan Kalemeber, SVP, Cybersecurity Strategy, Proofpoint Recorded: Sep 18 2018 62 mins
    Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

    You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

    Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

    o Prevent cyberattacks by stopping them before they start

    o Defend against email and cloud threats

    o Respond quickly to threats and limit the damage they could cause

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

Embed in website or blog