Hi [[ session.user.profile.firstName ]]

Business Email Compromise in Higher Education

Cyber attackers are going phishing in your network pond.
Learn how you can keep your people from taking the bait.

Nowadays there are as many ways to communicate as there are things to say. Even so, email continues to be the primary method to connect with others, and the preferred vector for cyber-attacks. The latest threat targeting higher learning institutions comes from Business Email Compromise, an emerging but sophisticated cyber-attack consisting of low-volume campaigns of highly targeted phishing emails.

In part 3 of our three-part Webinar series, we’ll take a deep dive into Business Email Compromise and explore the various approaches attackers are using to execute campaigns targeting higher education institutions. You’ll learn the indispensable tactics you need to protect your higher learning environment from Business Email Compromise phishing attacks. Register Now.
Recorded Sep 28 2016 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Proofpoint
Presentation preview: Business Email Compromise in Higher Education

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization Jun 6 2017 5:00 pm UTC 60 mins
    Ryan Terry, Product Marketing Manager
    The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.

    Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

    Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
    • Latest impostor email trends including BEC and consumer phishing
    • How to extend your current protection to stop all impostor threats
    • Upcoming product integration with Email Protection to secure your entire email ecosystem
  • GDPR - 358 Days To Fill the Compliance GAP Jun 1 2017 9:00 am UTC 45 mins
    Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest analyst Enza Iannopollo
    On the 1st June, there are just 358 days until the EU GDPR comes into force. At its core, the GDPR aims to put control of personal data back into the hands of EU residents. It regulates how personal data is collected, processed, and managed by organisations.

    Businesses have only 358 days left to develop and implement a GDPR compliance roadmap. But what does successful compliance look like? What changes will your organisation have to make to internal processes, and what technologies should your company leverage to ensure that the personal data of EU residents are protected?

    Join Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest Forrester analyst Enza Iannopollo to discuss:
    •The playbook of steps your organisation must implement to drive towards compliance
    •How to embed ‘privacy by design’ to your development life cycles
    •How to protect all identified EU personal data and prevent data breaches
  • Email Fraud Defense - Live Demo Recorded: May 26 2017 26 mins
    Aaron Neff, Sr Engineer, Parker Bowman Account Manager
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Ransomware – The Billion Dollar Thief Recorded: May 18 2017 64 mins
    Ryan Kalember, SVP Cybersecurity Strategies
    With WannaCry, Ransomware has once again burst onto the scene, reminding us of the need to stay vigilant. Ransomware attacks have continued to grow with security experts estimating that criminals will collect around $1 billion this year.

    Join us for this webinar as we discuss WannaCry, its variants and other Ransomware and how you can ensure your people, data and brand are protected.

    - The latest attacks, including WannaCry and its variants
    - The challenges in combating Ransomware
    - Tips and suggestions to mitigate WannaCry and other Ransomware attacks
  • Advanced Email Security - Email Protection Live Demo Recorded: May 4 2017 40 mins
    Proofpoint
    Advanced Email Strategy Series - Email Protection

    Cyber attacks are increasing and diversifying—with new variations appearing all the time, many targeting new vectors. Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. This is the first in a series of three demos about our Email Protection Suite. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Protecting Your Users on Office 365 Recorded: May 3 2017 63 mins
    Duane Kuroda, Group Product Marketing Manager
    Organizations around the world are moving to Office 365 to reap the benefits of this amazing collaboration platform. But bad actors continue to target end users with advanced threats that can slip through gaps in your security infrastructure. If you’re already a Proofpoint customer, you know the powerful protection our solutions offer. Learn how to leverage that protection to ensure security for your employees on Office 365.

    Whether you’re considering a migration or already using Office 365, join us for this webinar to learn about:

    · Key threat types targeting end users
    · Best practices for blocking and responding to advanced threats
    · How Proofpoint can protect your organization before, during, and after your move to Office 365
  • Threat Protection for Office 365 - Live Demonstration Recorded: Apr 27 2017 55 mins
    Proofpoint
    The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you efficiently respond and remediate threats.

    That’s where our Threat Protection for Microsoft Office 365 comes in.

    Join us for a live demo and see firsthand how our solution can help you:

    •Protect against advanced malware-based threats delivered through URLs and attachments and non-malware threats
    •Keep your email service connected even during Office 365 email server outages
    •See at a glance the campaigns targeting your organization
    •Quickly reduce the attack surface
  • How to Build An Advanced Email Security Strategy Recorded: Apr 27 2017 46 mins
    Richard Davis, Dir, Cyber Security Strategy and Adenike Cosgrove, Cyber Security Strategy - EMEA, Proofpoint
    You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.

    Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:

    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.

    •Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.

    • How to respond to and mitigate security risks faster and more reliably at a reduced cost.
  • How to Build an Advanced Email Security Strategy Recorded: Apr 4 2017 57 mins
    Mark Guntrip, Product Marketing Director, Proofpoint
    Build an advanced email security strategy that empowers you to see, block, and respond to all email threats.

    Register now and learn:
    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.
    • Key steps to building an email security strategy that adapts to threats as they evolve
    • How to respond to security risks faster at a reduced cost
  • Proofpoint Enterprise Archive Live Demo Recorded: Mar 9 2017 47 mins
    Proofpoint Archive
    Proofpoint Offers Leading Archive, Compliance, and e-discovery Capabilities

    Get up to speed on the archiving and eDiscovery compliance challenges that enterprises face — and the Proofpoint solution that meets them.

    Watch security experts take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving. The solution features:

    - Powerful policy management capabilities that ensure information meets internal and regulatory-driven requirements
    - Fully automated eDiscovery response for real-time search, legal hold management, and legal team collaboration
    - Effective strategies for building internal support to control archived content
  • How to Fight the Next Generation of Targeted BEC Attacks Recorded: Mar 8 2017 57 mins
    Ryan Terry, Product Marketing Manager at Proofpoint
    Highly-targeted, low volume impostor email – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today.  This is not news.
     
    But things are changing.  New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
     
    Join us for a live webinar on Wednesday, March 8th at 10am PST where you will learn:
    -  Why email spoofing works
    -  Current BEC trends and attack methods
    -  How Proofpoint’s new Email Fraud Defense solution can identify and block BEC threats before they reach the inbox
  • Protection On The Go | Mobile Security - Live Demo Recorded: Mar 2 2017 42 mins
    David Jevans, VP Mobile Security Proofpoint
    Mobile Defense - Live Demo
  • FINRA And SEC Exam Priorities For 2017 Recorded: Mar 1 2017 49 mins
    Martin Tuip, Sr Product Manager | Joanna Belbey, Compliance Subject Matter Expert | Dan Nadir, VP, Product Management
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2017.

    Joanna Belbey, Compliance Subject Matter Expert, Proofpoint, Dan Nadir, VP, Product Management, Proofpoint and Martin Tuip, Senior Product Marketing Manager will discuss some of the risks spotlighted for 2017:

    • Recordkeeping
    • Supervision and controls to protect investors
    • Suitability, particularly for seniors
    • Social media and electronic communications retention and supervision
    • Cybersecurity controls

    Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
    Time not convenient? Sign up anyway and we’ll send you the link to the recorded webinar plus valuable materials.
  • Threat Actors Are Using Automation..Are You Automating Threat Response? Recorded: Feb 21 2017 43 mins
    Joseph Yun, Sr. Product Evangelist, ProofPoint
    Cyber criminals are leveraging automation to launch more efficient and effective campaigns. Manual defense solutions will never be able to scale to fight back.

    Join us for this webinar to learn:

    -The scope of automation necessary to combat mass campaigns from attackers
    -What automations can be accomplished with the fastest ROI
    -How to apply internal context, 3rd party intelligence, and campaign data to automated defense
    -Shortcuts to integrating with alert sources and enforcement systems
  • Responding to Cybersecurity Challenges in Higher Education Recorded: Feb 15 2017 52 mins
    Proofpoint, Duane Kurada, Curtis Wray
    Universities are faced with a constantly evolving cyber threat landscape as well as an ever-changing faculty and student body. With limited budgets and a shortage of skilled security staff, doing less with more is not a mantra, it's a way of life that requires smart choices and maximizing resource efficiency.

    Join us on February 15th to hear Proofpoint cybersecurity experts discuss:

    •Explore threats that specifically target Higher Education
    •Discuss the challenges faced when dealing with these threats
    •Demonstrate incident response focused technology
  • Bridging the Office 365 Security Gap Recorded: Feb 14 2017 52 mins
    Jennifer Cheng Director, Product Marketing, Proofpoint
    As you plan the move to Microsoft Office 365, you must implement the right security capabilities to ensure advanced email protection and continuity.

    Join this webinar to learn how you can:

    -Get visibility into all threats targeting your organization
    -Block threats before the inbox
    -Implement protection against compliance violations and information loss
  • Live Demo: Protecting Your Healthcare Data from Attack Recorded: Feb 9 2017 45 mins
    Proofpoint
    You know the situation: healthcare is becoming one of the primary targets for cyber attacks. What will it take to protect your organization? Find out by attending a live demo of Proofpoint Information Protection Suite.

    Learn about our products:

    •Email Data Loss Prevention to help you quickly discover exposed sensitive and confidential data and quickly resolve any issues
    •Email Encryption to ensure your clinicians and patients’ messages and attachments are communicated securely
    •Data Discover that provides the visibility to accurately discover, monitor and protect sensitive data on file shares, data stores and SharePoint sites

    The demo will include a live Q&A.
  • Improve Your Cybersecurity Visibility by Thinking Beyond the Network Recorded: Feb 8 2017 53 mins
    SVP, Cybersecurity Strategy, David Jevans, VP Mobile Security, Celeste Wynchopen, Social Media Strategist, ProofPoint
    Today’s cyber attackers exploit human weakness more often than infrastructure gaps: 90% of attacks target email, but social media links and mobile apps are also fair game.

    In this webinar, you'll learn:

    -How cyber attackers gain visibility into organizations
    -How you can see across all major threat entry points and stop attacks
    -How to stop business email compromise (BEC), credential phishing, ransomware and other advanced threats
    -How to eliminate social media risk so you can focus on social success
    -How to protect against malicious apps that mishandle data or install malware
  • Preparing for Cyber Threats in 2017 Recorded: Feb 2 2017 51 mins
    Richard Davis, Director Cybersecurity & Adenike Cosgrove, Snr. Product Marketing Manager, Proofpoint
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Proofpoint for "How to Prepare for Cyber Threats in 2017" and learn:

    * What we predict for the threat landscape in 2017

    * Key actions you can take to prepare

    * What top resources will help support your security efforts
  • How to Leverage Proofpoint and Splunk Recorded: Jan 31 2017 34 mins
    Alok Ojha and Jeff Burstein from Proofpoint and Vijay Chauhan from Splunk
    By integrating Proofpoint Emerging Threat® (ET) intelligence, to include email and social media together with Splunk’s analytics-driven platform, visibility is now expanded across your entire organization, enabling your teams to delve into granular new use cases.

    Register now to attend this live webinar on January 31st at 10:00 a.m. PT to get a closer look at the benefits of the integration. You’ll learn how joint customers of Proofpoint and Splunk will be able to:

    * Ingest logs from Proofpoint Email Protection and Social Media Protection for increased visibility into email and social threats

    * Leverage Proofpoint Emerging Threats (ET) Technical Add-On (TA) to enhance Splunk correlation rules and search, using the Adaptive Response framework

    * Simplify incident investigation, discovery and hunting

    * Create consolidated reports for both security and compliance

    We’ll also take you “behind the scenes” to demonstrate how the technology works and why our partnership is truly Better Together!
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Business Email Compromise in Higher Education
  • Live at: Sep 28 2016 5:00 pm
  • Presented by: Proofpoint
  • From:
Your email has been sent.
or close