Hi [[ session.user.profile.firstName ]]

Live Demo - Proofpoint Security Awareness Training

Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

You'll learn how to: 

- Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
- Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Recorded Jul 9 2019 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sean Walker, Enterprise Account Executive
Presentation preview: Live Demo - Proofpoint Security Awareness Training

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber-Threats in Healthcare: Understanding and Protecting Against the Risks Sep 25 2019 5:00 pm UTC 52 mins
    Roman Tobe, Product Marketing Manager
    Security is more critical than ever for healthcare organizations. At the same time, the sector has become one of the most easily targeted. Hospitals, for example, are falling victim to cyber-attacks such as ransomware and business email compromise (BEC). However, healthcare organizations attack surface extends beyond email.

    Cyber criminals create fake social media accounts and register fraudulent domains to attack their supply chain, defraud their customers and gain access to sensitive data. Join this webinar and learn how Proofpoint can help protect healthcare organizations from these targeted attacks.

    Join us to learn:

    - The state of cyber risks in healthcare
    - The latest trends in cyber threats targeting healthcare organizations
    - How Proofpoint can help protect your organization
  • EMEA Threat Landscape: Volumes, Focus, & Shifting Targets Sep 23 2019 9:00 am UTC 24 mins
    Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales Engineer
    2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.

    While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
  • 2019 Domain Fraud Report with Proofpoint Sep 18 2019 9:00 am UTC 48 mins
    Roman Tobe, Product Marketing Manager
    Web domain fraud is a growing risk for businesses, employees, and their customers. Every year, threat actors register millions of domains to impersonate brands and defraud those who trust them. How can you protect your employees and customers from these fake sites?

    Join Proofpoint as our security expert discusses the latest research findings of the 2019 Domain Fraud Report, the latest trends shaping the domain landscape, and the tactics and activities of threat actors.

    In this session, we'll share:

    • Tactics threat actors take to trick employees and customers
    • Connection between fraudulent domain registrations and highly-targeted email attacks
    • How to protect your corporate domains
  • Case Study: How Northwestern Mutual Stops Email Attacks w/ Email Fraud Defense Sep 12 2019 5:00 pm UTC 60 mins
    Rich Wegner, Sr. Cybersecurity Engineer - Northwestern Mutual & Ryan Terry, Product Marketing Manager - Proofpoint
    Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. As the number one threat vector to businesses, email must be authenticated to restore trust to business communications. So what is the best way to accomplish this?

    Join us for our case study with Northwestern Mutual as we examine how this financial services' leader is using Proofpoint's Email Fraud Defense (EFD) to help stop email spoofing attacks in their tracks.

    In this session, we'll share:
    - The benefits of deploying DMARC email authentication
    - How Northwestern Mutual is utilizing Proofpoint's EFD
    - How to strengthen your secure email gateway to better protect your end users
  • What the Symantec Acquisition Means for Your Email Security Future Sep 12 2019 9:00 am UTC 60 mins
    Adenike Cosgrove, International Cybersecurity Strategist
    It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats.

    As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn:

    - How the email threat landscape has changed with attackers evading legacy approaches
    - How leaders like Proofpoint have innovated to keep up
    - How we have helped customers migrate from legacy products to Proofpoint
  • Live Demo - Enterprise Information Archiving Sep 5 2019 5:00 pm UTC 45 mins
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what' the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • Live Demo: Security Awareness Training Sep 5 2019 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • EMEA Threat Landscape: Volumes, Focus, & Shifting Targets Sep 3 2019 9:00 am UTC 24 mins
    Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales Engineer
    2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.

    While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
  • What the Symantec Acquisition Means for Your Email Security Future Aug 28 2019 4:30 pm UTC 60 mins
    Ryan Kalember, EVP of Cybersecurity Strategy for Proofpoint
    It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats.

    As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn:

    - How the email threat landscape has changed with attackers evading legacy approaches
    - How leaders like Proofpoint have innovated to keep up
    - How we have helped customers migrate from legacy products to Proofpoint
  • Building a Culture of Security within Healthcare Organizations Aug 27 2019 5:00 pm UTC 59 mins
    Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice
    Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.

    In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.

    Join us to learn:

    - What we mean by a “patient-centric” cybersecurity mindset
    - How to overcome common training obstacles and deliver the most effective cybersecurity education program
    - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program Recorded: Aug 22 2019 47 mins
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity Recorded: Aug 21 2019 38 mins
    Joel Sierra, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Live Demo: Proofpoint Security Awareness Training Recorded: Aug 20 2019 31 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Cloud Security: Learn How to Protect Your Cloud Users with a CASB Innovator Recorded: Aug 20 2019 59 mins
    Ryan Kalember, SVP of Cybersecurity Strategy - Proofpoint. Garrett Bekker, Principal Analyst Info Security - 451 Research.
    In case you missed it, we wanted to share a recent webinar about how to use a Cloud Access Security Broker (CASB) to protect your organization from next generation cloud attacks.

    Join Garrett Bekker, Principal Security Analyst at 451 Research, and Ryan Kalember, EVP of Cybersecurity at Proofpoint, for a discussion about:

    • The different CASB use cases, features and architectures
    • What the most prevalent cloud attacks are, and how they target your VAPs, or Very Attacked People
    • What to look for in a CASB solution to mitigate your cloud risks
  • From Skeptics to Champions: Selling the Value of Security Awareness Training Recorded: Aug 15 2019 106 mins
    Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader
    The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.

    Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.

    Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:

    - Best practices for selling the value of security awareness training internally
    - Preparing a business case for your training program
    - Engaging employees through creative programming, recognition, and incentives
  • Securing the Multi-Cloud in the Age of Threats Recorded: Aug 8 2019 55 mins
    Raj Mallempati (CloudKnox Security) | Chris Schueler (Trustwave) | Tim Choi (Proofpoint) | Nathan Wenzler (Moss Adams)
    How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about:
    - Multi-cloud reality
    - Addressing your cyber risk
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Automating security tasks across multiple clouds and applications
    - Recommendations for improving enterprise cloud security

    Speakers:
    - Raj Mallempati, COO, CloudKnox Security
    - Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
    - Tim Choi, VP, Product Marketing, Proofpoint
    - Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
  • Webisode 4: Proofpoint Demo - Enterprise Information Archiving Recorded: Aug 8 2019 29 mins
    Tom Mahoney, Senior Archiving Sales Specialist; Jason Colvin, Senior Systems Engineer
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us for the last of four webisodes to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance
  • How To Build a People-Centric Cybersecurity Strategy Recorded: Aug 8 2019 23 mins
    Tim Choi, VP, Product Marketing, Proofpoint & Roselle Safran, President, Rosint Labs
    Abstract: More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the center when building a robust cybersecurity approach in the era of highly sophisticated attacks.

    Join BrightTalk for a live interview with Tim Choi, the VP of Product Marketing at Proofpoint, as we discuss the key findings of the threat landscape for 2019 and share practical tips on how CISOs can build a truly people-centric cybersecurity strategy.
  • Webisode 5: Proofpoint Demo - Ramping Up People-Centric Cybersecurity Recorded: Aug 7 2019 36 mins
    Craig Morell, Security Sales Engineer, Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    - Identify and remediate account compromise attacks
    - Solve for data loss through email
    - Make your users more resilient against attacks through awareness training
  • Compliance Trends & Futures – How Technology is Driving Change Recorded: Aug 6 2019 59 mins
    Martin Tuip - Senior Information Archive Strategist, John Pepe - Market Development Principal
    The compliance world is changing. Regulations are evolving and new technology addressing compliance challenges are becoming available. From international privacy regulations to new communication channels, how can organizations keep up with those changing regulations and how can they remain nimble.

    Join us for a webinar on compliance trends and futures and how regulatory technology and modern-day data behavior is driving change.

    Learn about:
    • What regulators are focusing on these days
    • New regulatory and compliance technology that can help organizations meet regulatory requirements
    • External drivers for technology change
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live Demo - Proofpoint Security Awareness Training
  • Live at: Jul 9 2019 5:00 pm
  • Presented by: Sean Walker, Enterprise Account Executive
  • From:
Your email has been sent.
or close