Hi [[ session.user.profile.firstName ]]

How to Stop Look-alike Domains Targeting Your Customers, Partners & Employees

Organizations today are facing increased targeted attacks using social engineering tactics. Last year, we saw a 200% increase from cyber criminals registering look-alike domains to pose as employees or partners by spoofing email addresses, or creating deceptive links for victims to click on.

Join us for a live webinar where you will learn:
* The latest trends and tactics used to commit email fraud
* How to gain better visibility into any domain spoofing your organization
* How to proactively protect your organization, employees, partners and customers from email fraud
Recorded Mar 7 2018 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brett Shaw, Sr. Product Marketing Manager at Proofpoint and Jonathan Lee, Sr. Product Manager at Proofpoint
Presentation preview: How to Stop Look-alike Domains Targeting Your Customers, Partners & Employees

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Four Months Into GDPR: Balancing Data Protection and Digital Transformation Oct 18 2018 11:00 am UTC 45 mins
    Markus Grueneberg, GDPR Evangelist, Proofpoint and Jonathan Lee, Product Manager, Digital Risk, Proofpoint
    The internet has grown to more than 330 million unique domain names and three billion users. Digital transformation means that email, web, social and mobile have become essential channels of engagement for your business but they also increase your exposure to cyber threats, and escalate the level of digital risk.

    Your marketing team is connecting with your customers in so many ways—but do you have full visibility of these interactions? How should you safeguard your online brand and maintain GDPR compliance across this digital landscape?

    Join our webinar to hear Markus Grueneberg and Jonathan Lee share recommendations and best practices to defend your customers and your business within the digital channels that you operate in.
  • Beat the top 3 security challenges in Office 365 Sep 27 2018 5:00 pm UTC 60 mins
    Celeste Kinswood, Cybersecurity Strategist, Proofpoint
    If you are migrating to Office 365 or you already run your business in the cloud, you know the benefits of cloud collaboration tools. But new tools bring new risks. Compromised accounts can be used to launch fraud and phishing attacks or access sensitive data in cloud storage. Protecting your people and data is vital to making your Office 365 migration a success.

    Join Proofpoint security experts as they discuss top security threats affecting organizations today. You’ll learn how to address challenges including:

    Account compromise
    Email fraud and phishing
    Data protection in the cloud
  • Cybersecurity Helden werden nicht geboren ... Sie werden gemacht! Sep 27 2018 9:00 am UTC 60 mins
    Giovanni Pascale, Associate Sales Engineer, Proofpoint
    Phishing ist nach wie vor eine der am schnellsten wachsenden und bösartigsten Bedrohungen für die Sicherheit von Unternehmen aller Branchen. Denn der versierte „Phisher“ von heute schafft es, selbst die ausgefeiltesten technischen Sicherheitsvorkehrungen durch sorgfältig geplante, sozial ausgerichtete E-Mails zu umgehen, die sich immer weiterentwickeln.

    Wie also Mitarbeiter und Unternehmen vor diesen gezielten Angriffen schützen?
    Das Phishing-Simulation- und Sicherheits-Awareness-Training von Proofpoint bietet Organisationen eine zusätzliche Sicherheitsebene, indem es Mitarbeiter auf die neuesten E-Mail-Sicherheitstaktiken testet und informiert. Dies hilft, das Bewusstsein zu erhöhen, die Anzahl erfolgreicher Phishing-Angriffe und Malware-Infektionen zu reduzieren und zukünftige Sicherheitsverletzungen zu verhindern.

    Erfahren Sie in unserem Live-Webcast, mehr über die marktführende Lösung für computerbasierte Security Awareness Trainings und Phishing-Simulation und informieren Sie sich über

    •E-Mail Fraud – Ein Omnipräsentes Thema
    •Proofpoint und Wombat – Eine optimale Ergänzung
    •Maturitätslevel von Security Awareness
    •Wombat Methodologe & Live Demo
    •Q&A
  • Tools for Email Fraud Defense | Live demo Recorded: Sep 20 2018 47 mins
    Alex Fryback, Product Manager @ Proofpoint
    Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • Comment gagner la bataille contre les comptes Office 365 compromis Recorded: Sep 19 2018 37 mins
    Laura Peytavin : Senior Sales Engineer, CISSP, Proofpoint & Miguel Battais : Manager Commercial Sales France, Proofpoint
    Office 365 est aujourd’hui en France et en Europe la solution collaborative la plus adoptée par les organisations. Les cybercriminels l’ont bien compris et les entreprises subissent des attaques de plus en plus réussies sur leurs comptes utilisateurs Office 365.

    Ces comptes tombent dans les mains des fraudeurs, qui, à partir d’une compromission, lancent des attaques horizontales pour toucher les utilisateurs les plus à risque dans l’entreprise. La mise en place de solutions de gestion d’accès par double authentification et par « one time password » ne règle pas pour autant ce problème.

    Ce webinaire va repasser en détail la réalité du phénomène et les véritables enjeux des comptes Office 365 compromis. Nous verrons comment notre approche « People-Centric » qui se fonde sur la gestion et le suivi des personnes ciblées permet d’éviter et de remédier à cette compromission de comptes O365.
  • Cybersecurity Now: A Guide to Building a People-Centric Strategy Recorded: Sep 18 2018 62 mins
    Ryan Kalemeber, SVP, Cybersecurity Strategy, Proofpoint
    Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

    You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

    Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

    o Prevent cyberattacks by stopping them before they start

    o Defend against email and cloud threats

    o Respond quickly to threats and limit the damage they could cause

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
  • Protect Your People - Email Protection Live Demo Recorded: Sep 13 2018 50 mins
    Anthony Creel - Sr Sales Engineer
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • How to Build your People-Centric Cybersecurity Strategy Recorded: Sep 12 2018 60 mins
    Ryan Kalember, SVP Cybersecurity Strategies at Proofpoint
    Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.

    But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO.

    The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that:

    • Reveals who is targeted and how
    • Combats attacks before they reach your users, and
    • Mitigates damage from the attacks that inevitably will reach your people

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
  • Make the Move from Veritas Enterprise Vault Recorded: Aug 30 2018 54 mins
    Martin Tuip, IGP Senior Product Marketing Manager & Steve Horvath Senior Director, Professional Services
    Organizations have long relied on compliance solutions such as Veritas Enterprise Vault to help them comply with retention requirements.

    Are you struggling with the lack of innovation and are ready to move to a next generation compliance solution? What is the strategy with the existing information you have in Enterprise Vault? Do you leave it in place ? Can you delete it ? What about legal implications?

    Join this webinar to learn about proven real-world strategies to handle a move to a modern compliance infrastructure.
  • Malware of the Week | Project Hook, Line and Trojan Horse Recorded: Aug 9 2018 10 mins
    Proofpoint
    This week on Malware of the Week, we're going to focus on Project Hook, a point of sale malware and Evrial, a trojan horse that can hijack cryptocurrency addresses.

    Project Hook comes to us as a targeted phishing email, purporting to be from Office of Inspector General encouraging the victim to click a link to get to a tax document. This downloads a Visual Basic Script that gives Project Hook the freedom to do as it pleases.

    After that, we take a look at Evrial, a trojan horse that can sense when cryptocurrency addresses are copied into the clipboard and replaces that address with an address to a threat actor which then pulls the ol’ switch-a-roo and you end up sending the payment to the threat actor and not it’s intended, recipient.

    Watch the video to see all the details.
  • Email Protection Demo - Staying Secure in Office 365 Recorded: Aug 9 2018 51 mins
    Greg McHugh, Sr Engineer at Proofpoint
    Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Join this webinar and learn about:

    •Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • One Year to Go! Your CA Orchestria ‘End-of-Life’ Transition Plan Recorded: Aug 1 2018 59 mins
    John Pepe (Proofpoint) & Christopher Amatulli (Technically Creative)
    Still on CA Orchestria ‘Data Protection’ and don’t know where to start?

    End-of-Life happens in just 12 months and Proofpoint has a proven plan to migrate your data and detection logic to its new ‘Intelligent Supervision’ platform designed to increase the relevancy of alerts paired with intuitive workflows.

    In this webinar, Proofpoint and Technically Creative will discuss migration best practices and present a plan to have customers up-and-running by summer 2019, so there is no gap in regulatory compliance.

    Join us as our experts discuss:

    - Where to Start
    - Summer 2019 Transition Plan
    - Upgrading to Intelligent Supervision
    - Ongoing Support

    Join CA Orchestria ‘Data Protection’ experts John Pepe from Proofpoint and Christopher Amatulli from Technically Creative for insights on making a timely, successful transition, all while remaining compliant.
  • Malware of the Week | You've Got...Stolen Credentials Recorded: Aug 1 2018 11 mins
    Proofpoint
    Each week we host a Threat of the Week webinar featuring a high-level look at interesting threats to help security teams navigate the attack landscape.

    This week On Malware of the Week, we're going to focus on sLoad/Ramnit and Flazio Hosted Credential Harvesting.

    We’ll begin this week by altering reality with our first malware campaign called sLoad/Ramnit, a banking credential steeler that uses a two stage malware attack to steal your banking credentials

    After that we’ll discuss Flazio Hosted Credential Harvesting which allows threat actors to create and upload fake templates. This allows them to once again, steal your credentials.

    Hear all about it on this week’s video
  • Keeping Up With Automation - Threat Response Live Demo Recorded: Jul 26 2018 31 mins
    Todd Edelglass, Sr Engineer
    Proofpoint's Threat Response product orchestrates several key phases of the incident response process, collecting alerts, context, target histories and intelligence from internal and external sources.

    Using all of this information, it automates workflows and response actions saving you critical time. Join us for a live walkthrough of the product and see it for yourself:

    Join us to see how to


    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • Malware of the Week | Sharepoint, Share a Phish. Recorded: Jul 25 2018 14 mins
    Proofpoint
    This week on Malware of the Week, we're going to focus on the SecurityXploded Toolkit and phishing of Microsoft Sharepoint.

    We take a look at SecurityXploded Toolkit, a legitimate pack of free security tools put out by XenArmor to help security experts and system administrators that threat actors have hi-jacked it to steal your passwords

    Next, we look at a Microsoft Sharepoint phish that takes advantage of Office 365’s growing market share.

    Get the details in this week’s video.
  • Phishing – Sensibilisez vos utilisateurs par la simulation et la formation Recorded: Jul 24 2018 60 mins
    Mickael Omer, Sales Engineer
    Le phishing reste l’une des plus grandes menaces pour les entreprises. Ce type d’attaque ciblée exploite le facteur humain plutôt que la technologie, ce qui la rend plus difficile à détecter par les solutions de sécurité traditionnelles. Nous vous ferons découvrir comment réduire le risque d’hameçonnage en permettant la simulation de phishing et la formation pour aider vos utilisateurs finaux à détecter, signaler et se prémunir de cette menace.

    Durant cette session, nous couvrirons les sujets suivants :

    • Comment évaluer la vulnérabilité de vos utilisateurs aux attaques de phishing et de spear phishing
    • Sensibiliser et former vos utilisateurs pour qu’ils reconnaissent et évitent les attaques de phishing et autres escroqueries d'ingénierie sociale
    • Comment permettre à vos employés de signaler les messages suspects en un seul clic.
  • Malware of the Week | One-Two Punch Recorded: Jul 19 2018 10 mins
    Proofpoint
    Each week we host a Threat of the Week webinar featuring a high-level look at interesting threats to help security teams navigate the attack landscape, in less than 10 minutes.

    This week on Threat of the Week – a Phish, a RAT and some LaZagne

    Malware like Sentinel are particularly dangerous due to their multi-stage infection progression. It kicks off with an emailed Word doc that, once downloaded it requests you to enable macros. After that it installs that RAT and then installs LaZagna.

    A nasty one-two punch.

    We also cover a new phishing campaign focused on Stripe and Square payments. Joins us to learn how these attacks worked and how to avoid them.
  • Email Account Compromise – How Dangerous Is it and How to Prevent It Recorded: Jul 17 2018 40 mins
    Eric Schwake, Group Product Marketing Manager, Proofpoint & Itir Clarke, Sr Security Strategist, Proofpoint
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors use these tactics usually aim to fraud the company, its customers or partners

    Join us for a discussion on the problems associated with compromised accounts, from phishing to malware vulnerability and the steps your organization can take to help mitigate the threat.

    Join us and learn:

    - The damage compromised accounts cause, from stolen customer data, to phishing
    - Why targeting people, not infrastructure is more effective
    - What you can do to keep your accounts secure
  • Still Falling Foul to Phishing? Recorded: Jul 11 2018 42 mins
    Brett Shaw, Sr Cybersecurity Strategist, Proofpoint
    It has been around for many years, but phishing is not a problem that’s going away any time soon.

    In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of.

    Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization.

    Join us as we discuss:

    - Effective security training to help prevent falling for an attack
    - The right tools and methods for detecting phishing
    - How to respond when to email threats
  • Malware of the Week | Iced, Iced ID Recorded: Jul 3 2018 12 mins
    Proofpoint
    Each week we host a Threat of the Week webinar featuring a high-level look at interesting threats to help security teams navigate the attack landscape.

    This week on Malware of the Week:

    We explore “IcedID”, a new trend where similar malwares are being used together to create a synergistic effect to better convince victims that the websites they are visiting are indeed their financial institutions

    Another threat that caught our attention was the Chalbhai generic phishing threat. A lot of security vendors are letting this one slip through to customers and we dive into why this is happening
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Stop Look-alike Domains Targeting Your Customers, Partners & Employees
  • Live at: Mar 7 2018 6:00 pm
  • Presented by: Brett Shaw, Sr. Product Marketing Manager at Proofpoint and Jonathan Lee, Sr. Product Manager at Proofpoint
  • From:
Your email has been sent.
or close