Hi [[ session.user.profile.firstName ]]

People Make the Best Exploits: How Threats Prey on the Human Factor

Cybersecurity vendors devote much of their attention to the technical aspects of their task: malware payloads, distribution methods, infection chains, stolen data, and so on. To be sure, these elements are important. But focusing on them too narrowly neglects a simple fact: in the end, people are the targets.

That’s why attacks are still getting through, despite advances in detection and response technology. From email and web to social media and mobile apps, attackers are exploiting the human factor.

Join Proofpoint Director of Threat Intelligence Patrick Wheeler as he discusses The Human Factor 2016 report.

This Dark Reading webinar presents original field research from data gathered by Proofpoint products deployed in customer settings around the world. Patrick will cover threats in email attachments, social media posts, and URLs.

In this webinar you will see not just who is clicking what—but when, where, and why they are clicking:

Who is being targeted, and who is falling victim
What attackers are sending, and which lures are working
When threats arrive, and when people are most likely to click
Recorded Mar 16 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Patrick Wheeler Director,Threat Intelligence, Proofpoint
Presentation preview: People Make the Best Exploits: How Threats Prey on the Human Factor

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • See It In Action - Email Protection Live Demo Oct 26 2017 6:30 pm UTC 60 mins
    Frank Trammell, Sr Sales Engineer
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Targeted Attack Protection.

    Learn about:

    -- Today’s threat landscape and to how to build your defense against spam, malware, and non-malware threats
    -- Approaches for identifying suspicious messages
    -- The latest in security software to fight against advanced threats
  • Customer Technical Webinar - Gone Phishin! Oct 26 2017 5:00 pm UTC 60 mins
    Jason Williams, Sr. Threat Analyst, Adam Steigrod, Manager, System Engineering and Ivan Hernandez, Sr. Systems Engineer
    Phishing attacks have been the norm for malicious campaigns over the last few years, with credential phishing making up almost 90% of those attacks. Long lining. Spear phishing. Whaling. Imposter and spoofing. What’s it all mean? And how can you protect yourself and your organization? We hope you can join us as we review the phishing threat landscape and then dive into how Proofpoint customers are utilizing multiple levels of protection in order to keep attacks at bay.

    Join us on October 26th at 10 a.m. PDT for a Proofpoint customer technical webinar, brought to you by engineers, for engineers. This session will focus on effectively defending against emails that ask you to hand over something critically important…your information, your money, or your credentials.

    We will discuss:

    * Some Background on Phishing Techniques
    * Today’s Phishing Threat Landscape
    * Real World Examples of Phishing
    * Protection available from Proofpoint Solutions
    * Email Fraud Defense
  • Securing Your Data Throughout Your Digital Transformation Oct 25 2017 6:00 pm UTC 45 mins
    Mark Guntrip, Director of Email Security, Proofpoint
    As organizations around the globe look to migrate to the cloud – whether that’s Office 365, G Suite or another cloud platform – it’s clear that things are fundamentally changing how we work. This digital transformation changes many of the processes and systems that have been put in place to protect users and data. Now, with data residing outside the network, accessed by users who are also outside the network you need an effective data protection program to help maintain visibility and control of all data, both inside and outside your organization.

    Join Mark Guntrip, Director of Email Security, address the considerations for data security as you shift to the cloud and how you can protect your data, and plan your own digital transformation.

    -How to plan your data security strategy for your move to the cloud
    -Capabilities that are needed to be effective with data residing in cloud applications
    -New threat vectors that need to be addressed
  • Navigating the Stormy Sea of Risk & Compliance Regulations Oct 19 2017 5:00 pm UTC 60 mins
    Martin Tuip, Sr Product Manager | Joanna Belbey, Compliance Subject Matter Expert
    A current increasingly uncertain and complex regulatory environment has made it challenging for firms tasked with creating and maintaining a “culture of compliance”. The business demands access to new forms of communications to increase engagement with employees, partners and customers, only increasing the quantity and complexity of the data you manage. Join Proofpoint to gain an understanding of the challenges that compliance faces and the consequences of not meeting the expectations of the regulators

    Join us to

    •Develop insight into the rapidly changing regulatory environment
    •Hear how new forms of communications are bringing about the digital revolution
    •Discover how to protect your organization from reputational risk and stay out of the cross hairs of the regulators
  • 5.3 Billion Reasons To Stay Up To Date On B.E.C. and Email Fraud Recorded: Sep 27 2017 61 mins
    Ryan Terry, Product Marketing Manager, Johannes Ullrich, Dean of research at the SANS Technology Institute
    The cost of Business Email Compromise (BEC), and Impostor email has risen to $5.3B and is impacting employees, business partners and customers of organizations around the world.

    In order to protect all the groups that are targeted by BEC requires deep visibility into email, and the expertise to build and deploy email authentication policy. Proofpoint Email Fraud Defense (EFD) is designed to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

    Join us to learn:

    - Latest impostor email trends including BEC and consumer phishing
    - Advantages of implementing email authentication
    - How Email Fraud Defense integrates with the Proofpoint Advanced Email Security solution
  • Bridging the Office 365 Security Gap Recorded: Sep 21 2017 45 mins
    Richard Davis - Director Cybersecurity Strategy EMEA, and Roy Murdoch - Sales Engineering Manager - NEMEA
    As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.
    Join Richard Davis, Proofpoint, and Roy Murdoch to hear how you can mitigating security and compliance risks to secure your Office 365 email environment.
    Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:
    • Superior blocking of advanced threats
    • Immediate threat visibility and rapid response
    • Greater protection from compliance violations and information loss
    • Uninterrupted access to live and historic email

    To raise a question to Roy or Richard prior to the event email: O365questions@proofpoint.com
  • What's New: The Latest Proofpoint Email Security Release Recorded: Sep 20 2017 39 mins
    Jeff Burstein, Sr. Director, Product Management
    Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.

    The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:

    * Email Authentication
    * Attachment Sandboxing
    * Data Loss Prevention
    * Encryption
  • Adopt Office 365 With Modern Data Protection and Compliance Measures Recorded: Sep 19 2017 61 mins
    Celeste Kinswood, Product Marketing Manager, Stephen Chan, Sr. Director, Product, Proofpoint
    Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk?

    Watch this webinar to learn:

    · Hear about new types of risk this transformation introduces to your people and data
    · Learn about the evolution of compliance requirements in the modern workplace
    · Identify steps and effective countermeasures to protect your people, data, and brand in Office 365, G Suite, and more.
  • Before the Breach - Protecting Higher Education from Advanced Threats Recorded: Sep 15 2017 61 mins
    Mark Guntrip, Product Marketing Director - Email Security, ProofPoint
    Recent studies show that attackers are using many different methods to target higher education institutions. Email is the common culprit that enables these advanced threats to breach campuses.

    As attackers continue to evolve their techniques to bypass even the latest email security tools, institutions are left to deal with the often costly and time-consuming clean up. To fight back, institutions need a unified solution that solves the entire email threat problem covering both malware and malware-free threats.

    Join this webinar to learn:

    - The latest cyber threats targeting universities, colleges and other higher education institutions
    - How to build an advanced email security strategy
    - Visibility into threats and empowers you to proactively protect your campus
  • Security Protection in Office 365 - See It In Action Recorded: Sep 7 2017 43 mins
    Proofpoint
    The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you effectively respond and remediate threats.

    That’s where our Threat Protection for Microsoft Office 365 comes in.

    Join us for a live demo and see firsthand how our solution can help you:

    •Protect against advanced malware-based threats delivered through URLs and attachments and non-malware threats
    •Keep your email service connected even during Office 365 email server outages
    •See at a glance the campaigns targeting your organization
    •Quickly reduce the attack surface, securing Office 365 Live Demo
  • See It In Action - Email Protection Live Demo Recorded: Aug 31 2017 46 mins
    Proofpoint
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us Thursday, July 27, 10 AM PT for a live demo that will explore Proofpoint Email Protection and Targeted Attack Protection.

    Learn about:

    -- Today’s threat landscape and to how to build your defense against spam, malware, and non-malware threats
    -- Approaches for identifying suspicious messages
    -- The latest in security software to fight against advanced threats
  • Your Security Sandbox Won't Catch It All - The Phishing Problem Recorded: Aug 30 2017 45 mins
    Ryan Kalember, SVP Cybersecurity Strategies
    Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.

    Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.

    Watch this webinar to learn:
    - How phishing has evolved
    - Phishing threat landscape
    - Top phishing lures that impact employees
    - How Proofpoint can effectively address phishing attacks
  • Proofpoint Customer Technical Webinar: Imposter Emails & BEC Attacks Recorded: Jul 25 2017 50 mins
    Nathan Chessin - Director Field Sales Engineering, Jason Ford - Sr. Systems Engineer, Nick Sullivan - Sr. Systems Engineer
    More than 90% of targeted attacks start with email fraud. Learn how to gain insight into, and effectively defend against, these attacks.

    Join us for a Proofpoint technical webinar, brought to you by engineers, for engineers.  This session will focus on effectively defending your domains from impostors and fraudsters attacking your organization, your customers and your partners.
     
    Topics will include:
    • The Threat Landscape
    • SMTP Standards and Evolution
    • Stop Attacks with Visibility & Authentication
    • Configuring Email Protection to help block imposter threat
    • Creating DMARC reporting in less than 10 minutes
  • The Human Factor 2017 Recorded: Jul 25 2017 47 mins
    Adenike Cosgrove, Cybersecurity Strategist at Proofpoint , Davide Canali - Senior Threat Analyst Proofpoint
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Protecting Data After The Digital Disruption Recorded: Jul 18 2017 61 mins
    Ryan Kalember, SVP Cybersecurity Strategies, Heidi Shey, Forrester Researcher
    Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy.

    Join this lively discussion to learn:

    - Trends and implications for traditional network and endpoint DLP
    - Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently
    - Strategies on how to move forward to protect your critical data
  • How today’s threats prey on the human factor | 2017 Human Factor Report Recorded: Jun 29 2017 47 mins
    Patrick Wheeler, Director, Threat Intelligence, Proofpoint
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Protect & Respond to Ransomware and Business Email Compromise Recorded: Jun 28 2017 54 mins
    Mark Guntrip, Director Product Marketing, Proofpoint
    Cyber threats have changed dramatically in the last year.

    Last week, Symantec released patches for several critical SMG vulnerabilities that enabled attackers to (1) compromise the email gateway and (2) fully bypass gateway inspection and deliver malware via email.

    Short term, have you patched the vulnerability?

    Long term, have you evaluated email security solutions that handle all threats, with and without malware?

    Join this webinar for an overview of how modern email protection should dynamically analyze and identify malware. Learn:

    • What’s happening in the threat landscape—new vectors, new criminal techniques
    • How our solution can help you strengthen your defense, detecting and blocking email threats and enabling rapid, automated response
    • How Advanced Email Security compares to your current solution
  • Incident Response Live Demo Recorded: Jun 15 2017 28 mins
    Proofpoint
    Join our live incident response demonstration

    Reduce your incident response time.

    Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:

    •Reduce exposure time to malicious emails
    •Reduce the time to quarantine and contain email threats
    •Reduce your dependency on custom-coded software
  • How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization Recorded: Jun 6 2017 56 mins
    Ryan Terry, Product Marketing Manager and Ash Valeski, Sr. Manager Product Management
    The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.

    Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

    Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
    • Latest impostor email trends including BEC and consumer phishing
    • How to extend your current protection to stop all impostor threats
    • Upcoming product integration with Email Protection to secure your entire email ecosystem
  • Security Protection with Office 365 | Live Demo Recorded: Jun 1 2017 53 mins
    Proofpoint
    The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you efficiently respond and remediate threats.

    That’s where our Threat Protection for Microsoft Office 365 comes in.

    Join us for a live demo and see firsthand how our solution can help you:

    •Protect against advanced malware-based threats delivered through URLs and attachments and non-malware threats
    •Keep your email service connected even during Office 365 email server outages
    •See at a glance the campaigns targeting your organization
    •Quickly reduce the attack surface
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: People Make the Best Exploits: How Threats Prey on the Human Factor
  • Live at: Mar 16 2016 10:15 pm
  • Presented by: Patrick Wheeler Director,Threat Intelligence, Proofpoint
  • From:
Your email has been sent.
or close