Hi [[ session.user.profile.firstName ]]

Live Demo: Email Fraud Defense by Proofpoint

Email Fraud is one of the oldest yet most successful threats against your organisations. Proofpoint Email Fraud Defense (EFD) can help you protect your organisation and your customers, leveraging the power of email authentication.

Join this product demo to discover how you can protect your organisation and people by leveraging the power of EFD.


•Block malicious emails spoofing your domains before they reach your employees and customers
•Monitor all emails (inbound and outbound) from your domains and those of third parties
•Accurately distinguish between legitimate emails and fraudulent emails
Recorded Jun 19 2018 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Neil Hammet, Email Fraud Specialist
Presentation preview: Live Demo: Email Fraud Defense by Proofpoint

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • LIVE PANEL: Cybersecurity for the Modern Era Nov 20 2018 10:00 am UTC 60 mins
    Tom Berry, Adenike Cosgrove, Swati Lay, Naveen Vasudeva, Graham Edwards and Clive Room
    TBC
  • Let it go! Time to revise your archiving commitment Nov 13 2018 6:00 pm UTC 60 mins
    PFPT
    Many organizations have already deployed a compliance solution but the continuing adoption of the cloud for business processes eventually results in the reevaluation of the existing compliance infrastructure. The move to Office 365 is a logical step for business communication, but are your compliance teams concerned about the ability to support critical needs such as email/social/collaboration archiving, eDiscovery, and more?

    Join this session to discuss how to address key considerations when you are at this cross road:

    -How to migrate content from the existing environment
    -What are the critical items to be aware off with O365 from a compliance and legal view
    -Limitations, work arounds and alternatives
    -Industry trends
  • Email Protection Demo - Staying Secure in Office 365 Nov 7 2018 6:00 pm UTC 60 mins
    Andres Bore - Senior SE, Proofpoint
    Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Join this webinar and learn about:

    •Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Storm Clouds Brewing – How to Defend Against Stolen Cloud Accounts Oct 31 2018 5:00 pm UTC 61 mins
    Eric Schwake Group Product Marketing Manager; Itir Clarke Senior Security Strategist
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors who use these tactics usually aim to fraud the company, its customers or partners.

    Join us for a discussion on the clever methods used to compromise accounts and the headaches that come from it, whether it be phishing or data theft, and the steps your organization can take to help mitigate the threat.

    Join our security experts and learn:

    • The damage compromised accounts cause, from stolen customer data to phishing
    • Why bad actors choose to target people rather than infrastructure
    • What you can do to keep your accounts secure
  • Protecting Office 365 Users Against Account Compromise Oct 25 2018 1:00 pm UTC 60 mins
    Itir Clarke, Sr. Product Marketing Manager, Proofpoint
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors who use these tactics usually aim to fraud the company, its customers or partners.

    Join us for a discussion on the clever methods used to compromise accounts and the headaches that come from it, whether it be phishing or data theft, and the steps your organization can take to help mitigate the threat.

    Join our security experts and learn:

    • The damage compromised accounts cause, from stolen customer data, to wire fraud
    • Why bad actors choose to target people rather than infrastructure
    • What you can do to keep your accounts secure
  • Building Your Modern Security Strategy - Email Protection Live Demo Oct 18 2018 5:00 pm UTC 60 mins
    Matt Walier, SR Sales Engineer
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Four Months Into GDPR: Balancing Data Protection and Digital Transformation Oct 18 2018 11:00 am UTC 45 mins
    Markus Grueneberg, GDPR Evangelist, Proofpoint and Jonathan Lee, Product Manager, Digital Risk, Proofpoint
    The internet has grown to more than 330 million unique domain names and three billion users. Digital transformation means that email, web, social and mobile have become essential channels of engagement for your business but they also increase your exposure to cyber threats, and escalate the level of digital risk.

    Your marketing team is connecting with your customers in so many ways—but do you have full visibility of these interactions? How should you safeguard your online brand and maintain GDPR compliance across this digital landscape?

    Join our webinar to hear Markus Grueneberg and Jonathan Lee share recommendations and best practices to defend your customers and your business within the digital channels that you operate in.
  • Monitoring Insider Risk with Intelligent Supervision Oct 17 2018 4:00 pm UTC 60 mins
    John Pepe, Monitoring Compliance Specialist, Proofpoint; Steve Prokai, SE Director, Archiving and Compliance, Proofpoint
    People-centric protection goes beyond the usual threats.

    Businesses are becoming aware that they need to monitor employee communications and mitigate risk associated with inappropriate business communications. Discover the latest approach to protect your organization from communication risk using modern, scalable cloud based supervision technology.

    Join this webinar and learn :
    • How Communications expose organizations to legal and compliance risks
    • Considerations to establish an employee monitoring program
    • Employee Monitoring strategies available to detect and prevent risks
    • How utilizing Intelligent Supervision can protect your organization
  • Phishing Prevention Training Demo Oct 16 2018 5:00 pm UTC 60 mins
    Proofpoint
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!
    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.


    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Cybersecurity Helden werden nicht geboren ... Sie werden gemacht! Recorded: Oct 16 2018 47 mins
    Giovanni Pascale, Associate Sales Engineer, Proofpoint
    Phishing ist nach wie vor eine der am schnellsten wachsenden und bösartigsten Bedrohungen für die Sicherheit von Unternehmen aller Branchen. Denn der versierte „Phisher“ von heute schafft es, selbst die ausgefeiltesten technischen Sicherheitsvorkehrungen durch sorgfältig geplante, sozial ausgerichtete E-Mails zu umgehen, die sich immer weiterentwickeln.

    Wie also Mitarbeiter und Unternehmen vor diesen gezielten Angriffen schützen?
    Das Phishing-Simulation- und Sicherheits-Awareness-Training von Proofpoint bietet Organisationen eine zusätzliche Sicherheitsebene, indem es Mitarbeiter auf die neuesten E-Mail-Sicherheitstaktiken testet und informiert. Dies hilft, das Bewusstsein zu erhöhen, die Anzahl erfolgreicher Phishing-Angriffe und Malware-Infektionen zu reduzieren und zukünftige Sicherheitsverletzungen zu verhindern.

    Erfahren Sie in unserem Live-Webcast, mehr über die marktführende Lösung für computerbasierte Security Awareness Trainings und Phishing-Simulation und informieren Sie sich über

    •E-Mail Fraud – Ein Omnipräsentes Thema
    •Proofpoint und Wombat – Eine optimale Ergänzung
    •Maturitätslevel von Security Awareness
    •Wombat Methodologe & Live Demo
    •Q&A
  • Weekly Threat Byte | Brain Food is Bad Recorded: Oct 4 2018 12 mins
    Proofpoint
    THIS WEEK'S INTERESTING THREAT:

    The interesting threat byte this week is called Brain Food. Brain Food refers to a botnet of thousands of compromised web servers with fake diet and brain enhancing pills advertised on the compromised web servers. This form of phishing is not new and uses a common marketing activity called a Call To Action (CTA) to attract potential victims. Brain Food also uses URL Shortening, which uses services to shorten URLs to help avoid detection of known compromised web servers.

    Learn all about it in the video
  • Beat the top 3 security challenges in Office 365 Recorded: Sep 27 2018 38 mins
    Celeste Kinswood, Cybersecurity Strategist, Proofpoint
    If you are migrating to Office 365 or you already run your business in the cloud, you know the benefits of cloud collaboration tools. But new tools bring new risks. Compromised accounts can be used to launch fraud and phishing attacks or access sensitive data in cloud storage. Protecting your people and data is vital to making your Office 365 migration a success.

    Join Proofpoint security experts as they discuss top security threats affecting organizations today. You’ll learn how to address challenges including:

    Account compromise
    Email fraud and phishing
    Data protection in the cloud
  • Threat Bytes | FlawedAmmy Recorded: Sep 27 2018 9 mins
    Proofpoint
    Threat Bytes is a weekly series covering the most interesting threats out there in 5 minutes or less.

    THIS WEEK, ON THREAT BYTES:

    This week's Threat Byte focuses on a new file type called SettingContent-ms. SettingContent-ms files are used to create shortcuts to the Settings page in Windows 8 and 10. Unfortunately, double-clicking on a SettingContent-ms file does not prompt the user and is automatically executed.

    What happens next can lead to a remote access trojan called FlawedAmmy.

    Get the whole story in this week's video.
  • Tools for Email Fraud Defense | Live demo Recorded: Sep 20 2018 47 mins
    Alex Fryback, Product Manager @ Proofpoint
    Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • Comment gagner la bataille contre les comptes Office 365 compromis Recorded: Sep 19 2018 37 mins
    Laura Peytavin : Senior Sales Engineer, CISSP, Proofpoint & Miguel Battais : Manager Commercial Sales France, Proofpoint
    Office 365 est aujourd’hui en France et en Europe la solution collaborative la plus adoptée par les organisations. Les cybercriminels l’ont bien compris et les entreprises subissent des attaques de plus en plus réussies sur leurs comptes utilisateurs Office 365.

    Ces comptes tombent dans les mains des fraudeurs, qui, à partir d’une compromission, lancent des attaques horizontales pour toucher les utilisateurs les plus à risque dans l’entreprise. La mise en place de solutions de gestion d’accès par double authentification et par « one time password » ne règle pas pour autant ce problème.

    Ce webinaire va repasser en détail la réalité du phénomène et les véritables enjeux des comptes Office 365 compromis. Nous verrons comment notre approche « People-Centric » qui se fonde sur la gestion et le suivi des personnes ciblées permet d’éviter et de remédier à cette compromission de comptes O365.
  • Cybersecurity Now: A Guide to Building a People-Centric Strategy Recorded: Sep 18 2018 62 mins
    Ryan Kalemeber, SVP, Cybersecurity Strategy, Proofpoint
    Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

    You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

    Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

    o Prevent cyberattacks by stopping them before they start

    o Defend against email and cloud threats

    o Respond quickly to threats and limit the damage they could cause

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
  • How to Build your People-Centric Cybersecurity Strategy Recorded: Sep 12 2018 60 mins
    Ryan Kalember, SVP Cybersecurity Strategies at Proofpoint
    Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.

    But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO.

    The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that:

    • Reveals who is targeted and how
    • Combats attacks before they reach your users, and
    • Mitigates damage from the attacks that inevitably will reach your people

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
  • Make the Move from Veritas Enterprise Vault Recorded: Aug 30 2018 54 mins
    Martin Tuip, IGP Senior Product Marketing Manager & Steve Horvath Senior Director, Professional Services
    Organizations have long relied on compliance solutions such as Veritas Enterprise Vault to help them comply with retention requirements.

    Are you struggling with the lack of innovation and are ready to move to a next generation compliance solution? What is the strategy with the existing information you have in Enterprise Vault? Do you leave it in place ? Can you delete it ? What about legal implications?

    Join this webinar to learn about proven real-world strategies to handle a move to a modern compliance infrastructure.
  • Malware of the Week | Project Hook, Line and Trojan Horse Recorded: Aug 9 2018 10 mins
    Proofpoint
    This week on Malware of the Week, we're going to focus on Project Hook, a point of sale malware and Evrial, a trojan horse that can hijack cryptocurrency addresses.

    Project Hook comes to us as a targeted phishing email, purporting to be from Office of Inspector General encouraging the victim to click a link to get to a tax document. This downloads a Visual Basic Script that gives Project Hook the freedom to do as it pleases.

    After that, we take a look at Evrial, a trojan horse that can sense when cryptocurrency addresses are copied into the clipboard and replaces that address with an address to a threat actor which then pulls the ol’ switch-a-roo and you end up sending the payment to the threat actor and not it’s intended, recipient.

    Watch the video to see all the details.
  • Email Protection Demo - Staying Secure in Office 365 Recorded: Aug 9 2018 51 mins
    Greg McHugh, Sr Engineer at Proofpoint
    Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Join this webinar and learn about:

    •Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live Demo: Email Fraud Defense by Proofpoint
  • Live at: Jun 19 2018 9:30 am
  • Presented by: Neil Hammet, Email Fraud Specialist
  • From:
Your email has been sent.
or close