Hi [[ session.user.profile.firstName ]]

Exploit Kits Don't Stop, Neither Should Your Business.

Exploit kits don’t stop. Neither should your business with CERT Australia.

Ransomware has one goal: to get your money. It locks away files until payment is made.
Webinar invitation: December 8th at 11:30am AEST

Join Chris Firman, Technical Adviser at CERT Australia and Jennifer Cheng, Director, Product at Proofpoint for a live webinar about Ransomware. They will address:

•Ransomware evolution
•Why ransomware is surging
•Where it comes from
•How are actors bypassing common security controls
•Should you pay or not? What to consider
•CERT recommended migrations
Recorded Dec 8 2016 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Proofpoint
Presentation preview: Exploit Kits Don't Stop, Neither Should Your Business.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Panel Discussion: CISO Challenges and How to Solve Them Jun 5 2019 10:30 am UTC 45 mins
    Yotam Gutman | David Boda, Camelot Group | George Patsis, Obrela Security Industries |
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    David Boda, CISO, Camelot Group
    George Patsis, CEO, Obrela Security Industries

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Analyst Webinar: Best Practices to Defend Against Phishing Attacks May 29 2019 5:00 pm UTC 54 mins
    Joseph Blankenship, Principal Analyst, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
    In today's shifting threat landscape, cyber criminals increasingly target individuals rather than infrastructure.

    How can you defend against highly targeted and effective attacks like phishing?

    Join guest Forrester speaker Joseph Blankenship and Proofpoint for an interactive discussion about best practices around phishing and security awareness training.

    You'll learn:

    1. The latest research on breaches and why phishing stands out as one of the riskiest attack vectors
    2. Today's most common phishing methods and outcomes
    3. Proven best practices to defend against phishing
  • Live Demo: Enterprise Information Archiving May 2 2019 5:00 pm UTC 60 mins
    Tom Mahoney, Senior Archiving Sales Specialist Sales
    Financial services firms face some of the world’s most stringent and complex regulations. Proofpoint offers solutions that can help financial firms streamline compliance. We provide compliance and supervision solutions that provide easy capture, review, and reporting. That means complete visibility across your email, instant messages, collaboration tools, and social media.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    •Mitigate risk of adverse inferences and damaged reputations
    •Quickly collect, search and retrieve data on demand
    •Stay compliant with industry regulations through Enterprise Archiving, Intelligent Supervision and E-discovery
  • Live Demo: Advanced People-Centric Cybersecurity May 1 2019 5:00 pm UTC 45 mins
    Joel Sierra, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Live Demo: Email Fraud Defense Apr 25 2019 9:00 am UTC 30 mins
    Ash Valeski, Director Product Management, Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Strategic Cybersecurity Transformation: Why Now, Why People-Centric Apr 24 2019 5:00 pm UTC 66 mins
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    You'll learn:
    · How business transformation like the rise of Office 365 has driven cybersecurity transformation
    · Why you should pivot your transformation around people and culture, rather than infrastructure
    · 6 principles for successful cybersecurity transformation
  • Live Demo: Ramping Up People-Centric Cybersecurity Apr 23 2019 5:00 pm UTC 45 mins
    Craig Morell, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    1. Identify and remediate account compromise attacks
    2. Solve for data loss through email
    3. Make your users more resilient against attacks through awareness training
  • Hacking Human Nature - The truth about today's European threat landscape Recorded: Apr 18 2019 61 mins
    Paul McKay, Senior Analyst, Forrester and Adenike Cosgrove, Cybersecurity Strategist, Proofpoint
    Join Paul MacKay, Senior Analyst at Forrester, and Nikki Cosgrove, Cybersecurity Strategist at Proofpoint, as they discuss the latest European cybersecurity trends and what you can do to guard against them.
    53% of European companies have reported experiencing a data breach in the last 12 months. Companies are increasingly using cloud applications, making it easier for hackers to obtain credentials, and with email remaining the most common attack vector (over 90% of worldwide cyberattacks start with an email), it’s vital that organisations defend not just their networks, but their employees too.

    This webinar focuses on both Forrester European cyberattack landscape research and Proofpoint’s own threat insights. Discover what’s needed to build a cybersecurity strategy that will protect your most valuable asset- your people.
  • Live Demo: Email Fraud Defense Recorded: Apr 2 2019 31 mins
    Ash Valeski, Director Product Management, Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Live Demo: Foundations of People-Centric Cybersecurity Recorded: Mar 28 2019 42 mins
    Dustin Anderson, Senior Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • 2019 FINRA and SEC Exam Priorities Recorded: Mar 20 2019 57 mins
    Raymond Mcgrath, Services, Supervision Policy Consultant; Roman Tobe, Manager, Product Marketing
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2019 and beyond.

    Our industry experts will discuss some of the risks spotlighted for 2019:
    •Supervision of Digital Assets Business
    •Regulatory Technology
    •Adequacy of firms’ cybersecurity programs to protect sensitive information

    Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
  • Outside the Network: Protecting People and Customers Against Digital Threats Recorded: Mar 19 2019 52 mins
    Roman Tobe, Senior Product Marketing Manager, Proofpoint
    Bad actors do not just target employee inboxes - they also target the brand itself, key employees and customers on digital channels.

    Social media, web domains and the deep and dark web pose areas of risk where companies are not directly in control of their communication security. Despite their value, these properties are often left unsecured against fraudulent activity.

    Since these are emerging threats, digital risks can be blind spots of focus for security teams.

    Join this webinar to learn about trends in digital risk including:

    -Executive impersonations targeting your people on LinkedIn
    -Social media protection on Instagram, Facebook and Twitter
    -Credential threats on the dark web
    -Physical threats to key locations
    -Counterfeit domains in the retail space
    -Visibility into the digital threat landscape
    -How to protect against these threats
  • Live Demo: Enterprise Information Archiving Recorded: Mar 14 2019 30 mins
    Tom Mahoney, Senior Archiving Sales Specialist;Jason Colvin, Senior Systems Engineer
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users Recorded: Mar 13 2019 39 mins
    Paul Down, Senior Director Proofpoint Security Awareness Training
    As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.

    Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.

    Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:

    - How to build a people centric security strategy

    - Steps organizations are taking to mitigate end-user risk from phishing

    - The most devastating types of phishing emails

    - The most vulnerable industries and departments
  • Live Demo: Security Awareness Training for Healthcare Recorded: Mar 5 2019 36 mins
    Ryan Witt, Healthcare Industry Practice Leader; Joshua Whisnant, Security Awareness for Healthcare
    The latest threat data for the Healthcare industry shows a significant shift away from attacks on infrastructure towards personalized attacks like phishing.

    What are the key components of a best-in-class solution for phishing simulation and training?

    Join this live demo to see Proofpoint Security Awareness Training in action, and learn how it addresses the most common attacks in today's Healthcare threat landscape.
  • Weekly Threat Byte | Super Mario and GandCrab Recorded: Feb 27 2019 3 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threaty Byte, we bring you Super Mario and GandCrab. A new malware is making its way around the Internet and uses the popular Super Mario character from Nintendo to help spread itself. In this attack a spreadsheet contains a malicious macro that if enabled will download an image of Super Mario onto the victim’s computer. This image contains pixels that will kick off a PowerShell script that will install the ransomware GandCrab and potentially other malwares. Currently this malware only triggers when the victim’s computer is in the Italian region.

    It’s possible threat actors have chosen to only trigger the malware in Italy because they are testing how easily the infection will be received and spread. If the threat is met with success, the threat actors behind this malware may expand their net to ensnare more unwilling victims.

    Information about this webinar was taken from an article at BleepingComputer, located at:
    https://www.bleepingcomputer.com/news/security/mail-attachment-builds-ransomware-downloader-from-super-mario-image
  • Weekly Threat Byte | LCG Kit Recorded: Feb 13 2019 10 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you the LCG Kit, a new builder for malicious Microsoft Office documents. What's so fascinating about this week’s threat is it allows budding threat actors to create malicious documents of their own using this kit. LCG Kit or Linear Congruential Generator was first discovered in March of 2018 and began by creating documents that exploited certain CVE's. LCG Kit has now evolved to use macros which are popular for threat actors to use to infect a person's computer.

    Once infected, the threat actor can further infect the victim's computer with common malwares such as; Loki Bot, FormBook, Agent Tesla, AZORult, Revcode RAT and Quasar RAT.

    This Interesting Threat comes to us from our Proofpoint Threat Insight blog; "LCG Kit: Sophisticated builder for Malicious Microsoft Office Documents", located at https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents
  • Weekly Threat Byte | SpeakUp Backdoor Trojan Recorded: Feb 13 2019 11 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you SpeakUp Backdoor Trojan. A new trojan is targeting Linux and macOS by exploiting a Common Vulnerability and Exposures (CVE-2018-20062). First discovered on January 14th 2019, it has been targeting servers running ThinkPHP primarily in East Asia and Latin America. According to experts approximately 70,000 servers world wide are at risk and have the potential of allowing threat actors unauthorized access into these servers.

    Once a foothold has been achieved, threat actors can exploit further CVE’s and move to other servers located within an organizations infrastructure. Currently threat actors have installed Monero cryptocurrency miners on servers and have made about $4500 dollars, but with access to multiple infrastructure servers, this is most likely only the beginning of the damage that can be caused by this vulnerability.
  • Weekly Threat Byte | Bombs & Bitcoin Recorded: Feb 7 2019 6 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Threat Byte, we bring you “Bombs & Bitcoin - Sextortion Evolution?”

    Recently, campaigns have been sent out claiming to have gained access to a victim’s computer and extort the user by claiming to have found pornographic images on the user’s computer as well as having images and video of the victim viewing the content. Unfortunately links in the sextortion emails tended to lead the victim to a ransomware that would lock up their computer, demanding cryptocurrency to unlock the computer.

    Having been successful with this approach, threat actors attempted to step up the threat by sending emails that bombs had been placed in buildings, hospitals, schools and places of employment. The threat declared if the police were called or evacuations were attempted, they would detonate the bombs. This tactic didn’t make the threat actors money, but did cause massive confusion and fear. Luckily there were no bombs found, but this latest threat demonstrates that the threat actors are always trying to come up with new and creative ways to separate us from our money.
  • Live Demo: Resolve Incidents with Less Effort Recorded: Feb 7 2019 20 mins
    Dante Giadone, Sr. Sales Engineer
    No defense can stop every attack. When something does get through, Proofpoint Threat Response Auto-Pull (TRAP) takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

    Join us for a live demo to get an actionable view of threats and learn how to enrich alerts and automate forensic collection and comparison.

    We’ll demo how you can:
    •Effectively identify which users are under attack
    •Reduce exposure time to malicious emails
    •Implement additional business logic to retract malicious emails
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Exploit Kits Don't Stop, Neither Should Your Business.
  • Live at: Dec 8 2016 12:30 am
  • Presented by: Proofpoint
  • From:
Your email has been sent.
or close