Hi [[ session.user.profile.firstName ]]

Your Mobile Devices: Wi-Fi Attacks and Vulnerabilities

Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Users often accept terms and conditions without realizing the risk of data-loss.

Join this webinar to understand:

-The common vulnerabilities that users are exposed to when traveling
-How to get visibility into all remote attacks
-How to fight threats before they do harm
Recorded Oct 20 2016 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Jevans, VP Mobile Security, Proofpoint
Presentation preview: Your Mobile Devices: Wi-Fi Attacks and Vulnerabilities

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • One Year to Go! Your CA/Orchestria ‘End-of-Life’ Transition Plan Aug 1 2018 5:00 pm UTC 60 mins
    John Pepe (Proofpoint) & Christopher Amatulli (Technically Creative)
    Still on CA / Orchestria ‘Data Protection’ and don’t know where to start?

    End-of-Life happens in just 12 months and Proofpoint has a proven plan to migrate your data and detection logic to its new ‘Intelligent Supervision’ platform designed to increase the relevancy of alerts paired with intuitive workflows.

    In this short webinar, Proofpoint and Technically Creative will discuss migration best practices and present a plan to have customers up-and-running by summer 2019, so there is no gap in regulatory compliance.

    Join us as our experts discuss:

    - Where to Start
    - Summer 2019 Transition Plan
    - Upgrading to Intelligent Supervision
    - Ongoing Support

    Join CA / Orchestria ‘Data Protection’ experts John Pepe and Christopher Amatulli from Technically Creative for insights on making a timely, successful transition, all while remaining compliant.
  • Keeping Up With Automation - Threat Response Live Demo Jul 26 2018 5:00 pm UTC 45 mins
    Todd Edelglass, Sr Engineer
    Proofpoint's Threat Response product orchestrates several key phases of the incident response process, collecting alerts, context, target histories and intelligence from internal and external sources.

    Using all of this information, it automates workflows and response actions saving you critical time. Join us for a live walkthrough of the product and see it for yourself:

    Join us to see how to

    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • Phishing – Sensibilisez vos utilisateurs par la simulation et la formation Jul 24 2018 9:00 am UTC 45 mins
    Mickael Omer, Sales Engineer
    Le phishing reste l’une des plus grandes menaces pour les entreprises. Ce type d’attaque ciblée exploite le facteur humain plutôt que la technologie, ce qui la rend plus difficile à détecter par les solutions de sécurité traditionnelles. Nous vous ferons découvrir comment réduire le risque d’hameçonnage en permettant la simulation de phishing et la formation pour aider vos utilisateurs finaux à détecter, signaler et se prémunir de cette menace.

    Durant cette session, nous couvrirons les sujets suivants :

    • Comment évaluer la vulnérabilité de vos utilisateurs aux attaques de phishing et de spear phishing
    • Sensibiliser et former vos utilisateurs pour qu’ils reconnaissent et évitent les attaques de phishing et autres escroqueries d'ingénierie sociale
    • Comment permettre à vos employés de signaler les messages suspects en un seul clic.
  • Malware of the Week | One-Two Punch Recorded: Jul 19 2018 10 mins
    Each week we host a Threat of the Week webinar featuring a high-level look at interesting threats to help security teams navigate the attack landscape, in less than 10 minutes.

    This week on Threat of the Week – a Phish, a RAT and some LaZagne

    Malware like Sentinel are particularly dangerous due to their multi-stage infection progression. It kicks off with an emailed Word doc that, once downloaded it requests you to enable macros. After that it installs that RAT and then installs LaZagna.

    A nasty one-two punch.

    We also cover a new phishing campaign focused on Stripe and Square payments. Joins us to learn how these attacks worked and how to avoid them.
  • Proofpoint Email Protection Demo - See it Live Recorded: Jul 18 2018 46 mins
    John Daley - Sr Engineer
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Email Account Compromise – How Dangerous Is it and How to Prevent It Recorded: Jul 17 2018 40 mins
    Eric Schwake, Group Product Marketing Manager, Proofpoint & Itir Clarke, Sr Security Strategist, Proofpoint
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors use these tactics usually aim to fraud the company, its customers or partners

    Join us for a discussion on the problems associated with compromised accounts, from phishing to malware vulnerability and the steps your organization can take to help mitigate the threat.

    Join us and learn:

    - The damage compromised accounts cause, from stolen customer data, to phishing
    - Why targeting people, not infrastructure is more effective
    - What you can do to keep your accounts secure
  • Still Falling Foul to Phishing? Recorded: Jul 11 2018 42 mins
    Brett Shaw, Sr Cybersecurity Strategist, Proofpoint
    It has been around for many years, but phishing is not a problem that’s going away any time soon.

    In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of.

    Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization.

    Join us as we discuss:

    - Effective security training to help prevent falling for an attack
    - The right tools and methods for detecting phishing
    - How to respond when to email threats
  • Malware of the Week | Iced, Iced ID Recorded: Jul 3 2018 12 mins
    Each week we host a Threat of the Week webinar featuring a high-level look at interesting threats to help security teams navigate the attack landscape.

    This week on Malware of the Week:

    We explore “IcedID”, a new trend where similar malwares are being used together to create a synergistic effect to better convince victims that the websites they are visiting are indeed their financial institutions

    Another threat that caught our attention was the Chalbhai generic phishing threat. A lot of security vendors are letting this one slip through to customers and we dive into why this is happening
  • Phishing Prevention Training Demo Recorded: Jun 28 2018 29 mins
    Chris Thielet, Phishing Training Specialist & Brett Shaw, Sr Security Strategist
    Today’s cyberattacks target individuals, not infrastructure, and phishing is one of the most successful and enduring types of attack.

    Join this live demo to see how Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, reduces phishing risk by enabling phishing simulation and training to change end-user behavior.

    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Inoculation Against Healthcare Cyber Attacks Recorded: Jun 26 2018 60 mins
    RYAN WITT Healthcare Industry Practice Leader and RYAN TERRY Sr. Product Marketing Manager
    Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment.

    Join us for a discussion of:

    - Just released research that outlines healthcare's most likely threat vectors of 2018
    - How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare
    - Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution
    - New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow
  • Malware of the Week | Houdini takes control Recorded: Jun 26 2018 12 mins
    Every week Proofpoint's researchers report on the active threats making their way around the Internet and the threats commonly missed by security vendors.

    This week on Malware of the Week:

    The threat of the week was all about RATs and backdoors and you don't want either! We dive into H-Worm(Houdini) a Visual Basic Script(VBS) that allows threat actors full control over a victim's computer and Jacksbot, a Java backdoor that takes control and so much more!

    The Miss of the Week was a fascinating malware rivaling a Rube Goldberg Machine, SocGholish. This malware convinces users to go to a website and click on fake upgrade screens. From there the dominos begin to fall...
  • Demystify the cloud: Stay secure in Microsoft Office 365 Recorded: Jun 26 2018 38 mins
    Edward Rowley, Sales Engineering Manager and Tim Ricketts, Principal Sales Engineer
    Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
    While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

    Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

    --Threats: credential phishing, email fraud, targeted attacks etc
    -- Enabling secure digital transformation: people centric security at the heart of the transformation
    -- Solutions: regulatory compliance and tools to implement
  • Schutz vor modernen CEO-Fraud-Angriffen: Live-Hack und umfassende Schutzkonzepte Recorded: Jun 26 2018 61 mins
    Chris Wojzechowski,Security Researche,Institut für IT-Sicherheit und Markus Grünenerg, Senior Security Strategist, Proofpoint
    E-Mail-Betrug, auch CEO-Fraud oder BEC (Business Email Compromise) ist weit verbreitet und kostet Unternehmen Milliarden. Dabei ist ein Großteil dieser E-Mail-Angriffe vermeidbar. Diese Bedrohungen beginnen meist mit einer E-Mail, die von einer hochrangigen Führungskraft, aber auch von Partnern oder Lieferanten zu stammen scheint. Diese E-Mail weist Mitarbeiter an Gelder zu überweisen oder sensible Daten zur Verfügung zu stellen. Die Empfänger erfüllen pflichtbewusst die übertragenen Aufgaben, überweisen zb das angeforderte Geld – und lernen erst später, dass sie betrogen worden sind.

    Erleben Sie in unserem Webinar anhand eines CEO Fraud Live Hack, wie leicht Ihre Mitarbeiter dazu gebracht werden, die betrügerischen Anfragen auszuführen. Anschließend zeigen wir Ihnen auf, wie Proofpoint Ihre Mitarbeiter und Ihr Unternehmen anhand eines mehrstufigen Schutzkonzeptes vor derartigen Angriffen schützen kann.
  • Pourquoi sécuriser sa messagerie sous Office 365 ? Recorded: Jun 21 2018 41 mins
    Laura Peytavin, Sales Engineer, CISSP et Miguel Battais, Account Manager France, Proofpoint
    Office 365 est en France et en Europe une solution collaborative de plus en plus adoptée par les organisations.

    La messagerie fait partie des services déployés en priorité.

    Les clients Office365 sont confrontés à deux soucis majeurs :

    1 Obtenir la meilleure sécurité possible contre les attaques sur les courriels, qui représentent encore aujourd’hui 93% des vecteurs de menaces sur vos données et vos postes de travail,

    2 Conserver une continuité de service lorsqu’Office 365 est indisponible.

    Lors de ce webinaire, nous présenterons entre autre comment Proofpoint, fournisseur de solutions de cybersécurité « people-centric » adresse les défis suivants :

    -Protection des identifiants utilisateurs ciblés par du phishing O365 de plus en plus sophistiqué
    -Contrer la fraude email (attaques au président, FOVI) qui n’est pas traitée par O365, quel que soit l’offre souscrite
    -Donner une visibilité en temps réel des attaques
    -Pouvoir faire des corrélations d’attaques qui deviennent de plus en plus multi-vectorielles (liens vers du partage de fichiers dans le Cloud : Box, OneDrive, SalesForce, Sharepoint, GSuite, etc…)
  • Malware of the Week | It's a Blast from the Past Recorded: Jun 20 2018 7 mins
    Every week Proofpoint's researchers report on the active threats making their way around the Internet and the threats commonly missed by security vendors.

    This week on Malware of the Week:

    Get your flannel ready because the Threat of The Week was a 90's blast from the past with Shankar's Virus. A polymorphic virus discovered in 1999 that can cause Microsoft Word to no longer function and change computer time.

    The Miss of The Week was a cryptocurrency miner called CoinHive. Emails lead victims to websites with JavaScript code on them that use the unsuspecting victim's own computer to mine Monero cryptocurrency.
  • Live Demo: Email Fraud Defense by Proofpoint Recorded: Jun 19 2018 47 mins
    Neil Hammet, Email Fraud Specialist
    Email Fraud is one of the oldest yet most successful threats against your organisations. Proofpoint Email Fraud Defense (EFD) can help you protect your organisation and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organisation and people by leveraging the power of EFD.

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Malware of the Week - Proofpoint Caught a RAT Recorded: Jun 15 2018 12 mins
    Every week Proofpoint's researchers report on the active threats making their way around the Internet. Join us each week for a brief roundup of

    - What threat is making waves this week and another that is commonly missed by security vendors

    THS WEEK on Malware of the Week:

    We saw a highly targeted RAT/Stealer that is making it’s way around the Internet. RAT (remote access trojan) is the terminology for a banking trojan that can take control of your users' systems
  • Tools for Email Fraud Defense | Live demo Recorded: Jun 13 2018 25 mins
    Alex Fryback, Product Manager at Proofpoint
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution.

    Learn how EFD can help you:

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • 360 Degrees of Email Fraud Defense | Why Email Fraud Still Works Recorded: Jun 6 2018 43 mins
    Ryan Terry - Sr Security Strategist, Email Fraud Defense
    You likely know that email fraud is costing organizations billions of dollars. But do you know why these attacks continue to reach new levels of success? Proofpoint researchers have uncovered the latest email fraud trends, tactics, and techniques that are impacting organizations around the world.

    Join us and learn:

    • Why organizations haven’t solved one of the oldest email scams
    • The strategies needed to stop these attacks before they reach your employees, customers, and business partners
    • What a best practice email fraud solution should include
  • Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse Recorded: Jun 5 2018 54 mins
    Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint
    Proofpoint hat seinen neuen Faktor Mensch Bericht für das Jahr 2018 veröffentlicht, der untersucht, wie Bedrohungsakteure ihre Herangehensweisen mit Social Engineering und ausgeklügelten Angriffen verfeinern, die selbst versierte Benutzer regelmäßig täuschen.

    Melden Sie sich jetzt zu unserem Live-Webcast Der Faktor Mensch 2018 am 5. Juni 2018 um 10:00Uhr an und informieren Sie sich über die wichtigsten Erkenntnisse des diesjährigen Berichts.
    Der jährliche Proofpoint Bericht basiert auf der Analyse von Angriffsversuchen bei mehr als 6.000 weltweiten Unternehmenskunden während des gesamten Jahres 2017 und bietet Einblicke in Angriffstrends über E-Mail, Cloud-Anwendungen und soziale Medien hinweg, um Unternehmen und Benutzern die Sicherheit zu gewährleisten.

    Themen des Berichtes:
    -Soziale Engineering: Wie Social Engineering auf den Faktor Mensch abzielt
    -Bedrohungs-Trends: Malware, Phishing und E-Mail-Betrug: Dropbox, Docusign & Co
    -Trends zu gezielte Angriffen: Spam-Kampagnen bis zielgerichteter E-Mail-Betrugs
    -Neue digitale Risiken: Collaboration-Tools als neue Angriffsziele
    -Angriffe über Cloud Dienste: Cyberangriffe über Cloud-Dienste und -Apps
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Your Mobile Devices: Wi-Fi Attacks and Vulnerabilities
  • Live at: Oct 20 2016 4:00 pm
  • Presented by: David Jevans, VP Mobile Security, Proofpoint
  • From:
Your email has been sent.
or close