Hi [[ session.user.profile.firstName ]]

Live Demo: Email Fraud Defense

Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

•Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

•Monitor all inbound impostor threats from your domains and those of third parties

•Accurately distinguish between legitimate emails and fraudulent emails
Recorded Apr 2 2019 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ash Valeski, Director Product Management, Proofpoint
Presentation preview: Live Demo: Email Fraud Defense

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Webisode 6: Live Demo - Advanced People-Centric Cybersecurity Aug 21 2019 5:00 pm UTC 38 mins
    Joel Sierra, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Webisode 5: Live Demo - Ramping Up People-Centric Cybersecurity Aug 7 2019 5:00 pm UTC 36 mins
    Craig Morell, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    - Identify and remediate account compromise attacks
    - Solve for data loss through email
    - Make your users more resilient against attacks through awareness training
  • Webisode 4: Live Demo - Foundations of People-Centric Cybersecurity Jul 24 2019 5:00 pm UTC 41 mins
    Dustin Anderson, Senior Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    - Protect your people from email-based attacks
    - Gain visibility into who in your organization is getting the most attacks
    - Solve for user awareness through threat simulation and training
  • Webisode 3: Email Fraud - Case Studies & Defense Strategies w/ US Secret Service Jul 10 2019 5:00 pm UTC 73 mins
    Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service
    Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on.

    What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks?

    Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies.

    We’ll share:

    - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers
    - How fraudsters use social engineering to reach the right person at the right time
    - How to identify and stop email fraud attacks before they reach the inbox
  • Webisode 2: Strategic Cybersecurity Transformation - Why Now, Why People-Centric Jun 26 2019 5:00 pm UTC 66 mins
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    In this session, you'll learn:
    - How business transformation like the rise of Office 365 has driven cybersecurity transformation
    - Why you should pivot your transformation around people and culture, rather than infrastructure
    - 6 principles for successful cybersecurity transformation
  • Live Demo: Email Fraud Defense Jun 26 2019 3:30 am UTC 30 mins
    Ash Valeski, Director Product Management, Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Webisode 1: 2019 Cyber Threat Landscape Jun 12 2019 5:00 pm UTC 51 mins
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint
    This year, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss:

    - Predictions for the 2019 threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Strategic Cybersecurity Transformation: Why Now, Why People-Centric Jun 12 2019 3:30 am UTC 66 mins
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organising change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    You'll learn:
    · How business transformation like the rise of Office 365 has driven cybersecurity transformation
    · Why you should pivot your transformation around people and culture, rather than infrastructure
    · 6 principles for successful cybersecurity transformation
  • Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering Jun 5 2019 1:00 pm UTC 45 mins
    Raef Meeuwisse, ISACA | Carl Leonard, Forcepoint | John Scott, Bank of England | Adenike Cosgrove, Proofpoint
    External and internal threats continue to pose a challenge for security professionals worldwide. How are businesses preparing against attacks like phishing, ransomware, and social engineering?

    Join security experts from the industry to learn more about:
    - The most prevailing cyber threats businesses face in 2019
    - Lessons from cyber attacks and strategies for protecting against them
    - Solutions for faster breach detection and response
    - Why network visibility is key
    - Recommendations for improving enterprise security

    Panellists
    Carl Leonard, Principal Security Analyst, Forcepoint
    John Scott, Head of Information Security, Bank of England
    Adenike Cosgrove, Cybersecurity Strategist, Proofpoint

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Livestream Video - CISO Challenges and How to Solve Them Jun 5 2019 10:30 am UTC 45 mins
    Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, Proofpoint
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    David Boda, CISO, Camelot Group
    Darren Thomson, CTO - EMEA, Symantec
    George Patsis, CEO, Obrela Security Industries
    Martin Mackay, Senior Vice President - EMEA, Proofpoint

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Analyst Webinar: Best Practices to Defend Against Phishing Attacks May 29 2019 5:00 pm UTC 54 mins
    Joseph Blankenship, Principal Analyst, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
    In today's shifting threat landscape, cyber criminals increasingly target individuals rather than infrastructure.

    How can you defend against highly targeted and effective attacks like phishing?

    Join guest Forrester speaker Joseph Blankenship and Proofpoint for an interactive discussion about best practices around phishing and security awareness training.

    You'll learn:

    1. The latest research on breaches and why phishing stands out as one of the riskiest attack vectors
    2. Today's most common phishing methods and outcomes
    3. Proven best practices to defend against phishing
  • Analyst Webinar: Best Practices to Defend Against Phishing Attacks May 29 2019 3:30 am UTC 54 mins
    Joseph Blankenship, Principal Analyst, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
    In today's shifting threat landscape, cyber criminals increasingly target individuals rather than infrastructure.

    How can you defend against highly targeted and effective attacks like phishing?

    Join guest Forrester speaker Joseph Blankenship and Proofpoint for an interactive discussion about best practices around phishing and security awareness training.

    You'll learn:

    1. The latest research on breaches and why phishing stands out as one of the riskiest attack vectors
    2. Today's most common phishing methods and outcomes
    3. Proven best practices to defend against phishing
  • Trends in Compliance: How IT Should Prepare for the Future May 22 2019 5:00 pm UTC 60 mins
    Robert Kreuscher, Solution Architect - Professional Services. Martin Tuip, Sr. Product Marketing Manager
    Join this webinar for an interactive discussion about the need for cross-departmental alliances, and best practices for joining efforts and technology across your organization.

    You’ll learn:

    - How evolving regulations and compliance technology will impact IT
    - How IT can help with your organization's compliance strategy
    - How new RegTech can improve compliance readiness while also improving IT value to an organization
  • GDPR turns one: Protecting Privacy & Maintaining Security in the new GDPR world May 22 2019 2:00 pm UTC 45 mins
    Markus Grueneberg, GDPR Evangelist and Michael McGrath, Senior Director, Compliance and Digital Risk
    According to the 2019 Cyber Security Breaches Survey conducted by the UK government, the number of data breaches suffered by businesses has declined over the last twelve months since the introduction of the EU GDPR.

    However, is this decline because of the changing threat landscape, is it due to investments in security controls that protect our people or has GDPR truly transformed the way businesses protect the privacy of consumer data?

    Join Michael McGrath and Markus Grüneberg as we discuss the impact GDPR has had one year on and the new challenges and opportunities it presents as we pass into the second year.
  • Live Demo: Email Fraud Defense Recorded: May 21 2019 30 mins
    Ash Valeski, Director Product Management, Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a demo of the Proofpoint Email Fraud Defense and learn how to:

    - Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
    - Monitor all inbound impostor threats from your domains and those of third parties
    - Accurately distinguish between legitimate emails and fraudulent emails
  • Live Demo: Enterprise Information Archiving Recorded: May 2 2019 32 mins
    John Pepe, Market Development Principle - Financial Services. Micah Wyenn, Sales Engineer
    Financial services firms face some of the world’s most stringent and complex regulations. Proofpoint offers solutions that can help financial firms streamline compliance. We provide compliance and supervision solutions that provide easy capture, review, and reporting. That means complete visibility across your email, instant messages, collaboration tools, and social media.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    •Mitigate risk of adverse inferences and damaged reputations
    •Quickly collect, search and retrieve data on demand
    •Stay compliant with industry regulations through Enterprise Archiving, Intelligent Supervision and E-discovery
  • How to Leverage CASBs to Stop Next Generation Cloud Attacks Recorded: May 2 2019 60 mins
    Ryan Kalember, SVP of Cybersecurity Strategy - Proofpoint. Garrett Bekker, Principal Analyst Info Security - 451 Research.
    As more enterprise data and workloads migrate to the cloud, security needs and practices continue to evolve. The perceived “big risks” -shadow IT and the security practices of SaaS companies – have been surpassed by attacks on individual cloud users and data. The good news? There are reliable, high fidelity ways to detect and mitigate cloud threats and risks to data.

    Join Garrett Bekker from 451 Group and Ryan Kalember, SVP of Cybersecurity at Proofpoint, as they discuss:

    - How the industry’s conceptions of what matters in cloud security have evolved, from the initial emphasis on shadow IT and the security practices of cloud vendors to the current focus on the identity-defined perimeter
    - What the most successful and prevalent attack vectors are in the cloud, from brute force attacks to new forms of phishing that bypass multi-factor authentication
    - What to look for in a CASB solution to mitigate the risks your organization is likely to face
  • Live Demo: Advanced People-Centric Cybersecurity Recorded: May 1 2019 39 mins
    Joel Sierra, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Live Demo: Email Fraud Defense Recorded: Apr 25 2019 30 mins
    Ash Valeski, Director Product Management, Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Strategic Cybersecurity Transformation: Why Now, Why People-Centric Recorded: Apr 24 2019 66 mins
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    You'll learn:
    · How business transformation like the rise of Office 365 has driven cybersecurity transformation
    · Why you should pivot your transformation around people and culture, rather than infrastructure
    · 6 principles for successful cybersecurity transformation
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live Demo: Email Fraud Defense
  • Live at: Apr 2 2019 5:00 pm
  • Presented by: Ash Valeski, Director Product Management, Proofpoint
  • From:
Your email has been sent.
or close