Hi [[ session.user.profile.firstName ]]

Fighting the Next Generation of Targeted BEC Attacks

Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news.

But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

In this webinar, you’ll learn:

- Why email spoofing works
- What the current BEC trends and attack methods are
- How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox
Recorded Nov 24 2016 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adenike Cosgrove, Sr. Product Marketing Mgr, Email Fraud Defense & Richard Davis, Field Product & Solutions Mgr, Proofpoint
Presentation preview: Fighting the Next Generation of Targeted BEC Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Building a Culture of Security within Healthcare Organizations Aug 27 2019 5:00 pm UTC 59 mins
    Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice
    Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.

    In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.

    Join us to learn:

    - What we mean by a “patient-centric” cybersecurity mindset
    - How to overcome common training obstacles and deliver the most effective cybersecurity education program
    - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
  • Webisode 6: Live Demo - Advanced People-Centric Cybersecurity Aug 21 2019 5:00 pm UTC 38 mins
    Joel Sierra, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Webisode 4: Live Demo - Enterprise Information Archiving Aug 8 2019 5:00 pm UTC 29 mins
    Tom Mahoney, Senior Archiving Sales Specialist; Jason Colvin, Senior Systems Engineer
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us for the last of four webisodes to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance
  • Webisode 5: Live Demo - Ramping Up People-Centric Cybersecurity Aug 7 2019 5:00 pm UTC 36 mins
    Craig Morell, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    - Identify and remediate account compromise attacks
    - Solve for data loss through email
    - Make your users more resilient against attacks through awareness training
  • Beyond the Phish: A Snapshot of End-User Behavior Jul 31 2019 5:00 pm UTC 60 mins
    Gretel Egan, Security Awareness and Training Strategist & Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist
    Phishing is one of InfoSec's longstanding threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end users about cybersecurity threats beyond email-based social engineering
    - The strengths and weaknesses among end users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization
    - A more wholistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks
    - How you can use this information to reduce the risk of successful cyberattacks within your organization

    Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.
  • Live Demo – Browser & Email Isolation to Protect Your Users in Minutes Jul 30 2019 5:00 pm UTC 45 mins
    Paul Wang, Technical Product Marketing Manager
    When your employees are browsing the web or accessing webmail, your organization can be facing a wide range of online threats. These can include ransomware, web-based & file exploitation, leaks of sensitive and confidential information, and catastrophic data breaches. Web isolation technology is one of the best ways to help you protect against these risks.

    Join Proofpoint’s Browser and Email Isolation live demo as we share:

    • How Proofpoint protects your users within minutes from web born threats from risky browsing and malicious email in both corporate and personal email
    • How Proofpoint’s new integration with Targeted Attack Protection (TAP) allows us to provide adaptive controls within corporate email to enhance security
    • How Proofpoint’s people-centric approach to Isolation stacks up against competitors
  • Webisode 3: Future-Proof Your Legacy and Cloud Archive Jul 25 2019 5:00 pm UTC 58 mins
    John Pepe Archiving Specialist; Martin Tuip, Sr Product Marketing Manager
    Many organizations have already deployed a compliance solution but continuing adoption of the cloud for business processes eventually results in the reevaluation of the existing compliance infrastructure. With email and collaboration data in Office 365 growing daily and the need to meet compliance and legal requirements, you need to come up with a strategy of how to address legacy and cloud archive data that is future-proof.

    Join the third of four webisodes to discuss what a modern archiving strategy looks like, and how you can get there.

    In this session we'll discuss:

    - What’s involved in the move – policy, planning, and people
    - Challenges with O365 from a compliance and legal view
    - The ins and outs of archiving with Office 365
    - Industry trends
  • Webisode 4: Live Demo - Foundations of People-Centric Cybersecurity Jul 24 2019 5:00 pm UTC 41 mins
    Dustin Anderson, Senior Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    - Protect your people from email-based attacks
    - Gain visibility into who in your organization is getting the most attacks
    - Solve for user awareness through threat simulation and training
  • 2019 State of the Phish: Impacts and Opportunities Jul 18 2019 5:00 pm UTC 61 mins
    Dale Zabriskie, Security Awareness and Training Evangelist
    Phishing continues to be the number one attack vector. Why? Because it works — all too well. Industries of every kind fall prey to these scams — from financial organizations to government contractors to healthcare firms. Today’s cybercriminals manage to evade even the most sophisticated security technology through carefully planned, socially engineered email attacks that are only getting more advanced.

    The fifth annual State of the Phish Report provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this report, our focus mirrors that of cyber attackers: people. You will see data related to the following:

    Tens of millions of simulated phishing emails:
    We compiled and analyzed data from tens of millions of simulated phishing emails sent to end users via our cloud-based Security Education Platform between October 2017 and September 2018.

    16 industries:
    We compare and contrast activities and results from organizations and their employees across 16 industries.

    Nearly 15,000 survey responses from InfoSec professionals:
    We sent quarterly surveys to our database of InfoSec professionals (customers and non-customers) throughout 2018. Their responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks.

    7,000+ technology user insights:
    Our third-party survey of more than 7,000 working adults — 1,000 each in the US, UK, France, Germany, Italy, Australia, and Japan — reveals understanding of common social engineering terms and attack vectors. The results provide a global perspective on the awareness levels of the average end user.
  • Securing Your Organization & End-Users with Browser and Email Isolation Jul 16 2019 5:00 pm UTC 60 mins
    Paul Wang, Technical Product Marketing Manager
    Everyday threat actors are trying to infiltrate your organization with advanced attacks by going after your users via corporate email, personal web mail and personal browsing. When your people engage in personal browsing or webmail at work, they can become a target for attackers. IT and Security teams are struggling with the process of exception handling for particular user website while still ensuring their organizations’ security. What can you do to protect your organizations and end-users?

    Join Proofpoint as we discuss:
    • A people-centric approach to browser and email security
    • The benefits of adopting Isolation for personal browsing and webmail defense
    • Cost benefits using isolation for URL exception handling
  • Webisode 2: On-Premises Archives - A Breach Waiting To Happen? Jul 11 2019 5:00 pm UTC 47 mins
    Martin Tuip - Senior Information Archive Strategist
    The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades but there also come these days with some inherit increasing risks. What do these risks look like and what can you do to defend against them?

    Join this second of four webisodes to learn about:

    - Why cyber criminals might be targeting your archive
    - The top security risks of on-premises archives
    - How to reduce your risk
  • Webisode 3: Email Fraud - Case Studies & Defense Strategies w/ US Secret Service Jul 10 2019 5:00 pm UTC 73 mins
    Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service
    Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on.

    What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks?

    Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies.

    We’ll share:

    - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers
    - How fraudsters use social engineering to reach the right person at the right time
    - How to identify and stop email fraud attacks before they reach the inbox
  • State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users Jul 10 2019 3:30 am UTC 38 mins
    Paul Down, Senior Director Proofpoint Security Awareness Training
    As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.

    Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.

    Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:

    - How to build a people centric security strategy

    - Steps organizations are taking to mitigate end-user risk from phishing

    - The most devastating types of phishing emails

    - The most vulnerable industries and departments
  • Webisode 1: 2019 FINRA and SEC Compliance Jun 27 2019 5:00 pm UTC 56 mins
    Raymond Mcgrath, Services, Supervision Policy Consultant; Roman Tobe, Manager, Product Marketing
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for the rest of 2019 and beyond.

    Attend our first of four webisodes to learn how you can help your firm meet these and other regulatory challenges in the year ahead. Our industry experts will discuss some of the risks spotlighted for 2019:

    - Supervision of Digital Assets Business
    - Regulatory technology
    - Adequacy of firms’ cybersecurity programs to protect sensitive information
  • EMEA Threat Landscape: Volumes, Focus, & Shifting Targets Jun 27 2019 9:00 am UTC 45 mins
    Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales Engineer
    2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.

    While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
  • Webisode 2: Strategic Cybersecurity Transformation - Why Now, Why People-Centric Jun 26 2019 5:00 pm UTC 66 mins
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    In this session, you'll learn:
    - How business transformation like the rise of Office 365 has driven cybersecurity transformation
    - Why you should pivot your transformation around people and culture, rather than infrastructure
    - 6 principles for successful cybersecurity transformation
  • Live Demo: Email Fraud Defense Jun 26 2019 3:30 am UTC 30 mins
    Ash Valeski, Director Product Management, Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Live Demo: Proofpoint Security Awareness Training Jun 25 2019 5:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Enterprise Information Archiving Recorded: Jun 20 2019 31 mins
    John Pepe, Market Development Principle - Financial Services. Micah Wyenn, Sales Engineer
    Financial services firms face some of the world’s most stringent and complex regulations. Proofpoint offers solutions that can help financial firms streamline compliance. We provide compliance and supervision solutions that provide easy capture, review, and reporting. That means complete visibility across your email, instant messages, collaboration tools, and social media.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    •Mitigate risk of adverse inferences and damaged reputations
    •Quickly collect, search and retrieve data on demand
    •Stay compliant with industry regulations through Enterprise Archiving, Intelligent Supervision and E-discovery
  • 2019 Domain Fraud Report with Proofpoint Recorded: Jun 18 2019 49 mins
    Roman Tobe, Product Marketing Manager
    Web domain fraud is a growing risk for businesses, employees, and their customers. Every year, threat actors register millions of domains to impersonate brands and defraud those who trust them. How can you protect your employees and customers from these fake sites?

    Join Proofpoint as our security expert discusses the latest research findings of the 2019 Domain Fraud Report, the latest trends shaping the domain landscape, and the tactics and activities of threat actors.

    In this session, we'll share:

    • Tactics threat actors take to trick employees and customers
    • Connection between fraudulent domain registrations and highly-targeted email attacks
    • How to protect your corporate domains
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Fighting the Next Generation of Targeted BEC Attacks
  • Live at: Nov 24 2016 11:00 am
  • Presented by: Adenike Cosgrove, Sr. Product Marketing Mgr, Email Fraud Defense & Richard Davis, Field Product & Solutions Mgr, Proofpoint
  • From:
Your email has been sent.
or close