Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Responding to Cross Vector Attacks Responding to Cross Vector Attacks Proofpoint Recorded: Sep 21 2016 59 mins
    Open environments are great for innovation and higher learning.
    They’re also ideal for cross vector cyber attacks.

    One of the greatest challenges that security teams of higher learning institutions face is the growing number of sophisticated attackers leveraging multiple threat vectors to target faculty and students. There is no question that open network environments drive innovation but this equally makes it possible for cyber attacks to wreak havoc on day-to-day operations.

    In part 2 of our three-part webinar series, gain insight into cross-vector attacks and why they’re so challenging for universities to monitor. Learn how to arm yourself with ways to best respond when cross-vector attacks threaten your environment and users

    Complimentary On-Site Threat Assessment for All Attendees
  • Pokemon Go Malware and Zero Day iOS Attacks: Mobile Threat Defense Pokemon Go Malware and Zero Day iOS Attacks: Mobile Threat Defense David Jevans, VP Mobile Security Recorded: Sep 15 2016 49 mins
    Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.
  • Security for the Higher Education Threat Landscape Security for the Higher Education Threat Landscape Proofpoint Recorded: Sep 14 2016 63 mins
    A whole new batch of threats are descending on your campus, and we’re not talking about the freshmen.
    Universities face a cyber threat landscape that is unlike anything most companies endure. Beyond the burdens that staff and administrators put on the network, every year incoming students present a brand new set of challenges that push network security to its breaking point.

    Join us for part one of a three-part webinar series and explore how higher learning organizations gauge and mitigate the risk of intrusion by cyber threats. Learn what makes the higher education landscape so unique and how you can best protect against the threats that target your network through email, social media and mobile.
  • Proofpoint Canada Interactive Tech Talk: Incident Response Proofpoint Canada Interactive Tech Talk: Incident Response Proofpoint Recorded: Sep 6 2016 56 mins
    This is the first installment of the Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers. This session will focus on incident response.

    Far too often security teams spend their time manually researching a detected security threat using a variety of disconnected tools. Proofpoint Threat Response provides a single pane of glass designed from the ground up for the incident response process. By bringing all the relevant threat information together in one place and helping analysts identify important relationships Threat Response streamlines the workflow required to rapidly respond after threat detection.

    Please join us along with fellow Proofpoint customers for a session to discuss our threat response components including:

    •Dashboard – see all your critical threats, open incidents and more all at a glance
    •Incident Scoring – scores are automatically adjusted as new details are discovered
    •Incident Workflow – assign incidents to analysts and collaborate in an incident
    •Incident Details – view all the collected data about an incident in one place
    •List Management – add and remove identities and hosts to/from quarantine and containment lists
    •Event Sources – view threat detection systems that will be generating alerts
    •Device Updates – view devices and update schedules for your existing infrastructure
    •Reporting – view real-time trends about malware, infected users, CNC IPs and much more
  • How Banking Trojans Work and How to Stop Them How Banking Trojans Work and How to Stop Them Samantha MacLeod, ME Bank and John Baird, Deutsche Bank Recorded: Sep 1 2016 42 mins
    Because they are so lucrative, Banking Trojans have emerged as a favorite of attackers who have turned cybercrime into a big-money endeavor. From Dridex to Ursnif, Banking Trojans have been targeting Australian organizations with frightening effectiveness – lurking on victims' computers until they can grab banking details and login credentials which are then used to commit online fraud.

    When business accounts are involved, the potential losses can surge into the millions. Do you know how to detect and stop them before they hit your balance sheet?

    Please join CSO Australia and Proofpoint for an interactive webinar that will feature Samantha MacLeod, General Manager of Cyber Security from ME Bank and John Baird, Director, Global Technology Production at Deutsche Bank to discover:
    •A business perspective on Banking Trojans and how you can increase awareness
    •How to stop Banking Trojans before they hit your business
    •And other steps you can take
  • Ransomware Survival Guide Ransomware Survival Guide Jennifer Cheng Director, Product Marketing, Proofpoint Recorded: Aug 30 2016 61 mins
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.
  • How to Defend Against Email Fraud - in partnership with CSO How to Defend Against Email Fraud - in partnership with CSO Scott Brown, CERT Australia & Mark Guntrip, Email Protection, Proofpoint Recorded: Aug 25 2016 55 mins
    Online criminals used to favor scattershot campaigns that relied on emailing hundreds of people in the hopes of tricking even a few of them into clicking on malicious attachments. These days, however, businesses face a new threat as ever more-calculating attackers conduct extensive research to craft carefully worded emails designed to emulate the CEO, CFO or other key executive.

    These emails, known as email fraud or business email compromise (BEC), are fast exploiting perceptual weak spots by adopting executives' identities in emails pressuring employees into sending sensitive files or wiring large sums of money to a bank account.

    Recent FBI figures suggest the attacks are costing victims an average of $US130,000 per incident and cost more than $US2.3 billion worldwide. Furthermore, it is difficult if not impossible to get the money back.

    Please join the Australian Federal Police, CERT Australia and Proofpoint for a webinar to discuss the emerging threat and strategies for defending against it. Over the course of the session, you will learn:

    · How cybercriminals craft Email Fraud messages and where they get their information
    · How to help executives hide the information that cybercriminals may be using to shape Email Fraud
    · Why your current email filtering solution may struggle to keep up, and what technologies can help in the fight against Email Fraud campaigns
    · What kind of business controls can be put in place to protect against Email Fraud manipulations
  • Archiving, Compliance, & eDiscovery Demo Archiving, Compliance, & eDiscovery Demo Proofpoint Recorded: Aug 5 2016 53 mins
    Get up to speed on the compliance risks enterprises will face in 2016 for archiving and eDiscovery with our live demonstration. See for yourself the technology that positioned Proofpoint as a leader in Gartner's 2015 Magic Quadrant for Enterprise Information Archiving.

    Take a deep dive into archiving for Proofpoint's solution for archive and compliance including:

    Powerful policy management capabilities to ensure that information is managed in accordance with internal and regulatory-driven requirements.
    Efficient eDiscovery response with a fully automated system for real-time search, legal hold management and legal team collaboration.
    Strategies that were effective in building internal support for control of archived content.
  • Information Protection, DLP, Encryption Demo Information Protection, DLP, Encryption Demo Proofpoint Recorded: Jul 28 2016 54 mins
    No security posture is 100% effective against attackers. That is why IT teams must proactively identify and protect sensitive and regulated data whether “at rest” in file stores or “in motion” as it is sent or received.

    Proofpoint Information Protection is the only cloud-based suite of solutions designed from the ground up to provide visibility and control of sensitive data across cloud-based email such as Microsoft Office 365, on-premises email, file shares, storage area networks (SAN), network attached storage (NAS), and SharePoint — all with out-of-the-box policies that provide insight to your attack surface in just 24 hours.

    - Proofpoint Data Discover: Quickly discover exposed sensitive and confidential information in shared drives, NAS, SAN and SharePoint sites
    - Proofpoint Email DLP: Prevent accidental negligence by employees with greater accuracy and control
    - Proofpoint Email Encryption: Communicate securely with policy-based encryption of messages and attachments
  • Protect Your Office 365 Email from Three Key Threats Protect Your Office 365 Email from Three Key Threats Catherine Hwang, Proofpoint Product Marketing Recorded: Jul 8 2016 63 mins
    Find the Email Threats Lurking in Your Office 365 Environment

    As you look to migrate your email infrastructure to Office 365, you might be wondering what the right approach and technology is to stop exploding threats such as business email compromise and ransomware.

    Join Catherine Hwang, Proofpoint Product Marketing, in a live Redmond webinar to hear about key requirements for catching email spoofs, emerging and zero day threats, and even commodity threats. Considerations for threat visibility and response requirements will also be explored.

    See attacks for what they really are.
    Whether broad or targeted, Proofpoint safeguards your Office 365 users with superior efficacy against BEC, ransomware and other email attacks.

Embed in website or blog