Hi [[ session.user.profile.firstName ]]

How to Prepare for the 2018 Cyber Threats


Join Patrick Wheeler, Proofpoint’s Director of Threat Intelligence, on Wednesday, January 24th at 10 AM PT for our webinar, “How to Prepare for the 2018 Cyber Threats.” This live event will cover:

- Predictions for the 2018 threat landscape
- Key actions you can take to prepare your organization
- Top resources to help support your security efforts
Live online Jan 24 6:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Patrick Wheeler, Director of Threat Intelligence, Proofpoint
Presentation preview: How to Prepare for the 2018 Cyber Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to prepare for the 2018 cyber threats Jan 30 2018 10:00 am UTC 60 mins
    Davide Canali, Senior Threat Analyst and Adenike Cosgrove, Cybersecurity Strategist

    Join Davide Canali, Senior Threat Analyst and Adenike Cosgrove, Cybersecurity Strategist, on Tuesday, 30th Jan at 10 AM GMT for our yearly webinar, “How to Prepare for the 2018 Cyber Threats.” This live event will cover:

    - Predictions for the 2018 threat landscape with a special focus on EMEA
    - Key actions you can take to prepare your organisation
    - Top resources to help support your security efforts
  • How to Prepare for the 2018 Cyber Threats Jan 24 2018 6:00 pm UTC 60 mins
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint

    Join Patrick Wheeler, Proofpoint’s Director of Threat Intelligence, on Wednesday, January 24th at 10 AM PT for our webinar, “How to Prepare for the 2018 Cyber Threats.” This live event will cover:

    - Predictions for the 2018 threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization Recorded: Dec 19 2017 56 mins
    Ryan Terry, Product Marketing Manager and Ash Valeski, Sr. Manager Product Managemen
    The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.

    Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

    Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
    • Latest impostor email trends including BEC and consumer phishing
    • How to extend your current protection to stop all impostor threats
    • Upcoming product integration with Email Protection to secure your entire email ecosystem
  • Proofpoint Presenta su Informe trimestral de Amenazas Recorded: Dec 14 2017 34 mins
    Ryan Kalember, Vicepresidente Sénior de Estrategia de Ciberseguridad
    Proofpoint es la compañía líder en ciberseguridad del mundo con visibilidad a más de 2 billones de correos electrónicos y más de 6 billones de URL diariamente.
    En este reporte vemos como los ataques maliciosos de URL volvieron a aparecer con fuerza, además vemos como los “Ransomware” siguen siendo el rey supremo y vamos entendiendo como los atacantes trabajaron agresivamente para hacerse pasar por las marcas en las cuales confiamos utilizando correo electrónico, las redes sociales y la web para hacer los ataques. Estas son algunas de las tendencias sobresalientes que vimos este año atacando a nuestros clientes globales y el panorama de amenazas a través del mundo.

    Únete a Ryan Kalember, Vicepresidente Sénior de Estrategia de Ciberseguridad, y aprende:

    •Cómo han cambiado las amenazas trimestre tras trimestre, identificando tendencias más amplias en malware, phishing y fraude
    •Inteligencia y consejos puntuales para manager su estrategia de seguridad
    •Acerca de las sofisticadas amenazas en el correo electrónico, la web, las redes sociales y los dispositivos móviles que seguimos viendo
  • Filling the GDPR Compliance Gap Recorded: Dec 14 2017 30 mins
    Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint
    Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
  • How today’s threats prey on the human factor | 2017 Human Factor Report Recorded: Dec 13 2017 48 mins
    Patrick Wheeler, Director, Threat Intelligence, Proofpoint
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • How Look-alike Domains Can Cause Havoc for your Organization Recorded: Dec 7 2017 62 mins
    Ron Poserina, Sr. Manager, Sales Engineering, Proofpoint, Jonathan Lee Sr Product Manager, Proofpoint
    Registering lookalike domains is nothing new. However, the threat actors have found new ways to leverage old techniques. The threat landscape shifts to more social engineering attacks and organizations need to understand where the risks are. Without visibility, domain names are being registered that are very similar to your own, often fooling unsuspecting victims! As a premier threat intelligence provider, Proofpoint can give you the ability to know what you don’t yet know.

    Join us for an interesting and informative tech talk on the rise of the lookalike domain!

    We will discuss:
    • Threat Landscape and How the Bad Guys are Leveraging Look-alike Domains
    • What Organizations Can Do to Protect Themselves
    • Overview & Demo of Proofpoint’s Domain Discover service
  • Building An Effective Program to Stop Email Fraud Recorded: Dec 6 2017 36 mins
    Ash Valeski, Product Manager at Proofpoint and Ryan Terry, Sr. Product Marketing Manager at Proofpoint
    The cost of business email compromise (BEC) has risen to $5.3B as impostor email impacts employees, business partners, and customers of organizations around the world. Given the rapid growth, defining a multi-faceted approach to solving this problem is a requirement for effective protection.

    Join us for a live webinar where you will learn:

    * The latest trends, tactics, and techniques used to commit email fraud
    * How to build an effective program to stop email fraud
    * How Proofpoint can help you fight against email fraud attacks to protect your employees, customers, and business parters
  • Your Security Sandbox Won't Catch It All - The Phishing Problem Recorded: Dec 6 2017 45 mins
    Ryan Kalember, SVP Cybersecurity Strategies
    Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.

    Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.

    Watch this webinar to learn:
    - How phishing has evolved
    - Phishing threat landscape
    - Top phishing lures that impact employees
    - How Proofpoint can effectively address phishing attacks
  • The IT Guide to eDiscovery in the Digital Transformation Recorded: Dec 1 2017 47 mins
    Martin Tuip, Sr. Product Manager at ProofPoint
    The digital transformation is changing the way we work, collaborate and create information. These new flexible platforms, infrastructure, and digital channels mean new security, compliance, fraud and legal risks to an organization. IT is often the point of contact for Legal to assist in investigations. How can you help better prepare your organization for legal matters in this new era?

    Join this webinar to learn:

    - What your obligation might be as an organization towards new content sources
    - How to handle legal holds
    - How to go from ‘reactive’ to ‘proactive’
  • Office 365 Migration Checklist: Considerations for Midsize Enterprises Recorded: Nov 30 2017 45 mins
    Jennifer Cheng, Director of Cybersecurity Solutions at Proofpoint
    Midsize enterprises face a unique quandary when it comes to Office 365. Migrating to Microsoft's cloud-based platform can lead to greater collaboration and cost savings, but securing corporate data in the cloud can also increase strain on small IT & security teams. So how do small teams with limited resources effectively manage security and compliance risks for Office 365?

    According to Gartner, a full 35% of organizations that migrate to Office 365 supplement the app's native email security with a third-party product.

    Join Proofpoint for a webinar covering best practices on securing Office 365, and learn what to look for in an integrated approach that maintains the end user experience. We'll cover:

    •Superior blocking of advanced threats
    •Immediate threat visibility and rapid response
    •Greater protection from compliance violations and information loss
    •Uninterrupted access to live and historic email
  • What's New: The Latest Proofpoint Email Security Release Recorded: Nov 28 2017 40 mins
    Jeff Burstein, Sr. Director, Product Management
    Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.

    The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:

    * Email Authentication
    * Attachment Sandboxing
    * Data Loss Prevention
    * Encryption
  • Respond Faster - Live demo, Incident Response Recorded: Nov 16 2017 22 mins
    Joel Bowden, Sr Engineer, Proofpoint
    Join our live incident response demonstration

    Reduce your incident response time.

    Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:

    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • Proofpoint Quarterly Threat Report Q3 2017 Recorded: Nov 15 2017 57 mins
    Ryan Kalember, SVP Cybersecurity Strategies, Proofpoint
    Malicious URL attacks returned with a vengeance. Ransomware reigned supreme. And fraudsters worked aggressively to impersonate trusted brands in email, social media, and the web. Those are just a few of standout trends we saw in the third quarter within our global customer base and in the wider threat landscape.

    Join Ryan Kalember, SVP of Cybersecurity Strategy, and learn:

    - How the threats have shifted quarter over quarter, identifying larger trends across malware, phishing, and fraud
    - Actionable intelligence and advice for managing your security posture
    - About the sophisticated threats across email, the web, social media, and mobile that we continue to see
  • Non-Malware Attacks - The Rising Threat to Higher Education Recorded: Nov 14 2017 65 mins
    Eric Schwake, Poduct Marketing - Email Security, Proofpoint, Jennifer Cheng Director of Cybersecurity Solutions, Proofpoint
    Non-malware attacks – or attacks that exploit applications and processes legitimately running on systems – are not new, but they are increasingly a favorite of cybercriminals for one simple reason: They work.

    Also known as fileless malware, non-malware attacks are stealthy techniques that are difficult to detect with traditional antivirus software and out-of-the-box software. Higher education institutions – with their trove of valuable data, including personally identifiable information (PII) – are a prime target for hackers, making them especially susceptible to non-malware attacks.

    Watch this webinar and learn:
    •How phishing and other tactics have evolved – and some of the top phishing lures
    •The smartest three things you can do to defend your data against fileless malware
    •How to train your employees to avoid becoming a victim of non-malware attacks
  • Filling the GDPR Compliance Gap Recorded: Nov 14 2017 29 mins
    Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint
    GDPR is approaching fast for organizations worldwide.

    For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core.

    With Proofpoint, you get a complete solution for quickly discovering, controlling, and protecting personal and sensitive EU data. We help you comply with GDPR mandates for collecting, processing, storing, deleting, transferring and using EU personal data.

    Join us to learn how to:
    • Drive towards compliance
    • Embed "privacy by design" to your development lifecycles
    • Protect all identified EU personal data and prevent data breaches
  • Email Fraud Defence - How to Fight the Next Generation of Targeted BEC Attacks Recorded: Nov 14 2017 48 mins
    Richard Davis - Director Cybersecurity Strategy, and Tim Ricketts - Snr Security Engineer - EMEA, Proofpoint
    Find out how highly-targeted, low volume impostor email – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today.

    This is not news but things are changing. New technology or protocols, such as DMARC, can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

    Join us to learn:

    - Why email spoofing works

    - Current BEC trends and attack methods

    - How Proofpoint’s new Email Fraud Defense solution can identify and block BEC threats before they reach the inbox".
  • Malware in SaaS Applications: The Unprotected Exploit Recorded: Nov 7 2017 53 mins
    Duane Kuroda, Group Product Marketing Manager at Proofpoint
    SaaS application use is rapidly increasing, with 70% of organizations having at least one application in the cloud(1). At the same time, however, 41% report concerns about the security of cloud solutions(2). In fact, while companies often employ technologies for advanced threats within their organization, few, if any, provide technology to protect against advanced threats in the SaaS apps they use.

    Join this webinar to learn:
    * How threats can reach your SaaS applications
    * What threat we’ve seen lurking in SaaS applications
    * Tips and Tools to start protecting against SaaS borne threats

    (1)(2) IDG Enterprises 2016 Cloud Computing survey
  • See It In Action - Email Protection Live Demo Recorded: Oct 26 2017 37 mins
    Frank Trammell, Sr Sales Engineer
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Targeted Attack Protection.

    Learn about:

    -- Today’s threat landscape and to how to build your defense against spam, malware, and non-malware threats
    -- Approaches for identifying suspicious messages
    -- The latest in security software to fight against advanced threats
  • Customer Technical Webinar - Gone Phishin! Recorded: Oct 26 2017 55 mins
    Jason Williams, Sr. Threat Analyst, Adam Steigrod, Manager, System Engineering and Ivan Hernandez, Sr. Systems Engineer
    Phishing attacks have been the norm for malicious campaigns over the last few years, with credential phishing making up almost 90% of those attacks. Long lining. Spear phishing. Whaling. Imposter and spoofing. What’s it all mean? And how can you protect yourself and your organization? We hope you can join us as we review the phishing threat landscape and then dive into how Proofpoint customers are utilizing multiple levels of protection in order to keep attacks at bay.

    Join us on October 26th at 10 a.m. PDT for a Proofpoint customer technical webinar, brought to you by engineers, for engineers. This session will focus on effectively defending against emails that ask you to hand over something critically important…your information, your money, or your credentials.

    We will discuss:

    * Some Background on Phishing Techniques
    * Today’s Phishing Threat Landscape
    * Real World Examples of Phishing
    * Protection available from Proofpoint Solutions
    * Email Fraud Defense
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Prepare for the 2018 Cyber Threats
  • Live at: Jan 24 2018 6:00 pm
  • Presented by: Patrick Wheeler, Director of Threat Intelligence, Proofpoint
  • From:
Your email has been sent.
or close