Hi [[ session.user.profile.firstName ]]

Proofpoint Security Awareness Training

  • Date
  • Rating
  • Views
  • The Insider Threat: Real Defense for Real Business
    The Insider Threat: Real Defense for Real Business
    Sara Peters, Kurt Wescoe & Katie Burnell Recorded: Mar 27 2019 61 mins
    Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place?

    In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business. Attend this webinar and you’ll learn:

    What essentials must be in your end user awareness program and how to make those lessons stick
    Which tools and techniques can be used to enforce security policies when your users unintentionally or maliciously try to break them
    How you can spot the signs of an impending or ongoing insider data leak and respond
  • SecureWorld Behind the Scenes Interview: 2018 User Risk Report
    SecureWorld Behind the Scenes Interview: 2018 User Risk Report
    Gretel Egan & Kurt Wescoe Recorded: Mar 27 2019 28 mins
    Go behind the scenes of our 2018 User Risk Report.
  • SecureWorld 2018 User Risk Report Webinar
    SecureWorld 2018 User Risk Report Webinar
    Gretel Egan, Brand Communications Manager, Proofpoint Security Awareness Training Recorded: Mar 27 2019 102 mins
    We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening.

    We will discuss the 2018 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide, including:

    Knowledge of phishing and ransomware


    Password habits (including password reuse)


    Safe use of WiFi, location tracking, and social media


    The types of personal activities (shopping online, playing games, streaming media, etc.) that your organization's devices are being used for by employees and their families and friends
  • Cybersecurity Heroes Aren't Born... They're Made
    Cybersecurity Heroes Aren't Born... They're Made
    Amy Baker - VP of Marketing, Proofpoint Security Awareness Training Recorded: Mar 27 2019 122 mins
    Phishing continues to be one of the fastest growing and most malicious threats to the security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated technical safeguards through carefully planned, socially-engineered emails that are only getting more advanced.

    During this panel, we will discuss key findings from Proofpoint’s 2018 State of the Phish™ and 2018 Beyond the Phish® Reports. You will gain insight into current vulnerabilities, industry-specific phishing metrics, and emerging threats.
  • End User Cybersecurity Behaviors: The Importance of Training Beyond the Phish
    End User Cybersecurity Behaviors: The Importance of Training Beyond the Phish
    Amy Baker - VP of Marketing, Proofpoint Security Awareness Training Recorded: Mar 27 2019 107 mins
    Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering.

    During this session, we will share results from the Proofpoint Security Awareness Training 2018 Beyond the Phish® Report, which analyzes data from nearly 85 million responses to cybersecurity knowledge assessments and training challenges presented to global end users across multiple industries during 2017. We will discuss end users’ strengths and weaknesses across 12 cybersecurity topics — from identifying social engineering scams to protecting confidential information to working safely outside the office. We’ll also highlight variations in end-user knowledge levels across industries, giving you a benchmark against which to compare your organization’s readiness.

    Attendees will also see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks, and how using these tools together can give a more complete view of susceptibility. Finally, we’ll provide guidance about how to use this information to strengthen your end users and reduce the risk of successful cyberattacks within your organization.

    Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community.

    During this panel, we will discuss key findings from Proofpoint's 2018 State of the Phish and 2018 Beyond the Phish® Reports. You will gain insight into current vulnerabilities, industry-specific phishing metrics, and emerging threats.
  • SecureWorld: Behind the Scenes 2018 Beyond the Phish® Report
    SecureWorld: Behind the Scenes 2018 Beyond the Phish® Report
    Amy Baker and Kurt Wescoe Recorded: Mar 27 2019 26 mins
    Go behind the scenes of our 2018 Beyond the Phish Report

    Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering.
  • The People Factor: Fight Back Against Phishing Podcast
    The People Factor: Fight Back Against Phishing Podcast
    Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training Recorded: Mar 27 2019 18 mins
    How to Turn Your Top Vulnerability Into a Defensive Asset

    Phishing remains the top attack vector used by cybercriminals, and every end user is a potential target. But with the right security awareness training, these same people can be transformed into a key component in your anti-phishing defense. Kurt Wescoe, Chief Architect of Proofpoint Security Awareness Training, shares his insights and perspectives in this interview hosted by BankInfoSecurity.

    Listen to the interview to learn more about:

    Current phishing trends
    What’s wrong with traditional end-user training
    How Proofpoint takes a different approach to security awareness training
  • State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users
    State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users
    Paul Down, Senior Director Proofpoint Security Awareness Training Recorded: Mar 13 2019 39 mins
    As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.

    Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.

    Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:

    - How to build a people centric security strategy

    - Steps organizations are taking to mitigate end-user risk from phishing

    - The most devastating types of phishing emails

    - The most vulnerable industries and departments
  • Live Demo: Security Awareness Training for Healthcare
    Live Demo: Security Awareness Training for Healthcare
    Ryan Witt, Healthcare Industry Practice Leader; Joshua Whisnant, Security Awareness for Healthcare Recorded: Mar 5 2019 36 mins
    The latest threat data for the Healthcare industry shows a significant shift away from attacks on infrastructure towards personalized attacks like phishing.

    What are the key components of a best-in-class solution for phishing simulation and training?

    Join this live demo to see Proofpoint Security Awareness Training in action, and learn how it addresses the most common attacks in today's Healthcare threat landscape.

Embed in website or blog