Hi [[ session.user.profile.firstName ]]

Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage

Cyber criminals are organised and well-funded and just like any innovative commercial business, these organisations have a business plan and an operating framework to ‘go to market’.
If we understood how they go about targeting individuals at organisations like yours with the end goal of stealing valuable sensitive data, perhaps we might change the way we protect our users. The good news is that there is a common operating framework that cybercriminals work towards known as the Cyber Kill Chain®.
It’s time to play the cyber criminals at their own game! Join, Proofpoint, Fujitsu and Bloor Research on this webinar as they provide practical advice on how to interpret the 7 stages of the Attack Chain and use this knowledge to review the way you prepare, protect, detect & respond to cyber criminals targeting your organisation.
Cyber Kill Chain® is a registered trademark of Lockheed Martin
Recorded Sep 29 2015 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Smart, Proofpoint
Presentation preview: Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A view from the CISO: Key Pressures and Trends Impacting their Role Recorded: Oct 29 2015 32 mins
    Mike Smart
    Join Mike Smart, Security Strategist from Proofpoint and Martin Whitworth, Snr. Analyst at Forrester to hear some of what goes on behind the scenes in the office of the CISO.
    During this webinar they will discuss the most pressing issues that influence security strategy decisions and spending plans.
  • Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage Recorded: Sep 29 2015 59 mins
    Mike Smart, Proofpoint
    Cyber criminals are organised and well-funded and just like any innovative commercial business, these organisations have a business plan and an operating framework to ‘go to market’.
    If we understood how they go about targeting individuals at organisations like yours with the end goal of stealing valuable sensitive data, perhaps we might change the way we protect our users. The good news is that there is a common operating framework that cybercriminals work towards known as the Cyber Kill Chain®.
    It’s time to play the cyber criminals at their own game! Join, Proofpoint, Fujitsu and Bloor Research on this webinar as they provide practical advice on how to interpret the 7 stages of the Attack Chain and use this knowledge to review the way you prepare, protect, detect & respond to cyber criminals targeting your organisation.
    Cyber Kill Chain® is a registered trademark of Lockheed Martin
Next-generation cybersecurity that protects the way people work today
At Proofpoint, we give organisations the power to:
-Protect people from the advanced attacks that target them (via email, mobile apps, and social media)
-Protect the information people create (from advanced attacks and compliance violations), and
-Equip people to respond quickly when things go wrong
Our webinars are usually informative panel-style discussions targeted to the security professional.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage
  • Live at: Sep 29 2015 10:00 am
  • Presented by: Mike Smart, Proofpoint
  • From:
Your email has been sent.
or close