Hi [[ session.user.profile.firstName ]]

Health IT

  • Empowering Your Human Firewall: The Art and Science of Secure Behavior
    Empowering Your Human Firewall: The Art and Science of Secure Behavior
    Perry Carpenter, David Littman Recorded: Jan 23 2020 61 mins
    You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? Here's the great news. Creating a security awareness strategy that not only educates, but reinforces good behaviors can be achieved and we'll show you how.

    In this webinar, Perry Carpenter, Chief Evangelist and Strategy Officer for KnowBe4, and David Littman of TruthInIT unpack a number of key elements from his new book Transformational Security Awareness. What Neuroscientists, Storytellers, and Marketers can Teach Us About Driving Secure Behaviors. Drawn from his experience as an awareness practitioner, CISO mentor, researcher, and author, Perry will dive into ideas like how to use "Trojan Horses for the Mind," how to leverage social dynamics to drive behavior and shape culture, and will unveil some exciting new behavior models that will help you stop the bad guys in their tracks.

    This presentation will take a deep (and practical) dive into:

    · How to understand and design for behavioral segments
    · How to successfully debug bad behaviors
    · How to influence motivation in three different ways
    · And why it is important to live your awareness program through the eyes of your audience
  • What Most Computer Security Defenses are Doing Wrong, and How to Fix It
    What Most Computer Security Defenses are Doing Wrong, and How to Fix It
    Roger Grimes, David Littman Recorded: Jan 23 2020 55 mins
    Most companies have huge gaps in their computer security defenses and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”.

    But it doesn’t have to be that way!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and David Littman of TruthInIT for this webinar where he explores the latest research on what’s wrong with current network defenses and how they got this way. Roger will teach you what most organizations are doing wrong, why, and how to fix it. You’ll leave this webinar with a fresh perspective and an action plan to improve the efficiency and effectiveness of your current computer security defenses.

    Roger will teach you:

    · What most companies are doing wrong, why, and how to fix it
    · An action plan to improve the effectiveness of your computer security defenses
    · How to create your “human firewall”
  • Security Investigation: Restoring Calm from Chaos
    Security Investigation: Restoring Calm from Chaos
    Jae Lee Director, Product Marketing Splunk Inc. Recorded: Jan 23 2020 66 mins
    Security teams are underfunded, understaffed and overwhelmed by constantly putting out fires. They struggle to deal with threats and attacks, while having to answer hard questions from management. Everyone is demanding detailed, accurate answers about cyberthreats and risk and compliance – and they all need answers NOW.

    So, how useful is it to know that you’re not alone, since others are in the same boat? The answer is “not useful at all.” What IS useful, is knowing how to work smarter and get answers faster.

    Join us in this one-hour technical deep dive and demo to learn:
    - How to analyze events from three common data sources to look for malicious activity
    - How to get more efficient at discovery, triage and the investigation of potential security incidents
    - How to leverage automation methods to accelerate investigations and get answers faster
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Jan 23 2020 38 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • New (and free) analysis tools for the cyber threat hunter
    New (and free) analysis tools for the cyber threat hunter
    Chris Doman, Tawnya Lancaster, Amy Pace, Michael Vaughn - AT&T Cybersecurity Recorded: Jan 23 2020 59 mins
    Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In response, security teams are turning to proactive threat hunting to help find the bad actors in their environment that have slipped past initial defenses.

    Join AT&T Cybersecurity to see how you use the AT&T Alien Labs Open Threat Exchange (OTX™), among the world’s largest open threat-sharing communities, along with free malware and threat analysis tools to improve your threat hunting program.

    In this webinar, we’ll cover:

    ● New features in OTX for threat hunting, including how to submit suspicious files and URLs for analysis

    ● Enhanced functionality for our indicator of compromise (IoC) extraction tool, which now includes the ability to auto-extract indicators from emails and PCAP files

    ● How OTX can help you quickly identify and investigate new and evolving threat trends

    ● How Alien Labs is using analytics and machine learning for threat analysis that is then fed back into the OTX community
  • The Effects of Ransomware Don’t End with the Ransom for Healthcare Organizations
    The Effects of Ransomware Don’t End with the Ransom for Healthcare Organizations
    James McQuiggan, John Riggi Recorded: Jan 22 2020 60 mins
    Ransomware is back with a vengeance, impacting healthcare organizations like yours around the globe. While it appeared ransomware cases might be decreasing for a brief time, these incidents rose dramatically over the past year. This increase in malicious activity has serious business ramifications — from increasing downtime to causing revenue loss. Ransomware attacks also can impact an organization's' ability to treat patients.

    In this webinar, the American Hospital Association’s Senior Advisor for Cybersecurity and Risk will share an overview of cybersecurity. KnowBe4’s James McQuiggan will cover some of the emerging trends in ransomware. You’ll learn about the recent highly targeted attack vectors and what you can do to prepare before an attack.

    Attendees Will Learn:
    - The new ways offenders are using ransomware to take control of your network.
    - Best practices for defending against and recovering from ransomware attacks.
    - How to detect potentially threatening phishing and social engineering emails.
    - Actionable steps to take if your organization does become a victim.
    - How to create a “human firewall.”
  • Be Everywhere: How to Leverage Speaking Gigs to Grow Your Business
    Be Everywhere: How to Leverage Speaking Gigs to Grow Your Business
    Beck Power Recorded: Jan 21 2020 60 mins
    Ready to grow your impact, influence and income through speaking? In this webinar, Beck will show you how to be more prolific with your speaking outreach - so you can "be everywhere" your clients are.

    There are three sections we'll cover
    1. Strategy: Who you want to get in front of, how you'll do it and what will happen as a result
    2. Application: Actually doing the outreach and doing the gigs
    3. Leveraging the gigs into content, clients, and collaborations

    Bring your questions, and your speaking goals for 2020 - you don't want to miss this.

    You'll learn:

    · Being prolific with applications and using tools like Innovation Women to secure gigs
    · Email outreach strategies and tools to help keep you from being overwhelmed
    · The art of leverage - importance of lead tracking and making money from speaking gigs
  • Enterprise Information Archiving
    Enterprise Information Archiving
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist Recorded: Jan 21 2020 48 mins
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what is the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • Spotting and Defending Against Common Business Email Compromise Tax Scams
    Spotting and Defending Against Common Business Email Compromise Tax Scams
    Erich Kron, James McQuiggan Recorded: Jan 17 2020 49 mins
    Tax season is upon us, which makes this prime time for hackers to target your unsuspecting users with the latest Business Email Compromise (BEC) scams. From evolved W2 fraud to tax-related spear phishing, cybercriminals capitalize on the first quarter of each new year with smarter, craftier attacks designed to convince your users to provide confidential information, authorize wire transfers, or enable malicious files.

    In this webinar Erich Kron and James McQuiggan, KnowBe4 Security Awareness Advocates, discuss the new types of BEC scams you can expect to see, what your users should be on alert for this tax season, and how to protect your organization from these evolved threats.

    You will learn:
    - Real-world examples of the latest BEC attacks
    - Common targets within your organization and techniques used to trick them
    - Red flags your users need to know now to spot BEC attacks
    - How to educate your organization so you don’t fall victim

    Don't let your organization become a statistic this tax season! Join our experts to find out how to stop the bad guys before it's too late.
  • Ransomware Hostage Rescue Manual
    Ransomware Hostage Rescue Manual
    Erich Kron, David Littman Recorded: Jan 16 2020 55 mins
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • Hijacked! The Perils of Business Email Compromise
    Hijacked! The Perils of Business Email Compromise
    Ryan Terry, ProofPoint; Derrick Butts, Truth Initiative; Michael Weisberg, Garnet River, LLC; Brandon Dunlap (Moderator) Recorded: Jan 16 2020 59 mins
    According to the FBI’s Internet Crime Complaint Center, Business Email Compromise (BEC) resulted in more than $26 Billion in losses since 2016. Bad actors impersonating or using stolen trusted identities use a variety of attack vectors to defraud targets out of money and sensitive information. The problem is only getting worse, as these attacks are increasing due to a larger attack surface and the ability to move quickly through an organization. Detection can be difficult. What can be done to combat this fast growing and moving threat? Join ProofPoint and (ISC)2 on January 16, 2020 at 1PM Eastern for a Roundtable discussion on BEC, the threats it poses and strategies to defend against it.
  • Find Out the Top 9 IT Security Trends You Need to Watch Out for in 2020
    Find Out the Top 9 IT Security Trends You Need to Watch Out for in 2020
    Roger Grimes, Erich Kron, Javvad Malik Recorded: Jan 14 2020 22 mins
    Cyber security and security awareness landscapes are constantly changing. IT Professionals, like you, always need to know what is coming next in order to build (and maintain) effective security cultures and programs at your organization. Policy changes, evolving technologies, and even world events all play a part in attack vectors and how you respond to threats.

    To help you master the challenges ahead, KnowBe4 Evangelists, Roger Grimes, Javvad Malik and Erich Kron, share their top predictions for the coming year and discuss where the future of security awareness is heading in 2020.

    You'll want to watch this video to see their predictions for:

    •The future of privacy and data protection policies around the world
    •Changes to voting procedures and factors impacting election security
    •How the Internet of Everything and evolved spear phishing will make spotting attacks even harder
    •How you can prepare your users now to identify the threats of tomorrow

    Don’t get caught by surprise - watch their predictions now!
  • Investigate Security Incidents Like a Boss
    Investigate Security Incidents Like a Boss
    Jae Lee Director, Product Marketing Splunk Inc. Recorded: Jan 14 2020 53 mins
    For security teams, having the ability to investigate a security incident quickly and accurately is still the most fundamental skill needed to combat the majority of cyberthreats and attacks. The average organization is being attacked on a weekly basis, without the right processes and tools in place to pinpoint root cause without delay, and put the right countermeasures in place in time to minimize damage.

    Join us in this 1-hour webinar to learn:
    - Why investigating security and non-compliance incidents can be so difficult
    - Why machine data generated by your business is so important to security
    - How to get better at performing investigations -- regardless of the size or skill level of your security staff

    We will provide a methodology to help you align how you think about your organization’s security processes – the goal is to help you develop an investigative mindset that addresses a broad range of security and compliance concerns, in a pragmatic and targeted manner, specific to your own needs.
  • The Many Ways to Hack Multi-Factor Authentication
    The Many Ways to Hack Multi-Factor Authentication
    Roger Grimes, David Littman Recorded: Jan 14 2020 62 mins
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, a security expert with over 30-years experience, and David Littman of TruthInIT for this video webinar where they will explore 12 ways hackers can and do get around your favorite MFA solution.

    The on-demand webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Email Fraud Defense
    Email Fraud Defense
    Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint Recorded: Jan 14 2020 39 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. best practice Email Fraud Defense requires a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Discover how to:

    • Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
    • Monitor all inbound impostor threats from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use
    Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use
    Kevin Mitnick, Perry Carpenter Recorded: Jan 10 2020 70 mins
    Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows.

    The truth is that it is shockingly easy to gather detailed intelligence on individuals and organizations. Everything the bad guys need to specifically target your end users is out there for the taking. Banking and credit card accounts, driver's license numbers, geolocation details and even IT secrets can be found easily and through public resources! There’s even a name for it: Open Source Intelligence (OSINT).

    In this mind-blowing webinar, Kevin and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, give you an inside look into some of Kevin’s most prized, underground OSINT secrets and how the bad guys use those techniques to target your users and your organizations.

    Find out what to watch out for and learn how to strengthen your end-user “human firewall” against OSINT-fueled attacks before it's too late!
  • Using AI to Improve Detection, Prevention & Response
    Using AI to Improve Detection, Prevention & Response
    Dave DeWalt; Scott Sawoya; Rich Thompson; Bob Slocum; Brandon Dunlap (Moderator) Recorded: Jan 9 2020 62 mins
    Legacy, signature-based AV isn’t working. It is ineffective in stopping ransomware and zero-day attacks and creates a burden on your staff between patching, updating, reimaging systems, and overall impact to endpoint performance. As former NSA Director Admiral Michael Rogers said, “Without Artificial Intelligence, Cyber ‘is a losing strategy.” AI is all around us, and everyone is claiming to use it, but not all AI is created equal. With 70% of all attacks beginning on the endpoint, with the right AI in place organizations can move to a prevention first approach to end point security. Join BlackBerry Cylance and (ISC)2 on Thursday, January 9, 2020 for our first Security Briefing of the year where we will discuss AI-tools that can provide powerful detection, prevention and response capabilities.
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network
    Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network
    Roger Grimes, David Littman Recorded: Jan 9 2020 60 mins
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:

    - How detailed data is harvested using public databases and surprising techniques
    - Tricks used to craft a compelling social engineering attack that your users WILL click
    - Cunning ways hackers deliver malicious code to take control of an endpoint
    - Taking over your domain controller and subsequently your entire network

    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • Stop the Burnout Cycle In Its Tracks
    Stop the Burnout Cycle In Its Tracks
    Devon Grilly Recorded: Jan 8 2020 34 mins
    Remember what it was like to wake up feeling excited about your work? The path to burnout often feels like your energy and excitement is being drained away. In this workshop, you will learn 5 steps to stop the drain and get back on track to doing what you love and loving what you do. This is hands-on, so bring a notebook and a sense of curiosity about yourself, your mindset, and the impact you want to make in the world.
  • A Cultured Life: Innovations in Spheroid and Organoid Models
    A Cultured Life: Innovations in Spheroid and Organoid Models
    Shuang Zhang, PhD Postdoctoral Fellow NYU School of Medicine, Sonia Iyer, PhD, Jens Eberhardt CEO & Co-founder Automated Lab Recorded: Jan 8 2020 67 mins
    Scientists strive for recapitulation. A seemingly odd goal to reach for at first glance, yet, during experimentation, a fundamental objective is to introduce as few variables as possible while simultaneously trying to recreate in vivo conditions as closely as possible. For decades, two-dimensional cell culture was not only the best way to study the cell biology of healthy and diseased tissue—in many cases, it was the only way. But now, we are in the 21st century, and technological innovations in biomedical sciences have allowed investigators to get closer than ever to an accurate recapitulation of tissue and organ systems. Advanced 3D cell culture methods, such as the development of spheroids and organoids, have become increasingly popular and are revolutionizing approaches to drug discovery, cancer research, and other disease modeling applications. These more in vivo like models show great promise in furthering research in critical areas by delivering more physiologically relevant results.

    In this on-demand GEN webinar, the presenters explore two 3D cell culture paths: one using complex organoid models and CRISPR/Cas9 technology to understand the tumor microenvironment, including gene expression signatures and responses to immunotherapies. The other using novel microcavity spheroid technology to generate thousands of viable and productive monoclonal cell lines for several applications.
  • Is Your Traditional Security Stack Giving You A False Sense of Security?
    Is Your Traditional Security Stack Giving You A False Sense of Security?
    Kevin Mitnick, Perry Carpenter Recorded: Jan 7 2020 61 mins
    Endpoint security, firewalls, VPNs, authentication systems… we’ve all got them. But do they really provide the comprehensive level of security your organization needs to keep the bad guys out? The unfortunate reality is that each of these security layers can provide hackers with a back-door right into your organization. And we're going to show you how.

    In this exclusive webinar Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, show you shocking examples of significant vulnerabilities that social engineers and hackers use to circumvent these traditional security layers.

    There is no need for a false sense of security. Better defend your network by learning:

    - The 3 most common causes of data breaches
    - Significant vulnerabilities recently discovered in common technologies
    - Kevin’s top tips for security defenders
    - Why security awareness training is a security layer you can’t afford to skip

    Kevin shares new hacking demos that will scare the daylights out of you.  Find out how to mitigate these risks before it’s too late!
  • Critical Considerations When Choosing Your Security Awareness Vendor
    Critical Considerations When Choosing Your Security Awareness Vendor
    Perry Carpenter Recorded: Jan 7 2020 58 mins
    It’s become more and more evident to organizations that new-school security awareness training is an absolute requirement for managing the ongoing problem of social engineering. But how do you develop a program that will deliver the goods without doubling your workload or costing an arm and a leg?

    In this on-demand webinar Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer and former Gartner Analyst, steps you through key measures that will help you make an informed security awareness decision for your organization.

    You’ll gain insight into:

    - Critical components to make your program successful from the start
    - Features to look for that will ease implementation and ongoing management
    - How to create a process to demonstrate measurable success

    Find out now how you can not only check the box on security awareness training, but develop sustainable, meaningful change in your organization's security posture.
  • Security Awareness Training from Proofpoint
    Security Awareness Training from Proofpoint
    Sean Walker, Enterprise Account Executive Recorded: Jan 7 2020 37 mins
    Effective security awareness training ensures your work colleagues become a strong last line of defense against cyber attacks. Best practice in cyber security training is to engage colleagues and keep security top-of-mind, by offering continuously updated, interactive cyber security training modules; to arm all employees, contractors and visitors against real-world cyber attacks using personalised training based on industry-leading threat intelligence; and to replace one-size-fits-all content and adopt a new approach that allows you to target the right training to the right people at the right time.

    In this 30 minute demo, you'll learn how to: 
    4) Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    5)  Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    6) Enable your employees to report suspicious messages with a single mouse click

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Lower Your Business Risk with Best Practice Data Privacy Impact Assessments
    Lower Your Business Risk with Best Practice Data Privacy Impact Assessments
    Lecio DePaula Jr. Recorded: Jan 6 2020 45 mins
    Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from Marriott’s acquisition of Starwood, not undergoing a full security and privacy assessment can present huge problems for your organization and now Marriott faces a $123.6 million dollar fine due to lack of due diligence.

    One way to reduce risks and identify security/privacy risk is to conduct a data protection impact assessment. Not only will this assessment help you reduce business risk, but it also helps identify new processes in your organization to maintain compliance with GDPR, LGPD, CCPA and other global privacy laws.

    Join Lecio DePaula Jr., KnowBe4’s Data Privacy Director, for this webinar to hear about creating a robust data protection impact assessment to analyze new processes, workflows, and products to identify problems before they happen.

    In this webinar you’ll learn:

    - Best practices for conducting a robust DPIA
    - The privacy and security risks of M&A, creating new software products, other initiatives
    - How conducting a DPIA aligns with global privacy requirements
    - Common DPIA mistakes and how to avoid them
    - Tools that help manage and streamline your DPIA process
  • How to Gain and Maintain Executive Support for Security Awareness Training
    How to Gain and Maintain Executive Support for Security Awareness Training
    Perry Carpenter Recorded: Dec 23 2019 39 mins
    You know that having a healthy and functioning security awareness culture within your organization is key to avoiding a costly data breach. Your employees are your last line of defense against phishing attacks and keeping them on their toes and aware of the latest threats is critical. However, getting buy-in from executives to start, and more importantly, maintain a new-school security awareness program can prove to be a challenge.

    In this webinar, Perry Carpenter, Chief Evangelist and Strategy Office at KnowBe4, helps you detangle the complicated web of politics around securing executive support for security awareness training.

    - Get actionable insights on:
    - Capturing executive attention
    - How to frame the story of your program’s value position
    - What to measure before you present your program
    - How to not drown your executives in data
    - Setting intentional and actionable goals for your program
  • Building an Effective Security Awareness Program
    Building an Effective Security Awareness Program
    Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist Jan 28 2020 10:00 am UTC 57 mins
    Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves?

    Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss:

    - Proven best practices for increasing the effectiveness of cybersecurity education
    - How to build a culture of security within your organization
    - Actionable guidance on executing security awareness & training initiatives that deliver measurable results
  • How NDR Powers Event-Driven Security in the Cloud
    How NDR Powers Event-Driven Security in the Cloud
    Ryan Davis, Senior Manager, Cloud Product Marketing & Vince Stross, Principal Security SE at ExtraHop Jan 28 2020 6:00 pm UTC 60 mins
    For public cloud customers, event-driven security isn’t just practical—it’s expected. Although organizations still rely on perimeter-focused technologies, they’re moving away from a strictly protect-and-prevent mindset to one that includes detect-and-respond capabilities.

    In this webinar, we’ll dig into how network detection and response (NDR) can power event-driven security in the cloud. Topics will include:
    - How virtual taps enable agentless NDR in the public cloud
    - How NDR completes Gartner’s SOC Visibility Triad in the cloud
    - How NDR can be used for response automation
  • 2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions
    2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions
    Chris Dawson, Threat Intelligence Publications Lead Jan 28 2020 6:00 pm UTC 60 mins
    Every year, Proofpoint’s threat research team examines trends from the prior year and predicts changes in the threat landscape for the year to come. For 2020, some of the top concerns include a significant evolution in impostor attacks and increasingly sophisticated attacks on cloud applications.

    Join us for a deep dive into the biggest trends that we’re predicting for the next 12 months, and how you can prepare and protect your most valuable assets: your people and your data.

    You’ll learn:

    - Predictions for the 2020 cyber threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Gigamon #1: Transport Layer Security (TLS) 1.3: A New Private World
    Gigamon #1: Transport Layer Security (TLS) 1.3: A New Private World
    Ricardo Font, Product Marketing Manager, Gigamon ThreatINSIGHT; Brandon Dunlap, Moderator Jan 28 2020 6:00 pm UTC 60 mins
    Network traffic encryption is the pillar on which the Internet, as we know it today, rests on. E-commerce, banking transactions, private and sensitive communications…all occur based on the implicit assumption that our communications are secured. However, ubiquity also means targetable, and Transport Layer Security (TLS) has undergone changes in an effort to stay ahead of the security game. Join (ISC)2 and Gigamon on Tuesday, January 28, 2020 at 1:00PM Eastern as we dive into TLS 1.3, the newest version of the TLS encryption protocol. Areas covered include an overview of statistics associated with encrypted traffic, what changes are introduced in TLS 1.3, and the advantages and challenges associated with them, implementation caveats and gotchas and best practice deployment strategies.
  • Unlocking DevOps Security with PKI Automation
    Unlocking DevOps Security with PKI Automation
    Keyfactor's Senior Solution Engineer, Shian Sung and Thales Senior Solutions Architect, Matthew Armstrong Jan 28 2020 7:00 pm UTC 60 mins
    Today, DevOps teams are focused on getting new features out faster, yet they need digital certificates for critical tasks in the build and release process - things like signing code, spinning up containers, and using SSL/TLS certificates for load balancers and web servers.

    Maintaining an optimized development and release cycle requires frictionless, automatic PKI processes to provide timely, valid certificates while maintaining the visibility and control security teams need to ensure compliance and prevent delays.

    How do you unlock DevOps security with PKI Automation?

    Join Keyfactor and Thales to discuss how enterprises can automate and securely integrate PKI into continuous integration and continuous deployment (CI/CD) pipeline and the DevOps toolchain – including Jenkins, Kubernetes, and HashiCorp Vault.
  • CCPA: A New Age In Privacy
    CCPA: A New Age In Privacy
    24by7Security, Inc Jan 29 2020 5:00 pm UTC 60 mins
    On January 1, 2020, the CCPA became effective. With this new change comes the dawn of a new era in privacy for the citizens of California. Any California consumer may demand to see all the information a company has saved on them, as well as a full list of all the third parties that data is shared with. In addition, the California law allows consumers to sue companies if privacy guidelines are violated, even if there is no breach.

    Tune in to listen to Kevin Levy, Shareholder at Gray Robinson and Sanjay Deo, President of 24By7Security as they come together and talk about how CCPA's overarching influence will impact how privacy is kept and handled in the US.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • How to Communicate Risk & Security Program Value to Executives
    How to Communicate Risk & Security Program Value to Executives
    Sam Abadir, CISM, Lockpath Jan 30 2020 5:00 pm UTC 60 mins
    Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives today still think of risk management as a defensive, overhead activity or activities that are performed to satisfy legislative or regulatory requirements and deserve minimal attention.

    In this webinar, Lockpath’s Sam Abadir will help attendees understand the different value propositions business executives need to know to understand and support risk management projects across the organization.

    Attendees will learn how to:
    •Articulate their current and future risk management goals
    •Understand their risk management value proposition
    •Define business case benefits and communicate value to business executives
    •Define tools and resources needed to achieve goals
    •Understand an approach for their GRC or IRM program
  • Walking on the Wild Side: Exploring the Attacker Underground
    Walking on the Wild Side: Exploring the Attacker Underground
    Tarik Saleh, DomainTools; Aamir Lakhani; Ju-Lie McReynolds; Brandon Dunlap, Moderator Jan 30 2020 6:00 pm UTC 60 mins
    You don’t have to visit the dark web to find a black market where attackers and other bad actors trade information and can acquire tools & services that they can use to compromise your organization. Examples include things like Packer services (crypters, binders and packers), Malware services (RATs and silent doc kits) and Infrastructure services (such as VPSs, Domains and Shells). Join Domain Tools and (ISC)2 on Thursday, January 30, 2020 at 1:00PM Eastern for a discussion of attacker underground economy, how attackers see success with these tools and services and what defenders need to know to combat these threats.
  • From Source to Value: Why Automation is Driving Data Catalog Success
    From Source to Value: Why Automation is Driving Data Catalog Success
    Matthew Monahan, Senior Product Manager Jan 30 2020 8:00 pm UTC 90 mins
    Traditional data catalog solutions often require a conglomeration of separate tools (multiple catalogs, ETL, data governance, etc.) which are managed in silos by separate teams. When a data analyst needs to derive business value from this data, it requires communication across teams, integrations between products, and a high level of coordination to get them the data they need.

    A single platform, on the other hand, provides a single source of truth for analysts to quickly gain access to the data they need in a self-service manner. From source to provisioning, the automated data catalog keeps gears aligned and the train on the track. This reduces the burden on the IT staff, while ensuring the right level of governance over the whole process.

    An automated data catalog provides the workflow to take your data from source to value without manual intervention. Allowing a small team to accomplish the same tasks as one much larger. The catalog can automatically bring the data in from the systems of record, execute data quality rules, profile the data, prepare it for consumption, and provision it to the locations where the analysts can use it.

    During this webinar, Matthew Monahan, Senior Product Manager at Zaloni, will explore:
    - The benefits of a single application over connecting various point-solutions
    - How automation from source to destination reduces your workload
    - Real-world examples that you can leverage
  • Email Security: Why Now Is The Time To Review Your Strategy
    Email Security: Why Now Is The Time To Review Your Strategy
    Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist Feb 4 2020 10:00 am UTC 57 mins
    Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

    Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

    Join us to gain insights into:
    How the email threat landscape has changed with attackers evading legacy approaches;
    How leaders like Proofpoint have innovated to keep up;
    Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
  • Informed patients: evolving healthcare, clinical trials and medical information
    Informed patients: evolving healthcare, clinical trials and medical information
    Andrew Schorr, Patient Power, Dominic Jack, Merck, Vale Nicoli-Carr, mdgroup, Dr Vidal Pérez, Cardiologist, Dom Tyer, pp Feb 5 2020 2:00 pm UTC 75 mins
    Overview

    Patients are more informed than ever about their conditions and what is available for them to improve their quality of life.

    The healthcare sector is increasingly focused on understanding patient needs and engaging them in the clinical development and medical information process. Therefore, it is paramount to create patient-focused educational content using a range of communication channels and digital tools.

    However, do we take any time to think like a patient and, by doing so, understand their evolving needs and how this will affect the development of clinical trials and other healthcare educational initiatives?

    This pharmaphorum webinar, held in association with Plenum and mdgroup, takes place on Wednesday 5th February from 14:00-15:00 GMT and will look at the impact of patient involvement, from clinical programme design through to launch and post-launch activities.

    Focus

    • What should patient-led communication look like and who will provide it?
    • How to best meet patients’ needs during clinical trials
    • Which meeting formats and other channels are most relevant to reach the broadest and most appropriate audiences?
    • What role will each stakeholder play in the future?

    Register to find out more and be part of this exciting debate.
  • Protecting Your People and Data - Featuring Forrester's Zero Trust Framework
    Protecting Your People and Data - Featuring Forrester's Zero Trust Framework
    Ryan Kalember, EVP of Cybersecurity Strategy - Proofpoint & Chase Cunningham, Principal Analyst Feb 5 2020 6:00 pm UTC 60 mins
    There's lots of noise in the cybersecurity industry around zero-trust, but Forrester Research pioneered the original and most effective framework. It’s never been more important to understand how zero-trust principles apply to your environment, with people becoming the new perimeter, and protecting them and the data they access becoming the new imperative.

    In our upcoming webinar, we will take a closer look at the original Zero Trust Approach as defined by Forrester Research and applied in practice by leading security teams. The webinar will cover:

    - An overview of the Zero Trust approach
    - Concrete first steps for getting started
    - Guidelines on how to evaluate your standing within the maturity model
    - How Zero Trust reinforces people-centric security

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Authoring in The Lancet — Learn from the Editors
    Authoring in The Lancet — Learn from the Editors
    John McConnell, Editor-in-Chief of The Lancet Infectious Diseases Feb 6 2020 9:00 am UTC 76 mins
    Hear McConnell, Editor-in-Chief of The Lancet Infectious Diseases, discuss how to prepare a manuscript for submission to leading journals. John also answers some of the most frequently asked questions by authors. Due to the high level of engagement and positive feedback received from research communities around the globe, we are now making the recording of this webinar available to you.

    You’ll learn about:
    • How to choose a journal
    • What a Lancet editor looks for in a submission
    • The editorial decision-making process
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Sean Walker, Enterprise Account Executive Feb 6 2020 6:00 pm UTC 45 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • The Blame Game: Does Attribution Matter?
    The Blame Game: Does Attribution Matter?
    John McClurg, Senior VP & CISO, BlackBerry; John McCumber, Dir Cybersecurity Advocacy, (ISC)²; Brandon Dunlap, Moderator Feb 6 2020 6:00 pm UTC 60 mins
    You’ve been attacked and you’re defending your organization against the intrusion. Do you need to know who’s behind the attack, and why they’re targeting you? here have always been two schools of thought in response to this question. One school of thought believes that attributing the attack to a threat actor, i.e. attribution, is less important than figuring out how your defenses failed and focusing your efforts on mitigating the attack. The other school believes that identifying who the attackers are can help to inform the way an organization protects against such incidents. In the current geopolitical context, have the tides turned in favor of one or the other approach as the global security community grapples with an increasing volume of state-sponsored attacks? Is how the better question than who? Join BlackBerry Cylance and (ISC)2 on February 6, 2020 at 1:00PM Eastern for a discussion on attribution. We’ll debate the merits of both schools of thought and examine the possible costs and advantages of each approach.
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access
    Live Demo: Meta Networks – Implementing Zero Trust Network Access
    Michael Kaunitz, Sr. Sales Field Specialist with Proofpoint Feb 11 2020 6:00 pm UTC 45 mins
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Cybersecurity and IoT: Key trends, challenges and how to overcome them
    Cybersecurity and IoT: Key trends, challenges and how to overcome them
    Mark Brown and Shyamkant Dhamke, Wipro and Robert Dobson, Device Authority Feb 12 2020 3:00 pm UTC 60 mins
    2019 saw widespread adoption of the Internet of Things (IoT) – delivering new opportunities and benefits to many industries; consumers and the Enterprise.

    With the increased volume of IoT devices and more government regulations coming in, data privacy and security have become paramount when designing and building IoT solutions. Security will continue to be a key decision factor for organizations when deploying IoT infrastructure.

    The need for Security by Design and Automation to deal with the scale and unique characteristics of IoT will evolve and mature throughout 2020 – which means it’s important to understand how to overcome IoT security challenges and mitigate risk within your organization.

    Join this webinar to learn about:
    •The current state of cybersecurity and the IoT ecosystem
    •Real world experiences demonstrating the challenges and risks of IoT security including legislation e.g. GDPR, HIPAA
    •Solutions to overcome challenges and mitigate risk
    •Predictions/expectations for 2020 and beyond
  • Live Demo: Proofpoint Digital Risk Protection
    Live Demo: Proofpoint Digital Risk Protection
    Mike Dempsey, Director of Technical Sales & Kim Bruce, Regional Sales Director for Proofpoint Feb 12 2020 5:00 pm UTC 45 mins
    Digital channels such as the web and social media provide a lot of opportunity for people and businesses to connect and communicate. At the same time, these channels provide a lot of opportunity for threat actors to defraud businesses and consumers, through phishing, wire transfer fraud, counterfeit sales and more. So how can you better protect your business from threats across digital channels?

    Join this live demo and listen to product experts Kim Bruce and Mike Dempsey who will demonstrate how our solution helps customers:

    · Identify threats such as lookalike domains, domains selling counterfeit goods and domains involved in active phishing attacks
    · Find threats on social media, including phishing accounts, impersonation accounts, brand scams (like counterfeit goods or fake coupons), and malicious URLs in comments or replies to your posts
    · Monitor deep web and darknet sources to identify physical threats, credential compromise, confidential information exposure, doxing and more
  • Unusual Suspects: How Three Women Create Space for Authentic Equity & Inclusion
    Unusual Suspects: How Three Women Create Space for Authentic Equity & Inclusion
    Bobbie Carlton, Tangie Roseboro, Celina Caesar-Chavannes and Joy Rain Feb 12 2020 5:00 pm UTC 60 mins
    Bobbie Carlton, Celina Caesar-Chavannes, Joy Rain and Tangie Roseboro will discuss how three women create space for authentic equity and inclusion.

    You’ll learn:
    The greater impact of visibility on diversity & inclusion
    The importance of being your authentic self
    How to tell your authentic story to create a space for equity & inclusion
  • 2020 Cyber Threat Landscape - EMEA & APJ
    2020 Cyber Threat Landscape - EMEA & APJ
    Adenike Cosgrove, Cybersecurity Strategist, Proofpoint EMEA & Davide Canali, Senior Threat Analyst, Proofpoint EMEA Feb 13 2020 10:00 am UTC 60 mins
    45 min of expert predictions of the 2020 cyber threat landscape across EMEA & APJ.
    Includes: Key actions you can take to prepare your organization & resources to help support your security efforts.

    The 2020 Cyber Threat Landscape webinar is a 20/20 look into Cybersecurity predictions for EMEA & APJ.

    Every year, Proofpoint’s threat research team examines trends from the prior year and predicts upcoming changes in the Threat Landscape. For 2020, top concerns include a significant evolution in impostor attacks and increasingly sophisticated strikes on cloud applications.

    Join us for a deep dive into the critical threats that we’re expecting in the next 12 months, and how you can identify and protect your VAPs (Very Attacked People).

    In this 45-minute webinar with Q&A, you’ll learn:
    - Predictions for the 2020 cyber threat landscape across EMEA & APJ
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts


    About Proofpoint
    -----------------------
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • 5G is Coming, Are You Prepared?
    5G is Coming, Are You Prepared?
    Tawnya Lancaster, Lead Product Marketing Manager & Theresa Lanowitz, Head of Evangelism Feb 13 2020 5:00 pm UTC 53 mins
    5G technologies and networks are bringing exciting new possibilities for the enterprise. Prudent organizations are taking a proactive stance by anticipating the security requirements that will come with the new technology. Given the multifaceted nature of 5G and security, it’s critical for organizations to understand the magnitude of this undertaking.

    Join us to learn key findings revealed in the recently published AT&T Cybersecurity Insights™ Report: Security at the Speed of 5G. This ninth edition of the Insights Report is based on a global survey of enterprise security leadership conducted by AT&T Cybersecurity with 451 Research. Results show that many enterprises are getting a head start on 5G, yet many are challenged with understanding and appreciating all its dimensions.

    In the webinar, we’ll cover:
    • How 5G will transform the network with such things as Multi-edge Computing (MEC) and IoT
    • Where 5G may present new security challenges and where it offers security benefits
    • Which security controls will become most critical in the 5G future
    • What security practitioners should focus on to get a head start on 5G

    Meet your hosts:
    Tawnya Lancaster, Lead Product Marketing Manager
    Theresa Lanowitz, Head of Evangelism
  • Reduce Phishing with Proofpoint’s Messaging Security Best Practices
    Reduce Phishing with Proofpoint’s Messaging Security Best Practices
    Brett Shaw, Sr. Product Marketing Manager and Rick Miles Director, Product Management Feb 13 2020 6:00 pm UTC 60 mins
    Email is the #1 threat vector and organizations are constantly bombarded by phishing messages. In turn, security teams have a hard time keeping up with these attacks and often times don’t get around to responding to all of them. Join this webinar to see how Proofpoint has reduced phishing attacks for organizations and saved security teams countless hours of cleaning up malicious email.

    In this webinar, you will see:

    - How to streamline your incident response process for emails
    - How to leverage your users to identify and reduce phishing
    - A deep dive of Proofpoint Solutions and how they help with phishing
  • Email Fraud Defense
    Email Fraud Defense
    Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint Feb 18 2020 10:00 am UTC 39 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. best practice Email Fraud Defense requires a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Discover how to:

    • Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
    • Monitor all inbound impostor threats from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Turning Good Security into Good HIPAA Compliance
    Turning Good Security into Good HIPAA Compliance
    Adam Greene, Partner, Davis Wright Tremaine; Kathleen Randall, EVP North America, SureCloud Feb 18 2020 5:00 pm UTC 45 mins
    It may seem odd, but your organization may have a robust, mature information security program but still have terrible compliance. In fact, recent HIPAA audits revealed this happens often within organizations which are focused heavily on information security. This webinar will bridge the gap between good information security and good HIPAA compliance, addressing what the regulators are looking for, and how their expectations differ from typical information security practices.

    The 45-minute webinar will provide practical takeaways regarding:
    1) How to ensure that you are conducting a risk assessment and implementing a risk management plan that will pass muster with regulators.
    2) How you can ensure that you get credit for the good information security work you are doing.
    3) The regulators' expectations for policies and procedures.
    4) Risk assessment scope best practices checklist

    In this webinar, Adam Greene, veteran health attorney and former key regulator at the U.S. Department of Health and Human Services, will walk through what key elements of the risk analysis will help you in the event of an OCR audit.
  • January 2020 Update: Teradici PCoIP Management Console and Zero Clients
    January 2020 Update: Teradici PCoIP Management Console and Zero Clients
    Edna Menon, Arjen van der Meulen, Paul Barrett Feb 18 2020 6:00 pm UTC 45 mins
    Teradici’s most recent release of all PCoIP products and components, including PCoIP Zero Client firmware and Management Console software is now here!
    Sign up to learn about new capabilities and ask our product managers and systems specialist any questions you might have about this 2020.01 release.
    This webinar will cover everything you need to learn about the new features in:
    •PCoIP Zero Client Firmware 2020.01
    •PCoIP Management Console Enterprise 2020.01

    Live Q&A to follow