Hi [[ session.user.profile.firstName ]]

Email Fraud Defense: How to Fight the Next Generation of Targeted BEC Attacks

Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees are the biggest cyberthreat organizations face today. Yet the vast majority of these attacks are preventable.

Watch this webinar to learn:

- Why email spoofing works
- Current BEC trends and attack methods
- How Proofpoint’s new Email Fraud Defense solution can identify and
block BEC attacks before they hit the inbox
Recorded Dec 6 2016 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Proofpoint
Presentation preview: Email Fraud Defense: How to Fight the Next Generation of Targeted BEC Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber-Threats in Healthcare: Understanding and Protecting Against the Risks Sep 25 2019 5:00 pm UTC 52 mins
    Roman Tobe, Product Marketing Manager
    Security is more critical than ever for healthcare organizations. At the same time, the sector has become one of the most easily targeted. Hospitals, for example, are falling victim to cyber-attacks such as ransomware and business email compromise (BEC). However, healthcare organizations attack surface extends beyond email.

    Cyber criminals create fake social media accounts and register fraudulent domains to attack their supply chain, defraud their customers and gain access to sensitive data. Join this webinar and learn how Proofpoint can help protect healthcare organizations from these targeted attacks.

    Join us to learn:

    - The state of cyber risks in healthcare
    - The latest trends in cyber threats targeting healthcare organizations
    - How Proofpoint can help protect your organization
  • Live Demo: Security Awareness Training Sep 5 2019 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • What the Symantec Acquisition Means for Your Email Security Future Aug 28 2019 4:30 pm UTC 60 mins
    Ryan Kalember, EVP of Cybersecurity Strategy for Proofpoint
    It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats.

    As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn:

    - How the email threat landscape has changed with attackers evading legacy approaches
    - How leaders like Proofpoint have innovated to keep up
    - How we have helped customers migrate from legacy products to Proofpoint
  • Building a Culture of Security within Healthcare Organizations Aug 27 2019 5:00 pm UTC 59 mins
    Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice
    Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.

    In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.

    Join us to learn:

    - What we mean by a “patient-centric” cybersecurity mindset
    - How to overcome common training obstacles and deliver the most effective cybersecurity education program
    - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program Aug 22 2019 5:00 pm UTC 60 mins
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity Aug 21 2019 5:00 pm UTC 38 mins
    Joel Sierra, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Live Demo: Proofpoint Security Awareness Training Recorded: Aug 20 2019 31 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Cloud Security: Learn How to Protect Your Cloud Users with a CASB Innovator Recorded: Aug 20 2019 59 mins
    Ryan Kalember, SVP of Cybersecurity Strategy - Proofpoint. Garrett Bekker, Principal Analyst Info Security - 451 Research.
    In case you missed it, we wanted to share a recent webinar about how to use a Cloud Access Security Broker (CASB) to protect your organization from next generation cloud attacks.

    Join Garrett Bekker, Principal Security Analyst at 451 Research, and Ryan Kalember, EVP of Cybersecurity at Proofpoint, for a discussion about:

    • The different CASB use cases, features and architectures
    • What the most prevalent cloud attacks are, and how they target your VAPs, or Very Attacked People
    • What to look for in a CASB solution to mitigate your cloud risks
  • From Skeptics to Champions: Selling the Value of Security Awareness Training Recorded: Aug 15 2019 106 mins
    Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader
    The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.

    Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.

    Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:

    - Best practices for selling the value of security awareness training internally
    - Preparing a business case for your training program
    - Engaging employees through creative programming, recognition, and incentives
  • Securing the Multi-Cloud in the Age of Threats Recorded: Aug 8 2019 55 mins
    Raj Mallempati (CloudKnox Security) | Chris Schueler (Trustwave) | Tim Choi (Proofpoint) | Nathan Wenzler (Moss Adams)
    How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about:
    - Multi-cloud reality
    - Addressing your cyber risk
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Automating security tasks across multiple clouds and applications
    - Recommendations for improving enterprise cloud security

    Speakers:
    - Raj Mallempati, COO, CloudKnox Security
    - Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
    - Tim Choi, VP, Product Marketing, Proofpoint
    - Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
  • Webisode 4: Proofpoint Demo - Enterprise Information Archiving Recorded: Aug 8 2019 29 mins
    Tom Mahoney, Senior Archiving Sales Specialist; Jason Colvin, Senior Systems Engineer
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us for the last of four webisodes to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance
  • How To Build a People-Centric Cybersecurity Strategy Recorded: Aug 8 2019 23 mins
    Tim Choi, VP, Product Marketing, Proofpoint & Roselle Safran, President, Rosint Labs
    Abstract: More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the center when building a robust cybersecurity approach in the era of highly sophisticated attacks.

    Join BrightTalk for a live interview with Tim Choi, the VP of Product Marketing at Proofpoint, as we discuss the key findings of the threat landscape for 2019 and share practical tips on how CISOs can build a truly people-centric cybersecurity strategy.
  • Webisode 5: Proofpoint Demo - Ramping Up People-Centric Cybersecurity Recorded: Aug 7 2019 36 mins
    Craig Morell, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    - Identify and remediate account compromise attacks
    - Solve for data loss through email
    - Make your users more resilient against attacks through awareness training
  • Compliance Trends & Futures – How Technology is Driving Change Recorded: Aug 6 2019 59 mins
    Martin Tuip - Senior Information Archive Strategist, John Pepe - Market Development Principal
    The compliance world is changing. Regulations are evolving and new technology addressing compliance challenges are becoming available. From international privacy regulations to new communication channels, how can organizations keep up with those changing regulations and how can they remain nimble.

    Join us for a webinar on compliance trends and futures and how regulatory technology and modern-day data behavior is driving change.

    Learn about:
    • What regulators are focusing on these days
    • New regulatory and compliance technology that can help organizations meet regulatory requirements
    • External drivers for technology change
  • Live Demo: Proofpoint Security Awareness Training Recorded: Aug 6 2019 33 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Broker-Dealers on Social Media: Understanding the Risks Recorded: Aug 5 2019 59 mins
    Roman Tobe, Product Marketing Manager
    Regulations put broker-dealers squarely in the spotlight of various risks and responsibilities. FINRA and the SEC govern marketing communications and advertising practices when communicating with the public. Additionally, the cybersecurity threat landscape is evolving and is one of the primary operational risk’s firms face today.

    Join Proofpoint to hear the latest in advertising regulations and the cybersecurity threat landscape. Learn how your firm can protect its people and data on social media.

    Watch this webinar and learn:

    - The requirements of advertising regulations on social media
    - The latest trends in cyber threats facing broker-dealers
    - How Proofpoint can help protect your firm from today’s risks
  • Beyond the Phish: A Snapshot of End-User Behavior Recorded: Jul 31 2019 59 mins
    Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist
    Phishing is one of InfoSec's longstanding threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end users about cybersecurity threats beyond email-based social engineering
    - The strengths and weaknesses among end users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization
    - A more wholistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks
    - How you can use this information to reduce the risk of successful cyberattacks within your organization

    Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo – Browser & Email Isolation to Protect Your Users in Minutes Recorded: Jul 30 2019 34 mins
    Eric Schwake, Product Marketing Manager & Paul Wang, Technical Product Marketing Manager
    When your employees are browsing the web or accessing webmail, your organization can be facing a wide range of online threats. These can include ransomware, web-based & file exploitation, leaks of sensitive and confidential information, and catastrophic data breaches. Web isolation technology is one of the best ways to help you protect against these risks.

    Join Proofpoint’s Browser and Email Isolation live demo as we share:

    • How Proofpoint protects your users within minutes from web born threats from risky browsing and malicious email in both corporate and personal email
    • How Proofpoint’s new integration with Targeted Attack Protection (TAP) allows us to provide adaptive controls within corporate email to enhance security
    • How Proofpoint’s people-centric approach to Isolation stacks up against competitors
  • Webisode 3: Future-Proof Your Legacy and Cloud Archive Recorded: Jul 25 2019 58 mins
    John Pepe Archiving Specialist; Martin Tuip, Sr Product Marketing Manager
    Many organizations have already deployed a compliance solution but continuing adoption of the cloud for business processes eventually results in the reevaluation of the existing compliance infrastructure. With email and collaboration data in Office 365 growing daily and the need to meet compliance and legal requirements, you need to come up with a strategy of how to address legacy and cloud archive data that is future-proof.

    Join the third of four webisodes to discuss what a modern archiving strategy looks like, and how you can get there.

    In this session we'll discuss:

    - What’s involved in the move – policy, planning, and people
    - Challenges with O365 from a compliance and legal view
    - The ins and outs of archiving with Office 365
    - Industry trends
  • Proofpoint Security Awareness Training with Customization Center Recorded: Jul 25 2019 32 mins
    Shani Mahler, Product Manager & Mike Bailey, Sr. Product Marketing Manager
    Security awareness training is not one size fits all. Every organization, region, and even departments or specific roles can have different training needs. Which is why we introduced our Customization Center to enable administrators to tailor their content and assign it quickly to their end users.

    Join us as our experts talk about how you can utilize the Customization Center. This self-service customization enables quick turnaround of changes and the greatest flexibility in personalizing content for your organization at no additional charge to customers. The new version allows administrators the ability to manipulate most visible text, including the questions in the quizzes as well as the text across all supported locales.

    You'll learn how to:

    - Create customized, role-based training for individual departments, roles, or regions to ensure relevancy to specific users or groups
    - Provide a quality educational experience and continue to drive behavior change while customizing content
    - Align training with the knowledge level and cyber security maturity for your organization
    - Ensure your training content remains consistent for multinational audiences
    - Edit training to maintain US Section 508 and WCAG 2.0 AA compliance and ensure users with disabilities have the same opportunity to learn
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Email Fraud Defense: How to Fight the Next Generation of Targeted BEC Attacks
  • Live at: Dec 6 2016 6:00 pm
  • Presented by: Proofpoint
  • From:
Your email has been sent.
or close