Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities David Jevans, VP Mobile Security, Proofpoint Recorded: Oct 20 2016 40 mins
    Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Connecting to wifi networks is second nature, with users’ accepting terms and conditions without realizing the risk of data-loss from malwareless and softwareless wifi attacks. This webcast will help you understand the common attacks and vulnerabilities that users are exposed to when traveling, and what you can do about them.
  • Live Demo | Protecting your Information, DLP, Privacy Live Demo | Protecting your Information, DLP, Privacy Proofpoint Recorded: Oct 19 2016 49 mins
    Take a deep dive into the features of Proofpoint's industry-leading Data Loss Prevention and Encryption granting control over the information that leaves your organization through emails, social media and web file sharing, protecting it from exposure at all times.

    Join us as we answer the following questions

    How can I track and understand where sensitive data resides?
    How can my organization set policies that identify and categorize data to prevent sensitive data from leaving the organization?
    How can my organization maintain compliance when it comes to sensitive data?
  • BrightTALK: Proofpoint Canada Tech Talk Webinar: Better Together BrightTALK: Proofpoint Canada Tech Talk Webinar: Better Together Proofpoint Recorded: Oct 4 2016 43 mins
    Join us for second monthly Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers.

    This session will focus on how Proofpoint and Palo Alto Networks combine to combat the ever-changing threat landscape.

    The threat landscape is constantly morphing and changing. New threats and techniques are being used by hackers to continually target the enterprise through multiple attack vectors. In this technical session, we will discuss the themes and changes in the threat landscape, sample attacks we’ve seen in the wild, and methods to secure your company in this environment. Proofpoint and Palo Alto Networks have integrated their top-tier security solutions to stop these evolutionary threats.

    We will have live discussions where we will share attack tactics, forensic information, integration details and platform strategies you can use to keep your networks safe.

    Topics covered will include:
    • Overview of today’s threat landscape
    • Thwarting innovative attacks with combined threat intelligence
    • Integration flow and details
    • Automated protection and threat prevention across your infrastructure
  • Business Email Compromise in Higher Education Business Email Compromise in Higher Education Proofpoint Recorded: Sep 28 2016 52 mins
    Cyber attackers are going phishing in your network pond.
    Learn how you can keep your people from taking the bait.

    Nowadays there are as many ways to communicate as there are things to say. Even so, email continues to be the primary method to connect with others, and the preferred vector for cyber-attacks. The latest threat targeting higher learning institutions comes from Business Email Compromise, an emerging but sophisticated cyber-attack consisting of low-volume campaigns of highly targeted phishing emails.

    In part 3 of our three-part Webinar series, we’ll take a deep dive into Business Email Compromise and explore the various approaches attackers are using to execute campaigns targeting higher education institutions. You’ll learn the indispensable tactics you need to protect your higher learning environment from Business Email Compromise phishing attacks. Register Now.
  • Responding to Cross Vector Attacks Responding to Cross Vector Attacks Proofpoint Recorded: Sep 21 2016 59 mins
    Open environments are great for innovation and higher learning.
    They’re also ideal for cross vector cyber attacks.

    One of the greatest challenges that security teams of higher learning institutions face is the growing number of sophisticated attackers leveraging multiple threat vectors to target faculty and students. There is no question that open network environments drive innovation but this equally makes it possible for cyber attacks to wreak havoc on day-to-day operations.

    In part 2 of our three-part webinar series, gain insight into cross-vector attacks and why they’re so challenging for universities to monitor. Learn how to arm yourself with ways to best respond when cross-vector attacks threaten your environment and users

    Complimentary On-Site Threat Assessment for All Attendees
  • Pokemon Go Malware and Zero Day iOS Attacks: Mobile Threat Defense Pokemon Go Malware and Zero Day iOS Attacks: Mobile Threat Defense David Jevans, VP Mobile Security Recorded: Sep 15 2016 49 mins
    Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.
  • Security for the Higher Education Threat Landscape Security for the Higher Education Threat Landscape Proofpoint Recorded: Sep 14 2016 63 mins
    A whole new batch of threats are descending on your campus, and we’re not talking about the freshmen.
    Universities face a cyber threat landscape that is unlike anything most companies endure. Beyond the burdens that staff and administrators put on the network, every year incoming students present a brand new set of challenges that push network security to its breaking point.

    Join us for part one of a three-part webinar series and explore how higher learning organizations gauge and mitigate the risk of intrusion by cyber threats. Learn what makes the higher education landscape so unique and how you can best protect against the threats that target your network through email, social media and mobile.
  • Proofpoint Canada Interactive Tech Talk: Incident Response Proofpoint Canada Interactive Tech Talk: Incident Response Proofpoint Recorded: Sep 6 2016 56 mins
    This is the first installment of the Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers. This session will focus on incident response.

    Far too often security teams spend their time manually researching a detected security threat using a variety of disconnected tools. Proofpoint Threat Response provides a single pane of glass designed from the ground up for the incident response process. By bringing all the relevant threat information together in one place and helping analysts identify important relationships Threat Response streamlines the workflow required to rapidly respond after threat detection.

    Please join us along with fellow Proofpoint customers for a session to discuss our threat response components including:

    •Dashboard – see all your critical threats, open incidents and more all at a glance
    •Incident Scoring – scores are automatically adjusted as new details are discovered
    •Incident Workflow – assign incidents to analysts and collaborate in an incident
    •Incident Details – view all the collected data about an incident in one place
    •List Management – add and remove identities and hosts to/from quarantine and containment lists
    •Event Sources – view threat detection systems that will be generating alerts
    •Device Updates – view devices and update schedules for your existing infrastructure
    •Reporting – view real-time trends about malware, infected users, CNC IPs and much more
  • How Banking Trojans Work and How to Stop Them How Banking Trojans Work and How to Stop Them Samantha MacLeod, ME Bank and John Baird, Deutsche Bank Recorded: Sep 1 2016 42 mins
    Because they are so lucrative, Banking Trojans have emerged as a favorite of attackers who have turned cybercrime into a big-money endeavor. From Dridex to Ursnif, Banking Trojans have been targeting Australian organizations with frightening effectiveness – lurking on victims' computers until they can grab banking details and login credentials which are then used to commit online fraud.

    When business accounts are involved, the potential losses can surge into the millions. Do you know how to detect and stop them before they hit your balance sheet?

    Please join CSO Australia and Proofpoint for an interactive webinar that will feature Samantha MacLeod, General Manager of Cyber Security from ME Bank and John Baird, Director, Global Technology Production at Deutsche Bank to discover:
    •A business perspective on Banking Trojans and how you can increase awareness
    •How to stop Banking Trojans before they hit your business
    •And other steps you can take
  • Ransomware Survival Guide Ransomware Survival Guide Jennifer Cheng Director, Product Marketing, Proofpoint Recorded: Aug 30 2016 61 mins
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.

Embed in website or blog