Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.
To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.
Join Proofpoint for "How to Prepare for Cyber Threats in 2017" and learn:
* What we predict for the threat landscape in 2017
* Key actions you can take to prepare
* What top resources will help support your security efforts
RecordedFeb 2 201751 mins
Your place is confirmed, we'll send you email reminders
99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.
Join our live demo to learn how to:
- Assess your users’ susceptibility to phishing attacks as well as other cyber threats
- Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.
Join our live demo to learn how to:
- Assess your users’ susceptibility to phishing attacks as well as other cyber threats
- Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.
Join our live demo to learn how to:
- Assess your users’ susceptibility to phishing attacks as well as other cyber threats
- Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Chris Dawson, Threat Intelligence Publications Lead
Every year, Proofpoint’s threat research team examines trends from the prior year and predicts changes in the threat landscape for the year to come. For 2020, some of the top concerns include a significant evolution in impostor attacks and increasingly sophisticated attacks on cloud applications.
Join us for a deep dive into the biggest trends that we’re predicting for the next 12 months, and how you can prepare and protect your most valuable assets: your people and your data.
You’ll learn:
- Predictions for the 2020 cyber threat landscape
- Key actions you can take to prepare your organization
- Top resources to help support your security efforts
*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist
Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves?
Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss:
- Proven best practices for increasing the effectiveness of cybersecurity education
- How to build a culture of security within your organization
- Actionable guidance on executing security awareness & training initiatives that deliver measurable results
Proofpoint Cloud App Security Broker(CASB) is a cloud security platform that helps accelerate migration to the cloud. Proofpoint keeps improving our CASB and tightening our cross-platform integrations to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations.
Join us to see how Proofpoint cloud security adds value to and benefits from existing email security when organizations migrate their email and other core apps to the cloud. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss.
- Correlate email threats such as phishing to cloud account compromise
- Detect and investigate threats using more granular policy rules and forensics capabilities
- Find out which apps are being accessed during a risky session via Okta integration
- Drill deeper into Shadow IT and third-party apps forensics
- Prevent risky file activity in the cloud using browser isolation
99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.
Join our live demo to learn how to:
- Assess your users’ susceptibility to phishing attacks as well as other cyber threats
- Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist
Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what is the best way for you to develop and implement a new secure approach to your data archiving challenges?
Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:
In this demo, we'll share how you can:
- Mitigate reputational risk
- Stay compliant with industry rules and regulations
- Improve visibility into your archived data
Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint
Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. best practice Email Fraud Defense requires a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.
Discover how to:
• Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
• Monitor all inbound impostor threats from your domains and those of third parties
• Accurately distinguish between legitimate emails and fraudulent emails
About Proofpoint
Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
Effective security awareness training ensures your work colleagues become a strong last line of defense against cyber attacks. Best practice in cyber security training is to engage colleagues and keep security top-of-mind, by offering continuously updated, interactive cyber security training modules; to arm all employees, contractors and visitors against real-world cyber attacks using personalised training based on industry-leading threat intelligence; and to replace one-size-fits-all content and adopt a new approach that allows you to target the right training to the right people at the right time.
In this 30 minute demo, you'll learn how to:
4) Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
5) Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
6) Enable your employees to report suspicious messages with a single mouse click
About Proofpoint
Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
Insider Threats are quickly becoming one of the greatest cyber security threats that organizations face today. They are responsible for three million records are stolen every day and at the heart of 57% of all database breaches last year (Verizon 2019). Research also shows that the average time to spot and contain an insider threat is a massive 77 days -- just 13% of incidents are caught within 30 days (Ponemon 2020).
The reason they are so prolific and take so long to deal with is because anyone with legitimate, trusted access to an organization’s systems and data – whether full-time employee, part-time contractor or strategic business partner – can be an Insider Threat.
Managing insider threats fundamentally requires a people-centric approach. With the acquisition of ObserveIT, Proofpoint adds a powerful Insider Threat Management platform to our portfolio of People Centric cybersecurity solutions. The ObserveIT platform delivers unique capability to monitor both user and file activity, enabling security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach.
Join ObserveIT | Proofpoint SVP Mayank Choudhary, in this webinar to:
· Learn how the key components of full visibility – user activity, data activity, and behavior analytics – provide the necessary context to understanding Insider Threats
· Discover how an organization’s risk of an Insider Threat can be reduced through always-on monitoring, without compromising user privacy and compliance; with real-life case studies to illustrate
· See a demo explaining of how out-of-policy user activity is detected and investigated on-the-spot
· Learn about the different types of Insider Threats and find out what steps you can take to build your own Insider Threat Management program
Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Join us for a demo of Proofpoint Security Awareness Training to see for yourself!
You'll learn how to:
- Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
- Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
See this demonstration of how you can engage your colleagues and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity training to the right people at the right time.
Register to see this demo of Proofpoint Security Awareness Training to see for yourself!
You'll learn how to:
- Assess your users’ susceptibility to email phishing attacks and their knowledge of cybersecurity beyond the phish
- Deliver customized online training to your end users to drive behavior change and make them a strong last line of cyber defense
- Enable your employees to report suspicious messages with a single mouse click
This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you.
Mark Guntrip, Group Product Marketing Director & Mike Bailey, Sr. Product Marketing Manager
The threat landscape is constantly changing and the attacks targeting your people are getting more sophisticated. Threat actors are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even the most savvy users. So how can you better protect yourself, your organization, and your end users?
Join us as we walk you through how we're taking Proofpoint's expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you'll get a better understanding of:
- How we identify and stop malicious inbound threats
- How to better identify end-user risk with our simulated attacks
- How we're helping customers stop real attacks in their tracks with our Closed-Loop Email Analysis and Response (CLEAR) solution
Ryan Witt, Healthcare Industry Practice Leader & Matt Nesser, Account Executive of Proofpoint
The 2019 HIMSS Cybersecurity indicated that email is the initial point of compromises for healthcare cyber-attacks – phishing, hacking, BEC – or negligent activity from hospital staff…someone inadvertently clicking on a link or downloading a file. Clearly people are under attack, yet they are also a health system’s first line of defense. So how do you best protect your people and prepare for them for continuous stream of cyber-attacks?
Join this live demo to see Proofpoint Security Awareness Training in action, and how it safeguards against advance threats and compliance risks.
You’ll learn:
- The most common attacks in today's healthcare threat landscape
- Best practices to improve your security posture
- A people-centric approach to helping you protect patient data
Stephen Doughtery, U.S. Secret Service, Ryan Terry, Proofpoint, Christopher Pierson, BlackCloak
Email—you either love it or hate it. Cybercriminals love it. We all know that email is the attack vector of choice for hackers. Why? Bottom line, it works. And they really capitalize on it. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC/CEO fraud attacks, W-2 scams, ransomware… the list goes on and on.
Email fraud is an expensive cybercrime for its victims. All it takes is one mistake, one erroneous mouse click of an email to let an attacker in. That is how it starts. Then attackers move around your email or network and learn more about your employees and company than you do. Eventually they strike—when the time is right. Do they get away with the cash? Or did you arm your employees with the tools and training they need to recognize email fraud and ransomware and stop a possible BEC attack?
On this web conference, our three experts will share real-world examples of these heinous crimes: what went down, how they got caught, what they got away with, and lessons learned.
Tune in and get an understanding of how these attacks work and what you can do to make it more difficult for hackers to fool your end-users.
Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist
GDPR, Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.
So what is best practice with respect to developing and implementing a new secure approach to your data archiving challenges?
Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:
In this demo, we'll share how you can:
- Mitigate reputational risk
- Stay compliant with industry rules and regulations
- Improve visibility into your archived data
Jennifer Cheng, Dir. of Product Marketing & Catherine Hwang, Dir. of Product Marketing at Proofpoint
More than 99% of all targeted cyber attacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance.
It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?
Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape.
In this session, we'll share:
- Why cybersecurity transformation is critical for the financial services sector
- How to identify users who are most at-risk of cyberattacks or cause the most compliance risk
- How to mitigate risk of adverse inferences and damaged reputations
*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Tanner Luxner, Product Marketing Manager of Proofpoint & Martin Starr, IS Support Consultant of Chapman and Cutler LLP
Email-based identity deception attacks are impacting organizations of all sizes and in all industries. In fact, business email compromise (BEC) alone has cost organizations more than $26.2 billion in losses worldwide. As the number one threat vector to businesses today, email must be authenticated to restore trust to business communications. So how can you better protect your people?
Join us for a case study with Chapman and Cutler LLP to learn how they are using Proofpoint’s Email Fraud Defense (EFD) to help stop impostor email attacks in their tracks.
In this session, we’ll share:
- The benefits of deploying DMARC email authentication
- The challenges associated with DMARC authentication
- How Chapman and Cutler LLP have deployed DMARC authentication efficiently and safely with EFD
Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Join us for a demo of Proofpoint Security Awareness Training to see for yourself!
You'll learn how to:
- Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
- Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.
Preparing for Cyber Threats in 2017Richard Davis, Director Cybersecurity & Adenike Cosgrove, Snr. Product Marketing Manager, Proofpoint[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]50 mins