Hi [[ session.user.profile.firstName ]]

Proofpoint

  • Date
  • Rating
  • Views
  • 2019 FINRA and SEC Exam Priorities
    2019 FINRA and SEC Exam Priorities
    Raymond Mcgrath, Services, Supervision Policy Consultant; Roman Tobe, Manager, Product Marketing Recorded: Mar 20 2019 57 mins
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2019 and beyond.

    Our industry experts will discuss some of the risks spotlighted for 2019:
    •Supervision of Digital Assets Business
    •Regulatory Technology
    •Adequacy of firms’ cybersecurity programs to protect sensitive information

    Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
  • Outside the Network: Protecting People and Customers Against Digital Threats
    Outside the Network: Protecting People and Customers Against Digital Threats
    Roman Tobe, Senior Product Marketing Manager, Proofpoint Recorded: Mar 19 2019 52 mins
    Bad actors do not just target employee inboxes - they also target the brand itself, key employees and customers on digital channels.

    Social media, web domains and the deep and dark web pose areas of risk where companies are not directly in control of their communication security. Despite their value, these properties are often left unsecured against fraudulent activity.

    Since these are emerging threats, digital risks can be blind spots of focus for security teams.

    Join this webinar to learn about trends in digital risk including:

    -Executive impersonations targeting your people on LinkedIn
    -Social media protection on Instagram, Facebook and Twitter
    -Credential threats on the dark web
    -Physical threats to key locations
    -Counterfeit domains in the retail space
    -Visibility into the digital threat landscape
    -How to protect against these threats
  • Live Demo: Enterprise Information Archiving
    Live Demo: Enterprise Information Archiving
    Tom Mahoney, Senior Archiving Sales Specialist;Jason Colvin, Senior Systems Engineer Recorded: Mar 14 2019 30 mins
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users
    State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users
    Paul Down, Senior Director Proofpoint Security Awareness Training Recorded: Mar 13 2019 39 mins
    As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.

    Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.

    Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:

    - How to build a people centric security strategy

    - Steps organizations are taking to mitigate end-user risk from phishing

    - The most devastating types of phishing emails

    - The most vulnerable industries and departments
  • Live Demo: Security Awareness Training for Healthcare
    Live Demo: Security Awareness Training for Healthcare
    Ryan Witt, Healthcare Industry Practice Leader; Joshua Whisnant, Security Awareness for Healthcare Recorded: Mar 5 2019 36 mins
    The latest threat data for the Healthcare industry shows a significant shift away from attacks on infrastructure towards personalized attacks like phishing.

    What are the key components of a best-in-class solution for phishing simulation and training?

    Join this live demo to see Proofpoint Security Awareness Training in action, and learn how it addresses the most common attacks in today's Healthcare threat landscape.
  • Weekly Threat Byte | Super Mario and GandCrab
    Weekly Threat Byte | Super Mario and GandCrab
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Feb 27 2019 3 mins
    For this week's Interesting Threaty Byte, we bring you Super Mario and GandCrab. A new malware is making its way around the Internet and uses the popular Super Mario character from Nintendo to help spread itself. In this attack a spreadsheet contains a malicious macro that if enabled will download an image of Super Mario onto the victim’s computer. This image contains pixels that will kick off a PowerShell script that will install the ransomware GandCrab and potentially other malwares. Currently this malware only triggers when the victim’s computer is in the Italian region.

    It’s possible threat actors have chosen to only trigger the malware in Italy because they are testing how easily the infection will be received and spread. If the threat is met with success, the threat actors behind this malware may expand their net to ensnare more unwilling victims.

    Information about this webinar was taken from an article at BleepingComputer, located at:
    https://www.bleepingcomputer.com/news/security/mail-attachment-builds-ransomware-downloader-from-super-mario-image
  • Weekly Threat Byte | LCG Kit
    Weekly Threat Byte | LCG Kit
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Feb 13 2019 10 mins
    For this week's Interesting Threat Byte, we bring you the LCG Kit, a new builder for malicious Microsoft Office documents. What's so fascinating about this week’s threat is it allows budding threat actors to create malicious documents of their own using this kit. LCG Kit or Linear Congruential Generator was first discovered in March of 2018 and began by creating documents that exploited certain CVE's. LCG Kit has now evolved to use macros which are popular for threat actors to use to infect a person's computer.

    Once infected, the threat actor can further infect the victim's computer with common malwares such as; Loki Bot, FormBook, Agent Tesla, AZORult, Revcode RAT and Quasar RAT.

    This Interesting Threat comes to us from our Proofpoint Threat Insight blog; "LCG Kit: Sophisticated builder for Malicious Microsoft Office Documents", located at https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents
  • Weekly Threat Byte | SpeakUp Backdoor Trojan
    Weekly Threat Byte | SpeakUp Backdoor Trojan
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Feb 13 2019 11 mins
    For this week's Interesting Threat Byte, we bring you SpeakUp Backdoor Trojan. A new trojan is targeting Linux and macOS by exploiting a Common Vulnerability and Exposures (CVE-2018-20062). First discovered on January 14th 2019, it has been targeting servers running ThinkPHP primarily in East Asia and Latin America. According to experts approximately 70,000 servers world wide are at risk and have the potential of allowing threat actors unauthorized access into these servers.

    Once a foothold has been achieved, threat actors can exploit further CVE’s and move to other servers located within an organizations infrastructure. Currently threat actors have installed Monero cryptocurrency miners on servers and have made about $4500 dollars, but with access to multiple infrastructure servers, this is most likely only the beginning of the damage that can be caused by this vulnerability.
  • Weekly Threat Byte | Bombs & Bitcoin
    Weekly Threat Byte | Bombs & Bitcoin
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Feb 7 2019 6 mins
    For this week's Threat Byte, we bring you “Bombs & Bitcoin - Sextortion Evolution?”

    Recently, campaigns have been sent out claiming to have gained access to a victim’s computer and extort the user by claiming to have found pornographic images on the user’s computer as well as having images and video of the victim viewing the content. Unfortunately links in the sextortion emails tended to lead the victim to a ransomware that would lock up their computer, demanding cryptocurrency to unlock the computer.

    Having been successful with this approach, threat actors attempted to step up the threat by sending emails that bombs had been placed in buildings, hospitals, schools and places of employment. The threat declared if the police were called or evacuations were attempted, they would detonate the bombs. This tactic didn’t make the threat actors money, but did cause massive confusion and fear. Luckily there were no bombs found, but this latest threat demonstrates that the threat actors are always trying to come up with new and creative ways to separate us from our money.
  • Live Demo: Resolve Incidents with Less Effort
    Live Demo: Resolve Incidents with Less Effort
    Dante Giadone, Sr. Sales Engineer Recorded: Feb 7 2019 20 mins
    No defense can stop every attack. When something does get through, Proofpoint Threat Response Auto-Pull (TRAP) takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

    Join us for a live demo to get an actionable view of threats and learn how to enrich alerts and automate forensic collection and comparison.

    We’ll demo how you can:
    •Effectively identify which users are under attack
    •Reduce exposure time to malicious emails
    •Implement additional business logic to retract malicious emails

Embed in website or blog