Hi [[ session.user.profile.firstName ]]

How to Build an Advanced Email Security Strategy

Build an advanced email security strategy that empowers you to see, block, and respond to all email threats.

Register now and learn:
• The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.
• Key steps to building an email security strategy that adapts to threats as they evolve
• How to respond to security risks faster at a reduced cost
Recorded Apr 4 2017 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Guntrip, Product Marketing Director, Proofpoint
Presentation preview: How to Build an Advanced Email Security Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber Security Now: A Guide to Building a People-Centric Strategy Sep 18 2018 3:00 pm UTC 60 mins
    Ryan Kalemeber, SVP, Cybersecurity Strategy, Proofpoint
    Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

    You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

    Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

    o Prevent cyberattacks by stopping them before they start

    o Defend against email and cloud threats

    o Respond quickly to threats and limit the damage they could cause

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
  • How to Build your People-Centered Cybersecurity Strategy Sep 12 2018 5:00 pm UTC 60 mins
    Ryan Kalember, SVP Cybersecurity Strategies at Proofpoint
    Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.

    But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO.

    The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember for a webinar on September 12 to learn how to build a strategy that:

    •Reveals who is targeted and how
    •Combats attacks before they reach your users, and
    •Mitigates damage from the attacks that inevitably will

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
  • Make the Move from Veritas Enterprise Vault Aug 30 2018 5:00 pm UTC 60 mins
    Martin Tuip, IGP Senior Product Marketing Manager & Steve Horvath Senior Director, Professional Services
    Organizations have long relied on compliance solutions such as Veritas Enterprise Vault to help them comply with retention requirements.

    Are you struggling with the lack of innovation and are ready to move to a next generation compliance solution? What is the strategy with the existing information you have in Enterprise Vault? Do you leave it in place ? Can you delete it ? What about legal implications?

    Join this webinar to learn about proven real-world strategies to handle a move to a modern compliance infrastructure.
  • The Challenges of Archiving - Archive Solution Live Demo Aug 22 2018 5:00 pm UTC 60 mins
    Allan Arguello, Proofpoint
    Financial institutions - specifically FINRA and SEC regulated organizations - are required to protect their firms and clients’ data, capture and archive business records and make them discoverable.

    They face challenges of swiftly producing required records during legal discovery and regulatory audits + demonstrating ongoing supervision of their employees despite an increased regulatory landscape, exponential data growth, decreases in staff and ongoing demand to lower costs

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Malware of the Week | Project Hook, Line and Trojan Horse Recorded: Aug 9 2018 10 mins
    Proofpoint
    This week on Malware of the Week, we're going to focus on Project Hook, a point of sale malware and Evrial, a trojan horse that can hijack cryptocurrency addresses.

    Project Hook comes to us as a targeted phishing email, purporting to be from Office of Inspector General encouraging the victim to click a link to get to a tax document. This downloads a Visual Basic Script that gives Project Hook the freedom to do as it pleases.

    After that, we take a look at Evrial, a trojan horse that can sense when cryptocurrency addresses are copied into the clipboard and replaces that address with an address to a threat actor which then pulls the ol’ switch-a-roo and you end up sending the payment to the threat actor and not it’s intended, recipient.

    Watch the video to see all the details.
  • Email Protection Demo - Staying Secure in Office 365 Recorded: Aug 9 2018 51 mins
    Greg McHugh, Sr Engineer at Proofpoint
    Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Join this webinar and learn about:

    •Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Protect Your People - Email Protection Live Demo Recorded: Aug 2 2018 45 mins
    Proofpoint
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • One Year to Go! Your CA Orchestria ‘End-of-Life’ Transition Plan Recorded: Aug 1 2018 59 mins
    John Pepe (Proofpoint) & Christopher Amatulli (Technically Creative)
    Still on CA Orchestria ‘Data Protection’ and don’t know where to start?

    End-of-Life happens in just 12 months and Proofpoint has a proven plan to migrate your data and detection logic to its new ‘Intelligent Supervision’ platform designed to increase the relevancy of alerts paired with intuitive workflows.

    In this webinar, Proofpoint and Technically Creative will discuss migration best practices and present a plan to have customers up-and-running by summer 2019, so there is no gap in regulatory compliance.

    Join us as our experts discuss:

    - Where to Start
    - Summer 2019 Transition Plan
    - Upgrading to Intelligent Supervision
    - Ongoing Support

    Join CA Orchestria ‘Data Protection’ experts John Pepe from Proofpoint and Christopher Amatulli from Technically Creative for insights on making a timely, successful transition, all while remaining compliant.
  • Keeping Up With Automation - Threat Response Live Demo Recorded: Jul 26 2018 31 mins
    Todd Edelglass, Sr Engineer
    Proofpoint's Threat Response product orchestrates several key phases of the incident response process, collecting alerts, context, target histories and intelligence from internal and external sources.

    Using all of this information, it automates workflows and response actions saving you critical time. Join us for a live walkthrough of the product and see it for yourself:

    Join us to see how to


    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • Malware of the Week | Sharepoint, Share a Phish. Recorded: Jul 25 2018 14 mins
    Proofpoint
    This week on Malware of the Week, we're going to focus on the SecurityXploded Toolkit and phishing of Microsoft Sharepoint.

    We take a look at SecurityXploded Toolkit, a legitimate pack of free security tools put out by XenArmor to help security experts and system administrators that threat actors have hi-jacked it to steal your passwords

    Next, we look at a Microsoft Sharepoint phish that takes advantage of Office 365’s growing market share.

    Get the details in this week’s video.
  • Phishing – Sensibilisez vos utilisateurs par la simulation et la formation Recorded: Jul 24 2018 60 mins
    Mickael Omer, Sales Engineer
    Le phishing reste l’une des plus grandes menaces pour les entreprises. Ce type d’attaque ciblée exploite le facteur humain plutôt que la technologie, ce qui la rend plus difficile à détecter par les solutions de sécurité traditionnelles. Nous vous ferons découvrir comment réduire le risque d’hameçonnage en permettant la simulation de phishing et la formation pour aider vos utilisateurs finaux à détecter, signaler et se prémunir de cette menace.

    Durant cette session, nous couvrirons les sujets suivants :

    • Comment évaluer la vulnérabilité de vos utilisateurs aux attaques de phishing et de spear phishing
    • Sensibiliser et former vos utilisateurs pour qu’ils reconnaissent et évitent les attaques de phishing et autres escroqueries d'ingénierie sociale
    • Comment permettre à vos employés de signaler les messages suspects en un seul clic.
  • Malware of the Week | One-Two Punch Recorded: Jul 19 2018 10 mins
    Proofpoint
    Each week we host a Threat of the Week webinar featuring a high-level look at interesting threats to help security teams navigate the attack landscape, in less than 10 minutes.

    This week on Threat of the Week – a Phish, a RAT and some LaZagne

    Malware like Sentinel are particularly dangerous due to their multi-stage infection progression. It kicks off with an emailed Word doc that, once downloaded it requests you to enable macros. After that it installs that RAT and then installs LaZagna.

    A nasty one-two punch.

    We also cover a new phishing campaign focused on Stripe and Square payments. Joins us to learn how these attacks worked and how to avoid them.
  • Email Account Compromise – How Dangerous Is it and How to Prevent It Recorded: Jul 17 2018 40 mins
    Eric Schwake, Group Product Marketing Manager, Proofpoint & Itir Clarke, Sr Security Strategist, Proofpoint
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors use these tactics usually aim to fraud the company, its customers or partners

    Join us for a discussion on the problems associated with compromised accounts, from phishing to malware vulnerability and the steps your organization can take to help mitigate the threat.

    Join us and learn:

    - The damage compromised accounts cause, from stolen customer data, to phishing
    - Why targeting people, not infrastructure is more effective
    - What you can do to keep your accounts secure
  • Still Falling Foul to Phishing? Recorded: Jul 11 2018 42 mins
    Brett Shaw, Sr Cybersecurity Strategist, Proofpoint
    It has been around for many years, but phishing is not a problem that’s going away any time soon.

    In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of.

    Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization.

    Join us as we discuss:

    - Effective security training to help prevent falling for an attack
    - The right tools and methods for detecting phishing
    - How to respond when to email threats
  • Malware of the Week | Iced, Iced ID Recorded: Jul 3 2018 12 mins
    Proofpoint
    Each week we host a Threat of the Week webinar featuring a high-level look at interesting threats to help security teams navigate the attack landscape.

    This week on Malware of the Week:

    We explore “IcedID”, a new trend where similar malwares are being used together to create a synergistic effect to better convince victims that the websites they are visiting are indeed their financial institutions

    Another threat that caught our attention was the Chalbhai generic phishing threat. A lot of security vendors are letting this one slip through to customers and we dive into why this is happening
  • Phishing Prevention Training Demo Recorded: Jun 28 2018 29 mins
    Chris Thielet, Phishing Training Specialist & Brett Shaw, Sr Security Strategist
    Today’s cyberattacks target individuals, not infrastructure, and phishing is one of the most successful and enduring types of attack.

    Join this live demo to see how Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, reduces phishing risk by enabling phishing simulation and training to change end-user behavior.

    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Inoculation Against Healthcare Cyber Attacks Recorded: Jun 26 2018 60 mins
    RYAN WITT Healthcare Industry Practice Leader and RYAN TERRY Sr. Product Marketing Manager
    Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment.

    Join us for a discussion of:

    - Just released research that outlines healthcare's most likely threat vectors of 2018
    - How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare
    - Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution
    - New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow
  • Malware of the Week | Houdini takes control Recorded: Jun 26 2018 12 mins
    Proofpoint
    Every week Proofpoint's researchers report on the active threats making their way around the Internet and the threats commonly missed by security vendors.

    This week on Malware of the Week:

    The threat of the week was all about RATs and backdoors and you don't want either! We dive into H-Worm(Houdini) a Visual Basic Script(VBS) that allows threat actors full control over a victim's computer and Jacksbot, a Java backdoor that takes control and so much more!

    The Miss of the Week was a fascinating malware rivaling a Rube Goldberg Machine, SocGholish. This malware convinces users to go to a website and click on fake upgrade screens. From there the dominos begin to fall...
  • Demystify the cloud: Stay secure in Microsoft Office 365 Recorded: Jun 26 2018 38 mins
    Edward Rowley, Sales Engineering Manager and Tim Ricketts, Principal Sales Engineer
    Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
    While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

    Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

    --Threats: credential phishing, email fraud, targeted attacks etc
    -- Enabling secure digital transformation: people centric security at the heart of the transformation
    -- Solutions: regulatory compliance and tools to implement
  • Schutz vor modernen CEO-Fraud-Angriffen: Live-Hack und umfassende Schutzkonzepte Recorded: Jun 26 2018 61 mins
    Chris Wojzechowski,Security Researche,Institut für IT-Sicherheit und Markus Grünenerg, Senior Security Strategist, Proofpoint
    E-Mail-Betrug, auch CEO-Fraud oder BEC (Business Email Compromise) ist weit verbreitet und kostet Unternehmen Milliarden. Dabei ist ein Großteil dieser E-Mail-Angriffe vermeidbar. Diese Bedrohungen beginnen meist mit einer E-Mail, die von einer hochrangigen Führungskraft, aber auch von Partnern oder Lieferanten zu stammen scheint. Diese E-Mail weist Mitarbeiter an Gelder zu überweisen oder sensible Daten zur Verfügung zu stellen. Die Empfänger erfüllen pflichtbewusst die übertragenen Aufgaben, überweisen zb das angeforderte Geld – und lernen erst später, dass sie betrogen worden sind.

    Erleben Sie in unserem Webinar anhand eines CEO Fraud Live Hack, wie leicht Ihre Mitarbeiter dazu gebracht werden, die betrügerischen Anfragen auszuführen. Anschließend zeigen wir Ihnen auf, wie Proofpoint Ihre Mitarbeiter und Ihr Unternehmen anhand eines mehrstufigen Schutzkonzeptes vor derartigen Angriffen schützen kann.
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Build an Advanced Email Security Strategy
  • Live at: Apr 4 2017 5:00 pm
  • Presented by: Mark Guntrip, Product Marketing Director, Proofpoint
  • From:
Your email has been sent.
or close