Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Making 5G Ready to Live on The Edge Kaitki Agarwal, Founder, President and CTO, A5G Networks, Inc. Edge IT is diverse, distributed, and largely siloed. With OT in the network that involves sensors, IoT devices etc., we need coordination with mobile ... 2 days ago | 19 mins A People-Centric Security Model for Financial Services John Checco, Proofpoint Resident CISO, Sean O'Dowd, Proofpoint Director of Financial Services Solutions For financial services firms, many cyber incidents and fraud is the result of errors, oversights, or deliberate mischief of individual employees. Whet... 1 week ago | 31 mins All compliance risks begin with people Michael McGrath, Yulia Luciano, Simon Fulton, Ben Chapman. Do you know who in your organisation has the most significant exposure to compliance risk? Are they at risk because of their actions, or are they tar... August 23, 2022 9:00am Insider Threats Are On the Rise: Insights from The Ponemon Report 2022 Yvette Lejins, Resident CISO, Proofpoint APJ & Steve Moros, Snr Director Threat Detection & Advanced Threats, Proofpoint APJ Insider threats continue to be a significant — yet frequently overlooked — cybersecurity threat within organisations. In fact, in the past two years, ... August 16, 2022 9:00am The Shoe Fits: Right-Size Your Organization's IT Service Management Nirmal Krishnamoorthy, Product Marketing, Freshworks and Scott Sinclair, Analyst, ESG Legacy SaaS-induced complexity plagues IT organizations with significant upkeep, data silos, and unneeded costs. Resource-intensive IT operating model... 2 months ago | 40 mins The State of the Phish 2022: An In-Depth Exploration of User Awareness Andy Rose, Resident CISO, and Gretel Egan, Security Awareness Consultant, Proofpoint Join us for a live discussion of our eighth annual State of the Phish report. We will explore user vulnerabilities from multiple angles and look at cy... 4 months ago | 63 mins Sicurezza e rischio: la base della people centric security Luca Maiocchi, Country Manager & Antonio Ieranò, Senior System Engineer – Proofpoint Italy. Al giorno d’oggi il cybercrime sfrutta, all'interno della kill chain dei suoi attacchi, sempre di più gli utenti e le persone, sia negli attacchi fina... 6 months ago | 56 mins Modernize Your Data Loss Prevention Strategy for Today's Challenges Itir Clarke, Manager of Product Marketing and Stephanie Torto, Senior Product Marketing Manager The rapid adoption of remote work and transition to the cloud have required many security teams to face a familiar question: are our legacy data loss ... 3 months ago | 32 mins Best Practices to Improve Your Embedded Product Experience Peter Schneider: Senior Product Manager, The Qt Company and Patrick Dalez: Product Business Line Director, The Qt Company Creating a great product experience means taking a human-centric approach to software design. Understanding your end-user expectations are the most im... 10 hours ago | 28 mins How to Stop Binding and Start Loving the Cloud Kat Garbis and Sean Rabbitt When choosing not to bind your Macs to Active Directory, it is crucial to address any perceived gaps or potential interruptions for your organization.... August 11, 2022 7:00pm Load more