Hi [[ session.user.profile.firstName ]]

Protect Your Office 365 Email from Three Key Threats

As you migrate your email infrastructure to Office 365, you might be wondering what the right approach and technology is to stop threats like business email compromise (BEC) and ransomware.

Join this webinar to learn key requirements for catching:

1) Email spoofs
2) Emerging and zero day threats
3) Commodity threats.
Recorded Jul 8 2016 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Catherine Hwang, Proofpoint Product Marketing
Presentation preview: Protect Your Office 365 Email from Three Key Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • One Year to Go! Your CA/Orchestria ‘End-of-Life’ Transition Plan Jul 18 2018 5:00 pm UTC 60 mins
    John Pepe (Proofpoint) & Christopher Amatulli (Technically Creative)
    Still on CA / Orchestria ‘Data Protection’ and don’t know where to start?

    End-of-Life happens in just 12 months and Proofpoint has a proven plan to migrate your data and detection logic to its new ‘Intelligent Supervision’ platform designed to increase the relevancy of alerts paired with intuitive workflows.

    In this short webinar, Proofpoint and Technically Creative will discuss migration best practices and present a plan to have customers up-and-running by summer 2019, so there is no gap in regulatory compliance.

    Join us as our experts discuss:

    - Where to Start
    - Summer 2019 Transition Plan
    - Upgrading to Intelligent Supervision
    - Ongoing Support

    Join CA / Orchestria ‘Data Protection’ experts John Pepe and Christopher Amatulli from Technically Creative for insights on making a timely, successful transition, all while remaining compliant.
  • Still Falling Foul to Phishing? Jul 11 2018 4:00 pm UTC 60 mins
    Brett Shaw, Sr Cybersecurity Strategist, Proofpoint
    It has been around for many years, but phishing is not a problem that’s going away any time soon.

    In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of.

    Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization.

    Join us as we discuss:

    - Effective security training to help prevent falling for an attack
    - The right tools and methods for detecting phishing
    - How to respond when to email threats
  • Phishing Prevention Training Demo Jun 27 2018 5:30 pm UTC 30 mins
    Chris Thielet, Phishing Training Specialist & Brett Shaw, Sr Security Strategist
    Today’s cyberattacks target individuals, not infrastructure, and phishing is one of the most successful and enduring types of attack.

    Join this live demo to see how Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, reduces phishing risk by enabling phishing simulation and training to change end-user behavior.

    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Inoculation Against Healthcare Cyber Attacks Jun 26 2018 6:00 pm UTC 60 mins
    RYAN WITT Healthcare Industry Practice Leader and RYAN TERRY Sr. Product Marketing Manager
    Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment.

    Join us for a discussion of:

    - Just released research that outlines healthcare's most likely threat vectors of 2018
    - How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare
    - Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution
    - New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow
  • Demystify the cloud: Stay secure in Microsoft Office 365 Jun 26 2018 10:30 am UTC 45 mins
    Edward Rowley, Sales Engineering Manager and Tim Ricketts, Principal Sales Engineer
    Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
    While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

    Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

    --Threats: credential phishing, email fraud, targeted attacks etc
    -- Enabling secure digital transformation: people centric security at the heart of the transformation
    -- Solutions: regulatory compliance and tools to implement
  • Schutz vor modernen CEO-Fraud-Angriffen: Live-Hack und umfassende Schutzkonzepte Jun 26 2018 9:00 am UTC 60 mins
    Chris Wojzechowski,Security Researche,Institut für IT-Sicherheit und Markus Grünenerg, Senior Security Strategist, Proofpoint
    E-Mail-Betrug, auch CEO-Fraud oder BEC (Business Email Compromise) ist weit verbreitet und kostet Unternehmen Milliarden. Dabei ist ein Großteil dieser E-Mail-Angriffe vermeidbar. Diese Bedrohungen beginnen meist mit einer E-Mail, die von einer hochrangigen Führungskraft, aber auch von Partnern oder Lieferanten zu stammen scheint. Diese E-Mail weist Mitarbeiter an Gelder zu überweisen oder sensible Daten zur Verfügung zu stellen. Die Empfänger erfüllen pflichtbewusst die übertragenen Aufgaben, überweisen zb das angeforderte Geld – und lernen erst später, dass sie betrogen worden sind.

    Erleben Sie in unserem Webinar anhand eines CEO Fraud Live Hack, wie leicht Ihre Mitarbeiter dazu gebracht werden, die betrügerischen Anfragen auszuführen. Anschließend zeigen wir Ihnen auf, wie Proofpoint Ihre Mitarbeiter und Ihr Unternehmen anhand eines mehrstufigen Schutzkonzeptes vor derartigen Angriffen schützen kann.
  • Pourquoi sécuriser sa messagerie sous Office 365 ? Recorded: Jun 21 2018 38 mins
    Laura Peytavin, Sales Engineer, CISSP et Miguel Battais, Account Manager France, Proofpoint
    Office 365 est en France et en Europe une solution collaborative de plus en plus adoptée par les organisations.

    La messagerie fait partie des services déployés en priorité.

    Les clients Office365 sont confrontés à deux soucis majeurs :

    1 Obtenir la meilleure sécurité possible contre les attaques sur les courriels, qui représentent encore aujourd’hui 93% des vecteurs de menaces sur vos données et vos postes de travail,

    2 Conserver une continuité de service lorsqu’Office 365 est indisponible.

    Lors de ce webinaire, nous présenterons entre autre comment Proofpoint, fournisseur de solutions de cybersécurité « people-centric » adresse les défis suivants :

    -Protection des identifiants utilisateurs ciblés par du phishing O365 de plus en plus sophistiqué
    -Contrer la fraude email (attaques au président, FOVI) qui n’est pas traitée par O365, quel que soit l’offre souscrite
    -Donner une visibilité en temps réel des attaques
    -Pouvoir faire des corrélations d’attaques qui deviennent de plus en plus multi-vectorielles (liens vers du partage de fichiers dans le Cloud : Box, OneDrive, SalesForce, Sharepoint, GSuite, etc…)
  • Malware of the Week | It's a Blast from the Past Recorded: Jun 20 2018 7 mins
    Proofpoint
    Every week Proofpoint's researchers report on the active threats making their way around the Internet and the threats commonly missed by security vendors.

    This week on Malware of the Week:

    Get your flannel ready because the Threat of The Week was a 90's blast from the past with Shankar's Virus. A polymorphic virus discovered in 1999 that can cause Microsoft Word to no longer function and change computer time.

    The Miss of The Week was a cryptocurrency miner called CoinHive. Emails lead victims to websites with JavaScript code on them that use the unsuspecting victim's own computer to mine Monero cryptocurrency.
  • Live Demo: Email Fraud Defense by Proofpoint Recorded: Jun 19 2018 47 mins
    Neil Hammet, Email Fraud Specialist
    Email Fraud is one of the oldest yet most successful threats against your organisations. Proofpoint Email Fraud Defense (EFD) can help you protect your organisation and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organisation and people by leveraging the power of EFD.


    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Malware of the Week - Proofpoint Caught a RAT Recorded: Jun 15 2018 12 mins
    Proofpoint
    Every week Proofpoint's researchers report on the active threats making their way around the Internet. Join us each week for a brief roundup of

    - What threat is making waves this week and another that is commonly missed by security vendors


    THS WEEK on Malware of the Week:

    We saw a highly targeted RAT/Stealer that is making it’s way around the Internet. RAT (remote access trojan) is the terminology for a banking trojan that can take control of your users' systems
  • Tools for Email Fraud Defense | Live demo Recorded: Jun 13 2018 25 mins
    Alex Fryback, Product Manager at Proofpoint
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution.

    Learn how EFD can help you:

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • 360 Degrees of Email Fraud Defense | Why Email Fraud Still Works Recorded: Jun 6 2018 43 mins
    Ryan Terry - Sr Security Strategist, Email Fraud Defense
    You likely know that email fraud is costing organizations billions of dollars. But do you know why these attacks continue to reach new levels of success? Proofpoint researchers have uncovered the latest email fraud trends, tactics, and techniques that are impacting organizations around the world.

    Join us and learn:

    • Why organizations haven’t solved one of the oldest email scams
    • The strategies needed to stop these attacks before they reach your employees, customers, and business partners
    • What a best practice email fraud solution should include
  • Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse Recorded: Jun 5 2018 54 mins
    Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint
    Proofpoint hat seinen neuen Faktor Mensch Bericht für das Jahr 2018 veröffentlicht, der untersucht, wie Bedrohungsakteure ihre Herangehensweisen mit Social Engineering und ausgeklügelten Angriffen verfeinern, die selbst versierte Benutzer regelmäßig täuschen.

    Melden Sie sich jetzt zu unserem Live-Webcast Der Faktor Mensch 2018 am 5. Juni 2018 um 10:00Uhr an und informieren Sie sich über die wichtigsten Erkenntnisse des diesjährigen Berichts.
    Der jährliche Proofpoint Bericht basiert auf der Analyse von Angriffsversuchen bei mehr als 6.000 weltweiten Unternehmenskunden während des gesamten Jahres 2017 und bietet Einblicke in Angriffstrends über E-Mail, Cloud-Anwendungen und soziale Medien hinweg, um Unternehmen und Benutzern die Sicherheit zu gewährleisten.

    Themen des Berichtes:
    -Soziale Engineering: Wie Social Engineering auf den Faktor Mensch abzielt
    -Bedrohungs-Trends: Malware, Phishing und E-Mail-Betrug: Dropbox, Docusign & Co
    -Trends zu gezielte Angriffen: Spam-Kampagnen bis zielgerichteter E-Mail-Betrugs
    -Neue digitale Risiken: Collaboration-Tools als neue Angriffsziele
    -Angriffe über Cloud Dienste: Cyberangriffe über Cloud-Dienste und -Apps
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks Recorded: May 24 2018 44 mins
    Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • The Challenges of Archiving - Archive Solution Live Demo Recorded: May 17 2018 55 mins
    Kieran Stewart, Archive Specialist & Jason Colvin, Senior Engineer
    Financial institutions - specifically FINRA and SEC regulated organizations - are required to protect their firm’s and clients’ data, capture and archive business records and make them discoverable.

    They face challenges of swiftly producing required records during legal discovery and regulatory audits + demonstrating ongoing supervision of their employees despite an increased regulatory landscape, exponential data growth, decreases in staff and ongoing demand to lower costs

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Threat Actors Follow The Money | 2018 Human Factor Report Recorded: May 9 2018 59 mins
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint
    The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    Join Proofpoint Director of Threat Intelligence as we discuss:

    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services
  • How to Stop Attackers That are Phishing Your End-users Recorded: May 1 2018 61 mins
    Brett Shaw, Proofpoint, Chip Homer, Wombat Security Products and Christopher Thielet, Wombat Security Products
    Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

    Join us for this webinar where you will learn:
    * About the latest trends and tactics used by threat actors that target your organization
    * How to assess your users’ susceptibility to phishing attacks
    * To respond to threats through end-user training and reporting
  • The Silver Lining: Guide for staying secure in Office 365 Recorded: Apr 26 2018 60 mins
    Michael Osterman, President Osterman Research & Celeste Kinswood, Security Strategist
    Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them.

    Join Michael Osterman from Osterman Research and our panel of experts, April 26, 10 AM PT as they discuss how to overcome challenges including:

    --Credential Phishing
    --Email Fraud
    --Cloud Access Security
    --Regulatory Compliance and E-Discovery
    --Data Loss
  • Driving Behavioural Change Through Phishing Simulation and Security Training Recorded: Apr 26 2018 28 mins
    Brett Shaw, Sr. Product Marketing Manager, Proofpoint and Chris Thielet, Account Executive, Wombat
    Today’s cyberattacks target individuals, not infrastructure, and phishing is one of the most successful and enduring types of attack.

    Join this webinar to see how the newest member of Proofpoint family - Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, reduces phishing risk by enabling phishing simulation and training to change end-user behaviour.

    You’ll learn how to:

    •Assess your users’ susceptibility to phishing and spear phishing attacks
    •Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    •Allow your employees to report suspicious messages with a single mouse click

    All your questions will be answered via email after the webcast, alternatively, you can email us: infouk@proofpoint.com

    Disclaimer: part of this webinar has been pre-recorded.
  • On-premises Archives: Are They A Breach Waiting To Happen? Recorded: Apr 25 2018 48 mins
    Martin Tuip - Senior Information Archive Strategist
    The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades but there also come these days with some inherit increasing risks. Join this webinar and learn about:

    -Why cyber criminals might be targeting your archive
    -The top security risks of on-premises archives
    -How to reduce your risk
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protect Your Office 365 Email from Three Key Threats
  • Live at: Jul 8 2016 4:00 pm
  • Presented by: Catherine Hwang, Proofpoint Product Marketing
  • From:
Your email has been sent.
or close