Hi [[ session.user.profile.firstName ]]

Improve Your Cybersecurity Visibility by Thinking Beyond the Network

Today’s cyber attackers exploit human weakness more often than infrastructure gaps: 90% of attacks target email, but social media links and mobile apps are also fair game.

In this webinar, you'll learn:

-How cyber attackers gain visibility into organizations
-How you can see across all major threat entry points and stop attacks
-How to stop business email compromise (BEC), credential phishing, ransomware and other advanced threats
-How to eliminate social media risk so you can focus on social success
-How to protect against malicious apps that mishandle data or install malware
Recorded Feb 8 2017 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
SVP, Cybersecurity Strategy, David Jevans, VP Mobile Security, Celeste Wynchopen, Social Media Strategist, ProofPoint
Presentation preview: Improve Your Cybersecurity Visibility by Thinking Beyond the Network

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Your Security Sandbox Won't Catch It All - The Phishing Problem Aug 30 2017 5:00 pm UTC 60 mins
    Ryan Kalember, SVP Cybersecurity Strategies
    Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.

    Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.

    Watch this webinar to learn:
    - How phishing has evolved
    - Phishing threat landscape
    - Top phishing lures that impact employees
    - How Proofpoint can effectively address phishing attacks
  • B.E.C. and Email Fraud Defense Live Demo Aug 17 2017 5:00 pm UTC 60 mins
    Alex Fryback- Product Manager, Nick Abbot - Account Manager
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • See It In Action - Advanced Email Protection Live Demo Recorded: Jul 27 2017 52 mins
    Proofpoint
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us Thursday, July 27, 10 AM PT for a live demo that will explore Proofpoint Email Protection and Targeted Attack Protection.

    Learn about:

    -- Today’s threat landscape and to how to build your defense against spam, malware, and non-malware threats
    -- Approaches for identifying suspicious messages
    -- The latest in security software to fight against advanced threats
  • Proofpoint Customer Technical Webinar: Imposter Emails & BEC Attacks Recorded: Jul 25 2017 50 mins
    Nathan Chessin - Director Field Sales Engineering, Jason Ford - Sr. Systems Engineer, Nick Sullivan - Sr. Systems Engineer
    More than 90% of targeted attacks start with email fraud. Learn how to gain insight into, and effectively defend against, these attacks.

    Join us for a Proofpoint technical webinar, brought to you by engineers, for engineers.  This session will focus on effectively defending your domains from impostors and fraudsters attacking your organization, your customers and your partners.
     
    Topics will include:
    • The Threat Landscape
    • SMTP Standards and Evolution
    • Stop Attacks with Visibility & Authentication
    • Configuring Email Protection to help block imposter threat
    • Creating DMARC reporting in less than 10 minutes
  • The Human Factor 2017 Recorded: Jul 25 2017 47 mins
    Adenike Cosgrove, Cybersecurity Strategist at Proofpoint , Davide Canali - Senior Threat Analyst Proofpoint
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Protecting Data After The Digital Disruption Recorded: Jul 18 2017 61 mins
    Ryan Kalember, SVP Cybersecurity Strategies, Heidi Shey, Forrester Researcher
    Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy.

    Join this lively discussion to learn:

    - Trends and implications for traditional network and endpoint DLP
    - Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently
    - Strategies on how to move forward to protect your critical data
  • How today’s threats prey on the human factor | 2017 Human Factor Report Recorded: Jun 29 2017 47 mins
    Patrick Wheeler, Director, Threat Intelligence, Proofpoint
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Protect & Respond to Ransomware and Business Email Compromise Recorded: Jun 28 2017 54 mins
    Mark Guntrip, Director Product Marketing, Proofpoint
    Cyber threats have changed dramatically in the last year.

    Last week, Symantec released patches for several critical SMG vulnerabilities that enabled attackers to (1) compromise the email gateway and (2) fully bypass gateway inspection and deliver malware via email.

    Short term, have you patched the vulnerability?

    Long term, have you evaluated email security solutions that handle all threats, with and without malware?

    Join this webinar for an overview of how modern email protection should dynamically analyze and identify malware. Learn:

    • What’s happening in the threat landscape—new vectors, new criminal techniques
    • How our solution can help you strengthen your defense, detecting and blocking email threats and enabling rapid, automated response
    • How Advanced Email Security compares to your current solution
  • Incident Response Live Demo Recorded: Jun 15 2017 28 mins
    Proofpoint
    Join our live incident response demonstration

    Reduce your incident response time.

    Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:

    •Reduce exposure time to malicious emails
    •Reduce the time to quarantine and contain email threats
    •Reduce your dependency on custom-coded software
  • How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization Recorded: Jun 6 2017 56 mins
    Ryan Terry, Product Marketing Manager and Ash Valeski, Sr. Manager Product Management
    The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.

    Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

    Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
    • Latest impostor email trends including BEC and consumer phishing
    • How to extend your current protection to stop all impostor threats
    • Upcoming product integration with Email Protection to secure your entire email ecosystem
  • Security Protection with Office 365 | Live Demo Recorded: Jun 1 2017 53 mins
    Proofpoint
    The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you efficiently respond and remediate threats.

    That’s where our Threat Protection for Microsoft Office 365 comes in.

    Join us for a live demo and see firsthand how our solution can help you:

    •Protect against advanced malware-based threats delivered through URLs and attachments and non-malware threats
    •Keep your email service connected even during Office 365 email server outages
    •See at a glance the campaigns targeting your organization
    •Quickly reduce the attack surface
  • GDPR - 358 Days To Fill the Compliance GAP Recorded: Jun 1 2017 44 mins
    Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest analyst Enza Iannopollo
    On the 1st June, there are just 358 days until the EU GDPR comes into force. At its core, the GDPR aims to put control of personal data back into the hands of EU residents. It regulates how personal data is collected, processed, and managed by organisations.

    Businesses have only 358 days left to develop and implement a GDPR compliance roadmap. But what does successful compliance look like? What changes will your organisation have to make to internal processes, and what technologies should your company leverage to ensure that the personal data of EU residents are protected?

    Join Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest Forrester analyst Enza Iannopollo to discuss:
    •The playbook of steps your organisation must implement to drive towards compliance
    •How to embed ‘privacy by design’ to your development life cycles
    •How to protect all identified EU personal data and prevent data breaches
  • Email Fraud Defense - Live Demo Recorded: May 26 2017 26 mins
    Aaron Neff, Sr Engineer, Parker Bowman Account Manager
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Ransomware – The Billion Dollar Thief Recorded: May 18 2017 64 mins
    Ryan Kalember, SVP Cybersecurity Strategies
    With the Petya ransomware attack following closely on the heels of WannaCry, security teams worldwide must reassess their ransomware-readiness.

    What are best practices for preventing, detecting, and remediating ransomware attacks?

    Watch this webinar for hard data and proven strategies for answering those questions. You'll learn:
    • Details on the latest ransomware attacks, including WannaCry and its variants
    • The most common challenges organizations face in combating ransomware
    • Strategies for mitigating ransomware attacks of all varieties
  • Advanced Email Security - Email Protection Live Demo Recorded: May 4 2017 40 mins
    Proofpoint
    Advanced Email Strategy Series - Email Protection

    Cyber attacks are increasing and diversifying—with new variations appearing all the time, many targeting new vectors. Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. This is the first in a series of three demos about our Email Protection Suite. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Protecting Your Users on Office 365 Recorded: May 3 2017 63 mins
    Duane Kuroda, Group Product Marketing Manager
    Organizations around the world are moving to Office 365 to reap the benefits of this amazing collaboration platform. But bad actors continue to target end users with advanced threats that can slip through gaps in your security infrastructure. If you’re already a Proofpoint customer, you know the powerful protection our solutions offer. Learn how to leverage that protection to ensure security for your employees on Office 365.

    Whether you’re considering a migration or already using Office 365, join us for this webinar to learn about:

    · Key threat types targeting end users
    · Best practices for blocking and responding to advanced threats
    · How Proofpoint can protect your organization before, during, and after your move to Office 365
  • Threat Protection for Office 365 - Live Demonstration Recorded: Apr 27 2017 55 mins
    Proofpoint
    The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you efficiently respond and remediate threats.

    That’s where our Threat Protection for Microsoft Office 365 comes in.

    Join us for a live demo and see firsthand how our solution can help you:

    •Protect against advanced malware-based threats delivered through URLs and attachments and non-malware threats
    •Keep your email service connected even during Office 365 email server outages
    •See at a glance the campaigns targeting your organization
    •Quickly reduce the attack surface
  • How to Build An Advanced Email Security Strategy Recorded: Apr 27 2017 46 mins
    Richard Davis, Dir, Cyber Security Strategy and Adenike Cosgrove, Cyber Security Strategy - EMEA, Proofpoint
    You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.

    Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:

    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.

    •Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.

    • How to respond to and mitigate security risks faster and more reliably at a reduced cost.
  • 'Don't Click This' Isn't a Security Strategy Recorded: Apr 18 2017 61 mins
    Ryan Witt - Healthcare Industry Practice Leader Proofpoint
    Healthcare providers need to rethink their security posture by stopping threats before they reach clinical staff augmented by an ability to respond quickly when attacks inevitably occur.

    This presentation will focus on current research that explains the most prevalent cyber attacks plaguing the healthcare industry, outline security technology that can best keep clinical staff safe from cyber attacks and provide a framework that hospitals can utilize to augment their security posture.

    During this webinar, you’ll learn:

    - Primary threat vectors oriented on clinical staff - ransomware, phishing, spearphising, angler phishing
    - The growing prevalence of imposter email and how to mitigate against this threat
    - Security technology that keeps threat away from users and removes clinical staff from threat determination
  • How to Build an Advanced Email Security Strategy Recorded: Apr 4 2017 57 mins
    Mark Guntrip, Product Marketing Director, Proofpoint
    Build an advanced email security strategy that empowers you to see, block, and respond to all email threats.

    Register now and learn:
    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.
    • Key steps to building an email security strategy that adapts to threats as they evolve
    • How to respond to security risks faster at a reduced cost
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Improve Your Cybersecurity Visibility by Thinking Beyond the Network
  • Live at: Feb 8 2017 6:00 pm
  • Presented by: SVP, Cybersecurity Strategy, David Jevans, VP Mobile Security, Celeste Wynchopen, Social Media Strategist, ProofPoint
  • From:
Your email has been sent.
or close