According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.
Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.
Join this webinar to learn:
• The key stages in the evolution of a post-infrastructure approach to security
• Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
• Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps
Today’s cyber attackers exploit human weakness more often than infrastructure gaps: 90% of attacks target email, but social media links and mobile apps are also fair game.
In this webinar you will learn:
• How cyber attackers gain visibility into organizations.
• How you can see across all major threat entry points and stop attacks.
• How to stop business email compromise (BEC), credential phishing, ransomware and other advanced threats.
• How to eliminate social media risk so you can focus on social success.
• How to protect against malicious apps that mishandle data or install malware.
Those defending against cyberattacks are overwhelmed by the shear volume of incidents to respond to. It is so bad that it has been said there may be as many as 1 million unfilled cybersecurity jobs. Machine learning and automation is often heralded as a way to deal with this problem so that many incidents can be dealt with requiring pressing a button. While there is much promise is machine learning there are also many perils that need to be considered. Attackers know how we defend ourselves and they do use our defenses against us.
This talk will cover some of the open-source tools and techniques available for organizations to use to defend themselves while keeping in mind how attackers could undermine our efforts.
To stay ahead of attackers, IT security teams are connecting their sophisticated threat mitigation infrastructure to a wide range of threat intelligence services: their own network data, open-source intel, commercial feeds, and even peers threat intel. Consuming this data is a starting point, but in many cases the volume of information generated is overwhelming. Its increasingly clear that threat intelligence needs to be winnowed down to the essential critical events, and then have context added to those events to reach the ultimate goal: to turn a mountain of threat intelligence into a few meaningful actions.
This webinar covers the challenges associated with working with threat intelligence and the security solutions available to turn data into actions that meaningfully decrease the threat exposure window.
Cybersecurity has been at the forefront of the US presidential election cycle. Join this interactive Q&A session with Mark Weatherford, Chief Cybersecurity Strategist at vArmour and discover the top cybersecurity challenges facing the elections and the new President, as well as some recommendations for improving security across industries and on a national level.Read more >
Our cybersecurity consultancy practice works with multinational businesses through to medium-sized UK organisations. We see cybersecurity strategies that are impressive, comprehensive, misguided and non-existent. This webinar will distil some of the most creative and successful approaches, as well highlighting the mistakes to avoid. Our analysis is based on cyber readiness, cyber risks stress testing, cyber hygiene assessments and security gap analysis. Threat and risk assessments and red team exercises also provide an insight into the effectiveness of cybersecurity strategies.Read more >
Organised in partnership with MIS Training Institute, (ISC)² Security Congress EMEA, in its third year, offered a unique opportunity for information security professionals from all levels to participate in comprehensive education programmes and connect with colleagues.Read more >
Universities are faced with a constantly evolving cyber threat landscape as well as an ever-changing faculty and student body. With limited budgets and a shortage of skilled security staff, doing less with more is not a mantra, it's a way of life that requires smart choices and maximizing resource efficiency.
Join us on February 15th to hear Proofpoint cybersecurity experts discuss:
•Explore threats that specifically target Higher Education
•Discuss the challenges faced when dealing with these threats
•Demonstrate incident response focused technology
Over the last few months, cyberattacks have dominated the news, creating uncertainty about how best to protect the value small business owners have worked to create. In this webinar, Emory Simmons, President of CMIT Solutions of South Charlotte, outlines today’s online threats and lays out a plan small businesses can use to manage risk.
Invest an hour to attend, Under Attack: Managing Small Business Cybersecurity Risk in 2017, on February 23rd at 11:00 am EST for answers to the questions below:
- What’s the likelihood my company will be targeted by a hacker?
- If my data is in the cloud, they are responsible for data breaches, right?
- Are ransomware attacks really that widespread?
- Does business insurance cover breaches?
- What can I do today to protect myself and my company?
Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.
To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.
Join Proofpoint for "How to Prepare for Cyber Threats in 2017" and learn:
* What we predict for the threat landscape in 2017
* Key actions you can take to prepare
* What top resources will help support your security efforts
The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.
Join guest speaker, Forrester’s Joseph Blackenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.
- How to grapple with “malware-free” threats, like BEC spoofing
- Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
- Managing a move to the cloud without losing visibility into attacks
Healthcare organizations have become prime targets for cyber criminals. In this webcast, security experts identify three key areas that are critical to improving your organization’s cybersecurity and provide effective strategies to combat cyber attacks using real-life examples.Read more >
As the global cyber threat environment continues to evolve, organizations need to begin thinking differently about information security and the protection of their infrastructure. The evolution from perimeter-centric, hardware-based environments to virtualized data centers and the cloud is underway and many organizations are late to the game. As CIO’s and CISO’s are driven to transition their CapEx investments to OpEx spending, the economic efficiencies of the cloud provide a rational path to those goals. From a security perspective however, security models that don’t sufficiently address workload and application-aware segmentation, lateral traffic visibility, and network-based threat detection of on-premises data center and public cloud-based environments leave a huge gap in the overall security posture.
This talk will provide CIO's and CISO's struggling with decisions about migration to the cloud with some thoughts about how the cloud can be the catalyst that improves security while also reducing costs and technology footprint.
Partnering to Fight Cybercrime
In our “2017 Cybersecurity Threat Insights Report for Leaders ” report, we shared several key findings and observations from our client engagements and about the security industry. This webcast will cover our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.
During this webcast our Counter Threat Unit™ e-crime lead, Alex Tilley, and Senior Incident Responder Daniel Eden, will give their perspective, observations and guidance through responses to a series of questions led by a moderator.
You Will Learn About:
- Our observations from our engagements and findings
- How you need to rethink core security processes and operations
- Whether the current nature and behaviors of the threat are evolving or staying constant
- What the common attack vectors are and how to protect your organization against the fundamentals of cyber-attacks
- How to focus your resources from a tactical and strategic perspective
Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.
While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.
Key takeaways include:
• Why the shift to Office 365 increases criticality of email security
• Common pitfalls to avoid in the planning stages
• Key security capabilities to protect from advanced threats
Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.
Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
Cloud Cybersecurity Lessons From 1B Files and 10M Users
Did you know that only 5% of all organizations actively care to protect user credentials in the cloud? Or that 1% of users in Financial Services represent 99% of exposure risk?
Our cyberlab data scientists gathered data from 1B files and 10M users to compile a fascinating cybersecurity report outlining The Riskiest Industries in the Cloud.
Join this webinar to see where your organization stands against your peers and competitors.
The aggressive incorporation of social engineering techniques in the malicious document attachment campaigns that have dominated the threat landscape of 2015 highlights the central place of ‘the human factor’ in the attack chain.
In 2016, people are the targets: from email and web to social media and mobile apps, attackers will build on the successes of 2015 by developing campaigns that leverage the human factor to bypass increasingly sophisticated automated detection and response capabilities.
Join Patrick Wheeler, Director, Threat Security at Proofpoint, as he presents Cybersecurity Predictions for 2016: Targeting the human factor addressing the shift to increasingly targeted attacks on people behind the devices.
Learn how your organization must demand solutions that enable you to:
• Take measures to secure data
• Effectively track incidents and remediate incidents
• Report out on compliance status
Cybersecurity continues to be a top priority; leaders must constantly judge how to balance business enablement and cyber protection priorities as they support the digital transformation of their organizations.
Join Microsoft's CISO, Bret Arsenault, as he discusses examples of this balancing act in action and where Microsoft can help to improve your security posture.