Hi [[ session.user.profile.firstName ]]

Catching Credential Phish

Preventing credential theft in today’s threat landscape requires far more than strong authentication and malware detection. The majority of breaches now start with credential phish, and there is a reason why most advanced threats start with phishing – because it works!

Catching credential phish is still not easy. Email remains the easiest way to reach almost all people, and tools like social media and mobile applications are broadening the attack surface – enabling phishing attacks to be even more complex and targeted. It is more vital than ever for organization to elevate their ability to stay ahead of cybercriminals.

Proofpoint has unparalleled visibility into the advanced threats, including credential phish and polymorphic attacks, that are aimed at leading global organizations today. Only Proofpoint provides a product suite and advanced threat platform that is aimed at protecting the way people work today.

Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn:
• The anatomy of credential phish
• The top phishing lures seen in today’s threat landscape
• The modern techniques that Proofpoint uses to catch credential phish and empower organizations
to protect people from handing over the keys to your corporate data

An Information Week Dark Reading webinar with UBM sponsored by Proofpoint
Recorded Nov 18 2015 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jennifer Cheng Director, Product Marketing, Proofpoint
Presentation preview: Catching Credential Phish

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Fight the Next Generation of Targeted BEC Attacks Mar 8 2017 6:00 pm UTC 60 mins
    Ryan Terry, Product Marketing Manager at Proofpoint
    Highly-targeted, low volume impostor email – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today.  This is not news.
     
    But things are changing.  New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
     
    Join us for a live webinar on Wednesday, March 8th at 10am PST where you will learn:
    -  Why email spoofing works
    -  Current BEC trends and attack methods
    -  How Proofpoint’s new Email Fraud Defense solution can identify and block BEC threats before they reach the inbox
  • FINRA And SEC Exam Priorities For 2017 Mar 1 2017 6:00 pm UTC 60 mins
    Martin Tuip, Sr Product Manager | Joanna Belbey, Compliance Subject Matter Expert | Dan Nadir, VP, Product Management
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2017.

    Joanna Belbey, Compliance Subject Matter Expert, Proofpoint, Dan Nadir, VP, Product Management, Proofpoint and Martin Tuip, Senior Product Marketing Manager will discuss some of the risks spotlighted for 2017:

    • Recordkeeping
    • Supervision and controls to protect investors
    • Suitability, particularly for seniors
    • Social media and electronic communications retention and supervision
    • Cybersecurity controls

    Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
    Time not convenient? Sign up anyway and we’ll send you the link to the recorded webinar plus valuable materials.
  • Threat Actors Are Using Automation.. Are You Automating Threat Response? Recorded: Feb 21 2017 43 mins
    Joseph Yun, Sr. Product Evangelist, ProofPoint
    Threat Actors figured out long ago that automating and orchestrating their attacks gives them the ability to conduct their campaigns more efficiently and effectively. The byproduct of these automated attacks is a high volume of events and alerts meant to overwhelm enterprises. Enterprises conducting predominantly manual investigations and remediations will never be able to scale to the level of those attackers utilizing automated tactics.

    Join us on February 21, 2017 at 1 PM PT and learn how to quickly and easily


    •Understand the scope of automation necessary to combat mass campaigns from attackers
    •Understand which automations can be accomplished with the fastest ROI
    •Understand how,you can automate and apply internal context, 3rd party intelligence, campaign data, and investigations
    •Deploy powerful and proven shortcuts to integrate with alert sources and enforcement systems
  • Responding to Cybersecurity Challenges in Higher Education Recorded: Feb 15 2017 52 mins
    Proofpoint, Duane Kurada, Curtis Wray
    Universities are faced with a constantly evolving cyber threat landscape as well as an ever-changing faculty and student body. With limited budgets and a shortage of skilled security staff, doing less with more is not a mantra, it's a way of life that requires smart choices and maximizing resource efficiency.

    Join us on February 15th to hear Proofpoint cybersecurity experts discuss:

    •Explore threats that specifically target Higher Education
    •Discuss the challenges faced when dealing with these threats
    •Demonstrate incident response focused technology
  • Bridging the Office 365 Security Gap Recorded: Feb 14 2017 52 mins
    Jennifer Cheng Director, Product Marketing, Proofpoint
    Threat Protection and Compliance for Microsoft Office 365

    As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.

    Join Jennifer Cheng, Proofpoint Product Marketing Director, to hear how you can mitigating security and compliance risks to secure your Office 365 email environment.

    Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:

    •Superior blocking of advanced threats
    •Immediate threat visibility and rapid response
    •Greater protection from compliance violations and information loss
    •Uninterrupted access to live and historic email
  • Live Demo: Protecting Your Healthcare Data from Attack Recorded: Feb 9 2017 45 mins
    Proofpoint
    You know the situation: healthcare is becoming one of the primary targets for cyber attacks. What will it take to protect your organization? Find out by attending a live demo of Proofpoint Information Protection Suite.

    Learn about our products:

    •Email Data Loss Prevention to help you quickly discover exposed sensitive and confidential data and quickly resolve any issues
    •Email Encryption to ensure your clinicians and patients’ messages and attachments are communicated securely
    •Data Discover that provides the visibility to accurately discover, monitor and protect sensitive data on file shares, data stores and SharePoint sites

    The demo will include a live Q&A.
  • Improve Your Cybersecurity Visibility by Thinking Beyond the Network Recorded: Feb 8 2017 53 mins
    SVP, Cybersecurity Strategy, David Jevans, VP Mobile Security, Celeste Wynchopen, Social Media Strategist, ProofPoint
    Today’s cyber attackers exploit human weakness more often than infrastructure gaps: 90% of attacks target email, but social media links and mobile apps are also fair game.

    In this webinar you will learn:

    • How cyber attackers gain visibility into organizations.
    • How you can see across all major threat entry points and stop attacks.
    • How to stop business email compromise (BEC), credential phishing, ransomware and other advanced threats.
    • How to eliminate social media risk so you can focus on social success.
    • How to protect against malicious apps that mishandle data or install malware.
  • Preparing for Cyber Threats in 2017 Recorded: Feb 2 2017 51 mins
    Richard Davis, Director Cybersecurity & Adenike Cosgrove, Snr. Product Marketing Manager, Proofpoint
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Proofpoint for "How to Prepare for Cyber Threats in 2017" and learn:

    * What we predict for the threat landscape in 2017

    * Key actions you can take to prepare

    * What top resources will help support your security efforts
  • How to Leverage Proofpoint and Splunk Recorded: Jan 31 2017 34 mins
    Alok Ojha and Jeff Burstein from Proofpoint and Vijay Chauhan from Splunk
    By integrating Proofpoint Emerging Threat® (ET) intelligence, to include email and social media together with Splunk’s analytics-driven platform, visibility is now expanded across your entire organization, enabling your teams to delve into granular new use cases.

    Register now to attend this live webinar on January 31st at 10:00 a.m. PT to get a closer look at the benefits of the integration. You’ll learn how joint customers of Proofpoint and Splunk will be able to:

    * Ingest logs from Proofpoint Email Protection and Social Media Protection for increased visibility into email and social threats

    * Leverage Proofpoint Emerging Threats (ET) Technical Add-On (TA) to enhance Splunk correlation rules and search, using the Adaptive Response framework

    * Simplify incident investigation, discovery and hunting

    * Create consolidated reports for both security and compliance

    We’ll also take you “behind the scenes” to demonstrate how the technology works and why our partnership is truly Better Together!
  • How to Prepare for Cyber Threats in 2017 Recorded: Jan 24 2017 54 mins
    Patrick Wheeler Director,Threat Intelligence, Proofpoint
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Patrick Wheeler, Proofpoint's Director of Threat Intelligence, for "How to Prepare for Cyber Threats in 2017" and learn:


    - What we predict for the threat landscape in 2017

    - Key actions you can take to prepare

    - What top resources will help support your security efforts
  • Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Recorded: Dec 14 2016 62 mins
    Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst
    The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.

    Join guest speaker, Forrester’s Joseph Blackenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.

    Topics include:
    - How to grapple with “malware-free” threats, like BEC spoofing
    - Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
    - Managing a move to the cloud without losing visibility into attacks
  • Eradicating Malware Emails After Delivery Recorded: Dec 13 2016 57 mins
    Duane Kuroda, Group Product Marketing Manager at Proofpoint
    Cyber criminals continue to innovate and find ways to bypass security. By apply social engineering, rapid software updates and VM evasion techniques, or even poisoning links after emails are sent, criminals find ways to get malicious email delivered and even clicked on.

    Join us for this live webinar, we’ll look at the techniques attackers use to get through security defenses and a new countermeasure for clawing back delivered and internally forwarded malicious emails.

    You will also learn:
    • How bad actors bypass security to get malicious email into the inbox
    • Which business pressures increase the ability of attackers bypassing security measures
    • How other enterprises are taking-on and drastically reducing the impact of malicious email that bypassed security
  • Exploit Kits Don't Stop, Neither Should Your Business. Recorded: Dec 8 2016 41 mins
    Proofpoint
    Exploit kits don’t stop. Neither should your business with CERT Australia.

    Ransomware has one goal: to get your money. It locks away files until payment is made.
    Webinar invitation: December 8th at 11:30am AEST

    Join Chris Firman, Technical Adviser at CERT Australia and Jennifer Cheng, Director, Product at Proofpoint for a live webinar about Ransomware. They will address:

    •Ransomware evolution
    •Why ransomware is surging
    •Where it comes from
    •How are actors bypassing common security controls
    •Should you pay or not? What to consider
    •CERT recommended migrations
  • Email Fraud Defense: How to Fight the Next Generation of Targeted BEC Attacks Recorded: Dec 6 2016 54 mins
    Proofpoint
    Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyberthreat organizations face today. This is not news.

    But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

    In this webinar, you’ll learn:

    - Why email spoofing works
    - Current BEC trends and attack methods
    - How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox


    Presenters:
    Mark Guntrip, Group Product Marketing Manager, Email Protection
    Adenike Cosgrove, Senior Product Marketing Manager, Email Fraud Defense
  • Kudelski Security Introduces Proofpoint Solutions to Defend their Customers Recorded: Dec 1 2016 36 mins
    Kudelski Security and Proofpoint
    Email, the most utilized business application in the world, is also the number one source for cybersecurity attacks today. In fact, according to Wired Magazine, an estimated 91% of hacking attacks begin with a phishing email.

    While establishing a strong perimeter to protect your organization is a step in the right direction, the attackers are ultimately targeting people and the data they create. Join Kudelski Security as they welcome their newest partner, Proofpoint Inc, who will discuss the right approach to combating cybersecurity attacks by focusing on the human factor.

    Join Covered in the one hour session will be:

    - Overview of the Proofpoint solution
    - Proofpoint’s integration with Palo Alto Networks
    - Opportunity to assess your current email security environment for strength and accuracy in blocking advanced attacks

    At the conclusion on the webinar, there will also be the opportunity to win an Apple iPod Mini2 with WiFi (32 GB). Make sure to register today!
  • Fighting the Next Generation of Targeted BEC Attacks Recorded: Nov 24 2016 51 mins
    Adenike Cosgrove, Sr. Product Marketing Mgr, Email Fraud Defense & Richard Davis, Field Product & Solutions Mgr, Proofpoint
    Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news.

    But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

    In this webinar, you’ll learn:

    - Why email spoofing works
    - What the current BEC trends and attack methods are
    - How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox
  • Mitigating Incident Response with the Limited Security Resources in Higher Ed Recorded: Nov 17 2016 63 mins
    Proofpoint
    A shortage of skilled security staff coupled with criminals finding new ways to infiltrate networks, is causing security alert fatigue to set in at many organizations. This leaves staff cutting corners, at times only processing 5% to 10% of security alerts to try and keep up.

    In this webinar Duane Kuroda and Curtis Wray will shine a light on this problem and provide best practices to help you take charge. They will share actionable tips and tricks to help you begin to gain control of your incident response process and keep you secured against advanced threats.

    Join this webinar to help your security operations team learn:

    • The types of threats seen in higher education and the challenges of managing them
    • The impact of security alert fatigue
    • How educational institutions are handling these threats today
    • Key aspects in which IR teams should prioritize
    • What is needed to reduce effort while optimizing resolution
  • What To Do About Information Archiving, eDiscovery and Compliance Now Recorded: Nov 15 2016 56 mins
    Cheryl McKinnon, Principal Analyst at Forrester, Martin Tuip, Senior Product Manager at Proofpoint
    Legal and compliance pressures continue to evolve in the face of today’s data growth. Couple this with recent market consolidation and email migrations, and companies are looking for new ways to retain, search and make sense of their data in order to meet modern eDiscovery and compliance challenges. Overcoming the limitations in legacy solutions and understanding if the alternatives are “good enough” is a top of mind concern. We invite IT leaders, compliance professionals and legal teams to join us for a webinar, “What To Do About Information Archiving, eDiscovery and Compliance Now” on November 15th, 2016. Guest speaker, Forrester’s Cheryl McKinnon, Principal Analyst serving Enterprise Architecture professionals, will share trends, pitfalls and best practices for gaining deep insight into your data to reduce risk and enable better decision making. Live Q & A will follow.
  • Know Your Security Blind Spots: Visibility Beyond the Network Recorded: Nov 3 2016 47 mins
    Ken Liao & Krystal Wang, Proofpoint Product Marketing
    Cyber attacks are getting through because they’re operating in the blind spots of perimeter-and endpoint focused security.

    Proofpoint enables customers to gain visibility beyond the network into the full threat landscape. Learn how to close the visibility gap.

    Built on advanced analytics and a cloud architecture, our platform protects the way your people work today—through email, social media, and mobile apps. With complete visibility across all major threat vectors, you can detect attacks before they reach their targets. You understand who’s attacking, how they’re attacking, and what they’re after. And you have the insight you need to prevent and resolve the attack.

    Join Ken Liao and Krystal Wang, Product Marketing, Proofpoint for this webinar as they discuss how our platform provides that visibility. Learn how:

    •Proofpoint provides a full security suite of solutions to protect organizations from how they are getting attacked today.
    •Proofpoint technology provides Best-in-Class detection capabilities
    •Proofpoint Nexus Threat Graph is one of the world’s premier threat intelligence systems.
  • Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities Recorded: Oct 20 2016 40 mins
    David Jevans, VP Mobile Security, Proofpoint
    Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Connecting to wifi networks is second nature, with users’ accepting terms and conditions without realizing the risk of data-loss from malwareless and softwareless wifi attacks. This webcast will help you understand the common attacks and vulnerabilities that users are exposed to when traveling, and what you can do about them.
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Catching Credential Phish
  • Live at: Nov 18 2015 6:00 pm
  • Presented by: Jennifer Cheng Director, Product Marketing, Proofpoint
  • From:
Your email has been sent.
or close