Hi [[ session.user.profile.firstName ]]

Proofpoint

  • Date
  • Rating
  • Views
  • Malware of  the Week | Project Hook, Line and Trojan Horse
    Malware of the Week | Project Hook, Line and Trojan Horse Proofpoint Recorded: Aug 9 2018 10 mins
    This week on Malware of the Week, we're going to focus on Project Hook, a point of sale malware and Evrial, a trojan horse that can hijack cryptocurrency addresses.

    Project Hook comes to us as a targeted phishing email, purporting to be from Office of Inspector General encouraging the victim to click a link to get to a tax document. This downloads a Visual Basic Script that gives Project Hook the freedom to do as it pleases.

    After that, we take a look at Evrial, a trojan horse that can sense when cryptocurrency addresses are copied into the clipboard and replaces that address with an address to a threat actor which then pulls the ol’ switch-a-roo and you end up sending the payment to the threat actor and not it’s intended, recipient.

    Watch the video to see all the details.
  • Email Protection Demo - Staying Secure in Office 365
    Email Protection Demo - Staying Secure in Office 365 Greg McHugh, Sr Engineer at Proofpoint Recorded: Aug 9 2018 51 mins
    Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Join this webinar and learn about:

    •Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Protect Your People - Email Protection Live Demo
    Protect Your People - Email Protection Live Demo Proofpoint Recorded: Aug 2 2018 45 mins
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • One Year to Go! Your CA Orchestria ‘End-of-Life’ Transition Plan
    One Year to Go! Your CA Orchestria ‘End-of-Life’ Transition Plan John Pepe (Proofpoint) & Christopher Amatulli (Technically Creative) Recorded: Aug 1 2018 59 mins
    Still on CA Orchestria ‘Data Protection’ and don’t know where to start?

    End-of-Life happens in just 12 months and Proofpoint has a proven plan to migrate your data and detection logic to its new ‘Intelligent Supervision’ platform designed to increase the relevancy of alerts paired with intuitive workflows.

    In this webinar, Proofpoint and Technically Creative will discuss migration best practices and present a plan to have customers up-and-running by summer 2019, so there is no gap in regulatory compliance.

    Join us as our experts discuss:

    - Where to Start
    - Summer 2019 Transition Plan
    - Upgrading to Intelligent Supervision
    - Ongoing Support

    Join CA Orchestria ‘Data Protection’ experts John Pepe from Proofpoint and Christopher Amatulli from Technically Creative for insights on making a timely, successful transition, all while remaining compliant.
  • Keeping Up With Automation - Threat Response Live Demo
    Keeping Up With Automation - Threat Response Live Demo Todd Edelglass, Sr Engineer Recorded: Jul 26 2018 31 mins
    Proofpoint's Threat Response product orchestrates several key phases of the incident response process, collecting alerts, context, target histories and intelligence from internal and external sources.

    Using all of this information, it automates workflows and response actions saving you critical time. Join us for a live walkthrough of the product and see it for yourself:

    Join us to see how to


    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • Malware of the Week | Sharepoint, Share a Phish.
    Malware of the Week | Sharepoint, Share a Phish. Proofpoint Recorded: Jul 25 2018 14 mins
    This week on Malware of the Week, we're going to focus on the SecurityXploded Toolkit and phishing of Microsoft Sharepoint.

    We take a look at SecurityXploded Toolkit, a legitimate pack of free security tools put out by XenArmor to help security experts and system administrators that threat actors have hi-jacked it to steal your passwords

    Next, we look at a Microsoft Sharepoint phish that takes advantage of Office 365’s growing market share.

    Get the details in this week’s video.
  • Phishing – Sensibilisez vos utilisateurs par la simulation et la formation
    Phishing – Sensibilisez vos utilisateurs par la simulation et la formation Mickael Omer, Sales Engineer Recorded: Jul 24 2018 60 mins
    Le phishing reste l’une des plus grandes menaces pour les entreprises. Ce type d’attaque ciblée exploite le facteur humain plutôt que la technologie, ce qui la rend plus difficile à détecter par les solutions de sécurité traditionnelles. Nous vous ferons découvrir comment réduire le risque d’hameçonnage en permettant la simulation de phishing et la formation pour aider vos utilisateurs finaux à détecter, signaler et se prémunir de cette menace.

    Durant cette session, nous couvrirons les sujets suivants :

    • Comment évaluer la vulnérabilité de vos utilisateurs aux attaques de phishing et de spear phishing
    • Sensibiliser et former vos utilisateurs pour qu’ils reconnaissent et évitent les attaques de phishing et autres escroqueries d'ingénierie sociale
    • Comment permettre à vos employés de signaler les messages suspects en un seul clic.
  • Malware of the Week | One-Two Punch
    Malware of the Week | One-Two Punch Proofpoint Recorded: Jul 19 2018 10 mins
    Each week we host a Threat of the Week webinar featuring a high-level look at interesting threats to help security teams navigate the attack landscape, in less than 10 minutes.

    This week on Threat of the Week – a Phish, a RAT and some LaZagne

    Malware like Sentinel are particularly dangerous due to their multi-stage infection progression. It kicks off with an emailed Word doc that, once downloaded it requests you to enable macros. After that it installs that RAT and then installs LaZagna.

    A nasty one-two punch.

    We also cover a new phishing campaign focused on Stripe and Square payments. Joins us to learn how these attacks worked and how to avoid them.
  • Email Account Compromise – How Dangerous Is it and How to Prevent It
    Email Account Compromise – How Dangerous Is it and How to Prevent It Eric Schwake, Group Product Marketing Manager, Proofpoint & Itir Clarke, Sr Security Strategist, Proofpoint Recorded: Jul 17 2018 40 mins
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors use these tactics usually aim to fraud the company, its customers or partners

    Join us for a discussion on the problems associated with compromised accounts, from phishing to malware vulnerability and the steps your organization can take to help mitigate the threat.

    Join us and learn:

    - The damage compromised accounts cause, from stolen customer data, to phishing
    - Why targeting people, not infrastructure is more effective
    - What you can do to keep your accounts secure
  • Still Falling Foul to Phishing?
    Still Falling Foul to Phishing? Brett Shaw, Sr Cybersecurity Strategist, Proofpoint Recorded: Jul 11 2018 42 mins
    It has been around for many years, but phishing is not a problem that’s going away any time soon.

    In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of.

    Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization.

    Join us as we discuss:

    - Effective security training to help prevent falling for an attack
    - The right tools and methods for detecting phishing
    - How to respond when to email threats

Embed in website or blog