Hi [[ session.user.profile.firstName ]]

Modern Email Fraud Defense | Live Demo

Highly targeted email fraud attacks – like a cyber criminal impersonating your CEO to send your CFO a wire transfer request – are hard to catch, unless you have the right tools.

Join us for a live demo of Proofpoint Email Fraud Defense to see how we catch email fraud scenarios like this and more.

You’ll see for yourself how to:

•Block malicious emails spoofing your domains before they reach your employees and customers

•Monitor all emails (inbound and outbound) from your domains and those of third parties

•Accurately distinguish between legitimate emails and fraudulent emails
Recorded Dec 6 2018 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Fahad Dadabhoy - Sr Sale Engineer, Proofpoint
Presentation preview: Modern Email Fraud Defense | Live Demo

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users Mar 13 2019 10:00 am UTC 45 mins
    Paul Down, Senior Director Proofpoint Security Awareness Training
    As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.

    Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.

    Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:

    - How to build a people centric security strategy

    - Steps organizations are taking to mitigate end-user risk from phishing

    - The most devastating types of phishing emails

    - The most vulnerable industries and departments
  • Live Demo: Security Awareness Training for Healthcare Mar 5 2019 6:00 pm UTC 45 mins
    Ryan Witt, Healthcare Industry Practice Leader; Joshua Whisnant, Security Awareness for Healthcare
    The latest threat data for the Healthcare industry shows a significant shift away from attacks on infrastructure towards personalized attacks like phishing.

    What are the key components of a best-in-class solution for phishing simulation and training?

    Join this live demo to see Proofpoint Security Awareness Training in action, and learn how it addresses the most common attacks in today's Healthcare threat landscape.
  • Weekly Threat Byte | LCG Kit Recorded: Feb 13 2019 10 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you the LCG Kit, a new builder for malicious Microsoft Office documents. What's so fascinating about this week’s threat is it allows budding threat actors to create malicious documents of their own using this kit. LCG Kit or Linear Congruential Generator was first discovered in March of 2018 and began by creating documents that exploited certain CVE's. LCG Kit has now evolved to use macros which are popular for threat actors to use to infect a person's computer.

    Once infected, the threat actor can further infect the victim's computer with common malwares such as; Loki Bot, FormBook, Agent Tesla, AZORult, Revcode RAT and Quasar RAT.

    This Interesting Threat comes to us from our Proofpoint Threat Insight blog; "LCG Kit: Sophisticated builder for Malicious Microsoft Office Documents", located at https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents
  • Weekly Threat Byte | SpeakUp Backdoor Trojan Recorded: Feb 13 2019 11 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you SpeakUp Backdoor Trojan. A new trojan is targeting Linux and macOS by exploiting a Common Vulnerability and Exposures (CVE-2018-20062). First discovered on January 14th 2019, it has been targeting servers running ThinkPHP primarily in East Asia and Latin America. According to experts approximately 70,000 servers world wide are at risk and have the potential of allowing threat actors unauthorized access into these servers.

    Once a foothold has been achieved, threat actors can exploit further CVE’s and move to other servers located within an organizations infrastructure. Currently threat actors have installed Monero cryptocurrency miners on servers and have made about $4500 dollars, but with access to multiple infrastructure servers, this is most likely only the beginning of the damage that can be caused by this vulnerability.
  • Weekly Threat Byte | Bombs & Bitcoin Recorded: Feb 7 2019 6 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Threat Byte, we bring you “Bombs & Bitcoin - Sextortion Evolution?”

    Recently, campaigns have been sent out claiming to have gained access to a victim’s computer and extort the user by claiming to have found pornographic images on the user’s computer as well as having images and video of the victim viewing the content. Unfortunately links in the sextortion emails tended to lead the victim to a ransomware that would lock up their computer, demanding cryptocurrency to unlock the computer.

    Having been successful with this approach, threat actors attempted to step up the threat by sending emails that bombs had been placed in buildings, hospitals, schools and places of employment. The threat declared if the police were called or evacuations were attempted, they would detonate the bombs. This tactic didn’t make the threat actors money, but did cause massive confusion and fear. Luckily there were no bombs found, but this latest threat demonstrates that the threat actors are always trying to come up with new and creative ways to separate us from our money.
  • Live Demo: Resolve Incidents with Less Effort Recorded: Feb 7 2019 20 mins
    Dante Giadone, Sr. Sales Engineer
    No defense can stop every attack. When something does get through, Proofpoint Threat Response Auto-Pull (TRAP) takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

    Join us for a live demo to get an actionable view of threats and learn how to enrich alerts and automate forensic collection and comparison.

    We’ll demo how you can:
    •Effectively identify which users are under attack
    •Reduce exposure time to malicious emails
    •Implement additional business logic to retract malicious emails
  • Deciphering 2019 Cyber Threat Landscape Recorded: Feb 6 2019 56 mins
    Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst
    In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join Adenike Cosgrove and Davide Canali live as they discuss:

    - Predictions for the 2019 threat landscape with a focus on EMEA and APJ
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Weekly Threat Byte | ServHelper and FlawedGrace Recorded: Jan 29 2019 8 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threaty Byte, we bring you “TA505 brings us ServHelper and FlawedGrace”. TA505 is one of the most prolific threat actors watched by Proofpoint, and when they start a trend, other threat actors tend to follow. TA505 ups the cat and mouse game by sending out a multi-part malware dubbed ServHelper. Three email campaigns were launched by TA505, the first installed and opened a secure tunnel with victim's computers, the second put a downloader on computers and the third campaign of ServHelper leads to FlawedGrace, a Remote Access Trojan (RAT), that allows full control over a victim's computer.

    This Interesting Threat comes to us from our Proofpoint Threat Insight blog; “ServHelper and FlawedGrace - New malware introduced by TA505”, located at https://www.proofpoint.com/us/threat-insight/post/servhelper-and-flawedgrace-new-malware-introduced-ta505
  • Email Protection Demo - Staying Secure in Office 365 Recorded: Jan 24 2019 43 mins
    Proofpoint
    Anyone can be a VAP: Very Attacked Person™ and they're not always the people you expect.

    While Microsoft Office 365 allows your people to work anywhere, anytime, on any device, it can also create security issues making your people vulnerable. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Join this webinar and learn about:

    •Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • 2019 Cyber Threat Landscape Recorded: Jan 23 2019 52 mins
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint
    In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us live as we discuss

    - Predictions for the 2019 threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Weekly Threat Byte | Happy (Late) Holidays Recorded: Jan 15 2019 7 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you Happy Holidays from TA505! TA505 is the designation for Threat Actor 505, one of the most prolific threat actors observed by Proofpoint. TA505 was responsible for the largest Dridex, Locky, Jaff and The Trick campaigns. Due to the variety of malware delivered by this group, demonstrates their deep connections to the underground malware scene.

    Proofpoint has been watching TA505 for quite some time and has data dating back to 2014 when they launched their first Dridex campaign. When TA505 changes their tactics, other threat actors tend to follow. Just in time for the holidays, Proofpoint has noticed that TA505 is sending out fewer ransomware campaigns and instead focusing on smaller more targeted attacks. Why you ask? The value of cryptocurrency has dropped significantly, leading to threat actors looking for new and creative ways to get money from unsuspecting victims.
  • Weekly Threat Byte | Sextortion Malware Recorded: Dec 19 2018 11 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week's Interesting Threat Byte, we bring you Sextortion! Sextortion is a category of scams where threat actors claim to have compromising information about the victim and threaten to expose their activities if an extortion payment is not made. We also focus on a recent Sextortion campaign that demanded $381 of Bitcoin.

    Watch the video to learn all about it.
  • Weekly Threat Byte | Get Ready for the Invasion Recorded: Dec 18 2018 9 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    . CobInt is a fairly new malware, discovered in early 2018, and seems to only be doing reconnaissance for now. It is a three stage malware with the ability to download additional modules when it's ready to strike. Like the other malwares in this series, CobInt uses clever techniques to disguise and hide itself from security researchers. CobInt is spread by a threat actor sending an email to a victim with a Microsoft Word document containing macros. If the macro is enabled, CobInt is downloaded.
  • Live Demo: Email Protection and Targeted Attack Protection Recorded: Dec 13 2018 46 mins
    Ryan Loo - Sr Systems Engineer
    More than 90% of targeted attacks start with email, and these threats are always evolving.

    Proofpoint helps you stay ahead of these attacks with a people-centric approach that detects, analyzes, and blocks advanced threats before they reach your inbox.

    Join us for a live demo and learn about:

    •How to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Enterprise Archive with Proofpoint - See How it Works Recorded: Dec 11 2018 57 mins
    Tom Mahoney - Senior Archive Specialist, Terry McMahon Sr Systems Engineer
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Modern Email Fraud Defense | Live Demo Recorded: Dec 6 2018 40 mins
    Fahad Dadabhoy - Sr Sale Engineer, Proofpoint
    Highly targeted email fraud attacks – like a cyber criminal impersonating your CEO to send your CFO a wire transfer request – are hard to catch, unless you have the right tools.

    Join us for a live demo of Proofpoint Email Fraud Defense to see how we catch email fraud scenarios like this and more.

    You’ll see for yourself how to:

    •Block malicious emails spoofing your domains before they reach your employees and customers

    •Monitor all emails (inbound and outbound) from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Weekly Threat Byte | tRAT the Trojan Recorded: Dec 5 2018 5 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week’s Interesting Threat Byte, we bring you tRAT.

    tRAT is a new Remote Access Trojan (RAT) that was first discovered back in September. The first campaigns included fake Norton Security and TripAdvisor brands as lures to get victim's to open the included Microsoft Word document, enabling macros.

    On October 11, 2018, Proofpoint discovered another tRAT campaign, but this time by threat actor TA505.

    Watch the video to get the details on tRAT and TA505.
  • Weekly Threat Byte | Good Advice, Avoid AdvisorsBot Recorded: Dec 4 2018 11 mins
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint
    For this week’s Interesting Threat Byte, we bring you AdvisorsBot.

    AdvisorsBot, is part of a group of recently discovered downloader malwares. AdvisorsBot is targeting hotels, restaurants, and telecommunications companies and is notable because it is currently only collecting system information, can download other modules/payloads, connects back to command and control servers and has many anti-analysis checks built into the code.

    Watch the video to see how AdvisorBot operates.
  • Live Demo: Proofpoint Security Awareness Training Recorded: Dec 4 2018 60 mins
    Proofpoint
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself!

    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Customer Webinar: A people-centric approach to Cloud Security Recorded: Nov 29 2018 56 mins
    Stephen Chan-Sr Director, Product Marketing & Itir Clarke-Sr Product Marketing Manager
    As a Proofpoint customer, you’re already protecting your people from targeted attacks like phishing and malware.

    But what about your data in the cloud?

    Join us for a Proofpoint Customer webinar to learn how you can extend your people-centric email protection to accounts and data in the cloud.

    You’ll learn best practices to:

    •Protect confidential data from theft and loss
    •Secure employees most targeted by threats
    •Integrate threat detection and access controls across email and cloud
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Modern Email Fraud Defense | Live Demo
  • Live at: Dec 6 2018 6:00 pm
  • Presented by: Fahad Dadabhoy - Sr Sale Engineer, Proofpoint
  • From:
Your email has been sent.
or close