Hi [[ session.user.profile.firstName ]]

Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility

The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.

Join guest speaker, Forrester’s Joseph Blackenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.

Topics include:
- How to grapple with “malware-free” threats, like BEC spoofing
- Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
- Managing a move to the cloud without losing visibility into attacks
Recorded Dec 14 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst
Presentation preview: Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Building a Culture of Security within Healthcare Organizations Aug 27 2019 5:00 pm UTC 59 mins
    Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice
    Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.

    In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.

    Join us to learn:

    - What we mean by a “patient-centric” cybersecurity mindset
    - How to overcome common training obstacles and deliver the most effective cybersecurity education program
    - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program Aug 22 2019 5:00 pm UTC 60 mins
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity Aug 21 2019 5:00 pm UTC 38 mins
    Joel Sierra, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • From Skeptics to Champions: Selling the Value of Security Awareness Training Aug 15 2019 5:00 pm UTC 106 mins
    Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader
    The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.

    Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.

    Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:

    - Best practices for selling the value of security awareness training internally
    - Preparing a business case for your training program
    - Engaging employees through creative programming, recognition, and incentives
  • Securing the Multi-Cloud in the Age of Threats Aug 8 2019 5:30 pm UTC 60 mins
    Raj Mallempati (CloudKnox Security), Chris Schueler (Trustwave), Tim Choi (Proofpoint), Nathan Wenzler, (Moss Adams)
    How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about:
    - Multi-cloud reality
    - Addressing your cyber risk
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Automating security tasks across multiple clouds and applications
    - Recommendations for improving enterprise cloud security

    Speakers:
    Raj Mallempati, COO, CloudKnox Security
    Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
    Tim Choi, VP, Product Marketing, Proofpoint
    Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
  • Webisode 4: Proofpoint Demo - Enterprise Information Archiving Aug 8 2019 5:00 pm UTC 29 mins
    Tom Mahoney, Senior Archiving Sales Specialist; Jason Colvin, Senior Systems Engineer
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us for the last of four webisodes to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance
  • How To Build a People-Centric Cybersecurity Strategy Aug 8 2019 3:30 pm UTC 30 mins
    Tim Choi, VP, Product Marketing, Proofpoint
    Abstract: More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the center when building a robust cybersecurity approach in the era of highly sophisticated attacks.

    Join BrightTalk for a live interview with Tim Choi, the VP of Product Marketing at Proofpoint, as we discuss the key findings of the threat landscape for 2019 and share practical tips on how CISOs can build a truly people-centric cybersecurity strategy.
  • Webisode 5: Proofpoint Demo - Ramping Up People-Centric Cybersecurity Aug 7 2019 5:00 pm UTC 36 mins
    Craig Morell, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    - Identify and remediate account compromise attacks
    - Solve for data loss through email
    - Make your users more resilient against attacks through awareness training
  • Live Demo: Proofpoint Security Awareness Training Aug 6 2019 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Beyond the Phish: A Snapshot of End-User Behavior Jul 31 2019 5:00 pm UTC 60 mins
    Gretel Egan, Security Awareness and Training Strategist & Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist
    Phishing is one of InfoSec's longstanding threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end users about cybersecurity threats beyond email-based social engineering
    - The strengths and weaknesses among end users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization
    - A more wholistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks
    - How you can use this information to reduce the risk of successful cyberattacks within your organization

    Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.
  • Live Demo – Browser & Email Isolation to Protect Your Users in Minutes Jul 30 2019 5:00 pm UTC 45 mins
    Eric Schwake, Product Marketing Manager & Paul Wang, Technical Product Marketing Manager
    When your employees are browsing the web or accessing webmail, your organization can be facing a wide range of online threats. These can include ransomware, web-based & file exploitation, leaks of sensitive and confidential information, and catastrophic data breaches. Web isolation technology is one of the best ways to help you protect against these risks.

    Join Proofpoint’s Browser and Email Isolation live demo as we share:

    • How Proofpoint protects your users within minutes from web born threats from risky browsing and malicious email in both corporate and personal email
    • How Proofpoint’s new integration with Targeted Attack Protection (TAP) allows us to provide adaptive controls within corporate email to enhance security
    • How Proofpoint’s people-centric approach to Isolation stacks up against competitors
  • Webisode 3: Future-Proof Your Legacy and Cloud Archive Jul 25 2019 5:00 pm UTC 58 mins
    John Pepe Archiving Specialist; Martin Tuip, Sr Product Marketing Manager
    Many organizations have already deployed a compliance solution but continuing adoption of the cloud for business processes eventually results in the reevaluation of the existing compliance infrastructure. With email and collaboration data in Office 365 growing daily and the need to meet compliance and legal requirements, you need to come up with a strategy of how to address legacy and cloud archive data that is future-proof.

    Join the third of four webisodes to discuss what a modern archiving strategy looks like, and how you can get there.

    In this session we'll discuss:

    - What’s involved in the move – policy, planning, and people
    - Challenges with O365 from a compliance and legal view
    - The ins and outs of archiving with Office 365
    - Industry trends
  • Proofpoint Security Awareness Training with Customization Center Jul 25 2019 3:00 pm UTC 60 mins
    Shani Mahler, Product Manager & Mike Bailey, Sr. Product Marketing Manager
    Security awareness training is not one size fits all. Every organization, region, and even departments or specific roles can have different training needs. Which is why we introduced our Customization Center to enable administrators to tailor their content and assign it quickly to their end users.

    Join us as our experts talk about how you can utilize the Customization Center. This self-service customization enables quick turnaround of changes and the greatest flexibility in personalizing content for your organization at no additional charge to customers. The new version allows administrators the ability to manipulate most visible text, including the questions in the quizzes as well as the text across all supported locales.

    You'll learn how to:

    - Create customized, role-based training for individual departments, roles, or regions to ensure relevancy to specific users or groups
    - Provide a quality educational experience and continue to drive behavior change while customizing content
    - Align training with the knowledge level and cyber security maturity for your organization
    - Ensure your training content remains consistent for multinational audiences
    - Edit training to maintain US Section 508 and WCAG 2.0 AA compliance and ensure users with disabilities have the same opportunity to learn
  • Webisode 4: Proofpoint Demo - Foundations of People-Centric Cybersecurity Jul 24 2019 5:00 pm UTC 41 mins
    Dustin Anderson, Senior Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    - Protect your people from email-based attacks
    - Gain visibility into who in your organization is getting the most attacks
    - Solve for user awareness through threat simulation and training
  • Proofpoint Demo: Security Awareness Training Jul 23 2019 5:00 pm UTC 36 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • EMEA Threat Landscape: Volumes, Focus, & Shifting Targets Recorded: Jul 17 2019 25 mins
    Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales Engineer
    2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.

    While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
  • Email Fraud Case Study: Real Attacks & Defense Strategies With US Secret Service Recorded: Jul 17 2019 73 mins
    Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service
    Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on.

    What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks?

    Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies.

    We’ll share:

    - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers
    - How fraudsters use social engineering to reach the right person at the right time
    - How to identify and stop email fraud attacks before they reach the inbox
  • Securing Your Organization & End-Users with Browser and Email Isolation Recorded: Jul 16 2019 47 mins
    Eric Schwake, Product Marketing Manager
    Everyday threat actors are trying to infiltrate your organization with advanced attacks by going after your users via corporate email, personal web mail and personal browsing. When your people engage in personal browsing or webmail at work, they can become a target for attackers. IT and Security teams are struggling with the process of exception handling for particular user website while still ensuring their organizations’ security. What can you do to protect your organizations and end-users?

    Join Proofpoint as we discuss:
    • A people-centric approach to browser and email security
    • The benefits of adopting Isolation for personal browsing and webmail defense
    • Cost benefits using isolation for URL exception handling
  • Webisode 2: On-Premises Archives - A Breach Waiting To Happen? Recorded: Jul 11 2019 47 mins
    Martin Tuip - Senior Information Archive Strategist
    The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades, but some of these solutions come with inherently increasing risks. What do these risks look like and what can you do to defend against them?

    Join this second of four webisodes to learn about:

    - Why cyber criminals might be targeting your archive
    - The top security risks of on-premises archives
    - How to reduce your risk
  • Webisode 3: Email Fraud - Case Studies & Defense Strategies w/ US Secret Service Recorded: Jul 10 2019 73 mins
    Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service
    Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on.

    What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks?

    Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies.

    We’ll share:

    - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers
    - How fraudsters use social engineering to reach the right person at the right time
    - How to identify and stop email fraud attacks before they reach the inbox
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility
  • Live at: Dec 14 2016 6:00 pm
  • Presented by: Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst
  • From:
Your email has been sent.
or close