Hi [[ session.user.profile.firstName ]]

Visibility into the Modern Threat Landscape: Thinking Beyond the Network

Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
Recorded May 26 2016 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ryan Kalember, Cybersecurity Strategist, Proofpoint
Presentation preview: Visibility into the Modern Threat Landscape: Thinking Beyond the Network

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Dec 14 2016 6:00 pm UTC 60 mins
    Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst
    The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.

    Join guest speaker, Forrester’s Joseph Blankenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.

    Topics include:
    - How to grapple with “malware-free” threats, like BEC spoofing
    - Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
    - Managing a move to the cloud without losing visibility into attacks
  • Eradicating Malware Emails After Delivery Dec 13 2016 7:00 pm UTC 60 mins
    Duane Kuroda, Group Product Marketing Manager at Proofpoint
    Cyber criminals continue to innovate and find ways to bypass security. By apply social engineering, rapid software updates and VM evasion techniques, or even poisoning links after emails are sent, criminals find ways to get malicious email delivered and even clicked on.

    Join us for this live webinar, we’ll look at the techniques attackers use to get through security defenses and a new countermeasure for clawing back delivered and internally forwarded malicious emails.

    You will also learn:
    • How bad actors bypass security to get malicious email into the inbox
    • Which business pressures increase the ability of attackers bypassing security measures
    • How other enterprises are taking-on and drastically reducing the impact of malicious email that bypassed security
  • Exploit Kits Don't Stop, Neither Should Your Business. Dec 8 2016 12:30 am UTC 60 mins
    Exploit kits don’t stop. Neither should your business with CERT Australia.

    Ransomware has one goal: to get your money. It locks away files until payment is made.
    Webinar invitation: December 8th at 11:30am AEST

    Join Chris Firman, Technical Adviser at CERT Australia and Jennifer Cheng, Director, Product at Proofpoint for a live webinar about Ransomware. They will address:

    •Ransomware evolution
    •Why ransomware is surging
    •Where it comes from
    •How acre actors bypassing common security controls
    •Should you pay or not? What to consider
    •CERT recommended migration
  • Email Fraud Defense: How to Fight the Next Generation of Targeted BEC Attacks Dec 6 2016 6:00 pm UTC 60 mins
    Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyberthreat organizations face today. This is not news.

    But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

    In this webinar, you’ll learn:

    - Why email spoofing works
    - Current BEC trends and attack methods
    - How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox

    Mark Guntrip, Group Product Marketing Manager, Email Protection
    Adenike Cosgrove, Senior Product Marketing Manager, Email Fraud Defense
  • Kudelski Security Introduces Proofpoint Solutions to Defend their Customers Recorded: Dec 1 2016 36 mins
    Kudelski Security and Proofpoint
    Email, the most utilized business application in the world, is also the number one source for cybersecurity attacks today. In fact, according to Wired Magazine, an estimated 91% of hacking attacks begin with a phishing email.

    While establishing a strong perimeter to protect your organization is a step in the right direction, the attackers are ultimately targeting people and the data they create. Join Kudelski Security as they welcome their newest partner, Proofpoint Inc, who will discuss the right approach to combating cybersecurity attacks by focusing on the human factor.

    Join Covered in the one hour session will be:

    - Overview of the Proofpoint solution
    - Proofpoint’s integration with Palo Alto Networks
    - Opportunity to assess your current email security environment for strength and accuracy in blocking advanced attacks

    At the conclusion on the webinar, there will also be the opportunity to win an Apple iPod Mini2 with WiFi (32 GB). Make sure to register today!
  • Fighting the Next Generation of Targeted BEC Attacks Recorded: Nov 24 2016 51 mins
    Adenike Cosgrove, Sr. Product Marketing Mgr, Email Fraud Defense & Richard Davis, Field Product & Solutions Mgr, Proofpoint
    Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news.

    But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

    In this webinar, you’ll learn:

    - Why email spoofing works
    - What the current BEC trends and attack methods are
    - How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox
  • Mitigating Incident Response with the Limited Security Resources in Higher Ed Recorded: Nov 17 2016 63 mins
    A shortage of skilled security staff coupled with criminals finding new ways to infiltrate networks, is causing security alert fatigue to set in at many organizations. This leaves staff cutting corners, at times only processing 5% to 10% of security alerts to try and keep up.

    In this webinar Duane Kuroda and Curtis Wray will shine a light on this problem and provide best practices to help you take charge. They will share actionable tips and tricks to help you begin to gain control of your incident response process and keep you secured against advanced threats.

    Join this webinar to help your security operations team learn:

    • The types of threats seen in higher education and the challenges of managing them
    • The impact of security alert fatigue
    • How educational institutions are handling these threats today
    • Key aspects in which IR teams should prioritize
    • What is needed to reduce effort while optimizing resolution
  • What To Do About Information Archiving, eDiscovery and Compliance Now Recorded: Nov 15 2016 56 mins
    Cheryl McKinnon, Principal Analyst at Forrester, Martin Tuip, Senior Product Manager at Proofpoint
    Legal and compliance pressures continue to evolve in the face of today’s data growth. Couple this with recent market consolidation and email migrations, and companies are looking for new ways to retain, search and make sense of their data in order to meet modern eDiscovery and compliance challenges. Overcoming the limitations in legacy solutions and understanding if the alternatives are “good enough” is a top of mind concern. We invite IT leaders, compliance professionals and legal teams to join us for a webinar, “What To Do About Information Archiving, eDiscovery and Compliance Now” on November 15th, 2016. Guest speaker, Forrester’s Cheryl McKinnon, Principal Analyst serving Enterprise Architecture professionals, will share trends, pitfalls and best practices for gaining deep insight into your data to reduce risk and enable better decision making. Live Q & A will follow.
  • Know Your Security Blind Spots: Visibility Beyond the Network Recorded: Nov 3 2016 47 mins
    Ken Liao & Krystal Wang, Proofpoint Product Marketing
    Cyber attacks are getting through because they’re operating in the blind spots of perimeter-and endpoint focused security.

    Proofpoint enables customers to gain visibility beyond the network into the full threat landscape. Learn how to close the visibility gap.

    Built on advanced analytics and a cloud architecture, our platform protects the way your people work today—through email, social media, and mobile apps. With complete visibility across all major threat vectors, you can detect attacks before they reach their targets. You understand who’s attacking, how they’re attacking, and what they’re after. And you have the insight you need to prevent and resolve the attack.

    Join Ken Liao and Krystal Wang, Product Marketing, Proofpoint for this webinar as they discuss how our platform provides that visibility. Learn how:

    •Proofpoint provides a full security suite of solutions to protect organizations from how they are getting attacked today.
    •Proofpoint technology provides Best-in-Class detection capabilities
    •Proofpoint Nexus Threat Graph is one of the world’s premier threat intelligence systems.
  • Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities Recorded: Oct 20 2016 40 mins
    David Jevans, VP Mobile Security, Proofpoint
    Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Connecting to wifi networks is second nature, with users’ accepting terms and conditions without realizing the risk of data-loss from malwareless and softwareless wifi attacks. This webcast will help you understand the common attacks and vulnerabilities that users are exposed to when traveling, and what you can do about them.
  • Live Demo | Protecting your Information, DLP, Privacy Recorded: Oct 19 2016 49 mins
    Take a deep dive into the features of Proofpoint's industry-leading Data Loss Prevention and Encryption granting control over the information that leaves your organization through emails, social media and web file sharing, protecting it from exposure at all times.

    Join us as we answer the following questions

    How can I track and understand where sensitive data resides?
    How can my organization set policies that identify and categorize data to prevent sensitive data from leaving the organization?
    How can my organization maintain compliance when it comes to sensitive data?
  • BrightTALK: Proofpoint Canada Tech Talk Webinar: Better Together Recorded: Oct 4 2016 43 mins
    Join us for second monthly Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers.

    This session will focus on how Proofpoint and Palo Alto Networks combine to combat the ever-changing threat landscape.

    The threat landscape is constantly morphing and changing. New threats and techniques are being used by hackers to continually target the enterprise through multiple attack vectors. In this technical session, we will discuss the themes and changes in the threat landscape, sample attacks we’ve seen in the wild, and methods to secure your company in this environment. Proofpoint and Palo Alto Networks have integrated their top-tier security solutions to stop these evolutionary threats.

    We will have live discussions where we will share attack tactics, forensic information, integration details and platform strategies you can use to keep your networks safe.

    Topics covered will include:
    • Overview of today’s threat landscape
    • Thwarting innovative attacks with combined threat intelligence
    • Integration flow and details
    • Automated protection and threat prevention across your infrastructure
  • Business Email Compromise in Higher Education Recorded: Sep 28 2016 52 mins
    Cyber attackers are going phishing in your network pond.
    Learn how you can keep your people from taking the bait.

    Nowadays there are as many ways to communicate as there are things to say. Even so, email continues to be the primary method to connect with others, and the preferred vector for cyber-attacks. The latest threat targeting higher learning institutions comes from Business Email Compromise, an emerging but sophisticated cyber-attack consisting of low-volume campaigns of highly targeted phishing emails.

    In part 3 of our three-part Webinar series, we’ll take a deep dive into Business Email Compromise and explore the various approaches attackers are using to execute campaigns targeting higher education institutions. You’ll learn the indispensable tactics you need to protect your higher learning environment from Business Email Compromise phishing attacks. Register Now.
  • Responding to Cross Vector Attacks Recorded: Sep 21 2016 59 mins
    Open environments are great for innovation and higher learning.
    They’re also ideal for cross vector cyber attacks.

    One of the greatest challenges that security teams of higher learning institutions face is the growing number of sophisticated attackers leveraging multiple threat vectors to target faculty and students. There is no question that open network environments drive innovation but this equally makes it possible for cyber attacks to wreak havoc on day-to-day operations.

    In part 2 of our three-part webinar series, gain insight into cross-vector attacks and why they’re so challenging for universities to monitor. Learn how to arm yourself with ways to best respond when cross-vector attacks threaten your environment and users

    Complimentary On-Site Threat Assessment for All Attendees
  • Pokemon Go Malware and Zero Day iOS Attacks: Mobile Threat Defense Recorded: Sep 15 2016 49 mins
    David Jevans, VP Mobile Security
    Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.
  • Security for the Higher Education Threat Landscape Recorded: Sep 14 2016 63 mins
    A whole new batch of threats are descending on your campus, and we’re not talking about the freshmen.
    Universities face a cyber threat landscape that is unlike anything most companies endure. Beyond the burdens that staff and administrators put on the network, every year incoming students present a brand new set of challenges that push network security to its breaking point.

    Join us for part one of a three-part webinar series and explore how higher learning organizations gauge and mitigate the risk of intrusion by cyber threats. Learn what makes the higher education landscape so unique and how you can best protect against the threats that target your network through email, social media and mobile.
  • Proofpoint Canada Interactive Tech Talk: Incident Response Recorded: Sep 6 2016 56 mins
    This is the first installment of the Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers. This session will focus on incident response.

    Far too often security teams spend their time manually researching a detected security threat using a variety of disconnected tools. Proofpoint Threat Response provides a single pane of glass designed from the ground up for the incident response process. By bringing all the relevant threat information together in one place and helping analysts identify important relationships Threat Response streamlines the workflow required to rapidly respond after threat detection.

    Please join us along with fellow Proofpoint customers for a session to discuss our threat response components including:

    •Dashboard – see all your critical threats, open incidents and more all at a glance
    •Incident Scoring – scores are automatically adjusted as new details are discovered
    •Incident Workflow – assign incidents to analysts and collaborate in an incident
    •Incident Details – view all the collected data about an incident in one place
    •List Management – add and remove identities and hosts to/from quarantine and containment lists
    •Event Sources – view threat detection systems that will be generating alerts
    •Device Updates – view devices and update schedules for your existing infrastructure
    •Reporting – view real-time trends about malware, infected users, CNC IPs and much more
  • How Banking Trojans Work and How to Stop Them Recorded: Sep 1 2016 42 mins
    Samantha MacLeod, ME Bank and John Baird, Deutsche Bank
    Because they are so lucrative, Banking Trojans have emerged as a favorite of attackers who have turned cybercrime into a big-money endeavor. From Dridex to Ursnif, Banking Trojans have been targeting Australian organizations with frightening effectiveness – lurking on victims' computers until they can grab banking details and login credentials which are then used to commit online fraud.

    When business accounts are involved, the potential losses can surge into the millions. Do you know how to detect and stop them before they hit your balance sheet?

    Please join CSO Australia and Proofpoint for an interactive webinar that will feature Samantha MacLeod, General Manager of Cyber Security from ME Bank and John Baird, Director, Global Technology Production at Deutsche Bank to discover:
    •A business perspective on Banking Trojans and how you can increase awareness
    •How to stop Banking Trojans before they hit your business
    •And other steps you can take
  • Ransomware Survival Guide Recorded: Aug 30 2016 61 mins
    Jennifer Cheng Director, Product Marketing, Proofpoint
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.
  • How to Defend Against Email Fraud - in partnership with CSO Recorded: Aug 25 2016 55 mins
    Scott Brown, CERT Australia & Mark Guntrip, Email Protection, Proofpoint
    Online criminals used to favor scattershot campaigns that relied on emailing hundreds of people in the hopes of tricking even a few of them into clicking on malicious attachments. These days, however, businesses face a new threat as ever more-calculating attackers conduct extensive research to craft carefully worded emails designed to emulate the CEO, CFO or other key executive.

    These emails, known as email fraud or business email compromise (BEC), are fast exploiting perceptual weak spots by adopting executives' identities in emails pressuring employees into sending sensitive files or wiring large sums of money to a bank account.

    Recent FBI figures suggest the attacks are costing victims an average of $US130,000 per incident and cost more than $US2.3 billion worldwide. Furthermore, it is difficult if not impossible to get the money back.

    Please join the Australian Federal Police, CERT Australia and Proofpoint for a webinar to discuss the emerging threat and strategies for defending against it. Over the course of the session, you will learn:

    · How cybercriminals craft Email Fraud messages and where they get their information
    · How to help executives hide the information that cybercriminals may be using to shape Email Fraud
    · Why your current email filtering solution may struggle to keep up, and what technologies can help in the fight against Email Fraud campaigns
    · What kind of business controls can be put in place to protect against Email Fraud manipulations
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Visibility into the Modern Threat Landscape: Thinking Beyond the Network
  • Live at: May 26 2016 4:10 pm
  • Presented by: Ryan Kalember, Cybersecurity Strategist, Proofpoint
  • From:
Your email has been sent.
or close