Hi [[ session.user.profile.firstName ]]

Health IT

  • Ransomware 2020
    Ransomware 2020
    Erich Kron, Stephen Lawton Recorded: Dec 9 2019 36 mins
    As we approach a new decade on the calendar, we also are approaching new techniques and technologies being used by attackers and defenders alike.

    Understanding what’s possible by the attackers helps companies build better defenses, but is it possible to guess what approach will be used next?

    This 20/20 webcast looks at the current state of ransomware and other email-borne attacks and provides some insights on what you can and should be doing – and perhaps not doing – to prevent attacks.
  • MSP’s Top Cloud Security Concerns and How to Tackle Them (EMEA)
    MSP’s Top Cloud Security Concerns and How to Tackle Them (EMEA)
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Recorded: Dec 9 2019 27 mins
    ** This is an EMEA focused webinar **

    The role of the cloud in IT security can be confusing and frightening for many customers and clients.

    Learn five tips for implementing cloud-based security for your clients. Discuss how to balance an approach with customers with those tips and understand the important questions to consider with customers considering cloud security as an option.
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network
    Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network
    Roger Grimes, David Littman Recorded: Dec 9 2019 60 mins
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:

    - How detailed data is harvested using public databases and surprising techniques
    - Tricks used to craft a compelling social engineering attack that your users WILL click
    - Cunning ways hackers deliver malicious code to take control of an endpoint
    - Taking over your domain controller and subsequently your entire network

    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • The Exposure Epidemic: Why It's Time to Rethink Your PKI
    The Exposure Epidemic: Why It's Time to Rethink Your PKI
    Ted Shorter, Co-Founder & CTO, Keyfactor Recorded: Dec 6 2019 19 mins
    Explosive growth in connectivity between users, devices, and applications has driven enterprises to become more reliant than ever on public key infrastructure (PKI) to guarantee trust. No longer viewed as a niche tool, PKI has emerged as a core technology to secure leading initiatives like Cloud, DevOps and IoT, yet most enterprises are unprepared to adapt. We’ll discuss the new risks and challenges involved in PKI and why it’s time for a change.
  • Ransomware Hostage Rescue Manual
    Ransomware Hostage Rescue Manual
    Erich Kron, David Littman Recorded: Dec 6 2019 55 mins
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • Security Investigation: Restoring Calm from Chaos
    Security Investigation: Restoring Calm from Chaos
    Jae Lee Director, Product Marketing Splunk Inc. Recorded: Dec 5 2019 66 mins
    Security teams are underfunded, understaffed and overwhelmed by constantly putting out fires. They struggle to deal with threats and attacks, while having to answer hard questions from management. Everyone is demanding detailed, accurate answers about cyberthreats and risk and compliance – and they all need answers NOW.

    So, how useful is it to know that you’re not alone, since others are in the same boat? The answer is “not useful at all.” What IS useful, is knowing how to work smarter and get answers faster.

    Join us in this one-hour technical deep dive and demo to learn:
    - How to analyze events from three common data sources to look for malicious activity
    - How to get more efficient at discovery, triage and the investigation of potential security incidents
    - How to leverage automation methods to accelerate investigations and get answers faster

    This webinar will provide demo examples of how to ask questions of your machine data to get security insights. For example, we will explore whether login behavior looks suspicious the root cause of how an attacker entered your network. We’ll show how you can get to investigative findings quickly and make use of those answers just as quickly. This webinar aims to help security teams learn how to stay focused on solving security problems faster so they can get ahead of it all.
  • A Former CIA Threat Analyst Shares Security Practices You Should Be Implementing
    A Former CIA Threat Analyst Shares Security Practices You Should Be Implementing
    Rosa Smothers. Justin Ong, Juan Hernandez Recorded: Dec 5 2019 59 mins
    Having spent over a decade as part of the CIA’s Center for Cyber Intelligence and the Counterterrorism Mission Center, Rosa Smothers knows the ins and outs of leading cyber operations against terrorists and nation-state adversaries. She has seen first-hand how the bad guys operate, she knows the threat they pose, and she can tell you how to use that knowledge to harden your organization’s defense.

    In this exclusive webinar, we’ll find out why Rosa, now KnowBe4’s SVP of Cyber Operations, encourages organizations like yours to maintain a healthy sense of paranoia as she walks you through the murky underworld of threats and exploits that your organization can't afford to ignore. We’ll also be joined by an IT pro from the Spiceworks Community.

    Here’s what we’ll discuss:

    - Understanding physical security risks like tailgating and badge impersonation, and the tactics secure organizations use to prevent this
    - Surprising data collection techniques – both physical and cyber
    - The pros (and cons) of MFA and why your company needs to take password security seriously
    - How you can educate and prepare your end users to defend against them all
  • Optimize Salesforce by Removing Data Barriers Between IT and Campus
    Optimize Salesforce by Removing Data Barriers Between IT and Campus
    Jeff Jones, Director of Information Systems, Fresno Pacific University, Douglas Louie, Director of Product Marketing, Informa Recorded: Dec 5 2019 30 mins
    As the Director of Information Systems at Fresno Pacific University, Jeff Jones was charged with optimizing the student information system. Moving from the legacy student information system to Salesforce necessitated the integration of many different databases. Come and learn how Fresno Pacific University increased visibility into student data, reduced integration time from weeks to a matter of days, and no longer needed to search for niche software when future integration needs arose.
  • How Chapman and Cutler LLP Use Email Fraud Defense & DMARC to Stop Email Attacks
    How Chapman and Cutler LLP Use Email Fraud Defense & DMARC to Stop Email Attacks
    Tanner Luxner, Product Marketing Manager of Proofpoint & Martin Starr, IS Support Consultant of Chapman and Cutler LLP Recorded: Dec 5 2019 44 mins
    Email-based identity deception attacks are impacting organizations of all sizes and in all industries. In fact, business email compromise (BEC) alone has cost organizations more than $26.2 billion in losses worldwide. As the number one threat vector to businesses today, email must be authenticated to restore trust to business communications. So how can you better protect your people?

    Join us for a case study with Chapman and Cutler LLP to learn how they are using Proofpoint’s Email Fraud Defense (EFD) to help stop impostor email attacks in their tracks.

    In this session, we’ll share:

    - The benefits of deploying DMARC email authentication
    - The challenges associated with DMARC authentication
    - How Chapman and Cutler LLP have deployed DMARC authentication efficiently and safely with EFD
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Dec 5 2019 38 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Ask a Corning Scientist: 3D Cell Culture and Bioprocess
    Ask a Corning Scientist: 3D Cell Culture and Bioprocess
    Audrey Bergeron, Applications Scientist & Ann E. Rossi, Ph.D, Senior Bioprocess Applications Scientist, Corning Life Sciences Recorded: Dec 5 2019 31 mins
    Advanced cell culture techniques and scale-up offer exciting research opportunities; however, they also come with complex challenges and questions. Corning Life Sciences knows cells – you might even say it’s in our DNA with over 100 years of experience in the field.

    In this webinar, Corning scientists put their expertise in the areas of 3D cell culture and bioprocess to work as they answered submitted questions from the audience.

    Webinar highlights:
    •Our lab is new to working with spheroids. What are some options for spheroid formation? (2:02 - 4:10)
    •How do you perform media changes in the 96-well Corning spheroid microplate without losing spheroids? (4:11 - 5:49)
    •How do you dissociate single cells from a spheroid for analysis? (5:50 - 6:51)
    •How do you transfer spheroids? (6:54 - 7:30)
    •What is the surface area of the Corning® CellSTACK® 10-layer vessels? (7:56 - 10:02)
    •Is there an easier way to fill Corning CellSTACK 10-layer vessels? (10:03 - 11:33)
    •What is the maximum culture volume for the 5L expansion bag? (11:34 - 13:25)
    •What cell types can I culture in the 5L Erlenmeyer flask? (13:26 - 15:25)

    Live Q&A session with audience (16:10 - 29:30)
    •How do you prevent organoids from sticking to collection tubes?
    •How do I check the cell confluence in a HYPERFlask?
    •And many more questions
  • Special Joint Webinar on Three-dimensional Models and Retinal Organoids
    Special Joint Webinar on Three-dimensional Models and Retinal Organoids
    Franziska Wienholz and Philip Wagstaff Recorded: Dec 5 2019 50 mins
    Three-dimensional Models: Organoid Study and Co-culture for Oncology
    Three-dimensional (3D) cell culture environments provide structural and biochemical clues for cellular differentiation and functionality. For specialized cell types such as primary cells and stem cells, a two-dimensional (2D) growth substrate may not be sufficient to support complex cellular behaviors such as cell polarity, morphology, spheroid formation, signal transduction, and tissue-specific gene expression. This seminar will introduce the newest tools developed to help researchers: Corning® Matrigel® matrix for organoid culture and Corning Elplasia® plates for bulk production of spheroids. We will also present advanced case studies using spheroids and organoids.

    Presenter:
    Franziska Wienholz is a Scientific Support Specialist at Corning Life Sciences.

    Retinal Organoids: Developing Disease Models to Better Understand Glaucoma Pathogenesis
    Glaucoma refers to a group of complex genetic diseases that affect the retinal ganglion cells that relay visual input along the optic nerve to the visual cortex. In glaucoma, these cells are damaged and degenerate, resulting in permanent progressive visual field loss and ultimately, blindness. Retinal organoids are routinely used to model glaucoma in vitro; however, a drawback is the lengthy culture times to generate retinal ganglion cells, which can be 2 months or longer. This can be reduced by using a 3D Corning Matrigel matrix culture, which has been used to generate retinal ganglion cells in just 28 days. With advances in gene editing, retinal organoids can be used to model genetic mutations that lead to the development of glaucoma and provide clues to future therapies to halt the loss of vision.

    Presenter:
    Philip Wagstaff is currently a Ph.D. researcher studying the genetics of glaucoma at University of Amsterdam, Netherlands.
  • Levers of Human Deception
    Levers of Human Deception
    Erich Kron, David Littman Recorded: Dec 5 2019 52 mins
    No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

    Join Erich Kron, Security Awareness Advocate at KnowBe4 and David Littman from TruthInIT, as they provide fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, We'll look at how to ethically use the very same levers when educating our users.

    Key Takeaways:
    - The Perception Vs. Reality Dilemma
    - Understanding the OODA (Observe, Orient, Decide, Act) Loop
    - How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
    - How we can defend ourselves and our organizations
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Dec 5 2019 36 mins
    Engage your colleagues and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity training to the right people at the right time.

    Sign up to see this in-depth demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to email phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a strong last line of cyber defense
    - Enable your employees to report suspicious messages with a single mouse click

    This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you.

    -------------------------------------------------------------------------------------------------------------

    About Proofpoint.

    A next-generation cybersecurity company protecting people, data, and brands from advanced threats and compliance risks.

    We collect and analyze more than 100 billion data points a day from more than 100 million email boxes, 200 million social-media accounts, and 7 million mobile apps. 

    Proofpoint was named a leader by Gartner: Magic Quadrant for Security Awareness (https://www.proofpoint.com/us/resources/analyst-reports/gartner-magic-quadrant-security-awareness-training) Computer-Based Training, Joanna Huisman, 18 July 2019.
  • Application of Harm Reduction Principles in Australia
    Application of Harm Reduction Principles in Australia
    Mark Dougan, Director, Frost & Sullivan, Dr. Sud Agarwal, Professor Tikki Pangestu Recorded: Dec 5 2019 61 mins
    Harm reduction is a set of public health policies designed to lessen the social, economic, and physical consequences arising from various human behaviors, both legal and illegal. Along with demand reduction and supply reduction, harm reduction is an important harm minimization component in areas such as smoking and the use of illegal drugs, e.g., cannabis.

    In this Frost & Sullivan webinar, we will explore the application of harm minimization and more specific harm reduction measures in Australia. It will include how policies legalizing and regulating medicinal cannabis are impacting the consumption of non-regulated products, and the use of harm reduction approaches to minimize the effects of tobacco consumption.
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Dec 5 2019 37 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Top Security Trends in Europe
    Top Security Trends in Europe
    Javvad Malik, Jelle Wieringa Recorded: Dec 4 2019 21 mins
    Defending your organization against cyber threats is not a one-size-fits-all approach. Cultural differences, language barriers, regional policies and more can mean that what is happening (and working) in North America in the IT security space may not necessarily fit the bill in other parts of the world.

    In this discussion, Javvad Malik and Jelle Wieringa, European-based Security Awareness Advocates for KnowBe4, share their insights on current and future cybersecurity trends across Europe that your organization needs to know about.

    They discuss:

    - The far-reaching implications of GDPR
    - What SOCs need to be doing differently in Europe compared to their North American counterparts
    - The evolution of security awareness in Europe
    - Emerging threats and applications of deepfake technology
    - What the future may hold and how Europe is leading the world in privacy

    Join Javvad and Jelle as they tackle how you and your organization can better prepare and defend against these ever-changing threats.
  • More data, less work. It’s not a dream, it’s a complete data catalog
    More data, less work. It’s not a dream, it’s a complete data catalog
    Matthew Monahan, Senior Product Manager Recorded: Dec 4 2019 58 mins
    Time to insights. Time to deployment. Time to value. It seems that time is an important factor for many big data projects. The faster they can be completed, the faster the investment starts to pay off. However, today’s organizations face challenges with complex data sprawl, lack of control and security, and data quality issues. These challenges result in unreliable and stale data by the time it reaches a data analyst or data scientist.

    You need a solution that allows you to centrally manage and govern distributed data, ensure data quality and security, automate processes, and provide self-service access to quickly and effectively deliver trusted data to your end-users.

    In this first of 3 series, Matthew Monahan, Zaloni’s Senior Product Manager, will take you through cutting-edge data management techniques and show you how to leverage a single platform to manage the complete end-to-end data pipeline. Curious how Zaloni can save you time?

    Matthew will be discussing:
    - Connecting and cataloging distributed data
    - Harnessing the power of machine learning and AI to build an augmented data catalog
    - Leveraging autonomous data management for improved data quality
    - Applying right-sized data governance for security and control
    - Providing self-service provisioning for near-real-time access to data

    This webinar will provide you with the information you need to guide your users on their journey to an amazing self-service data experience.
  • The Power IN Protection and Resiliency
    The Power IN Protection and Resiliency
    Jamie Zajac, Senior Director of Product, Carbonite Recorded: Dec 4 2019 39 mins
    Webroot and Carbonite empower businesses to be fearless in the face of cybercrime and data loss. Learn how affordable cybersecurity solutions help SMBs survive and thrive. From antivirus protection to backup and recovery services, this session addresses the daily cyber threats facing SMBs and the best practices and technologies for defending against them.

    From antivirus protection to backup and recovery services, this session addresses the daily cyber threats facing SMBs and the best practices and technologies for defending against them. Learn how affordable cybersecurity solutions help SMBs survive and thrive.
  • AI-Powered Streaming Analytics for Real-Time Customer Experience
    AI-Powered Streaming Analytics for Real-Time Customer Experience
    Vishwa Belur, Director Product Management, Preetam Kumar, Product Marketing Manager Recorded: Dec 4 2019 50 mins
    What’s the best way for businesses to differentiate themselves today? By delivering a unique, real-time customer experience across all touch points—one that is based on a solid, connected business strategy driven by data and analytics insights.
    But interacting with customers in real time and in a relevant, meaningful way can be challenging for organizations with disparate sources of data, including at the edge, on-premises, and multi-cloud.
    To get maximum value and insight from customer data, you need a data management framework that can do three things:
    1) Sense - Capture event data and streaming data from sources such as social media, web logs, machine logs, and IoT sensors.
    2) Reason - Automatically process, correlate, and analyze this data to add context and meaningful insights.
    3) Act – Respond and take automated action in a reliable, timely, and consistent way.

    Join this webinar to learn how to:
    - Manage the entire end-to-end sense-reason-act process at any latency with an AI-powered streaming solution
    - Automate data management processes and guide user behavior for real-time streaming analytics with AI
    - Gain a clear understanding of how to use Spark Structured Streaming for data engineering using an intelligent data streaming solution that unifies streaming and batch data to deliver next best actions that improve customer experience
  • Third-Party Phishing: The Phishing Attacks That Traditional Defenses Don't Stop
    Third-Party Phishing: The Phishing Attacks That Traditional Defenses Don't Stop
    Erich Kron Recorded: Dec 3 2019 55 mins
    Because third-party phishing attacks look like legitimate emails from your vendors’ domains, traditional defenses often don't work against them or they are severely weakened. Your only defense is a strong human firewall. Find out how third-party phishing attacks operate, how you can spot them, and learn what defenses do and don't work against them.

    Join Erich Kron, Security Defense Evangelist at KnowBe4, to see:

    - Real-world examples of third-party phishing schemes
    - Hacking techniques that make these targeted attacks even more dangerous
    - How to protect your network against these aggressive schemes
    - What to teach your end users so they can identify a third-party attack
  • Investigate Security Incidents Like a Boss
    Investigate Security Incidents Like a Boss
    Jae Lee Director, Product Marketing Splunk Inc. Recorded: Dec 3 2019 53 mins
    For security teams, having the ability to investigate a security incident quickly and accurately is still the most fundamental skill needed to combat the majority of cyberthreats and attacks. The average organization is being attacked on a weekly basis, without the right processes and tools in place to pinpoint root cause without delay, and put the right countermeasures in place in time to minimize damage.

    Join us in this 1-hour webinar to learn:
    - Why investigating security and non-compliance incidents can be so difficult
    - Why machine data generated by your business is so important to security
    - How to get better at performing investigations -- regardless of the size or skill level of your security staff

    We will provide a methodology to help you align how you think about your organization’s security processes – the goal is to help you develop an investigative mindset that addresses a broad range of security and compliance concerns, in a pragmatic and targeted manner, specific to your own needs.
  • Lower Your Business Risk with Best Practice Data Privacy Impact Assessments
    Lower Your Business Risk with Best Practice Data Privacy Impact Assessments
    Lecio DePaula Jr. Recorded: Dec 3 2019 45 mins
    Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from Marriott’s acquisition of Starwood, not undergoing a full security and privacy assessment can present huge problems for your organization and now Marriott faces a $123.6 million dollar fine due to lack of due diligence.

    One way to reduce risks and identify security/privacy risk is to conduct a data protection impact assessment. Not only will this assessment help you reduce business risk, but it also helps identify new processes in your organization to maintain compliance with GDPR, LGPD, CCPA and other global privacy laws.

    Join Lecio DePaula Jr., KnowBe4’s Data Privacy Director, for this webinar to hear about creating a robust data protection impact assessment to analyze new processes, workflows, and products to identify problems before they happen.

    In this webinar you’ll learn:

    - Best practices for conducting a robust DPIA
    - The privacy and security risks of M&A, creating new software products, other initiatives
    - How conducting a DPIA aligns with global privacy requirements
    - Common DPIA mistakes and how to avoid them
    - Tools that help manage and streamline your DPIA process
  • The Science of Healthcare Congresses
    The Science of Healthcare Congresses
    Eva Thalmann, Janssen, Jean-Yves Douillard, ESMO, Katie Koziol and Andrew Moore, Ashfield Meetings & Events Recorded: Dec 3 2019 70 mins
    Research from Ashfield Meetings & Events clearly demonstrates that face-to-face meetings and events form a major part of continuing medical education (CME). National and international congresses have been identified as the primary event to attend by HCPs.

    But what makes congresses such a valuable education channel for time-restricted physicians? This pharmaphorum webinar, in association with Ashfield Meetings & Events, will dive into a unique study of HCP educational and behavioural preferences towards attendance at medical congresses.

    Ashfield Meetings & Events’ The Science of Healthcare Congresses study, involved over 200 HCPs, drawn from a range of therapy areas, from both Europe and the US to ask what really matters to them and share some intriguing insights.

    These encompassed how HCPs value this type of activity, how they apportion their time on-site and engage with the healthcare industry, and how they evaluate a congress once its doors have closed for another year.

    Join our expert panel on Tuesday 3rd December to find out more on:

    • Why physicians attend congresses
    • How to ensure medical education provides value to attendees
    • How pharma can enhance industry symposia

    In addition, our panel will also share the results of an ongoing association and multi-pharmaceutical company research project, designed to standardise and benchmark the evaluation process of all congress medical education activities.
  • Live Demo: Advanced People-Centric Cybersecurity
    Live Demo: Advanced People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Recorded: Dec 3 2019 41 mins
    More than 99% of all targeted cyber-attacks exploit human errors rather than system flaws. Nowadays, threat actors are no longer attack your tech infrastructure, they target your most valuable assets - your people.

    So what is best practice when implementing people-centric cyber defense strategy, and where do you start? What are your top priority first fixes?

    Join us for a live demo to learn how to:

    1. Protect your people from email-based attacks
    2. Gain visibility into who in your organization is getting the most attacks
    3. Solve for user awareness through threat simulation and training
    -------
    About Proofpoint
    -------
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service
    Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service
    Jennifer Cheng, Dir. of Product Marketing & Catherine Hwang, Dir. of Product Marketing at Proofpoint Dec 10 2019 6:00 pm UTC 44 mins
    More than 99% of all targeted cyber attacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance.



    It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?

    Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape.

    In this session, we'll share:

    - Why cybersecurity transformation is critical for the financial services sector
    - How to identify users who are most at-risk of cyberattacks or cause the most compliance risk
    - How to mitigate risk of adverse inferences and damaged reputations

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Mind Your Own Business Operations: Optimize Business Processes With Dynamic Proc
    Mind Your Own Business Operations: Optimize Business Processes With Dynamic Proc
    Murthy Mathiprakasam Director, Product Marketing Splunk Inc. Dec 10 2019 7:00 pm UTC 45 mins
    Your infrastructure and applications ultimately support mission critical business processes, such as customer experience and internal workflows. But bottlenecks and issues in these processes can lead to expensive delays, customer dissatisfaction and even regulatory risk. Just as Splunk has delivered insight into infrastructure and applications, Splunk Business Flow can now help you drive operational improvements by detecting customer fallout, process bottlenecks and inefficiencies.

    In this session, learn how Splunk’s innovations in process mining can empower you to get even more value from the platform.

    Join this webinar to learn:
    - What Process Mining is and how it can help you drive business transformation
    - Why getting visibility into digital business processes is critical.
    - How Splunk Business Flow can help you explore, visualize and generate insights to help you improve your business processes.
  • Driving Results With New ITSM Digital Service Experiences: Customer Stories
    Driving Results With New ITSM Digital Service Experiences: Customer Stories
    Pierre-André Aeschlimann - Solution / Sales Strategist & Evangelist, Cherwell Dec 11 2019 10:00 am UTC 30 mins
    Explore journeys from ITSM to Enterprise Service Management and beyond, with all its opportunities, challenges and requirements.

    Hear how Arriva, HomeAdvisor, Domino's and Atlantic Health have increased employee experience and productivity through innovative service management practices.
  • How Adobe Document Cloud can help you achieve a paperless office
    How Adobe Document Cloud can help you achieve a paperless office
    Steve Walker, Solutions Consultant, Adobe Dec 11 2019 11:00 am UTC 45 mins
    Join us in our virtual, animated studio for this video webinar to discover how Adobe Document Cloud can help you unlock the power of digital document workflows. You’ll learn how to do the following:

    • Obtain accountability and tracking capabilities for every document
    • Give your teams the power to deliver paperless experiences to customers on any device
    • Create forms in Adobe Acrobat and Microsoft Office
    • Automate the storage of documents in Microsoft SharePoint
    • Build intelligent document workflows using Adobe Sign and Microsoft Flow
    • Ensure better security, collaboration, and organisation within your company.

    There will be live Q&A session at the end of the webinar.
  • The Female Voice in Public Spaces
    The Female Voice in Public Spaces
    Gina Razon, Founder and CEO at Grow Voice Dec 11 2019 5:00 pm UTC 60 mins
    Tired of hearing how “shrill” women’s voices are or how women need to speak lower in order to be taken seriously? Me too.
    Time to discuss Female Vocal Authority and how to leverage what is dynamic and powerful in female voices. This interactive session will discuss how we got here , the neurological factors at work in any given room, and the skills you need for confident command in speaking that is intentional and clear.
  • 2020 Risk Trends and Predictions
    2020 Risk Trends and Predictions
    Laura Clark Fey, Bob Maley, Adam Montville, Sam Abadir - Moderator Dec 11 2019 5:00 pm UTC 60 mins
    From new privacy regulations, like CCPA, to hefty fines many organizations, like Equifax, received, 2019 has been the year of data security and privacy. How will this year’s major trends affect the future of risk?

    In this webinar, our panel of industry experts will recap 2019 and offer their predictions on what to expect in 2020 and beyond. Don't miss the chance to attend this exclusive webinar on risk trends and predictions.

    Register now!
  • 2020 Trends in Cybersecurity
    2020 Trends in Cybersecurity
    Kunal Anand, CTO, Imperva & David Gee, CMO, Imperva Dec 11 2019 6:00 pm UTC 60 mins
    Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
  • Teradici PCoIP Management Console 2019.11
    Teradici PCoIP Management Console 2019.11
    Edna Menon, Sr Product Manager & Paul Barrett Systems Specialist Dec 11 2019 6:00 pm UTC 45 mins
    Teradici PCoIP Management Console 2019.11 offers significant upgradeability, usability, and security enhancements!
    In this webinar, we’ll be showing you a demo covering some of the new features, including:
    •General availability of Redhat Package Manager (RPM) for blazing fast upgrades
    •Account lockout enhancements for improved security
    •Support for User Principal Name (UPN) for simplified login with Active Directory
    •Ability to enable OPUS audio codec and dual audio output in Zero Clients from Management Console

    Register Today!
  • Live Demo - Enterprise Information Archiving
    Live Demo - Enterprise Information Archiving
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist Dec 12 2019 10:00 am UTC 48 mins
    GDPR, Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    So what is best practice with respect to developing and implementing a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • The Art of Cyber Threat Hunting
    The Art of Cyber Threat Hunting
    24by7Security, Inc Dec 12 2019 5:00 pm UTC 60 mins
    One of the best ways to get out ahead of malicious actors is with cyberthreat hunting, the act of proactively and aggressively eliminating adversaries as early as possible. The quicker you can locate and track your adversaries’ tactics, techniques and procedures, the less impact attackers will have on your business. Hear from Michael Sci, Senior Solutions Engineer from eSentire talk in-depth about Managed detection and response (MDR) and how it provides organizations with threat hunting services and responds to threats once they are discovered.
  • Infoblox #3: Stop Attacks Faster - Using the MITRE ATT&CK Framework
    Infoblox #3: Stop Attacks Faster - Using the MITRE ATT&CK Framework
    Mike Zuckerman, Consulting Product Maketing Manager, Infoblox; Brandon Dunlap, Moderator Dec 12 2019 6:00 pm UTC 60 mins
    The MITRE ATT&CK Framework is a comprehensive, up-to-date knowledge base of cyberattacker tactics and techniques gathered from actual observation of attacker behavior. The framework can help anticipate what an attacker will do and how to respond. Join Infoblox and (ISC)2 on December 12, 2019 at 1:00PM Eastern for an examination of how the MITRE ATT&CK can help you make better, faster decisions about assessing risks, deploying new security controls and stopping attacks faster and more efficiently.
  • Live Demo: Security Training for Healthcare
    Live Demo: Security Training for Healthcare
    Ryan Witt, Healthcare Industry Practice Leader & Matt Nesser, Account Executive of Proofpoint Dec 12 2019 6:00 pm UTC 45 mins
    The 2019 HIMSS Cybersecurity indicated that email is the initial point of compromises for healthcare cyber-attacks – phishing, hacking, BEC – or negligent activity from hospital staff…someone inadvertently clicking on a link or downloading a file. Clearly people are under attack, yet they are also a health system’s first line of defense. So how do you best protect your people and prepare for them for continuous stream of cyber-attacks?

    Join this live demo to see Proofpoint Security Awareness Training in action, and how it safeguards against advance threats and compliance risks.

    You’ll learn:

    - The most common attacks in today's healthcare threat landscape
    - Best practices to improve your security posture
    - A people-centric approach to helping you protect patient data
  • 2019 Threat Landscape Roundup (EMEA)
    2019 Threat Landscape Roundup (EMEA)
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Dec 16 2019 3:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    SMBs are major targets for cybercriminals. To stay safe, today’s businesses must understand the types of cyberattacks they may encounter and how to implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced during 2019, see what's upcoming in 2020, and get tips to help you to keep your business and clients safe.

    A Webroot threat expert will be discussing information theft, information stealers, BEC scams, ransomware, targeted attacks, and all the cybercrime headlines of 2019.
  • 5 Ways to Protect Your Business from Phishing
    5 Ways to Protect Your Business from Phishing
    George Anderson, Product Marketing Director Dec 17 2019 6:00 pm UTC 52 mins
    According to the latest Verizon Data Breach Investigations Report, human error was directly involved in 65%* of successful breaches in the last year, proving cybersecurity isn’t just a technology issue.
    People are the first line of defense against cyber threats, so educating them should be a major priority at your organization.

    Join our upcoming webinar to learn the risks associated with user error, 5 simple ways you can protect your business from phishing, and how security education can boost your bottom line.
  • Bridging the Technology & People Divide with Security Awareness Training
    Bridging the Technology & People Divide with Security Awareness Training
    Mark Guntrip, Group Product Marketing Director & Mike Bailey, Sr. Product Marketing Manager Dec 18 2019 6:00 pm UTC 60 mins
    The threat landscape is constantly changing and the attacks targeting your people are getting more sophisticated. Threat actors are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even the most savvy users. So how can you better protect yourself, your organization, and your end users?

    Join us as we walk you through how we're taking Proofpoint's expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you'll get a better understanding of:

    - How we identify and stop malicious inbound threats
    - How to better identify end-user risk with our simulated attacks
    - How we're helping customers stop real attacks in their tracks with our Closed-Loop Email Analysis and Response (CLEAR) solution
  • Mitigating Cyber Threats in Banking with Next-Generation Platforms
    Mitigating Cyber Threats in Banking with Next-Generation Platforms
    Courtney Wright, Neil Katkov and Duncan Ash Dec 18 2019 7:00 pm UTC 58 mins
    Our digitized world is creating more data than the world has ever seen. In fact, a recent Splunk survey found that 60% of global organizations said the majority of their data was dark, meaning the data is unowned, not captured or analyzed.

    This is where the challenge for cybersecurity comes in. The more data that stays dark, the more opportunities hackers have to hide in the shadows and exploit what we can't see.

    But hidden in this sea of data is a silver lining. With the right platform, data doesn't have to remain dark. By gaining insights from data, financial services institutions can stay ahead of threat actors by investigating, monitoring, analyzing and acting upon their data. Now’s the opportunity for the financial services industry to shift the narrative around security, thereby making it everyone’s responsibility, in order to transform the industry for the better.

    Join our On-Demand webinar for a thought-provoking discussion with Neil Katkov, PhD, Celent and Duncan Ash, Global Financial Services Lead, Splunk to explore the latest whitepaper "Mitigating Cyber Threats in Banking with Next-Generation Platforms."

    - Learn about the leading cyber threats impacting banks today
    - Understand the challenges to effective cybersecurity
    - Explore next-generation platforms as a path forward for banks
  • Security Awareness Training from ProofPoint - Live Demo
    Security Awareness Training from ProofPoint - Live Demo
    Sean Walker, Enterprise Account Executive Dec 19 2019 10:00 am UTC 36 mins
    See this demonstration of how you can engage your colleagues and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity training to the right people at the right time.

    Register to see this demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to email phishing attacks and their knowledge of cybersecurity beyond the phish
    - Deliver customized online training to your end users to drive behavior change and make them a strong last line of cyber defense
    - Enable your employees to report suspicious messages with a single mouse click

    This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you.
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Dec 19 2019 5:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • A People-Centric Approach to Managing Insider Threats: Introducing ObserveIT
    A People-Centric Approach to Managing Insider Threats: Introducing ObserveIT
    Mayank Choudhary, SVP of ObserveIT | Proofpoint Dec 19 2019 6:00 pm UTC 60 mins
    Insider Threats are quickly becoming one of the greatest cyber security threats that organizations face today. They are responsible for three million records are stolen every day and at the heart of 57% of all database breaches last year (Verizon 2019). Research also shows that the average time to spot and contain an insider threat is a massive 77 days -- just 13% of incidents are caught within 30 days (Ponemon 2020).

    The reason they are so prolific and take so long to deal with is because anyone with legitimate, trusted access to an organization’s systems and data – whether full-time employee, part-time contractor or strategic business partner – can be an Insider Threat.

    Managing insider threats fundamentally requires a people-centric approach. With the acquisition of ObserveIT, Proofpoint adds a powerful Insider Threat Management platform to our portfolio of People Centric cybersecurity solutions. The ObserveIT platform delivers unique capability to monitor both user and file activity, enabling security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach.

    Join ObserveIT | Proofpoint SVP Mayank Choudhary, in this webinar to:

    · Learn how the key components of full visibility – user activity, data activity, and behavior analytics – provide the necessary context to understanding Insider Threats

    · Discover how an organization’s risk of an Insider Threat can be reduced through always-on monitoring, without compromising user privacy and compliance; with real-life case studies to illustrate

    · See a demo explaining of how out-of-policy user activity is detected and investigated on-the-spot

    · Learn about the different types of Insider Threats and find out what steps you can take to build your own Insider Threat Management program
  • All Together Now – Using Security Orchestration for Better Incident Response
    All Together Now – Using Security Orchestration for Better Incident Response
    Nick Tausek, Security Research Engineer, Swimlane; Nate Zahedi; Lucie Hayward; Brandon Dunlap, Moderator Dec 19 2019 6:00 pm UTC 60 mins
    Most security departments suffer from the same issue – too many security alarms and not enough personnel to deal with them. Security Orchestration, Automation and Response (SOAR) can help by integrating your disparate tools and using modular workflows and playbooks to make incident response more effective by replacing the manual process. In many cases, the faster you respond and mitigate, the better your security posture. Join Swimlane and (ISC)2 on December 19, 2019 at 1:00PM Eastern for a discussion on SOAR and automated incident response and how this proactive approach can improve your security.
  • Creating a Trusted Kubernetes Environment with Keyfactor
    Creating a Trusted Kubernetes Environment with Keyfactor
    Keyfactor's VP Solutions Engineer, Anthony Ricci Dec 19 2019 7:00 pm UTC 45 mins
    With widespread adoption of DevOps practices, Kubernetes has become the default tool for developers to scale and automate orchestration of their containers. But most Kubernetes operators are naturally not security experts, particularly when it comes to the use of digital certificates.

    Unbeknownst to users, digital certificates are used throughout the Kubernetes system to securely authenticate various components. Understanding exactly how these certificates, keys, and certificate authorities (CAs) are used, and more importantly, how they all fit together, can be a real challenge.

    Join Anthony Ricci, Director of Solutions Engineering at Keyfactor, as he walks through:

    - Where and how certificates are used in Kubernetes
    - How Keyfactor can secure your Kubernetes clusters
    - A live demo of Kubernetes & Keyfactor
  • Security Awareness Training from Proofpoint
    Security Awareness Training from Proofpoint
    Sean Walker, Enterprise Account Executive Jan 7 2020 10:00 am UTC 37 mins
    Effective security awareness training ensures your work colleagues become a strong last line of defense against cyber attacks. Best practice in cyber security training is to engage colleagues and keep security top-of-mind, by offering continuously updated, interactive cyber security training modules; to arm all employees, contractors and visitors against real-world cyber attacks using personalised training based on industry-leading threat intelligence; and to replace one-size-fits-all content and adopt a new approach that allows you to target the right training to the right people at the right time.

    In this 30 minute demo, you'll learn how to: 
    4) Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    5)  Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    6) Enable your employees to report suspicious messages with a single mouse click

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Email Fraud Defense
    Email Fraud Defense
    Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint Jan 14 2020 10:00 am UTC 39 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. best practice Email Fraud Defense requires a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Discover how to:

    • Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
    • Monitor all inbound impostor threats from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Evolving Your Ethics and Compliance Program to Account for Risk
    Evolving Your Ethics and Compliance Program to Account for Risk
    Sam Abadir, Lockpath Jan 16 2020 5:00 pm UTC 60 mins
    Ethics and Compliance leaders have laid the foundation for how companies operate, what their values are, and how they achieve their goals while keeping those values. E&C leaders are now challenged to show how these foundations can demonstrate measurable compliance, as well as manage and measure risk across the organization. This applies to not only tactical activities but to strategic goals and the bottom line.

    In this exclusive NAVEX Global customer webinar, Lockpath’s Sam Abadir will discuss how you can leverage your organization’s existing operational and regulatory controls framework to account for and better manage risk within your policy platform. As an attendee, you will learn:

    • Manage and measure compliance risk
    • Manage regulatory change
    • Leverage your controls to manage various types of risk across the organization
    • Expand (and maybe even merge) your best practices into other risk management domains such as IT Risk and third-party risk management
    • Leverage your work to improve the audit and quality process

    Learn how to evolve your ethics and compliance program to incorporate and manage multiple types of risk across your organization. Register for this educational webinar today!
  • Enterprise Information Archiving
    Enterprise Information Archiving
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist Jan 21 2020 10:00 am UTC 48 mins
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what is the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data