Hi [[ session.user.profile.firstName ]]

Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility

The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.

Join guest speaker, Forrester’s Joseph Blackenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.

Topics include:
- How to grapple with “malware-free” threats, like BEC spoofing
- Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
- Managing a move to the cloud without losing visibility into attacks
Recorded Dec 14 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst
Presentation preview: Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Email Protection Demo - Staying Secure in Office 365 Jan 24 2019 6:00 pm UTC 60 mins
    Proofpoint
    Anyone can be a VAP: Very Attacked Person™ and they're not always the people you expect.

    While Microsoft Office 365 allows your people to work anywhere, anytime, on any device, it can also create security issues making your people vulnerable. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Join this webinar and learn about:

    •Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • 2019 Cyber Threat Landscape Jan 23 2019 6:00 pm UTC 60 mins
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint
    In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us live as we discuss

    - Predictions for the 2019 threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Weekly Threat Byte | Happy (Late) Holidays Recorded: Jan 15 2019 7 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you Happy Holidays from TA505! TA505 is the designation for Threat Actor 505, one of the most prolific threat actors observed by Proofpoint. TA505 was responsible for the largest Dridex, Locky, Jaff and The Trick campaigns. Due to the variety of malware delivered by this group, demonstrates their deep connections to the underground malware scene.

    Proofpoint has been watching TA505 for quite some time and has data dating back to 2014 when they launched their first Dridex campaign. When TA505 changes their tactics, other threat actors tend to follow. Just in time for the holidays, Proofpoint has noticed that TA505 is sending out fewer ransomware campaigns and instead focusing on smaller more targeted attacks. Why you ask? The value of cryptocurrency has dropped significantly, leading to threat actors looking for new and creative ways to get money from unsuspecting victims.
  • Weekly Threat Byte | Sextortion Malware Recorded: Dec 19 2018 11 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you Sextortion! Sextortion is a category of scams where threat actors claim to have compromising information about the victim and threaten to expose their activities if an extortion payment is not made. We also focus on a recent Sextortion campaign that demanded $381 of Bitcoin.

    Watch the video to learn all about it.
  • Weekly Threat Byte | Get Ready for the Invasion Recorded: Dec 18 2018 9 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    . CobInt is a fairly new malware, discovered in early 2018, and seems to only be doing reconnaissance for now. It is a three stage malware with the ability to download additional modules when it's ready to strike. Like the other malwares in this series, CobInt uses clever techniques to disguise and hide itself from security researchers. CobInt is spread by a threat actor sending an email to a victim with a Microsoft Word document containing macros. If the macro is enabled, CobInt is downloaded.
  • Live Demo: Email Protection and Targeted Attack Protection Recorded: Dec 13 2018 46 mins
    Ryan Loo - Sr Systems Engineer
    More than 90% of targeted attacks start with email, and these threats are always evolving.

    Proofpoint helps you stay ahead of these attacks with a people-centric approach that detects, analyzes, and blocks advanced threats before they reach your inbox.

    Join us for a live demo and learn about:

    •How to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Enterprise Archive with Proofpoint - See How it Works Recorded: Dec 11 2018 57 mins
    Tom Mahoney - Senior Archive Specialist, Terry McMahon Sr Systems Engineer
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Modern Email Fraud Defense | Live Demo Recorded: Dec 6 2018 40 mins
    Fahad Dadabhoy - Sr Sale Engineer, Proofpoint
    Highly targeted email fraud attacks – like a cyber criminal impersonating your CEO to send your CFO a wire transfer request – are hard to catch, unless you have the right tools.

    Join us for a live demo of Proofpoint Email Fraud Defense to see how we catch email fraud scenarios like this and more.

    You’ll see for yourself how to:

    •Block malicious emails spoofing your domains before they reach your employees and customers

    •Monitor all emails (inbound and outbound) from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Weekly Threat Byte | tRAT the Trojan Recorded: Dec 5 2018 5 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week’s Interesting Threat Byte, we bring you tRAT.

    tRAT is a new Remote Access Trojan (RAT) that was first discovered back in September. The first campaigns included fake Norton Security and TripAdvisor brands as lures to get victim's to open the included Microsoft Word document, enabling macros.

    On October 11, 2018, Proofpoint discovered another tRAT campaign, but this time by threat actor TA505.

    Watch the video to get the details on tRAT and TA505.
  • Weekly Threat Byte | Good Advice, Avoid AdvisorsBot Recorded: Dec 4 2018 11 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week’s Interesting Threat Byte, we bring you AdvisorsBot.

    AdvisorsBot, is part of a group of recently discovered downloader malwares. AdvisorsBot is targeting hotels, restaurants, and telecommunications companies and is notable because it is currently only collecting system information, can download other modules/payloads, connects back to command and control servers and has many anti-analysis checks built into the code.

    Watch the video to see how AdvisorBot operates.
  • Phishing Awareness Tools | Wombat demo Recorded: Dec 4 2018 60 mins
    Proofpoint
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!
    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.

    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Customer Webinar: A people-centric approach to Cloud Security Recorded: Nov 29 2018 56 mins
    Stephen Chan-Sr Director, Product Marketing & Itir Clarke-Sr Product Marketing Manager
    As a Proofpoint customer, you’re already protecting your people from targeted attacks like phishing and malware.

    But what about your data in the cloud?

    Join us for a Proofpoint Customer webinar to learn how you can extend your people-centric email protection to accounts and data in the cloud.

    You’ll learn best practices to:

    •Protect confidential data from theft and loss
    •Secure employees most targeted by threats
    •Integrate threat detection and access controls across email and cloud
  • Live Demo: Cloud Account Defense by Proofpoint Recorded: Nov 21 2018 9 mins
    Itir Clarke, Product Marketing Manager
    Proofpoint Cloud Account Defense (PCAD), allows you to detect, investigate and defend against cybercriminals accessing your sensitive data and trusted accounts via Office 365.

    PCAD is fast and easy to deploy, and it secures Office 365 users on any network or device. This allows you to confidently drive your business forward and make the most of Office 365.

    Attackers use a variety of methods to compromise Office 365 accounts. And once they do, they can launch attacks inside and outside of your organization. This impacts your reputation and your finance. Our multi-faceted approach helps you detect account compromise and the activities that leverage stolen credentials.

    Join this webinar to see this powerful product, live in action!
  • Identifying and Protecting the Very Attacked Persons in Your Organisation Recorded: Nov 21 2018 28 mins
    Itir Clarke, Product Marketing Manager
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors who use these tactics usually aim to fraud the company, its customers or partners.

    Join us for a discussion on the clever methods used to compromise accounts and the headaches that come from it, whether it be phishing or data theft, and the steps your organization can take to help mitigate the threat.

    Join this webinar to learn:

    • The damage compromised accounts cause, from stolen customer data, to wire fraud
    • Why bad actors choose to target people rather than infrastructure
    • What you can do to keep your accounts secure
  • Demystify the cloud: Stay secure in Microsoft Office 365 Recorded: Nov 21 2018 38 mins
    Edward Rowley, Sales Engineering Manager and Tim Ricketts, Principal Sales Engineer
    Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
    While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

    Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

    --Threats: credential phishing, email fraud, targeted attacks etc
    -- Enabling secure digital transformation: people centric security at the heart of the transformation
    -- Solutions: regulatory compliance and tools to implement
  • Four Months Into GDPR: Balancing Data Protection and Digital Transformation Recorded: Nov 21 2018 49 mins
    Markus Grueneberg, GDPR Evangelist, Proofpoint and Jonathan Lee, Product Manager, Digital Risk, Proofpoint
    The internet has grown to more than 330 million unique domain names and three billion users. Digital transformation means that email, web, social and mobile have become essential channels of engagement for your business but they also increase your exposure to cyber threats, and escalate the level of digital risk.

    Your marketing team is connecting with your customers in so many ways—but do you have full visibility of these interactions? How should you safeguard your online brand and maintain GDPR compliance across this digital landscape?

    Join our webinar to hear Markus Grueneberg and Jonathan Lee share recommendations and best practices to defend your customers and your business within the digital channels that you operate in.
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks Recorded: Nov 21 2018 44 mins
    Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • Cybersecurity Now: A Guide to Building a People-Centric Strategy Recorded: Nov 21 2018 62 mins
    Ryan Kalember, SVP, Cybersecurity Strategy, Proofpoint
    Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

    You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

    Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

    o Prevent cyberattacks by stopping them before they start

    o Defend against email and cloud threats

    o Respond quickly to threats and limit the damage they could cause

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
  • Live Demo: Email Protection and Targeted Attack Protection Recorded: Nov 20 2018 32 mins
    Adenike Cosgrove, Cybersecurity Strategist and Kiran Khokhar, Product Marketing Manager
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Live Demo: Phishing Simulation and Security Awareness Training Recorded: Nov 20 2018 30 mins
    Jen Gough, Sales Engineer, Proofpoint
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!

    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.


    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility
  • Live at: Dec 14 2016 6:00 pm
  • Presented by: Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst
  • From:
Your email has been sent.
or close