Hi [[ session.user.profile.firstName ]]

Respond Faster - Live demo, Incident Response

Join our live incident response demonstration

Reduce your incident response time.

Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:

• Reduce exposure time to malicious emails
• Reduce the time to quarantine and contain email threats
• Reduce your dependency on custom-coded software
Recorded Nov 16 2017 22 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joel Bowden, Sr Engineer, Proofpoint
Presentation preview: Respond Faster - Live demo, Incident Response

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Demo: Email Protection and Targeted Attack Protection Dec 13 2018 6:00 pm UTC 60 mins
    Ryan Loo - Sr Systems Engineer
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Enterprise Archive with Proofpoint - See How it Works Dec 11 2018 6:00 pm UTC 60 mins
    Tom Mahoney - Senior Archive Specialist, Terry McMahon Sr Systems Engineer
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Modern Email Fraud Defense | Live Demo Recorded: Dec 6 2018 40 mins
    Fahad Dadabhoy - Sr Sale Engineer, Proofpoint
    Highly targeted email fraud attacks – like a cyber criminal impersonating your CEO to send your CFO a wire transfer request – are hard to catch, unless you have the right tools.

    Join us for a live demo of Proofpoint Email Fraud Defense to see how we catch email fraud scenarios like this and more.

    You’ll see for yourself how to:

    •Block malicious emails spoofing your domains before they reach your employees and customers

    •Monitor all emails (inbound and outbound) from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Weekly Threat Byte | tRAT the Trojan Recorded: Dec 5 2018 5 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week’s Interesting Threat Byte, we bring you tRAT.

    tRAT is a new Remote Access Trojan (RAT) that was first discovered back in September. The first campaigns included fake Norton Security and TripAdvisor brands as lures to get victim's to open the included Microsoft Word document, enabling macros.

    On October 11, 2018, Proofpoint discovered another tRAT campaign, but this time by threat actor TA505.

    Watch the video to get the details on tRAT and TA505.
  • Weekly Threat Byte | Good Advice, Avoid AdvisorsBot Recorded: Dec 4 2018 11 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week’s Interesting Threat Byte, we bring you AdvisorsBot.

    AdvisorsBot, is part of a group of recently discovered downloader malwares. AdvisorsBot is targeting hotels, restaurants, and telecommunications companies and is notable because it is currently only collecting system information, can download other modules/payloads, connects back to command and control servers and has many anti-analysis checks built into the code.

    Watch the video to see how AdvisorBot operates.
  • Phishing Awareness Tools | Wombat demo Recorded: Dec 4 2018 60 mins
    Proofpoint
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!
    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.

    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Customer Webinar: A people-centric approach to Cloud Security Recorded: Nov 29 2018 56 mins
    Stephen Chan-Sr Director, Product Marketing & Itir Clarke-Sr Product Marketing Manager
    As a Proofpoint customer, you’re already protecting your people from targeted attacks like phishing and malware.

    But what about your data in the cloud?

    Join us for a Proofpoint Customer webinar to learn how you can extend your people-centric email protection to accounts and data in the cloud.

    You’ll learn best practices to:

    •Protect confidential data from theft and loss
    •Secure employees most targeted by threats
    •Integrate threat detection and access controls across email and cloud
  • Live Demo: Cloud Account Defense by Proofpoint Recorded: Nov 21 2018 9 mins
    Itir Clarke, Product Marketing Manager
    Proofpoint Cloud Account Defense (PCAD), allows you to detect, investigate and defend against cybercriminals accessing your sensitive data and trusted accounts via Office 365.

    PCAD is fast and easy to deploy, and it secures Office 365 users on any network or device. This allows you to confidently drive your business forward and make the most of Office 365.

    Attackers use a variety of methods to compromise Office 365 accounts. And once they do, they can launch attacks inside and outside of your organization. This impacts your reputation and your finance. Our multi-faceted approach helps you detect account compromise and the activities that leverage stolen credentials.

    Join this webinar to see this powerful product, live in action!
  • Identifying and Protecting the Very Attacked Persons in Your Organisation Recorded: Nov 21 2018 28 mins
    Itir Clarke, Product Marketing Manager
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors who use these tactics usually aim to fraud the company, its customers or partners.

    Join us for a discussion on the clever methods used to compromise accounts and the headaches that come from it, whether it be phishing or data theft, and the steps your organization can take to help mitigate the threat.

    Join this webinar to learn:

    • The damage compromised accounts cause, from stolen customer data, to wire fraud
    • Why bad actors choose to target people rather than infrastructure
    • What you can do to keep your accounts secure
  • Demystify the cloud: Stay secure in Microsoft Office 365 Recorded: Nov 21 2018 38 mins
    Edward Rowley, Sales Engineering Manager and Tim Ricketts, Principal Sales Engineer
    Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
    While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

    Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

    --Threats: credential phishing, email fraud, targeted attacks etc
    -- Enabling secure digital transformation: people centric security at the heart of the transformation
    -- Solutions: regulatory compliance and tools to implement
  • Four Months Into GDPR: Balancing Data Protection and Digital Transformation Recorded: Nov 21 2018 49 mins
    Markus Grueneberg, GDPR Evangelist, Proofpoint and Jonathan Lee, Product Manager, Digital Risk, Proofpoint
    The internet has grown to more than 330 million unique domain names and three billion users. Digital transformation means that email, web, social and mobile have become essential channels of engagement for your business but they also increase your exposure to cyber threats, and escalate the level of digital risk.

    Your marketing team is connecting with your customers in so many ways—but do you have full visibility of these interactions? How should you safeguard your online brand and maintain GDPR compliance across this digital landscape?

    Join our webinar to hear Markus Grueneberg and Jonathan Lee share recommendations and best practices to defend your customers and your business within the digital channels that you operate in.
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks Recorded: Nov 21 2018 44 mins
    Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • Cybersecurity Now: A Guide to Building a People-Centric Strategy Recorded: Nov 21 2018 62 mins
    Ryan Kalember, SVP, Cybersecurity Strategy, Proofpoint
    Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

    You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

    Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

    o Prevent cyberattacks by stopping them before they start

    o Defend against email and cloud threats

    o Respond quickly to threats and limit the damage they could cause

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
  • Live Demo: Email Protection and Targeted Attack Protection Recorded: Nov 20 2018 32 mins
    Adenike Cosgrove, Cybersecurity Strategist and Kiran Khokhar, Product Marketing Manager
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Live Demo: Phishing Simulation and Security Awareness Training Recorded: Nov 20 2018 30 mins
    Jen Gough, Sales Engineer, Proofpoint
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!

    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.


    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Driving Behavioural Change Through Phishing Simulation and Security Training Recorded: Nov 20 2018 27 mins
    Paul Down, Wombat Specialist
    Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

    Join us for this webinar where you will learn:

    * About the latest trends and tactics used by threat actors that target your organization
    * How to assess your users’ susceptibility to phishing attacks
    * To respond to threats through end-user training and reporting
  • Demo: 360 Degrees of Email Fraud Defense Recorded: Nov 20 2018 48 mins
    Ash Valeski, Director, Product Marketing, Proofpoint
    Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • Back to Basics: Solving the Email Fraud Problem Recorded: Nov 20 2018 43 mins
    Robert Holmes, VP Email Security Products
    In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.

    Join this webinar to learn:
    - Findings from our latest Email Fraud study
    - Email Fraud trends from 2017 and threats to look out for in 2018
    - Helpful tips to protect your people, data and brand against Email Fraud
    - Live Q&A with the speakers
  • LIVE PANEL: Cybersecurity for the Modern Era Recorded: Nov 20 2018 59 mins
    Tom Berry, Adenike Cosgrove, Swati Lay, Naveen Vasudeva, Graham Edwards and Clive Room
    In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.

    For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!

    Join us and our line up of industry experts at this live panel discussion, part of our Hacking Human Nature Summit to hear how they are building people centric strategies.

    Line up:
    •Swati Lay, CISO, Funding Circle
    •Graham Edwards, Former Head of Group Security, Nationwide
    •Naveen Vasudeva, MD & Co-founder, CyberCorre
    •Clive Room, Chairman, White Hat Ball
    •Adenike Cosgrove, International Cybersecurity Strategist, Proofpoint

    Moderated by: Tom Berry, Advisory Board Member, ClubCISO
  • Accelerate investigation with Proofpoint Threat Response | Live Demo Recorded: Nov 15 2018 32 mins
    Frank Tsang, Principle Systems Engineer
    Accelerate investigation, prioritize threats, and resolve incidents with less time and effort.

    Proofpoint Threat Response Auto-Pull (TRAP) offers an effective solution. It automatically pulls delivered malicious email into quarantine, saving you from slow and labor-intensive manual process.

    Join us for a live demo of the Proofpoint Threat Response platform and learn how to:

    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Respond Faster - Live demo, Incident Response
  • Live at: Nov 16 2017 6:00 pm
  • Presented by: Joel Bowden, Sr Engineer, Proofpoint
  • From:
Your email has been sent.
or close