Hi [[ session.user.profile.firstName ]]

Threat Actors Are Using Automation..Are You Automating Threat Response?

Cyber criminals are leveraging automation to launch more efficient and effective campaigns. Manual defense solutions will never be able to scale to fight back.

Join us for this webinar to learn:

-The scope of automation necessary to combat mass campaigns from attackers
-What automations can be accomplished with the fastest ROI
-How to apply internal context, 3rd party intelligence, and campaign data to automated defense
-Shortcuts to integrating with alert sources and enforcement systems
Recorded Feb 21 2017 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joseph Yun, Sr. Product Evangelist, ProofPoint
Presentation preview: Threat Actors Are Using Automation..Are You Automating Threat Response?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse Jun 5 2018 8:00 am UTC 60 mins
    Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint
    Proofpoint hat seinen neuen Faktor Mensch Bericht für das Jahr 2018 veröffentlicht, der untersucht, wie Bedrohungsakteure ihre Herangehensweisen mit Social Engineering und ausgeklügelten Angriffen verfeinern, die selbst versierte Benutzer regelmäßig täuschen.

    Melden Sie sich jetzt zu unserem Live-Webcast Der Faktor Mensch 2018 am 5. Juni 2018 um 10:00Uhr an und informieren Sie sich über die wichtigsten Erkenntnisse des diesjährigen Berichts.
    Der jährliche Proofpoint Bericht basiert auf der Analyse von Angriffsversuchen bei mehr als 6.000 weltweiten Unternehmenskunden während des gesamten Jahres 2017 und bietet Einblicke in Angriffstrends über E-Mail, Cloud-Anwendungen und soziale Medien hinweg, um Unternehmen und Benutzern die Sicherheit zu gewährleisten.

    Themen des Berichtes:
    -Soziale Engineering: Wie Social Engineering auf den Faktor Mensch abzielt
    -Bedrohungs-Trends: Malware, Phishing und E-Mail-Betrug: Dropbox, Docusign & Co
    -Trends zu gezielte Angriffen: Spam-Kampagnen bis zielgerichteter E-Mail-Betrugs
    -Neue digitale Risiken: Collaboration-Tools als neue Angriffsziele
    -Angriffe über Cloud Dienste: Cyberangriffe über Cloud-Dienste und -Apps
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks May 24 2018 9:00 am UTC 45 mins
    Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • The Challenges of Archiving - Archive Solution Live Demo Recorded: May 17 2018 55 mins
    Kieran Stewart, Archive Specialist & Jason Colvin, Senior Engineer
    Financial institutions - specifically FINRA and SEC regulated organizations - are required to protect their firm’s and clients’ data, capture and archive business records and make them discoverable.

    They face challenges of swiftly producing required records during legal discovery and regulatory audits + demonstrating ongoing supervision of their employees despite an increased regulatory landscape, exponential data growth, decreases in staff and ongoing demand to lower costs

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Threat Actors Follow The Money | 2018 Human Factor Report Recorded: May 9 2018 59 mins
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint
    The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    Join Proofpoint Director of Threat Intelligence as we discuss:

    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services
  • How to Stop Attackers That are Phishing Your End-users Recorded: May 1 2018 61 mins
    Brett Shaw, Proofpoint, Chip Homer, Wombat Security Products and Christopher Thielet, Wombat Security Products
    Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

    Join us for this webinar where you will learn:
    * About the latest trends and tactics used by threat actors that target your organization
    * How to assess your users’ susceptibility to phishing attacks
    * To respond to threats through end-user training and reporting
  • The Silver Lining: Guide for staying secure in Office 365 Recorded: Apr 26 2018 60 mins
    Michael Osterman, President Osterman Research & Celeste Kinswood, Security Strategist
    Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them.

    Join Michael Osterman from Osterman Research and our panel of experts, April 26, 10 AM PT as they discuss how to overcome challenges including:

    --Credential Phishing
    --Email Fraud
    --Cloud Access Security
    --Regulatory Compliance and E-Discovery
    --Data Loss
  • Driving Behavioural Change Through Phishing Simulation and Security Training Recorded: Apr 26 2018 28 mins
    Brett Shaw, Sr. Product Marketing Manager, Proofpoint and Chris Thielet, Account Executive, Wombat
    Today’s cyberattacks target individuals, not infrastructure, and phishing is one of the most successful and enduring types of attack.

    Join this webinar to see how the newest member of Proofpoint family - Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, reduces phishing risk by enabling phishing simulation and training to change end-user behaviour.

    You’ll learn how to:

    •Assess your users’ susceptibility to phishing and spear phishing attacks
    •Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    •Allow your employees to report suspicious messages with a single mouse click

    All your questions will be answered via email after the webcast, alternatively, you can email us: infouk@proofpoint.com

    Disclaimer: part of this webinar has been pre-recorded.
  • On-premises Archives: Are They A Breach Waiting To Happen? Recorded: Apr 25 2018 48 mins
    Martin Tuip - Senior Information Archive Strategist
    The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades but there also come these days with some inherit increasing risks. Join this webinar and learn about:

    -Why cyber criminals might be targeting your archive
    -The top security risks of on-premises archives
    -How to reduce your risk
  • Protecting Your Execs and Locations Against Threats Recorded: Apr 24 2018 33 mins
    Mike Lee, Director Social Media Solutions & Roman Tobe, Sr Product Marketing Manager
    Think you have a handle on threats beyond the perimeter? Watch this webinar and learn how Proofpoint helps you gain situational awareness of potential threats against your key executives and locations. Join us as we walk you through our detection system that provides in-depth scanning across all digital channels, including the surface, deep, dark web and social media.

    You’ll hear how to:

    • Detect threats on social media and all areas of the web
    • Protect your executives and locations
    • Gain detailed, real-time threat monitoring
    • Increase cyber intelligence and peace of mind
  • Latest Features in Proofpoint Enterprise Protection Recorded: Apr 12 2018 60 mins
    Rajneesh Chopra, VP, Product Management - Enterprise and Jeff Burstein, Sr. Director, Product Management
    We are excited about all the recent enhancements for Proofpoint Email Protection, TAP, Email DLP, and Email Encryption. Join this webinar where we review in detail:

    * New Threat Detection Technology
    * User Experience Enhancements
    * DLP Exact Data Matching
    * Pull Encryption with Secure Reader Inbox
    * New APIs, and much more!
  • Back to Basics: Solving the Email Fraud Problem Recorded: Apr 10 2018 43 mins
    Robert Holmes, VP Email Security Products
    In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.

    Join this webinar to learn:
    - Findings from our latest Email Fraud study
    - Email Fraud trends from 2017 and threats to look out for in 2018
    - Helpful tips to protect your people, data and brand against Email Fraud
    - Live Q&A with the speakers
  • Integrating, Coordinating, and Orchestrating Your Enterprise Security Tools Recorded: Apr 6 2018 62 mins
    John Pironti - President, IP Architects, LLC & Duane Kuroda - Cyber Security Strategist, Proofpoint
    Over the past decade, enterprises have purchased a wide range of security tools and systems, many designed to solve only one problem. Today, security teams are looking for ways to aggregate and integrate the capabilities of these systems to help identify sophisticated threats and improve overall enterprise security.

    In this Dark Reading webinar, attendees will learn strategies for tying security systems together and orchestrating them to build a better data defense.
  • Proofpoint Essentials: Cybersecurity for Small Businesses Recorded: Mar 28 2018 48 mins
    Joshua Bass and Special Guest
    Joshua Bass - Proofpoint Product Manager will be delving into cyber security for SME businesses and walking through some key topics and features of the Proofpoint products for SME business:

    Agenda:
    - The Threat Landscape for SMEs
    - Overview of Proofpoint Essentials for SMEs
    - Walkthrough of the Proofpoint Essentials User Interface
    - Q&A
  • Guide to Protecting Your People & Safeguarding Your Business from Ransomware Recorded: Mar 20 2018 48 mins
    Richard Davis, Director Cybersecurity Strategy and Patrick Wheeler, Director of Threat Intelligence
    The evolving threat of ransomware is more dangerous than ever and is here to stay! In early 2017, ‘Wannacry’ and ‘Petya’ created havoc and made it to mainstream media. Even more recently, in Q4 2017, ransomware remained the top payload distributed by malicious messages accounting for 57% of all malicious message volume. Showing no signs of abating, cybersecurity professionals must reassess their ransomware-readiness. The best protection from ransomware is to stay informed and learn what critical safety measures your organisation can take to prevent such an attack from occurring.

    Join this webinar for an overview of:

    - How ransomware works and the latest attacks
    - The most common challenges organizations face in combating ransomware
    - Strategies for mitigating ransomware attacks of all varieties
  • How to Effectively Fight Against Email Fraud Recorded: Mar 12 2018 40 mins
    Ryan Terry - Manager Cybersecurity Strategies, Email Fraud
    While ransomware and other high profile, high volume attacks have made many headlines, email fraud has silently been attacking companies around the world. In 2017, over 80% of organizations experienced at least one email fraud attack. Email fraud attacks are low volume attacks that impersonate a person in authority to try and trick the victim into sending money or data out of the organization.

    Join us and learn how attackers use email fraud to attack their victims and about the framework that can prevent these attacks for impacting your business.
  • See it live - Proofpoint Incident Response Recorded: Mar 8 2018 20 mins
    Scott Harris, Sr Engineer & Troy Evanson, Sr Account Manager
    Reduce your incident response time.

    Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:

    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • How to Stop Look-alike Domains Targeting Your Customers, Partners & Employees Recorded: Mar 7 2018 63 mins
    Brett Shaw, Sr. Product Marketing Manager at Proofpoint and Jonathan Lee, Sr. Product Manager at Proofpoint
    Organizations today are facing increased targeted attacks using social engineering tactics. Last year, we saw a 200% increase from cyber criminals registering look-alike domains to pose as employees or partners by spoofing email addresses, or creating deceptive links for victims to click on.

    Join us for a live webinar where you will learn:
    * The latest trends and tactics used to commit email fraud
    * How to gain better visibility into any domain spoofing your organization
    * How to proactively protect your organization, employees, partners and customers from email fraud
  • Enterprise Archive with Proofpoint - See it Live Recorded: Feb 28 2018 50 mins
    Davin Stilson, Sr Sales Engineer, James Seeley - Sr Account Specialst
    Financial institutions - specifically FINRA and SEC regulated organizations - are required to protect their firm’s and clients’ data, capture and archive business records and make them discoverable, and enable secure and compliant use of social media. They face challenges of swiftly producing required records during legal discovery and regulatory audits + demonstrating ongoing supervision of their employees despite and increased regulatory landscape, exponential data growth, decreases in staff and ongoing demand to lower costs

    Get up to speed on the compliance and eDiscovery challenges that enterprises face — and the Proofpoint solution that meets them.

    Watch industry experts take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Cyber Security Update 2018 Recorded: Feb 27 2018 62 mins
    Markus Grüneberg, Security Strategist and Mario Seefried, Cyber Security Professional
    So bleiben Sie vor den neuesten Cyber-Bedrohungen geschützt

    Erfahren Sie in unserem Cybersecurity-Jahresupdate für 2018, wie aktuelle Angriffe aussehen und wie Sie Ihr Unternehmen vor diesen neuen Bedrohungen schützen. Informieren Sie sich unter anderem, über

    - Vorhersagen für die Bedrohungslandschaft 2018 mit besonderem Fokus auf Europa
    - Wichtige Maßnahmen, die Sie ergreifen können, um Ihr Unternehmen zu schützen
    - Top-Ressourcen zur Unterstützung Ihrer Sicherheitsanstrengungen
  • What GDPR Means for Your Security Recorded: Feb 22 2018 46 mins
    Adenike Cosgrove, Cyber Security Strategist at Proofpoint
    For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core.

    Join us as we discuss how organizations can meet the GDPR requirements and the security implications for your organization.

    Join us to hear how to:

    • Discover and classify personal data.
    • Protect all personal data by developing and implementing appropriate security controls.
    • Enhance security controls by monitoring, detecting, responding, and reporting on all policy violations and external threats.
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Threat Actors Are Using Automation..Are You Automating Threat Response?
  • Live at: Feb 21 2017 9:00 pm
  • Presented by: Joseph Yun, Sr. Product Evangelist, ProofPoint
  • From:
Your email has been sent.
or close