Hi [[ session.user.profile.firstName ]]

Analyst Webinar: Best Practices to Defend Against Phishing Attacks

In today's shifting threat landscape, cyber criminals increasingly target individuals rather than infrastructure.

How can you defend against highly targeted and effective attacks like phishing?

Join guest Forrester speaker Joseph Blankenship and Proofpoint for an interactive discussion about best practices around phishing and security awareness training.

You'll learn:

1. The latest research on breaches and why phishing stands out as one of the riskiest attack vectors
2. Today's most common phishing methods and outcomes
3. Proven best practices to defend against phishing

*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Recorded May 29 2019 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joseph Blankenship, Principal Analyst, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
Presentation preview: Analyst Webinar: Best Practices to Defend Against Phishing Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Stop Cloud Threats by Leveraging CASB With a People-Centric Cybersecurity Oct 29 2019 5:00 pm UTC 60 mins
    Itir Clarke of Proofpoint & Rich Mogull of CSA
    Once your organization migrates to the cloud, protecting your people and the data they create becomes more challenging and critical than ever. Cybercriminals are launching wide-scale brute force attacks on cloud services to compromise user accounts. 85% of Office 365 and G Suite tenants are targeted. After taking over your trusted accounts, threat actors use social engineering tactics to trick even the most savvy users to install malware, transfer money or hand over sensitive data. That's why a people-centric approach to your cloud security is one of the most effective ways to provide visibility and control over your cloud applications. So what does a people-centric strategy look like and how can you use it to better your overall cloud security?

    Join our experts for a deep dive into how to use a Cloud Access Security Broker (CASB) to protect your organization's IT-approved applications, such as Office 365 and G Suite that contain your most valuable assets: your people and data.

    In this session, we'll examine:
    - What the most prevalent cloud attacks are and how they target your VAPs, or Very Attacked People
    -Why a people-centric approach to cloud security is one of the most effective ways to protect your VAPs
    - The different CASB use cases, features, and architectures
    - What to look for in a CASB solution to mitigate the risks you're likely to face
  • Top 5 Lessons I Learned Working with Compliance Recorded: Oct 23 2019 53 mins
    Dan Nadir, VP of Product Management
    Ever wonder what industry leaders are doing with their compliance programs? Listen as Proofpoint’s Dan Nadir (VP of Product, Digital Risk and Compliance) discusses today’s trends in social selling and compliance programs.

    Building a corporate compliance program that can keep up with changing laws, emerging risks and new regulations is increasingly difficult. Listen to this webinar and gain valuable insights as we cover:

    - Adoption of new communication platforms
    - How to scale a program successfully
    - Supervising for various media types

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Switch from Defense to Offense: Why Archiving All Electronic Content is Critical Recorded: Oct 22 2019 50 mins
    Martin Tuip - Senior Information Archive Strategist & Michael Osterman - Osterman Research Inc.
    Electronic content archiving – the process of capturing, indexing and placing data into long-term storage for later search and retrieval – has been a best practice for many years, particularly in industries that are more heavily regulated, such as financial services, energy, life sciences, healthcare and government. The digital transformation has resulted in the integration of digital technology into all areas of a business, resulting in fundamental changes in how a business operates and the value they deliver to their customers through varied set of communication and collaboration systems. All these new communications have an impact on an organization's compliance and legal readiness. So why is archiving all electronics critical to your organization, and what are some effective ways to approach this?

    Join Proofpoint's expert Martin Tuip and Michael Osterman of Osterman Research as we deep dive into archiving your electronic content, and what an archiving solution looks like.

    In this session, we'll share:

    - How an archiving solution can be used for both defensive purposes and as a proactive tool to glean insight and intelligence about an organization’s operations
    - How to use them to detect problems before they turn into big problems
    - Best practices on moving forward with next generation archiving

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Behind the Scenes of Building an Effective Security Awareness Program Recorded: Oct 22 2019 31 mins
    Dale Zabriskie, Security Awareness and Training Evangelist
    Join Dale Zabriskie, Proofpoint’s Security Awareness Training Evangelist, for a Behind the Scenes interview on Building an Effective Security Awareness Program. Dale Zabriskie travels worldwide to help security awareness professionals to overcome challenges, leverage best practices, and implement an effective security awareness program. In this interview, Dale will discuss some of the most frequent challenges he sees in the field and share his expertise on how to overcome these roadblocks.
  • Live Demo: Proofpoint Security Awareness Training Recorded: Oct 17 2019 33 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • 2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe Recorded: Oct 17 2019 60 mins
    Davide Canali, Senior Threat Analyst and Richard Davis, Cybersecurity Strategist
    More than 99% of the worldwide attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and trust that leads well-intentioned people to install malware, transfer money or hand over sensitive data is simply more reliable and lucrative to cyber criminals than expensive and quickly patched automated exploits. So how can you better protect yourself, your organization, and your end users from attacks that rely more on social engineering than system vulnerabilities?


    Join our International Cybersecurity Strategist, Richard Davis and Davide Canali, Senior Threat Analyst as we examine the key findings of Proofpoint's 2019 Human Factor Report. We'll take a close look at how threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that trick even savvy users, as well as break down the trends seen across both the EMEA and Asia Pacific regions.

    In this session we'll share:

    - Trends in volume and types of attacks, providing useful insights for both defenders and organizations for both the EMEA and Asia Pacific regions.
    - Refined techniques and new platforms used by attackers
    - The latest targets that make up an expanding attack including as Office 365 and other cloud accounts, as well as the schemes to which users are most likely to respond
    - The evolution of business email compromise and impostor threats
    - Best practices for layered defenses and user training when, in fact, end users represent the last line of defense against these threats

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo: Foundations of People-Centric Cybersecurity Recorded: Oct 16 2019 39 mins
    Joel Sierra, Sales Engineer at Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • How to Solve the $26 Billion Problem of Business Email & Account Compromise Recorded: Oct 10 2019 59 mins
    Mark Guntrip, Group Product Marketing Director for Proofpoint
    The FBI recently released their latest report detailing reported losses attributed to business email compromise (BEC) and Email Account Compromise (EAC) which totaled over $26B between July 2016 and July 2019. While the scale of losses is staggering, how to best protect against these type of threats, which don’t normally include malware or detectable malicious intent, is not an easy task. There are many facets that an organization must consider across email, cloud, authentication, visibility and education in order to address the different attack tactics and be prepared to limit the potential for financial losses. So what can you do to better protect your people and your organization?

    Join Proofpoint to as we deep dive into email fraud and how to defend against it. In this session, we'll share:

    - The techniques for preventing these threats
    - A framework for understanding where potential gaps exist
    - How automation is key in resolving incidents

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Key Considerations for Your Future Email Security Solution Recorded: Oct 8 2019 50 mins
    Cheryl Tang, Product Marketing Director
    The Broadcom acquisition of Symantec’s Enterprise Security Business creates uncertainty for your email security strategy. Unsettled by the acquisition, many Symantec email security customers are reevaluating their email security solution. As you evaluate your options, you may be wondering what critical capabilities your next email security solution must have. One thing is certain. With today’s threat actors continually refining their tactics, you need an email security solution that can keep pace with today’s rapidly changing threat landscape. But what else do you need to defend against the No. 1 threat vector?

    Join Proofpoint for an educational webinar to learn:

    - What the threat landscape looks like today
    - What key capabilities you should look for to future proof your email security
    - How Proofpoint we’ve helped customers with their email security
  • Live Demo: Security Awareness Training Recorded: Oct 3 2019 28 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • 2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe Recorded: Oct 2 2019 52 mins
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint
    More than 99% of attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and trust that leads well-intentioned people to install malware, transfer money or hand over sensitive data is simply more reliable and lucrative to cyber criminals than expensive and quickly patched automated exploits. So how can you better protect yourself, your organization, and your end users from attacks that rely more on social engineering than system vulnerabilities?

    Join our Director of Threat Intelligence, Patrick Wheeler, as we examine the key findings of Proofpoint's 2019 Human Factor Report. We'll take a close look at how threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that trick even savvy users.

    In this session we'll share:

    - Trends in volume and types of attacks, providing useful insights for both defenders and organizations
    - Refined techniques and new platforms used by attackers
    - The latest targets that make up an expanding attack including as Office 365 and other cloud accounts, as well as the schemes to which users are most likely to respond
    - The evolution of business email compromise and impostor threats
    - Best practices for layered defenses and user training when, in fact, end users represent the last line of defense against these threats

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Never Lose Data Again: Capture, Analyze & Reconcile All Electronic Communication Recorded: Sep 26 2019 61 mins
    John Pepe, Market Development Principle - Financial Services & Davin Stilson, Principle Systems Engineer
    Regulated organizations must ensure their communications are completely captured and retained. Without the proper tools, proving to regulators that you are not missing data is close to impossible and can lead to fines and penalties. So how can you better manage this?

    Join this webinar and learn:

    - How to unify content capture across data sources
    - How to ensure completeness of stored and monitored content
    - Common data integrity challenges and how to address them
  • Behind the Scenes Interview on the 2019 Beyond the Phish Report Recorded: Sep 26 2019 38 mins
    Dale Zabriskiem Security Awareness Training Evangelist & Bruce Sussman of Secure World
    You’ve probably seen a headline or two about Proofpoint’s 2019 "Beyond the Phish" report. Hopefully you’ve taken time to read the report and found the insights beneficial when developing and deploying your security awareness training program. We are now inviting you to go beyond behind the scenes on the key findings of this report.



    Join us as SecureWorld’s Bruce Sussman interviews Dale Zabriskie, Security Awareness Evangelist at Proofpoint Security Awareness Training as he unpacks key security awareness metrics and strategies you can use at your organization.
  • Email Security: Why Now Is The Time To Review Your Strategy Recorded: Sep 26 2019 58 mins
    Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist
    Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

    Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

    Join us to gain insights into:
    How the email threat landscape has changed with attackers evading legacy approaches;
    How leaders like Proofpoint have innovated to keep up;
    Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
  • Cyber-Threats in Healthcare: Understanding and Protecting Against the Risks Recorded: Sep 25 2019 52 mins
    Roman Tobe, Product Marketing Manager
    Security is more critical than ever for healthcare organizations. At the same time, the sector has become one of the most easily targeted. Hospitals, for example, are falling victim to cyber-attacks such as ransomware and business email compromise (BEC). However, healthcare organizations attack surface extends beyond email.

    Cyber criminals create fake social media accounts and register fraudulent domains to attack their supply chain, defraud their customers and gain access to sensitive data. Join this webinar and learn how Proofpoint can help protect healthcare organizations from these targeted attacks.

    Join us to learn:

    - The state of cyber risks in healthcare
    - The latest trends in cyber threats targeting healthcare organizations
    - How Proofpoint can help protect your organization

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Web & Email Isolation: Why It Matters to Secure Your Organization and End Users Recorded: Sep 24 2019 97 mins
    Eric Schwake Group Product Marketing Manager & Mike Osterman, President of Osterman Research
    Threat actors are focused on penetrating your organization through advanced attacks on the very tools that your users employ on a daily basis: corporate email, web browsers and personal webmail accounts. Just the simple act of visiting a compromised web page means that a user can become a victim of a targeted attack, thereby wreaking havoc on their corporate network. How can security and IT teams enable use of these critical tools for employee productivity, while at the same time ensuring the security of critical data, financial and other assets?

    We will dive into a new report by Osterman Research: Why You Should Seriously Consider Web Isolation Technology. This report will answer these questions and more:

    - How do you enable a people-centric approach to email and browser security?
    - What are the benefits of isolation technology to safely enable employees’ personal browsing and webmail use?
    - What are the cost benefits of using isolation technology for URL exception handling?
    - How easy and quickly can isolation technology be implemented?
  • Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service Recorded: Sep 24 2019 45 mins
    Jennifer Cheng, Dir. of Product Marketing & Catherine Hwang, Dir. of Product Marketing at Proofpoint
    More than 99% of all targeted cyber attacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance.



    It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?

    Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape.

    In this session, we'll share:

    - Why cybersecurity transformation is critical for the financial services sector
    - How to identify users who are most at-risk of cyberattacks or cause the most compliance risk
    - How to mitigate risk of adverse inferences and damaged reputations

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo: How Email Fraud Defense Authenticates Your Emails Quickly & Safely Recorded: Sep 19 2019 29 mins
    Ash Valeski, Director, Product Marketing & Tanner Luxner, Product Marketing Manager of Proofpoint
    Email spoofing attacks are on the rise and email authentication is a proven solution that can block these threats before they reach your employees, customers, and business partners. The challenge is deploying authentication is time-consuming, requires expertise, and brings the risk of blocking legitimate email. So how can you overcome this challenge?

    Join us for a live product demonstration and learn how Proofpoint’s Email Fraud Defense (EFD) is helping organizations deploy email authentication quickly and confidently.

    In this session, we'll share:

    - Our 360-degree visibility of the email coming into and being sent from the organization
    - EFD’s proven authentication deployment program
    - How Proofpoint strengthens your secure email gateway to better protect your employees
  • Proofpoint Demo: Security Awareness Training Recorded: Sep 19 2019 29 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • 2019 Domain Fraud Report with Proofpoint Recorded: Sep 18 2019 48 mins
    Roman Tobe, Product Marketing Manager
    Web domain fraud is a growing risk for businesses, employees, and their customers. Every year, threat actors register millions of domains to impersonate brands and defraud those who trust them. How can you protect your employees and customers from these fake sites?

    Join Proofpoint as our security expert discusses the latest research findings of the 2019 Domain Fraud Report, the latest trends shaping the domain landscape, and the tactics and activities of threat actors.

    In this session, we'll share:

    • Tactics threat actors take to trick employees and customers
    • Connection between fraudulent domain registrations and highly-targeted email attacks
    • How to protect your corporate domains
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Analyst Webinar: Best Practices to Defend Against Phishing Attacks
  • Live at: May 29 2019 5:00 pm
  • Presented by: Joseph Blankenship, Principal Analyst, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint
  • From:
Your email has been sent.
or close