Hi [[ session.user.profile.firstName ]]

Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era?

According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.

Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.

Join this webinar to learn:
• The key stages in the evolution of a post-infrastructure approach to security
• Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
• Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps
Recorded Dec 3 2015 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember
Presentation preview: Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Threat Actors Follow The Money | 2018 Human Factor Report May 9 2018 5:00 pm UTC 60 mins
    Patrick Wheeler, Director of Threat Intelligence
    The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    Join Proofpoint Director of Threat Intelligence as we discuss:

    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- The Latest Office 365 exploits
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    -- How bad actors are using cloud services
  • How to Stop Attackers That are Phishing Your End-users May 1 2018 5:00 pm UTC 60 mins
    Brett Shaw, Proofpoint, Chip Homer, Wombat Security Products and Christopher Thielet, Wombat Security Products
    Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

    Join us for this webinar where you will learn:
    * About the latest trends and tactics used by threat actors that target your organization
    * How to assess your users’ susceptibility to phishing attacks
    * To respond to threats through end-user training and reporting
  • The Silver Lining: Cloud Security and Compliance for your Office 365 Apr 26 2018 5:00 pm UTC 60 mins
    Michael Osterman, President Osterman Research & Celeste Kinswood, Security Strategist
    Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them.

    Join Michael Osterman from Osterman Research and our panel of experts, April 26, 10 AM PT as they discuss how to overcome challenges including:

    --Credential Phishing
    --Email Fraud
    --Cloud Access Security
    --Regulatory Compliance and E-Discovery
    --Data Loss
  • Driving Behavioural Change Through Phishing Simulation and Security Training Apr 26 2018 1:00 pm UTC 45 mins
    Brett Shaw, Sr. Product Marketing Manager, Proofpoint and Chris Thielet, Account Executive, Wombat
    Today’s cyberattacks target individuals, not infrastructure, and phishing is one of the most successful and enduring types of attack.

    Join this webinar to see how the newest member of Proofpoint family - Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, reduces phishing risk by enabling phishing simulation and training to change end-user behaviour.

    You’ll learn how to:

    •Assess your users’ susceptibility to phishing and spear phishing attacks
    •Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    •Allow your employees to report suspicious messages with a single mouse click

    All your questions will be answered via email after the webcast, alternatively, you can email us: infouk@proofpoint.com

    Disclaimer: part of this webinar has been pre-recorded.
  • On-premises Archives: Are They A Breach Waiting To Happen? Apr 25 2018 5:00 pm UTC 60 mins
    Martin Tuip - Senior Information Archive Strategist
    The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades but there also come these days with some inherit increasing risks. Join this webinar and learn about:

    -Why cyber criminals might be targeting your archive
    -The top security risks of on-premises archives
    -How to reduce your risk
  • Protecting Your Execs and Locations Against Threats Recorded: Apr 24 2018 33 mins
    Mike Lee, Director Social Media Solutions & Roman Tobe, Sr Product Marketing Manager
    Think you have a handle on threats beyond the perimeter? Watch this webinar and learn how Proofpoint helps you gain situational awareness of potential threats against your key executives and locations. Join us as we walk you through our detection system that provides in-depth scanning across all digital channels, including the surface, deep, dark web and social media.

    You’ll hear how to:

    • Detect threats on social media and all areas of the web
    • Protect your executives and locations
    • Gain detailed, real-time threat monitoring
    • Increase cyber intelligence and peace of mind
  • Latest Features in Proofpoint Enterprise Protection Recorded: Apr 12 2018 60 mins
    Rajneesh Chopra, VP, Product Management - Enterprise and Jeff Burstein, Sr. Director, Product Management
    We are excited about all the recent enhancements for Proofpoint Email Protection, TAP, Email DLP, and Email Encryption. Join this webinar where we review in detail:

    * New Threat Detection Technology
    * User Experience Enhancements
    * DLP Exact Data Matching
    * Pull Encryption with Secure Reader Inbox
    * New APIs, and much more!
  • Back to Basics: Solving the Email Fraud Problem Recorded: Apr 10 2018 43 mins
    Robert Holmes, VP Email Security Products
    In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.

    Join this webinar to learn:
    - Findings from our latest Email Fraud study
    - Email Fraud trends from 2017 and threats to look out for in 2018
    - Helpful tips to protect your people, data and brand against Email Fraud
    - Live Q&A with the speakers
  • Integrating, Coordinating, and Orchestrating Your Enterprise Security Tools Recorded: Apr 6 2018 62 mins
    John Pironti - President, IP Architects, LLC & Duane Kuroda - Cyber Security Strategist, Proofpoint
    Over the past decade, enterprises have purchased a wide range of security tools and systems, many designed to solve only one problem. Today, security teams are looking for ways to aggregate and integrate the capabilities of these systems to help identify sophisticated threats and improve overall enterprise security.

    In this Dark Reading webinar, attendees will learn strategies for tying security systems together and orchestrating them to build a better data defense.
  • Proofpoint Essentials: Cybersecurity for Small Businesses Recorded: Mar 28 2018 48 mins
    Joshua Bass and Special Guest
    Joshua Bass - Proofpoint Product Manager will be delving into cyber security for SME businesses and walking through some key topics and features of the Proofpoint products for SME business:

    - The Threat Landscape for SMEs
    - Overview of Proofpoint Essentials for SMEs
    - Walkthrough of the Proofpoint Essentials User Interface
    - Q&A
  • Guide to Protecting Your People & Safeguarding Your Business from Ransomware Recorded: Mar 20 2018 48 mins
    Richard Davis, Director Cybersecurity Strategy and Patrick Wheeler, Director of Threat Intelligence
    The evolving threat of ransomware is more dangerous than ever and is here to stay! In early 2017, ‘Wannacry’ and ‘Petya’ created havoc and made it to mainstream media. Even more recently, in Q4 2017, ransomware remained the top payload distributed by malicious messages accounting for 57% of all malicious message volume. Showing no signs of abating, cybersecurity professionals must reassess their ransomware-readiness. The best protection from ransomware is to stay informed and learn what critical safety measures your organisation can take to prevent such an attack from occurring.

    Join this webinar for an overview of:

    - How ransomware works and the latest attacks
    - The most common challenges organizations face in combating ransomware
    - Strategies for mitigating ransomware attacks of all varieties
  • How to Effectively Fight Against Email Fraud Recorded: Mar 12 2018 40 mins
    Ryan Terry - Manager Cybersecurity Strategies, Email Fraud
    While ransomware and other high profile, high volume attacks have made many headlines, email fraud has silently been attacking companies around the world. In 2017, over 80% of organizations experienced at least one email fraud attack. Email fraud attacks are low volume attacks that impersonate a person in authority to try and trick the victim into sending money or data out of the organization.

    Join us and learn how attackers use email fraud to attack their victims and about the framework that can prevent these attacks for impacting your business.
  • See it live - Proofpoint Incident Response Recorded: Mar 8 2018 20 mins
    Scott Harris, Sr Engineer & Troy Evanson, Sr Account Manager
    Reduce your incident response time.

    Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:

    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • How to Stop Look-alike Domains Targeting Your Customers, Partners & Employees Recorded: Mar 7 2018 63 mins
    Brett Shaw, Sr. Product Marketing Manager at Proofpoint and Jonathan Lee, Sr. Product Manager at Proofpoint
    Organizations today are facing increased targeted attacks using social engineering tactics. Last year, we saw a 200% increase from cyber criminals registering look-alike domains to pose as employees or partners by spoofing email addresses, or creating deceptive links for victims to click on.

    Join us for a live webinar where you will learn:
    * The latest trends and tactics used to commit email fraud
    * How to gain better visibility into any domain spoofing your organization
    * How to proactively protect your organization, employees, partners and customers from email fraud
  • Enterprise Archive with Proofpoint - See it Live Recorded: Feb 28 2018 50 mins
    Davin Stilson, Sr Sales Engineer, James Seeley - Sr Account Specialst
    Financial institutions - specifically FINRA and SEC regulated organizations - are required to protect their firm’s and clients’ data, capture and archive business records and make them discoverable, and enable secure and compliant use of social media. They face challenges of swiftly producing required records during legal discovery and regulatory audits + demonstrating ongoing supervision of their employees despite and increased regulatory landscape, exponential data growth, decreases in staff and ongoing demand to lower costs

    Get up to speed on the compliance and eDiscovery challenges that enterprises face — and the Proofpoint solution that meets them.

    Watch industry experts take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Cyber Security Update 2018 Recorded: Feb 27 2018 62 mins
    Markus Grüneberg, Security Strategist and Mario Seefried, Cyber Security Professional
    So bleiben Sie vor den neuesten Cyber-Bedrohungen geschützt

    Erfahren Sie in unserem Cybersecurity-Jahresupdate für 2018, wie aktuelle Angriffe aussehen und wie Sie Ihr Unternehmen vor diesen neuen Bedrohungen schützen. Informieren Sie sich unter anderem, über

    - Vorhersagen für die Bedrohungslandschaft 2018 mit besonderem Fokus auf Europa
    - Wichtige Maßnahmen, die Sie ergreifen können, um Ihr Unternehmen zu schützen
    - Top-Ressourcen zur Unterstützung Ihrer Sicherheitsanstrengungen
  • What GDPR Means for Your Security Recorded: Feb 22 2018 46 mins
    Adenike Cosgrove, Cyber Security Strategist at Proofpoint
    For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core.

    Join us as we discuss how organizations can meet the GDPR requirements and the security implications for your organization.

    Join us to hear how to:

    • Discover and classify personal data.
    • Protect all personal data by developing and implementing appropriate security controls.
    • Enhance security controls by monitoring, detecting, responding, and reporting on all policy violations and external threats.
  • Removing the guesswork from GDPR Recorded: Feb 22 2018 42 mins
    Adenike Cosgrove, Cybersecurity Strategist
    For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights.
    Which is why we believe that the first priority of any business responding to the GDPR, as well as to the wider threat landscape, is to look after the individual. Protect your customers and your employees, and your business will be free to thrive.

    Join us to hear how to:
    • Discover and classify personal data.
    • Protect all personal data by developing and implementing appropriate security controls.
    • Enhance security controls by monitoring, detecting, responding, and reporting on all policy violations and external threats.
  • FINRA And SEC Exam Priorities For 2018 Recorded: Feb 13 2018 54 mins
    Joanna Belbey, Compliance Subject Matter Expert, Proofpoint and Martin Tuip, Senior Product Marketing Manager
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2018.

    Joanna Belbey, Compliance Subject Matter Expert, Proofpoint and Martin Tuip, Senior Product Marketing Manager will discuss some of the risks spotlighted for 2018:

    • Supervision and controls to protect investors
    • Technology Governance
    • Cybersecurity controls

    Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
    Time not convenient? Sign up anyway and we’ll send you the link to the recorded webinar plus valuable materials.
  • Email Protection with Office 365 - See It In Action Recorded: Feb 8 2018 46 mins
    Joel Bowden, Sr Engineer, Jim Osselaer, Account Manager
    Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Learn about:

    Today’s threat landscape and to how to build your defense against spam, malware, and non-malware threats
    Approaches for identifying suspicious messages
    The latest in security software to fight against advanced threats
    Quickly reduce the attack surface, securing Office 365 Live Demo
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era?
  • Live at: Dec 3 2015 6:00 pm
  • Presented by: Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember
  • From:
Your email has been sent.
or close