Hi [[ session.user.profile.firstName ]]

Health IT

  • Ensuring that Your Users are the Solid Line of Defense Against Cyber Threats
    Ensuring that Your Users are the Solid Line of Defense Against Cyber Threats
    Mark Guntrip, Group Product Marketing Director of Proofpoint & Michael Osterman, President of Osterman Research Inc. Recorded: Feb 27 2020 60 mins
    Today’s most popular security tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities. But cybercriminals are no longer targeting infrastructure - they are targeting humans. It's the distracted user who clicks on an email attachment, or the eager customer who fills in credentials in a pixel-perfect phishing page who is vulnerable. It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?

    Join Proofpoint for a joint presentation with Osterman Research as we deep dive into some of the biggest challenges CISOs face, and why developing a people-centric strategy to security is the most effective way to protect your most valuable assets: your data and your people.

    In this session, we'll share:

    - Latest research findings on new methods for solving security attacks such as phishing and business email compromise
    - Why cybersecurity transformation is critical for protecting your people against today's threat actors
    - What it means and looks like to have an effective people-centric approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Feb 27 2020 37 mins
    2019 Results: 99% of the phishing attacks require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. So it will be a user who will unwittingly trigger a cyber attack by clicking on an email or downloading a fake attachment.

    Your users, staff, contractors and management should be empowered to be your organisation's last line of defense. Backed by threat intelligence, Proofpoint’s industry-leading Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join Proofpoint's Security Awareness training demonstartion to:
    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats from emails and downloads
    - Deliver tailored, just-in-time training to your users to educate and ensure new behaviors, building that vital last line of defense
    - Empower your employees to report suspicious messages with a single mouse click

    ====================================================================

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Security Awareness Training – Your best line of defence
    Security Awareness Training – Your best line of defence
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ Recorded: Feb 27 2020 40 mins
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain
    Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain
    James McQuiggan Recorded: Feb 26 2020 59 mins
    Your customer data, intellectual property, and financials are the lifeblood of your organization. If lost or leaked, there could be significant implications to the viability of your business. Maintaining control of that data, especially with third-party services, can be extremely challenging and requires that you ask the right questions and enforce stringent security policies.

    In an environment of increased outsourcing, cloud computing adoption, and regulatory requirements, how do you manage vendor risk and ensure you have a consistent evaluation life cycle

    Join James McQuiggan, KnowBe4's Security Awareness Advocate, to get actionable steps you can use now to better manage your third-party vendor risk. You'll learn:

    The importance of securing your organization's critical data
    How to determine Supplier Security Proficiency
    Why it’s important to understand the source of third-party products
    The impact Vendor Questionnaires have on your Security Posture
    How leveraging a GRC platform can ease the burden of risk assessments and audits
  • Seizing Your Data’s Unrealized Power: Talk with Zaloni’s CEO
    Seizing Your Data’s Unrealized Power: Talk with Zaloni’s CEO
    Susan Cook, CEO at Zaloni & Ben Sharma, CPO at Zaloni Recorded: Feb 26 2020 38 mins
    End-to-End, governed data operations is key to 2020 data success, speak with Susan Cook and Ben Sharma on why

    The multiplying of offerings in the data ecosystem, the move to cloud, and the increase in data sources available to enterprises, has led to new series of challenges for CIOs and CDOs - namely, how to accelerate the time to analytics value while maintaining the control needed to ensure data compliance, security, and quality.

    To succeed against the growing potential of data to increase performance, companies need true insight across the entire data journey, a view too often obscured by an uncoordinated array of data-related vendors.

    In this first of a new series, Susan Cook and Ben Sharma sit down to discuss the role data operations plays as the “air traffic control” of the data supply chain.

    Join them as they talk about:
    - The value of having control across the “day in the life of your data”
    - How to achieve greater control while broadening permissioned data access
    - Why Zaloni’s emphasis on extensibility + governance is key to analytics success
  • Four Steps to Transform Your IT Monitoring Strategy
    Four Steps to Transform Your IT Monitoring Strategy
    Andi Mann Chief Technology Advocate, Splunk Inc. and Pankaj Prasad Sr Principal Analyst, Gartner Recorded: Feb 26 2020 75 mins
    IT Ops teams are now critical to an organization’s success and require a strategy that aligns with the organization’s objectives and its external stakeholders. Most infrastructure monitoring solutions haven’t caught up to meet these new requirements, forcing IT teams to resort to traditional monitoring strategies that don’t allow for innovation and growth.

    Join Gartner analyst Pankaj Prasad and Splunk’s Chief Technology Advocate, Andi Mann, as we discuss new trends in IT monitoring strategy, best practices, and new IT models to implement in your organization.

    Here’s what you’ll learn:

    - How to effectively approach your IT monitoring strategy in this new world of IT
    - Build a successful IT infrastructure operating model to get to market faster, - innovate, and respond in real-time
    - Best practices for integrating LOB owners, application developers and external stakeholders into your strategy
  • Work Process Integration, a critical component of digital transformation.
    Work Process Integration, a critical component of digital transformation.
    Pierre-Andre Aeschlimann Recorded: Feb 26 2020 41 mins
    When employees and/or customers can share actions, events, data, and communications across processes, departments, and applications, your business will be able to fully capitalize on transformative technology. This webinar will help you understand how an end-to-end platform approach can:
    • avoid having information workers spending 46% of their time on manual processes
    • measurably increase user productivity, collaboration and satisfaction
  • Innovation at Cell Press: How can librarians make the most of resources
    Innovation at Cell Press: How can librarians make the most of resources
    Dr. Deborah Sweet, Vice President of Publishing, Cell Press Recorded: Feb 25 2020 58 mins
    Learn all about innovation, growth in the multi-disciplinary content and the expanding open access publishing strategy at Cell Press with Dr. Deborah Sweet, Senior Vice President of Publishing at Cell Press.

    You can expect to learn more about the community outreach programs at Cell Press like webinars, symposia, Cell Mentor, Sneak Peek, STAR Methods, STAR Protocols and much more which can help your researchers as well as institutes to grow faster and deliver a higher impact in the world.

    We promise to make the webinar engaging and to answer all your questions around Cell Press. At Cell Press, everything we do aims to drive research forward — whether it's working with authors, enhancing the peer review process, or developing innovations in publishing. We put science first, science that people talk about.

    Join Dr. Sweet in this engaging webinar and make sure to bring along your colleague and friends who may benefit from these helpful resources.
  • What Zero Trust Networking means for Network Visibility
    What Zero Trust Networking means for Network Visibility
    Ollie Sheridan, Principal Engineer, EMEA, Gigamon, Brandon Dunlap, Moderator, (ISC)² Recorded: Feb 25 2020 60 mins
    There is much talk in the Industry with regards to Zero Trust Networking (ZTN) - but what does it involve and what does this mean for Network Visibility? In this Webinar we will explore the reason for ZTN, some of the current ideas surrounding the implementations of ZTN and where Network Visibility plays a key role in securing such environments. With one of the key concepts of ZTN being the encryption and authentication of data in motion, we will also discuss the need for Metadata and why this can be an advantage over traditional methods of monitoring.

    Join us for this webinar to learn more about how you can:

    - Understand the ZTN trust model at a high level

    - See which components are important within ZTN and why

    - Understand why the perimeter is changing and why the need for segmentation goes beyond physical devices

    - How Metadata can play a key role in understanding the activity of applications on your network
  • Data at Work - Skills, Part 1
    Data at Work - Skills, Part 1
    Graeme McDermott, Caroline Carruthers and Mark Stubbs Recorded: Feb 25 2020 24 mins
    Data at Work - Skills, Part 1: Siloed Pockets of Data Expertise. Unearthing Them, Unpacking Them, and Unleashing Their Potential

    In part 1 of our Podcast focusing on Data Skills, our panel of experts ask the question: How the isolated packets of data and data know-how buried across the typical organization - the dreaded data siloes - can be formalized, structured, and transformed to drive wider data strategies and value. And why people, culture, ecosystem, and 'Data Cheerleaders' are crucial to the process. Once you have listened to this podcast, please listen to the extended discussion in part 2.

    Watch also the introduction webinar to learn more about the series: https://www.brighttalk.com/webcast/15913/382721
  • How Adobe Sign plays a role in your workplace
    How Adobe Sign plays a role in your workplace
    Steve Walker, Solutions Consultant, Adobe Recorded: Feb 25 2020 39 mins
    Join us in our virtual, animated studio for this video webinar to learn how countless businesses around the world use Adobe Sign to accelerate their business processes and eliminate the paper trail and waste previously involved.

    Register for this webinar to discover:
    • The immediate value of implementing electronic signatures with Adobe Sign
    • How easy it is to add signature fields to documents and send
    • How to embed a form for signature directly within your company’s website
    • How to save time by creating powerful workflows for regularly used processes
    • How you can deploy simply and easily for immediate results.

    There will be live Q&A session at the end of the webinar.
  • State of the Phish 2020
    State of the Phish 2020
    Paul Down, Director, Proofpoint EMEA Recorded: Feb 25 2020 30 mins
    PLEASE NOTE AUDIO STARTS AT 2m30s - APOLOGIES BUT THIS IS A LIVE WEBINAR RECORDING.
    ==================================================================================
    Do you have a good sense of how well your users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks?

    Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including:

    - End-user awareness and knowledge gaps that could be hurting your cybersecurity defences
    - Impacts of phishing attacks and the ways infosec pros are trying to combat these threats
    - How Proofpoint customers are approaching phishing awareness training, and the ways we’re helping them measure success
    - Download our report to learn how organizations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence.

    Join us for an in-depth look at user awareness, vulnerability and resilience.

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim
    Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim
    Roger Grimes, David Littman Recorded: Feb 24 2020 58 mins
    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

    Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and TruthInIT's David Littman as they dive into:

    Why data backups (even offline backups) won’t save you
    Evolved threats from data-theft, credential leaks, and corporate impersonation
    Why ransomware isn’t your real problem
    How your end users can become your best, last line of
    defense
  • Prevent Phishing Attacks with Proofpoint's Security Awareness Training
    Prevent Phishing Attacks with Proofpoint's Security Awareness Training
    Andrew Brown, Account Executive at Proofpoint Recorded: Feb 21 2020 24 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats

    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense

    - Enable your employees to report suspicious messages with a single mouse click
  • SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations
    SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations
    SANS expert Jake Williams and Authentic8’s Head of Special Services, Nick Espinoza Recorded: Feb 20 2020 7 mins
    Renowned SANS expert Jake Williams and Authentic8's Head of Special Services, Nick Espinoza, discuss today's use of OSINT for Cyber Threat Intelligence (CTI).

    Get answers to the following questions:

    - Does Counterintelligence (CI) depend on an organization's maturity level?
    - Can an organization be too small to have a CTI program?
    - Why is a framework for CI so challenging to build?
    - How is managed attribution like CI on steroids?
    - Is it more relevant to prioritize spending on CTI tools or processes?

    You'll also receive instructions on how to participate in the CTI 2020 Survey. Watch the talk and join in the discussion on the magnitude of OSINT in CTI.
  • Crime and Email: Real-Life Stories from the Trenches w/ the U.S. Secret Service
    Crime and Email: Real-Life Stories from the Trenches w/ the U.S. Secret Service
    Stephen Doughtery, U.S. Secret Service, Ryan Terry, Proofpoint, Christopher Pierson, BlackCloak Recorded: Feb 20 2020 124 mins
    Email—you either love it or hate it. Cybercriminals love it. We all know that email is the attack vector of choice for hackers. Why? Bottom line, it works. And they really capitalize on it. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC/CEO fraud attacks, W-2 scams, ransomware… the list goes on and on.

    Email fraud is an expensive cybercrime for its victims. All it takes is one mistake, one erroneous mouse click of an email to let an attacker in. That is how it starts. Then attackers move around your email or network and learn more about your employees and company than you do. Eventually they strike—when the time is right. Do they get away with the cash? Or did you arm your employees with the tools and training they need to recognize email fraud and ransomware and stop a possible BEC attack?

    On this web conference, our three experts will share real-world examples of these heinous crimes: what went down, how they got caught, what they got away with, and lessons learned.

    Tune in and get an understanding of how these attacks work and what you can do to make it more difficult for hackers to fool your end-users.
  • 2020 Trends in Cybersecurity
    2020 Trends in Cybersecurity
    Kunal Anand, CTO, Imperva & David Gee, CMO, Imperva Recorded: Feb 20 2020 40 mins
    Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
  • 30 minute update: Teradici Cloud Access Software
    30 minute update: Teradici Cloud Access Software
    Mirela Cunjalo Director, PM - Teradici Recorded: Feb 20 2020 30 mins
    Teradici Cloud Access Software provides high-performance remote visualization capabilities in VMs to deliver a great user experience for the most graphics-intensive applications and workloads. Built on industry-leading PCoIP® technology, it can securely deliver a rich user experience across all network conditions on a variety of desktop and mobile endpoint devices, including ultra-secure PCoIP Zero Clients. Teradici PCoIP® technology compresses and encrypts the entire computing experience securely in the cloud and transmits only pixels to the endpoints – ensuring intellectual property and sensitive data never leave the data center or cloud.
    Join us to learn about the latest updates on Cloud Access Software, including support for Wacom devices, and Cloud Access Manager. Register today!
  • 2020 Cost of Insider Threats Global Report
    2020 Cost of Insider Threats Global Report
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT Recorded: Feb 20 2020 47 mins
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    ● What kinds of Insider Threats cost organizations the most
    ● How investigations are driving up the cost-per-incident for companies
    ● Which organizations, industries, and regions are being targeted the most
    ● How companies can potentially save millions by using a dedicated Insider Threat management approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Feb 20 2020 31 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Learn valuable tips for impactful submissions from a Lancet editor!
    Learn valuable tips for impactful submissions from a Lancet editor!
    John McConnell, Editor-in-Chief of The Lancet Infectious Diseases Recorded: Feb 20 2020 76 mins
    Hear John McConnell, Editor-in-Chief of The Lancet Infectious Diseases, discuss how to prepare a manuscript for submission to leading journals and answer author's most frequently asked questions about the submission process. Due to the high level of engagement and positive feedback received from research communities around the globe, we are now making the recording of this webinar available to you.

    You can expect to learn:
    • How to choose a journal for submission
    • What to include in each section of your manuscript
    • The editorial decision-making process
  • Learn How To Align Your Security with Business Outcomes
    Learn How To Align Your Security with Business Outcomes
    Jeff Pollard, VP & Principal Analyst, Forrester Research and Girish Bhat, Director, Product Marketing, Splunk Inc. Recorded: Feb 20 2020 54 mins
    Security is now becoming a top priority for businesses worldwide, driven by the challenges posed by digital disruption and the continuously expanding threat landscape. Well architected security is regarded as a strategic advantage and security executives are adopting risk and operational driven metrics to communicate and gain mindshare with corporate boards.

    However, aligning security with business outcomes while handling corporate velocity, key innovations, the skills shortage and budgets is still a work in progress. There has been a dearth of guidance on tools and techniques to develop strategies to align security with corporate and business goals.

    Join this thought leadership Splunk webinar, featuring Forrester, to hear from guest speaker Jeff Pollard, VP and Principal Analyst at Forrester Research and Splunk’s Girish Bhat to understand:

    •How to talk to your board about security
    •How aligning security has helped businesses
    •Forrester’s CISO Strategic Canvas
    •How to apply lessons learned to your own organization
  • The Many Ways to Hack Multi-Factor Authentication
    The Many Ways to Hack Multi-Factor Authentication
    Roger Grimes, David Littman Recorded: Feb 19 2020 62 mins
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, a security expert with over 30-years experience, and David Littman of TruthInIT for this video webinar where they will explore 12 ways hackers can and do get around your favorite MFA solution.

    The on-demand webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • 2020 State of the Phish - Behind the Scenes
    2020 State of the Phish - Behind the Scenes
    Gretel Egan, Proofpoint’s Security Awareness Training Evangelist Recorded: Feb 18 2020 30 mins
    Join Gretel Egan, Proofpoint’s Security Awareness Training Evangelist, for a Behind the Scenes interview on the 2020 State of the Phish report.

    The sixth annual State of the Phish again delivers critical, actionable insights into the current state of the phishing threat, including:

    - The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses
    - The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
    - How organizations are delivering phishing awareness training, and the ways they measure program success
  • January 2020 Update: Teradici PCoIP Management Console and Zero Clients
    January 2020 Update: Teradici PCoIP Management Console and Zero Clients
    Edna Menon, Arjen van der Meulen & Zouheir Himoud from Teradici Recorded: Feb 18 2020 49 mins
    Teradici’s most recent release of all PCoIP products and components, including PCoIP Zero Client firmware and Management Console software is now here!
    Sign up to learn about new capabilities and ask our product managers and systems specialist any questions you might have about this 2020.01 release.
    This webinar will cover everything you need to learn about the new features in:
    •PCoIP Zero Client Firmware 2020.01
    •PCoIP Management Console Enterprise 2020.01

    Live Q&A to follow
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz Mar 3 2020 9:00 am UTC 60 mins
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

    Deutsch
  • Data at Work - Skills, Part 2
    Data at Work - Skills, Part 2
    Graeme McDermott, Caroline Carruthers and Mark Stubbs Mar 3 2020 10:00 am UTC 24 mins
    Data at Work - Skills, Part 2: Siloed Pockets of Data Expertise. Unearthing Them, Unpacking Them, and Unleashing Their Potential

    In part 2 of our Podcast focusing on Data Skills, our panel of experts discuss how data ops processes are vital to accelerating the provision of data for use by different teams - e.g. Finance or HR, vs traditional environments. Why it's vital to separate the confluence of data and technology. Also covered is how, as well as diversifying in terms of skills, data teams are becoming increasingly diverse in terms of personality and expertise, and why that is important to problem solving. Please note - we recommend that you listen to part 1, before listening to this episode.

    Watch also the introduction webinar to learn more about the series: https://www.brighttalk.com/webcast/15913/382721
  • How Adobe Document Cloud can help you achieve a paperless office
    How Adobe Document Cloud can help you achieve a paperless office
    Steve Walker, Solutions Consultant, Adobe Mar 3 2020 10:00 am UTC 24 mins
    Join us in our virtual, animated studio for this video webinar to discover how Adobe Document Cloud can help you unlock the power of digital document workflows. You’ll learn how to do the following:

    • Obtain accountability and tracking capabilities for every document
    • Give your teams the power to deliver paperless experiences to customers on any device
    • Create forms in Adobe Acrobat and Microsoft Office
    • Automate the storage of documents in Microsoft SharePoint
    • Build intelligent document workflows using Adobe Sign and Microsoft Flow
    • Ensure better security, collaboration, and organisation within your company.

    There will be live Q&A session at the end of the webinar.
  • Formation de sensibilisation à la sécurité – Votre meilleure ligne de défense
    Formation de sensibilisation à la sécurité – Votre meilleure ligne de défense
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint Mar 3 2020 1:00 pm UTC 60 mins
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • Cyber Front Lines Report: Incident Response Insights That Matter for 2020
    Cyber Front Lines Report: Incident Response Insights That Matter for 2020
    Stuart Davis, Director of Incident Response Services, CrowdStrike, Brandon Dunlap, Moderator, (ISC)² Mar 3 2020 1:00 pm UTC 60 mins
    The year 2019 ushered in a host of new adversaries, new attack methods and new challenges for the cybersecurity industry. The CrowdStrike® Services team faced these trials head-on, across geographical regions and within public companies, private industries and governmental entities spanning a variety of digital mediums.

    This webcast, drawn from real-life engagements and presented by the experts who investigated them, focuses on the themes and trends observed in the global incidents the Services team responded to and remediated throughout 2019 and what they mean for 2020.

    Join this webcast to learn the following:
    •How business disruption emerged as a main attack objective
    •Why third-party compromises served as a force multiplier for attacks and attackers
    •Why macOS machines are now clearly in the cross-hairs of adversaries
    •Recommendations based on CrowdStrike Services investigations that can help you increase your organisation’s cyber defences
  • AIOps Meets NewOps: How to Leverage AI in New Age of IT Operations
    AIOps Meets NewOps: How to Leverage AI in New Age of IT Operations
    Rick Fitz SVP, IT Markets, Splunk Inc. and Padraig Byrne Sr Director Analyst, Gartner Mar 4 2020 10:00 am UTC 51 mins
    AI and predictive analytics are shaping the rapid evolution of IT in financial institutions. IT teams have struggled to collaborate due to disparate tools, fragmented data and lingering legacy investments that just aren’t cutting it. Faced with these struggles and the pressure to keep up with digital transformation, IT orgs are shifting toward a new operating model that integrates development and operations cycles to better enable monitoring, collaboration and automation. The catalyst for all of this is AI and machine learning.

    With AIOps tools, teams are:
    - Using data-driven approaches to improve insights, decisions and time to value, spending more time on innovation and critical initiatives
    - Improving collaboration by creating a more holistic view of their data, building trust between IT and lines of business
    - Extracting additional value from legacy investments

    Join Padraig Byrne from Gartner and Splunk SVP of IT Markets Rick Fitz as they discuss the challenges I&O leaders face today, how integrating AIOps can improve collaboration and resolution times and help financial institutions move to a New IT model.
  • Unusual Suspects: How Three Women Create Space for Authentic Equity & Inclusion
    Unusual Suspects: How Three Women Create Space for Authentic Equity & Inclusion
    Bobbie Carlton, Tangie Roseboro, Celina Caesar-Chavannes and Joy Rain Mar 4 2020 5:00 pm UTC 60 mins
    We will be discussing the importance of visibility for our “unusual suspects”. Women, people of color, people with disabilities, and others are not the stereotype for many roles in our daily lives. Seeing yourself represented on a stage, or in a meeting, can be crucial for implementing diversity and inclusion changes. Sharing your equity and inclusion story can be crucial to expressing your authentic self.

    You’ll Learn:
    · The greater impact of visibility on diversity & inclusion
    · The importance of being your authentic self
    · How to tell your story to create a space for equity & inclusion
  • Zero Trust Network Access: The People-Centric Alternative to VPN
    Zero Trust Network Access: The People-Centric Alternative to VPN
    Gabriel Meekins, Sr. Sales Acct Mgr & William Guilherme, Sr. Sales Engineer Mar 4 2020 5:00 pm UTC 60 mins
    The network perimeter is dissolving, and applications are migrating to the cloud. The number of users working remotely has grown exponentially over the last decade and to keep up, enterprises need people-centric solutions to protect users and data both on and off-premise.

    Join us for our upcoming webinar where we will take a look at how Zero Trust Network Access (ZTNA) replaces traditional remote access VPNs, which did a great job 20 years ago, but no longer meet the secure remote access needs of today’s enterprise. In today’s work environment, people are becoming the new perimeter, and protecting them and the data they access is the new imperative.

    In this webinar, you will learn how ZTNA solutions:

    ● Microsegment network access and reduce the attack surface
    ● Simplify management across all data centers and clouds
    ● Deliver superior end-user experience around the world
    ● Drive cloud-scale efficiency and agility
  • Cyber Resilience in the age of Targeted Attacks
    Cyber Resilience in the age of Targeted Attacks
    Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint Mar 5 2020 9:00 am UTC 49 mins
    As a CISO, you already know that the bad actors are shifting their targets from technology to people. Instead of attacking your infrastructure, they’re now more focused on people, their roles within an organisation, the data to which they have access, and their likelihood to “click here.” Your role not only comprises of building an excellent cybersecurity strategy but also consider resources, technology stack, training end users, managing expectations of the board and the big C – compliance. In midst of all this, you also need to think about what happens after an attack? With all these targeted threats lurking in your users’ inboxes, how can you make your business more cyber resilient?

    Join Loic Guezo, a celebrated expert in cybersecurity and Senior Director at Proofpoint as he shares his expertise on some of the pain points faced by CISOs and how to overcome them. He’ll cover:

    - Latest trends from the threat landscape and what they mean for businesses
    - How to strike a balance between security, compliance, technology and processes while keeping people in the centre of it all
    - Considerations for building cybersecurity and resiliency strategies

    -------------------------------------------------------------------

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks.

    Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Must Know Tips for Publishing in Premium Journals
    Must Know Tips for Publishing in Premium Journals
    Dr. Philip Earis, Editor-in-Chief, Joule, Cell Press Mar 5 2020 9:00 am UTC 60 mins
    Join Dr. Philip Earis, Editor-in-Chief of Joule (Cell Press journal) for an engaging webinar to learn about techniques and strategies for authoring in high impact journals. Dr. Earis will present his experience working with researchers and authors throughout the research publishing cycle, how to develop papers for premium publications, and the opportunity to broadly disseminate findings. Dr. Earis will talk to you about growth of Cell Press journals in the physical sciences field, which includes launch of many new titles such as Chem, Joule, Matter, and One Earth. He’ll also outline Cell Press’ approach to high-demand, multi-disciplinary content, and expanding OA publishing strategies at Cell Press. You won’t want to miss this informative webinar and how it can benefit your research process and impact. Please extend this invite to colleagues who may also find it of interest.

    More about Dr. Philip Earis:
    Philip is a graduate of Cambridge University in England and brings over 10 years of experience in publishing impactful energy research to Joule. He came to Cell Press after 3 years of living in India, where he founded and ran Project Light, an organization bringing solar power to marginalized off-grid communities in India. In this role, he worked closely with Indian and international scientists to develop and install appropriate solar energy technology.
  • People-Centric Threats on Digital Channels and How to Stop Them
    People-Centric Threats on Digital Channels and How to Stop Them
    Amanda Cannata, Product Marketing Manager for Digital Risk and Compliance Mar 5 2020 6:00 pm UTC 60 mins
    Threat actors don’t just target your people via email. They also use digital channels, like the web and social media, to launch attacks targeting your employees, partners and customers. And these socially engineered schemes on digital channels can leave your business just as exposed as those that come through email.

    Join this webinar to learn about the biggest digital threats to your people, and how you can take steps to block them. You’ll learn:

    · How attackers register fake web domains to phish customers, conduct targeted email attacks, and more

    · How malicious content on social media can put your customers and executives at risk

    · How the deep web and darknet provide tools and opportunities for threat actors to launch digital attacks
  • Using MITRE ATT&CK In Cloud and Hybrid Environments
    Using MITRE ATT&CK In Cloud and Hybrid Environments
    Vince Stross, Princ. Security SE, ExtraHop; Blake Strom, ATT&CK Leader, MITRE; Chip Wagner, Cybersecurity Leader, IBM Mar 5 2020 6:00 pm UTC 60 mins
    The MITRE ATT&CK Framework provides an excellent structure for security professionals to identify the strengths and gaps in their ability to detect attacker tactics, techniques, and procedures (TTPs) in the environment. The framework is applicable for cloud, on-premises, and hybrid environments. Join ExtraHop and (ISC)² on March 5, 2020 at 1:00PM Eastern for a discussion on the MITRE ATT&CK Framework as we look at:

    • How to get the most value from the MITRE ATT&CK Framework in a hybrid environment

    • How upcoming changes in MITRE ATT&CK may affect utilization of the framework by SecOps teams

    • How MITRE ATT&CK fits into an overall framework-driven strategy for improving detection coverage and security maturity in hybrid enterprises of all sizes.
  • Cyber CSI: Learn How to Forensically Examine Phishing Emails
    Cyber CSI: Learn How to Forensically Examine Phishing Emails
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4 Mar 5 2020 6:00 pm UTC 59 mins
    Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network. Staying a step ahead may even involve becoming your own cyber crime investigator, forensically examining actual phishing emails to determine the who, the where, and the how.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will show you how to become a digital private investigator!
    You’ll learn:

    - How to forensically examine phishing emails and identify other types of social engineering
    - What forensic tools and techniques you can use right now
    - How to investigate rogue smishing, vishing, and social media phishes
    - How to enable your users to spot suspicious emails sent to your organization 
    - Get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late!
  • The Impact of Unsecured Digital Identities- 2020 Ponemon Institute Report
    The Impact of Unsecured Digital Identities- 2020 Ponemon Institute Report
    Larry Ponemon, Ponemon Institute & Chris Hickman, Chief Security Officer, Keyfactor Mar 5 2020 7:00 pm UTC 60 mins
    Enterprises increasingly rely on cryptographic keys and digital certificates – known as digital identities – to protect critical data and connections across their business. But as the number of digital identities multiplies, from hundreds to tens or even hundreds of thousands, so does the complexity of managing and securing them at massive scale.

    The 2020 Keyfactor-Ponemon Institute Report on the Impact of Unsecured Digital Identities reveals what happens when PKI and cryptography practices aren’t at their best – when mismanaged keys and certificates disrupt operations and undermine trust in the business.
    Join industry expert Larry Ponemon and Keyfactor Chief Security Officer (CSO) Chris Hickman to learn more about what they’ve uncovered, the real impact of mismanaged keys and certificates, and how to build a business case for investment in your PKI strategy.
    Get in-depth insights to understand why:

    -73% of organizations still experience unplanned downtime and outages due to mismanaged digital certificates
    -74% of respondents say they do not know how many keys and certificates they have across their business
    -Only 38% of respondents say they have sufficient IT security staff dedicated to their PKI
  • A People-Centric Approach to Managing Insider Threats: Introducing ObserveIT
    A People-Centric Approach to Managing Insider Threats: Introducing ObserveIT
    Mayank Choudhary, SVP of ObserveIT | Proofpoint Mar 10 2020 10:00 am UTC 42 mins
    Insider Threats are quickly becoming one of the greatest cyber security threats that organizations face today. They are responsible for three million records are stolen every day and at the heart of 57% of all database breaches last year (Verizon 2019). Research also shows that the average time to spot and contain an insider threat is a massive 77 days -- just 13% of incidents are caught within 30 days (Ponemon 2020).

    The reason they are so prolific and take so long to deal with is because anyone with legitimate, trusted access to an organization’s systems and data – whether full-time employee, part-time contractor or strategic business partner – can be an Insider Threat.

    Managing insider threats fundamentally requires a people-centric approach. With the acquisition of ObserveIT, Proofpoint adds a powerful Insider Threat Management platform to our portfolio of People Centric cybersecurity solutions. The ObserveIT platform delivers unique capability to monitor both user and file activity, enabling security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach.

    Join ObserveIT | Proofpoint SVP Mayank Choudhary, in this webinar to:

    · Learn how the key components of full visibility – user activity, data activity, and behavior analytics – provide the necessary context to understanding Insider Threats

    · Discover how an organization’s risk of an Insider Threat can be reduced through always-on monitoring, without compromising user privacy and compliance; with real-life case studies to illustrate

    · See a demo explaining of how out-of-policy user activity is detected and investigated on-the-spot

    · Learn about the different types of Insider Threats and find out what steps you can take to build your own Insider Threat Management program
  • Data at Work - Behavior, Part 1
    Data at Work - Behavior, Part 1
    Roberto Maranca, Caroline Carruthers and Wael Elrifai Mar 10 2020 11:00 am UTC 26 mins
    Data at Work - Behavior, part 1: How and why improving how we treat our data will improve how our data treats us.

    In part 1 of our podcast focusing on data behavior, our expert panel explore some of today's most common and critical data 'behaviors' - both good and bad. At how businesses can address these and their data challenges by building and nurturing active data protocols and communities. And why saying that Data = IT, is like saying that Transport = Car Dealership. Once you have listened to this podcast, please listen to the extended discussion in part 2.

    Watch also the introduction webinar to learn more about the series: https://www.brighttalk.com/webcast/15913/382721
  • Break Through Tunnel Vision: Security Awareness is Not Just About Phishing
    Break Through Tunnel Vision: Security Awareness is Not Just About Phishing
    Mike Bailey, Sr. Product Marketing Manager Mar 10 2020 5:00 pm UTC 60 mins
    According to the 2019 Verizon DBIR, 94% of breaches are from attacks targeting your people. We can make your people resilient against these threats by helping you conduct a targeted, data-driven security awareness program.

    Join us as we take a deeper dive into end-user risk beyond phishing.

    We’ll explore:
    •Common risk areas that could lead to your next breach
    •How end users are performing from around the globe
    •What you can do to assess and reduce these common risk areas.

    At the end of the webinar we’ll provide you the opportunity to take our free People Risk Assessment and see how you compare with other companies in your industry.
  • Investigate Security Incidents Like a Boss
    Investigate Security Incidents Like a Boss
    Jae Lee Director, Product Marketing Splunk Inc. Mar 11 2020 10:00 am UTC 53 mins
    For security teams, having the ability to investigate a security incident quickly and accurately is still the most fundamental skill needed to combat the majority of cyberthreats and attacks. The average organization is being attacked on a weekly basis, without the right processes and tools in place to pinpoint root cause without delay, and put the right countermeasures in place in time to minimize damage.

    Join us in this 1-hour webinar to learn:
    - Why investigating security and non-compliance incidents can be so difficult
    - Why machine data generated by your business is so important to security
    - How to get better at performing investigations -- regardless of the size or skill level of your security staff

    We will provide a methodology to help you align how you think about your organization’s security processes – the goal is to help you develop an investigative mindset that addresses a broad range of security and compliance concerns, in a pragmatic and targeted manner, specific to your own needs.
  • IoT Security 101: Why a secure code signing process is critical for IoT
    IoT Security 101: Why a secure code signing process is critical for IoT
    Eddie Glenn, Venafi and James Penney, Device Authority Mar 11 2020 4:00 pm UTC 60 mins
    As the number of Internet of Things devices and applications continues to grow in 2020, so does the need for secure code signing and update delivery.

    Connected devices are only as valuable as the operating systems and applications that they execute. The firmware, operating system and application update processes are highly sensitive and can be a prime target for attack. Hackers have used these methods and systems from Microsoft, ASUS, and others to spread malware that is completely ‘trusted’ and can avoid Next-Generation Antivirus (NGAV).

    Until recently, there have been limited solutions available that can deliver a full secure end-to-end code signing and update delivery process for IoT use cases, forcing organizations to design and build their own home-grown solutions to fulfil their requirements.

    Join this webinar to learn about:
    • Current attack surfaces / risks being exploited within IoT
    • Why code signing is exceedingly valuable for IoT
    • Methods for Next-Gen Code Signing
    • How secure update delivery can benefit your IoT use case
    • Real world examples
  • Live Demo - Countering Business Email Compromise (BEC) with Email Fraud Defense
    Live Demo - Countering Business Email Compromise (BEC) with Email Fraud Defense
    Tanner Luxner, Product Marketing Manager of Proofpoint Mar 11 2020 5:00 pm UTC 45 mins
    With staggering losses of $1.7 billion in 2019, business email compromise (BEC) is a crucial attack issue organizations to protect against. As these threats don't typically include malware or detectable malicious intent, protecting against them is not an easy task. One very essential component of full protection against BEC is email authentication. How can you use this to better protect your people and your organization?

    Join Proofpoint as we dive into BEC and how Email Authentication can help defend against it. In this session, we'll share:

    - The many components of BEC
    - A framework for understanding where potential gaps exist
    - A live demo of how Email Authentication can help provide protection for these gaps.
  • 2020 Cost of Insider Threats Global Report
    2020 Cost of Insider Threats Global Report
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT Mar 12 2020 10:00 am UTC 46 mins
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    ● What kinds of Insider Threats cost organizations the most
    ● How investigations are driving up the cost-per-incident for companies
    ● Which organizations, industries, and regions are being targeted the most
    ● How companies can potentially save millions by using a dedicated Insider Threat management approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Targeting Colorectal Disease Through Patient-derived Colon Cancer Organoids
    Targeting Colorectal Disease Through Patient-derived Colon Cancer Organoids
    Asunción Fernández-Barral, Ph.D. Mar 12 2020 2:00 pm UTC 60 mins
    We are happy to welcome Dr. Asunción Fernández-Barral, Instituto de Investigaciones Biomedicas "Alberto Sols", CIBERONC, Madrid, Spain as a guest presenter where she will discuss her research into the regulatory role of vitamin D in relation to human colon stem cells and its implications in colorectal cancer.

    Abstract:
    Hans Clevers’ group changed the rules of the game when they isolated and grew in vitro adult stem cells from normal and tumor intestinal tissue. These cells, embedded in an extracellular matrix that allows their growth in 3D, better reflect the genetic background, cellular heterogeneity, structure, and functionality of their tissue of origin. These structures derived from stem cells were called organoids and can be obtained from multiple organs of different species. Organoids constitute an alternative for animal models and 2D culture and are a promising tool for basic research, disease modelling, drug development, personalized treatments, and regenerative medicine.

    The Instituto de Investigaciones Biomedicas "Alberto Sols", CSIC-UAM has used 3D cell culture technology to create a unique living biobank of organoids from healthy and tumor colon tissue of over 90 colorectal cancer patients. Using this valuable material, we have studied the role of vitamin D in colon homeostasis and its protective action against colon cancer. Additionally, we have also developed a reproducible drug screening system in tumor colon organoids.

    Speaker Bio:
    Asunción Fernández-Barral obtained her Biology and Biochemistry degrees at University of Navarra (Pamplona, Spain). She received her Ph.D based on studying the antitumoral effects of pigment epithelium-derived factor (PEDF) in melanoma at the “Alberto Sols” Biomedical Research Institute (IIB; Madrid, Spain).

    Asunción has become an expert in 3D-Organoid Technology by isolating and culturing patient-derived organoids (PDO) from healthy and tumour surgical and endoscopic biopsies of colorectal patients.
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access
    Live Demo: Meta Networks – Implementing Zero Trust Network Access
    Michael Kaunitz, Sr. Sales Field Specialist with Proofpoint Mar 12 2020 5:00 pm UTC 45 mins
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Data at Work - Behavior, Part 2
    Data at Work - Behavior, Part 2
    Roberto Maranca, Caroline Carruthers and Wael Elrifai Mar 17 2020 10:00 am UTC 25 mins
    Data at Work - Behavior, Part 2: How and why improving how we treat our data will improve how our data treats us

    In part 2 of our podcast focusing on data behavior, our expert panel discuss how vital it is to educate people on processes and expected data behaviors; how for people to get the maximum benefit from data, they must first believe in the data. The necessity of starting any reporting process from the desired outcome - look to validate, prove, change or improve something specific. And finally, that we should never fall into the trap of doing things, just because that's the way they have always been done! Please note - we recommend that you listen to part 1, before listening to this episode

    Watch also the introduction webinar to learn more about the series: https://www.brighttalk.com/webcast/15913/382721