Hi [[ session.user.profile.firstName ]]

One Year to Go! Your CA Orchestria ‘End-of-Life’ Transition Plan

Still on CA Orchestria ‘Data Protection’ and don’t know where to start?

End-of-Life happens in just 12 months and Proofpoint has a proven plan to migrate your data and detection logic to its new ‘Intelligent Supervision’ platform designed to increase the relevancy of alerts paired with intuitive workflows.

In this webinar, Proofpoint and Technically Creative will discuss migration best practices and present a plan to have customers up-and-running by summer 2019, so there is no gap in regulatory compliance.

Join us as our experts discuss:

- Where to Start
- Summer 2019 Transition Plan
- Upgrading to Intelligent Supervision
- Ongoing Support

Join CA Orchestria ‘Data Protection’ experts John Pepe from Proofpoint and Christopher Amatulli from Technically Creative for insights on making a timely, successful transition, all while remaining compliant.
Recorded Aug 1 2018 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Pepe (Proofpoint) & Christopher Amatulli (Technically Creative)
Presentation preview: One Year to Go! Your CA Orchestria ‘End-of-Life’ Transition Plan

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Demo: Email Fraud Defense Apr 2 2019 5:00 pm UTC 60 mins
    Ash Valeski, Director Product Management, Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Live Demo: Foundations of People-Centric Cybersecurity Mar 28 2019 5:00 pm UTC 45 mins
    Dustin Anderson, Senior Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • 2019 FINRA and SEC Exam Priorities Recorded: Mar 20 2019 57 mins
    Raymond Mcgrath, Services, Supervision Policy Consultant; Roman Tobe, Manager, Product Marketing
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2019 and beyond.

    Our industry experts will discuss some of the risks spotlighted for 2019:
    •Supervision of Digital Assets Business
    •Regulatory Technology
    •Adequacy of firms’ cybersecurity programs to protect sensitive information

    Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
  • Outside the Network: Protecting People and Customers Against Digital Threats Recorded: Mar 19 2019 52 mins
    Roman Tobe, Senior Product Marketing Manager, Proofpoint
    Bad actors do not just target employee inboxes - they also target the brand itself, key employees and customers on digital channels.

    Social media, web domains and the deep and dark web pose areas of risk where companies are not directly in control of their communication security. Despite their value, these properties are often left unsecured against fraudulent activity.

    Since these are emerging threats, digital risks can be blind spots of focus for security teams.

    Join this webinar to learn about trends in digital risk including:

    -Executive impersonations targeting your people on LinkedIn
    -Social media protection on Instagram, Facebook and Twitter
    -Credential threats on the dark web
    -Physical threats to key locations
    -Counterfeit domains in the retail space
    -Visibility into the digital threat landscape
    -How to protect against these threats
  • Live Demo: Enterprise Information Archiving Recorded: Mar 14 2019 30 mins
    Tom Mahoney, Senior Archiving Sales Specialist;Jason Colvin, Senior Systems Engineer
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users Recorded: Mar 13 2019 39 mins
    Paul Down, Senior Director Proofpoint Security Awareness Training
    As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.

    Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.

    Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:

    - How to build a people centric security strategy

    - Steps organizations are taking to mitigate end-user risk from phishing

    - The most devastating types of phishing emails

    - The most vulnerable industries and departments
  • Live Demo: Security Awareness Training for Healthcare Recorded: Mar 5 2019 36 mins
    Ryan Witt, Healthcare Industry Practice Leader; Joshua Whisnant, Security Awareness for Healthcare
    The latest threat data for the Healthcare industry shows a significant shift away from attacks on infrastructure towards personalized attacks like phishing.

    What are the key components of a best-in-class solution for phishing simulation and training?

    Join this live demo to see Proofpoint Security Awareness Training in action, and learn how it addresses the most common attacks in today's Healthcare threat landscape.
  • Weekly Threat Byte | Super Mario and GandCrab Recorded: Feb 27 2019 3 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threaty Byte, we bring you Super Mario and GandCrab. A new malware is making its way around the Internet and uses the popular Super Mario character from Nintendo to help spread itself. In this attack a spreadsheet contains a malicious macro that if enabled will download an image of Super Mario onto the victim’s computer. This image contains pixels that will kick off a PowerShell script that will install the ransomware GandCrab and potentially other malwares. Currently this malware only triggers when the victim’s computer is in the Italian region.

    It’s possible threat actors have chosen to only trigger the malware in Italy because they are testing how easily the infection will be received and spread. If the threat is met with success, the threat actors behind this malware may expand their net to ensnare more unwilling victims.

    Information about this webinar was taken from an article at BleepingComputer, located at:
    https://www.bleepingcomputer.com/news/security/mail-attachment-builds-ransomware-downloader-from-super-mario-image
  • Weekly Threat Byte | LCG Kit Recorded: Feb 13 2019 10 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you the LCG Kit, a new builder for malicious Microsoft Office documents. What's so fascinating about this week’s threat is it allows budding threat actors to create malicious documents of their own using this kit. LCG Kit or Linear Congruential Generator was first discovered in March of 2018 and began by creating documents that exploited certain CVE's. LCG Kit has now evolved to use macros which are popular for threat actors to use to infect a person's computer.

    Once infected, the threat actor can further infect the victim's computer with common malwares such as; Loki Bot, FormBook, Agent Tesla, AZORult, Revcode RAT and Quasar RAT.

    This Interesting Threat comes to us from our Proofpoint Threat Insight blog; "LCG Kit: Sophisticated builder for Malicious Microsoft Office Documents", located at https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents
  • Weekly Threat Byte | SpeakUp Backdoor Trojan Recorded: Feb 13 2019 11 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you SpeakUp Backdoor Trojan. A new trojan is targeting Linux and macOS by exploiting a Common Vulnerability and Exposures (CVE-2018-20062). First discovered on January 14th 2019, it has been targeting servers running ThinkPHP primarily in East Asia and Latin America. According to experts approximately 70,000 servers world wide are at risk and have the potential of allowing threat actors unauthorized access into these servers.

    Once a foothold has been achieved, threat actors can exploit further CVE’s and move to other servers located within an organizations infrastructure. Currently threat actors have installed Monero cryptocurrency miners on servers and have made about $4500 dollars, but with access to multiple infrastructure servers, this is most likely only the beginning of the damage that can be caused by this vulnerability.
  • Weekly Threat Byte | Bombs & Bitcoin Recorded: Feb 7 2019 6 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Threat Byte, we bring you “Bombs & Bitcoin - Sextortion Evolution?”

    Recently, campaigns have been sent out claiming to have gained access to a victim’s computer and extort the user by claiming to have found pornographic images on the user’s computer as well as having images and video of the victim viewing the content. Unfortunately links in the sextortion emails tended to lead the victim to a ransomware that would lock up their computer, demanding cryptocurrency to unlock the computer.

    Having been successful with this approach, threat actors attempted to step up the threat by sending emails that bombs had been placed in buildings, hospitals, schools and places of employment. The threat declared if the police were called or evacuations were attempted, they would detonate the bombs. This tactic didn’t make the threat actors money, but did cause massive confusion and fear. Luckily there were no bombs found, but this latest threat demonstrates that the threat actors are always trying to come up with new and creative ways to separate us from our money.
  • Live Demo: Resolve Incidents with Less Effort Recorded: Feb 7 2019 20 mins
    Dante Giadone, Sr. Sales Engineer
    No defense can stop every attack. When something does get through, Proofpoint Threat Response Auto-Pull (TRAP) takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

    Join us for a live demo to get an actionable view of threats and learn how to enrich alerts and automate forensic collection and comparison.

    We’ll demo how you can:
    •Effectively identify which users are under attack
    •Reduce exposure time to malicious emails
    •Implement additional business logic to retract malicious emails
  • Deciphering 2019 Cyber Threat Landscape Recorded: Feb 6 2019 56 mins
    Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst
    In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join Adenike Cosgrove and Davide Canali live as they discuss:

    - Predictions for the 2019 threat landscape with a focus on EMEA and APJ
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Weekly Threat Byte | ServHelper and FlawedGrace Recorded: Jan 29 2019 8 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threaty Byte, we bring you “TA505 brings us ServHelper and FlawedGrace”. TA505 is one of the most prolific threat actors watched by Proofpoint, and when they start a trend, other threat actors tend to follow. TA505 ups the cat and mouse game by sending out a multi-part malware dubbed ServHelper. Three email campaigns were launched by TA505, the first installed and opened a secure tunnel with victim's computers, the second put a downloader on computers and the third campaign of ServHelper leads to FlawedGrace, a Remote Access Trojan (RAT), that allows full control over a victim's computer.

    This Interesting Threat comes to us from our Proofpoint Threat Insight blog; “ServHelper and FlawedGrace - New malware introduced by TA505”, located at https://www.proofpoint.com/us/threat-insight/post/servhelper-and-flawedgrace-new-malware-introduced-ta505
  • Email Protection Demo - Staying Secure in Office 365 Recorded: Jan 24 2019 43 mins
    Proofpoint
    Anyone can be a VAP: Very Attacked Person™ and they're not always the people you expect.

    While Microsoft Office 365 allows your people to work anywhere, anytime, on any device, it can also create security issues making your people vulnerable. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Join this webinar and learn about:

    •Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • 2019 Cyber Threat Landscape Recorded: Jan 23 2019 52 mins
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint
    In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us live as we discuss

    - Predictions for the 2019 threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Weekly Threat Byte | Happy (Late) Holidays Recorded: Jan 15 2019 7 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you Happy Holidays from TA505! TA505 is the designation for Threat Actor 505, one of the most prolific threat actors observed by Proofpoint. TA505 was responsible for the largest Dridex, Locky, Jaff and The Trick campaigns. Due to the variety of malware delivered by this group, demonstrates their deep connections to the underground malware scene.

    Proofpoint has been watching TA505 for quite some time and has data dating back to 2014 when they launched their first Dridex campaign. When TA505 changes their tactics, other threat actors tend to follow. Just in time for the holidays, Proofpoint has noticed that TA505 is sending out fewer ransomware campaigns and instead focusing on smaller more targeted attacks. Why you ask? The value of cryptocurrency has dropped significantly, leading to threat actors looking for new and creative ways to get money from unsuspecting victims.
  • Weekly Threat Byte | Sextortion Malware Recorded: Dec 19 2018 11 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you Sextortion! Sextortion is a category of scams where threat actors claim to have compromising information about the victim and threaten to expose their activities if an extortion payment is not made. We also focus on a recent Sextortion campaign that demanded $381 of Bitcoin.

    Watch the video to learn all about it.
  • Weekly Threat Byte | Get Ready for the Invasion Recorded: Dec 18 2018 9 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    . CobInt is a fairly new malware, discovered in early 2018, and seems to only be doing reconnaissance for now. It is a three stage malware with the ability to download additional modules when it's ready to strike. Like the other malwares in this series, CobInt uses clever techniques to disguise and hide itself from security researchers. CobInt is spread by a threat actor sending an email to a victim with a Microsoft Word document containing macros. If the macro is enabled, CobInt is downloaded.
  • Modern Email Fraud Defense | Live Demo Recorded: Dec 6 2018 40 mins
    Fahad Dadabhoy - Sr Sale Engineer, Proofpoint
    Highly targeted email fraud attacks – like a cyber criminal impersonating your CEO to send your CFO a wire transfer request – are hard to catch, unless you have the right tools.

    Join us for a live demo of Proofpoint Email Fraud Defense to see how we catch email fraud scenarios like this and more.

    You’ll see for yourself how to:

    •Block malicious emails spoofing your domains before they reach your employees and customers

    •Monitor all emails (inbound and outbound) from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: One Year to Go! Your CA Orchestria ‘End-of-Life’ Transition Plan
  • Live at: Aug 1 2018 5:00 pm
  • Presented by: John Pepe (Proofpoint) & Christopher Amatulli (Technically Creative)
  • From:
Your email has been sent.
or close