Hi [[ session.user.profile.firstName ]]

The Silver Lining: Guide for Staying Secure in Office 365

Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them.

Join Michael Osterman from Osterman Research and our panel of experts as they discuss how to overcome challenges including:

--Credential Phishing
--Email Fraud
--Cloud Access Security
--Regulatory Compliance and E-Discovery
--Data Loss
Recorded Apr 26 2018 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Osterman, President Osterman Research & Celeste Kinswood, Security Strategist
Presentation preview: The Silver Lining: Guide for Staying Secure in Office 365

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • ISSA Thought Leadership Series: BEC Attacks – Who’s Impersonating Who? Jun 17 2020 5:00 pm UTC 60 mins
    ISSA International
    The 2019 HMSS Cybersecurity Survey indicated that email is the initial point of compromise for healthcare cyber-attacks, with Business Email Compromise (BEC) becoming the favored tactic by cybercriminals. Because BEC emails do not carry malicious payload and are narrowly targeted, it’s difficult for health institutions to detect these attacks. With overall losses of more than $1.7 billion in 2019, BEC attacks are quickly becoming a significant headache for healthcare CISOs. Join us for a deep dive into the dos and don’ts when it comes to BEC, and best practices to mitigate against risk of this vital attack vector.
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Jun 16 2020 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Why Organizations Need Enterprise Information Archiving & How Proofpoint Helps Jun 11 2020 5:00 pm UTC 60 mins
    Shawn Aquino, Sr. Product Marketing Manager Rick Dales, VP, Product Management of Proofpoint
    Quick: what’s the first thought that comes to mind when you read SNIA’s definition of archive: a “collection of data objects…in a storage system whose primary purpose is the long-term preservation and retention of that data”? Why, right? The answer to your reasonable question is - it depends.

    In this webinar, we’ll explore this answer, taking a journey back a few decades to archiving origins and tracing the progression from on-prem to modern cloud-native solutions. You’ll learn:

    - How archiving has evolved to address today’s information management challenges
    - What primary use cases archiving solves for and why is it must-have technology for many organizations
    - Why Proofpoint Enterprise Archive is the choice of thousands of customers worldwide for long-term information retention

    As an added bonus, we’ll wrap up the webinar with a peek into recent enhancements introduced with Enterprise Archive, including key features in E-Discovery Analytics and Intelligent Supervision.
  • Live Demo: Advanced People-Centric Security to Cloud Applications Jun 10 2020 5:00 pm UTC 45 mins
    Joel Sierra, Sales Engineer at Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric security journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people and defend your data as your organization works with O365, G Suite, and other cloud applications
    - Leverage Proofpoint’s CASB solution to gain a centralized view of your cloud environment
    - Block threats associated with compromised accounts, risky third-party apps, and the misuse of valuable data
  • People-Centric Cybersecurity in Financial Services Jun 9 2020 5:00 pm UTC 60 mins
    Michael Osterman, President of Osterman Research & Sean Odowd, FinServ Director & John Checco, Resident CISO of Proofpoint
    The financial services industry is subject to enormous risk: it faces the highest rates of attack of any vertical market, it is the source of one-third of all data breaches, and it is vulnerable due to both the negligence and carelessness of employees and other insiders. Compounding the problem is that many financial professionals are now forced to work from home during the pandemic, and they’re using security solutions that often are not as robust as those used in their office environments. So how can you better protect your end-users in the new normal?

    Join Proofpoint and Osterman Research experts as they deep dive into the latest on a people-centric approach to cybersecurity in financial services. In this session, we’ll discuss:

    - The current threat landscape of the financial services industry
    - Best practices on defending against and recovering from cyber attacks and threats
    - Why cybersecurity transformation around people and culture is now more critical than ever
  • In 5 Schritten zum personenorientierten Insider-Threat-Programm Jun 4 2020 8:00 am UTC 60 mins
    Michael Silvestri, Director DACH bei ObserveIT & Ilan Sharoni, Security Insider Threat Expert
    Der Großteil der Sicherheitsteams ist mit den Herausforderungen, die Cyberbedrohungen von außen für das Unternehmen bedeuten bestens vertraut. Doch der Ausgangspunkt viele Cybersecurity-Probleme sind im Unternehmen selbst zu finden. Eine kürzlich vom Ponemon Institute durchgeführte Studie kam zum Ergebnis, dass Insider-Bedrohungen innerhalb von nur zwei Jahren um 45 Prozent zugenommen haben und auch die durchschnittlichen Kosten eines Insider-Zwischenfalls in diesem Zeitraum um 31 Prozent gestiegen sind.

    Um diese Insider-Bedrohungen zu adressieren müssen Unternehmen ein Insider-Threat-Programm entwickeln. Nur so erhalten Sie die notwendige Transparenz über von Insidern verursachte Datenlecks. Und nur so kann die Reaktion und Untersuchung von Zwischenfällen optimiert werden und zugleich ein Gleichgewicht zwischen dem Schutz der Unternehmens-Assets und der Privatsphäre der Mitarbeiter gefunden wird.

    Wir haben fünf Schritte entwickelt, um ein personenorientiertes Insider-Threat-Programm aufzubauen, inklusive Beispielen aus der Praxis sowie bewährter Vorgehensweisen, die Sie direkt in Ihrem Unternehmen umsetzen können. In unserem Webinar erfahren Sie:
    • Welche Arten von Insider-Bedrohungen sind für Unternehmen am teuersten?
    • Wie können Sie feststellen, ob in Ihrem Unternehmen ausreichend dafür getan wird, Insider-Bedrohungen entgegenzuwirken.
    • Wir informieren Sie über die fünf Schritte zum Aufbau eines effektiven Insider-Threat-Programms.
    • Und erläutern, warum die richtige Strategie eine Kombination von Menschen, Prozessen und Technologie (in dieser Reihenfolge) beinhalten muss.
  • 2020 Cost of Insider Threats Report - Over view with LIVE Q&As - APAC APJ Region Jun 4 2020 2:30 am UTC 60 mins
    Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    What kinds of Insider Threats cost organisations the most
    How investigations are driving up the cost-per-incident for companies
    Which organisations, industries, and regions are being targeted the most
    How companies can potentially save millions by using a dedicated Insider Threat management approach
  • How Do We Adapt to Remote Work and Stay Compliant? Jun 3 2020 4:00 pm UTC 41 mins
    Amanda Cannata, Product Marketing Manager & Shannon Smith, Archiving Sale Specialist
    To many, the switch to a remote workforce is a huge change with a new set of obstacles. The existing programs and procedures that compliance teams have put in place to protect businesses and identify risk were not designed for a work-from-home workforce. Many are wondering: how do we adapt to remote work and stay compliant?

    In this webinar we discuss tips and best practices to help ensure your workforce is staying compliant. We will share:

    - Potential employee communication issues
    - How to make the most of your existing technology
    - Email template to communicate with employees
    - Resources to stay up to date on regulatory guidance
  • Live Demo: Social Media Compliance Jun 2 2020 5:00 pm UTC 45 mins
    Coleem Chestnut, Sr. Integration Engineer
    In financial services, health care and other highly-regulated industries, specific rules govern marketing communications and advertising practices when communicating with the public. These regulations put employees squarely in the spotlight of various risks and responsibilities. So how can you mitigate these threats and better manage the process? Learn how to solve for complex social compliance pain points with ease using Proofpoint’s solution.

    Join this live demo and listen to product expert Coleem Chestnut, Sr. Integration Engineer, who will demonstrate how Proofpoint:

    - Finds accounts associated with your firm, including rogue adviser accounts
    - Automates reviews and approvals of social profiles
    - Supervises social media activity in real time and notifies you of compliance violations
    - Removes non-compliant social media content
    - Provides detailed reporting and proof of compliance
  • The Impact of an Accelerated Remote Culture: How Regulated Firms Can Stay Ahead May 29 2020 6:00 pm UTC 45 mins
    Jasmine Wu, Director of Product Marketing - Proofpoint
    The majority of our interactions were face-to-face just two decades ago. Fast forward to today, the amount of time people spend on digital technologies and devices has fundamentally changed the way people interact, work, and communicate. For regulated firms and its governing bodies, the lasting impact this digital shift has created can no longer be ignored. In 2020, more than 80% of the world has gone remote. The amount of digital communication usage skyrocketed for every single industry with technologies including Slack, Zoom, Microsoft Teams and more. The digital world has already arrived, but the remote culture is here to stay. What does this mean for financial services and regulated industries, as well as the regulations that shape its foundation?

    During this session we will explore:

    − A timeline view of communications trends impacting regulated organizations

    − What are the observed challenges we can learn from along the way

    − What successful corporate strategies, technologies, and processes can help organizations stay ahead of an increasingly remote culture

    Speaker Bio: Jasmine Wu is the Director of Product Marketing at Proofpoint. She has more than 10 years of experience providing insight and thought leadership in the emerging communications and compliance space, including cloud collaboration technologies, digital risk protection, data governance and discovery.
  • Live Demo - How to stop BEC attacks with Proofpoint May 28 2020 5:00 pm UTC 45 mins
    Thomas O'Leary, EFD Product Specialist & Sara Pan, Sr. Product Marketing Manager
    Business Email Compromise (BEC) often starts with an email in which attackers pose as someone the victim trusts. The message makes a seemingly legitimate business request that usually involves wire transfer or financial payment. Common BEC tactics include domain spoofing, display name spoofing, and lookalike domains. None of these emails carries malicious payload, and they are narrowly targeted at few people within an organization. Therefore, it is hard to detect these new forms of email threat.

    Join this live demo and learn more about the following:

    - How does BEC work
    - Real-life examples of BEC attempts
    - How does Proofpoint address common BEC use cases
  • Protégez votre vecteur de menaces N°1 : le courrier électronique (en français) May 28 2020 8:00 am UTC 60 mins
    Nicolas Godier, Principal System Engineer, Proofpoint France
    Selon le Data Breach Investigations report 2019 de Verizon, 32 % des incidents entrainant une violation de données impliquent le phishing, et 94 % des malwares sont transmis à partir d’un courrier électronique. Au vu de ces chiffres, il est clair que l’email continue d'être une surface d'attaque importante mais également un vecteur significatif quant à la fuite de données sensibles. Quelle est la meilleure façon pour les organisations de protéger leurs employés de ce vecteur d'attaque fréquemment exploité ?
     
    Assistez à la présentation de Nicolas Godier pour découvrir comment suivre l’évolution rapide du paysage des menaces et les meilleures pratiques pour protéger vos collaborateurs et vos données des attaques par courrier électronique. 
     
    Au cours de ce webinar, nous partagerons :
    - Les dernières données sur les menaces et les tendances en matière de cyberattaques par courrier électronique
    - Comment défendre au mieux vos collaborateurs et vos données contre les attaques ciblées
    - Comment rationaliser votre processus de réponse aux incidents

    Webinaire en Francais
  • Live Demo: Ramping Up People-Centric Security for BEC & EAC May 27 2020 5:00 pm UTC 45 mins
    Joel Sierra, Sales Engineer at Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric security journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people from impostor email attacks, like business email compromise (BEC)
    - Investigate and respond to the risks of email account compromise (EAC), including internal email threats sent from compromised accounts
    - Prevent risks associated with personal webmail and risky websites sent via corporate email
  • Formation de sensibilisation à la sécurité /dernière ligne de défense / Français May 26 2020 12:00 pm UTC 34 mins
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • Security Awareness Training –Your best line of defence May 26 2020 9:00 am UTC 31 mins
    Paul Down, Director & Matt Cooke, Cyber Security Specialist
    How susceptible are your users to email attack?
    Join our experts to discover new highly-crafted lures and tricks used by cyber criminals in 2020.
    Learn how to strengthen your last line of cyber defence : your people

    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.

    So how can you better protect yourself, your organisation, and your end users?

    With this webinar you’ll get a better understanding of:

    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)

    Join us to review 2020 best practice in security awareness training

    ABOUT PROOFPOINT
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe May 26 2020 8:00 am UTC 48 mins
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

    Deutsch
  • Security Awareness Training – Your best line of defence Recorded: May 26 2020 39 mins
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Email Security: Protecting your #1 Threat Vector - APAC Recorded: May 21 2020 31 mins
    Omer Lahav Principal Sales Engineer, Proofpoint APAC
    In 2020, what is a cyber criminal’s weapon of choice? As attacks against your organisational firewalls fade away, what’s next? Leading research from the FBI and Forrester Wave shows that email is today's number one threat vector and the threat email poses changes and evolves more rapidly than ever before. If you work in Information Security, you already know that you and your team have a hard time keeping up with the volume of attacks coming from email.
    Join Omer Lhav of Proofpoint to discover how to keep pace within this rapidly moving threat landscape and best practice ways to protect your people and data from email attacks, and in particular you will learn:
    - The latest threat data and trends for email cyber attacks- How best to defend your people and data with Proofpoint Targeted Attack Protection- How to streamline your incident response process for emails
    Join us as we go deep and show you how to better protect against email, the number one threat vector for your business
  • Live Demo - Protecting Your Data Against the Insider Threat Risk Recorded: May 20 2020 30 mins
    Mike Griffin, Sales Engineer at Proofpoint Insider Threat Management
    As the workforce rapidly shifts to remote work, the complexity of protecting IP and sensitive data has grown exponentially. Old models of locking down the perimeter no longer apply. Instead, a modern, people-centric approach to Insider Threat Management can complement existing information protection programs, while providing greater visibility and context into both user behavior and data movement. In this webinar with our expert Mike Griffin, we’ll explore the unique risks of insider threats and how to combat them. We will cover:

    - The types of insider threat profiles and how to address them. For example, organizations may not know how that more than 60% of insiders are negligent.
    - Why insider threats are unique, and require context into both user and data activity.
    - How to reduce response time by accelerating investigations. The longer the response times, the costlier an incident can get.
  • How to securely enable remote working Recorded: May 20 2020 51 mins
    Edward Rowley SE manager of EMEA, Proofpoint; Mark Edge Cloud Security Specialist EMEA, Proofpoint
    The Threat Landscape has changed drastically recently as employees around the world are mandated to work from home. Working safely and securely has never been more important.

    How do you enable this enormous challenge while maintaining compliance and reducing business exposure?

    Get practical tips on:
    • Providing employees with secure remote access to applications
    • Securely transitioning a remote workforce
    • Keeping malicious code away from corporate devices.
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Silver Lining: Guide for Staying Secure in Office 365
  • Live at: Apr 26 2018 5:00 pm
  • Presented by: Michael Osterman, President Osterman Research & Celeste Kinswood, Security Strategist
  • From:
Your email has been sent.
or close