Hi [[ session.user.profile.firstName ]]

Proofpoint

  • Date
  • Rating
  • Views
  • Exploit Kits Don't Stop, Neither Should Your Business. Exploit Kits Don't Stop, Neither Should Your Business. Proofpoint Recorded: Dec 8 2016 41 mins
    Exploit kits don’t stop. Neither should your business with CERT Australia.

    Ransomware has one goal: to get your money. It locks away files until payment is made.
    Webinar invitation: December 8th at 11:30am AEST

    Join Chris Firman, Technical Adviser at CERT Australia and Jennifer Cheng, Director, Product at Proofpoint for a live webinar about Ransomware. They will address:

    •Ransomware evolution
    •Why ransomware is surging
    •Where it comes from
    •How are actors bypassing common security controls
    •Should you pay or not? What to consider
    •CERT recommended migrations
  • Email Fraud Defense: How to Fight the Next Generation of Targeted BEC Attacks Email Fraud Defense: How to Fight the Next Generation of Targeted BEC Attacks Proofpoint Recorded: Dec 6 2016 54 mins
    Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyberthreat organizations face today. This is not news.

    But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

    In this webinar, you’ll learn:

    - Why email spoofing works
    - Current BEC trends and attack methods
    - How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox


    Presenters:
    Mark Guntrip, Group Product Marketing Manager, Email Protection
    Adenike Cosgrove, Senior Product Marketing Manager, Email Fraud Defense
  • Kudelski Security Introduces Proofpoint Solutions to Defend their Customers Kudelski Security Introduces Proofpoint Solutions to Defend their Customers Kudelski Security and Proofpoint Recorded: Dec 1 2016 36 mins
    Email, the most utilized business application in the world, is also the number one source for cybersecurity attacks today. In fact, according to Wired Magazine, an estimated 91% of hacking attacks begin with a phishing email.

    While establishing a strong perimeter to protect your organization is a step in the right direction, the attackers are ultimately targeting people and the data they create. Join Kudelski Security as they welcome their newest partner, Proofpoint Inc, who will discuss the right approach to combating cybersecurity attacks by focusing on the human factor.

    Join Covered in the one hour session will be:

    - Overview of the Proofpoint solution
    - Proofpoint’s integration with Palo Alto Networks
    - Opportunity to assess your current email security environment for strength and accuracy in blocking advanced attacks

    At the conclusion on the webinar, there will also be the opportunity to win an Apple iPod Mini2 with WiFi (32 GB). Make sure to register today!
  • Fighting the Next Generation of Targeted BEC Attacks Fighting the Next Generation of Targeted BEC Attacks Adenike Cosgrove, Sr. Product Marketing Mgr, Email Fraud Defense & Richard Davis, Field Product & Solutions Mgr, Proofpoint Recorded: Nov 24 2016 51 mins
    Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news.

    But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

    In this webinar, you’ll learn:

    - Why email spoofing works
    - What the current BEC trends and attack methods are
    - How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox
  • Mitigating Incident Response with the Limited Security Resources in Higher Ed Mitigating Incident Response with the Limited Security Resources in Higher Ed Proofpoint Recorded: Nov 17 2016 63 mins
    A shortage of skilled security staff coupled with criminals finding new ways to infiltrate networks, is causing security alert fatigue to set in at many organizations. This leaves staff cutting corners, at times only processing 5% to 10% of security alerts to try and keep up.

    In this webinar Duane Kuroda and Curtis Wray will shine a light on this problem and provide best practices to help you take charge. They will share actionable tips and tricks to help you begin to gain control of your incident response process and keep you secured against advanced threats.

    Join this webinar to help your security operations team learn:

    • The types of threats seen in higher education and the challenges of managing them
    • The impact of security alert fatigue
    • How educational institutions are handling these threats today
    • Key aspects in which IR teams should prioritize
    • What is needed to reduce effort while optimizing resolution
  • What To Do About Information Archiving, eDiscovery and Compliance Now What To Do About Information Archiving, eDiscovery and Compliance Now Cheryl McKinnon, Principal Analyst at Forrester, Martin Tuip, Senior Product Manager at Proofpoint Recorded: Nov 15 2016 56 mins
    Legal and compliance pressures continue to evolve in the face of today’s data growth. Couple this with recent market consolidation and email migrations, and companies are looking for new ways to retain, search and make sense of their data in order to meet modern eDiscovery and compliance challenges. Overcoming the limitations in legacy solutions and understanding if the alternatives are “good enough” is a top of mind concern. We invite IT leaders, compliance professionals and legal teams to join us for a webinar, “What To Do About Information Archiving, eDiscovery and Compliance Now” on November 15th, 2016. Guest speaker, Forrester’s Cheryl McKinnon, Principal Analyst serving Enterprise Architecture professionals, will share trends, pitfalls and best practices for gaining deep insight into your data to reduce risk and enable better decision making. Live Q & A will follow.
  • Know Your Security Blind Spots: Visibility Beyond the Network Know Your Security Blind Spots: Visibility Beyond the Network Ken Liao & Krystal Wang, Proofpoint Product Marketing Recorded: Nov 3 2016 47 mins
    Cyber attacks are getting through because they’re operating in the blind spots of perimeter-and endpoint focused security.

    Proofpoint enables customers to gain visibility beyond the network into the full threat landscape. Learn how to close the visibility gap.

    Built on advanced analytics and a cloud architecture, our platform protects the way your people work today—through email, social media, and mobile apps. With complete visibility across all major threat vectors, you can detect attacks before they reach their targets. You understand who’s attacking, how they’re attacking, and what they’re after. And you have the insight you need to prevent and resolve the attack.

    Join Ken Liao and Krystal Wang, Product Marketing, Proofpoint for this webinar as they discuss how our platform provides that visibility. Learn how:

    •Proofpoint provides a full security suite of solutions to protect organizations from how they are getting attacked today.
    •Proofpoint technology provides Best-in-Class detection capabilities
    •Proofpoint Nexus Threat Graph is one of the world’s premier threat intelligence systems.
  • Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities David Jevans, VP Mobile Security, Proofpoint Recorded: Oct 20 2016 40 mins
    Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Connecting to wifi networks is second nature, with users’ accepting terms and conditions without realizing the risk of data-loss from malwareless and softwareless wifi attacks. This webcast will help you understand the common attacks and vulnerabilities that users are exposed to when traveling, and what you can do about them.
  • Live Demo | Protecting your Information, DLP, Privacy Live Demo | Protecting your Information, DLP, Privacy Proofpoint Recorded: Oct 19 2016 49 mins
    Take a deep dive into the features of Proofpoint's industry-leading Data Loss Prevention and Encryption granting control over the information that leaves your organization through emails, social media and web file sharing, protecting it from exposure at all times.

    Join us as we answer the following questions

    How can I track and understand where sensitive data resides?
    How can my organization set policies that identify and categorize data to prevent sensitive data from leaving the organization?
    How can my organization maintain compliance when it comes to sensitive data?
  • BrightTALK: Proofpoint Canada Tech Talk Webinar: Better Together BrightTALK: Proofpoint Canada Tech Talk Webinar: Better Together Proofpoint Recorded: Oct 4 2016 43 mins
    Join us for second monthly Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers.

    This session will focus on how Proofpoint and Palo Alto Networks combine to combat the ever-changing threat landscape.

    The threat landscape is constantly morphing and changing. New threats and techniques are being used by hackers to continually target the enterprise through multiple attack vectors. In this technical session, we will discuss the themes and changes in the threat landscape, sample attacks we’ve seen in the wild, and methods to secure your company in this environment. Proofpoint and Palo Alto Networks have integrated their top-tier security solutions to stop these evolutionary threats.

    We will have live discussions where we will share attack tactics, forensic information, integration details and platform strategies you can use to keep your networks safe.

    Topics covered will include:
    • Overview of today’s threat landscape
    • Thwarting innovative attacks with combined threat intelligence
    • Integration flow and details
    • Automated protection and threat prevention across your infrastructure