Hi [[ session.user.profile.firstName ]]

Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service

More than 99% of all targeted cyber attacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance.



It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?

Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape.

In this session, we'll share:

- Why cybersecurity transformation is critical for the financial services sector
- How to identify users who are most at-risk of cyberattacks or cause the most compliance risk
- How to mitigate risk of adverse inferences and damaged reputations

*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Recorded Sep 24 2019 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jennifer Cheng, Dir. of Product Marketing & Catherine Hwang, Dir. of Product Marketing at Proofpoint
Presentation preview: Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Demo: Proofpoint Security Awareness Training Dec 19 2019 5:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service Dec 10 2019 6:00 pm UTC 44 mins
    Jennifer Cheng, Dir. of Product Marketing & Catherine Hwang, Dir. of Product Marketing at Proofpoint
    More than 99% of all targeted cyber attacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance.



    It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?

    Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape.

    In this session, we'll share:

    - Why cybersecurity transformation is critical for the financial services sector
    - How to identify users who are most at-risk of cyberattacks or cause the most compliance risk
    - How to mitigate risk of adverse inferences and damaged reputations

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo: Proofpoint Security Awareness Training Dec 5 2019 5:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Building a People-Centric Cybersecurity Strategy for Healthcare Dec 4 2019 6:00 pm UTC 60 mins
    ISSA International
    More than 99% of all targeted cyber-attacks rely on users to activate them. Nowadays, threat actors are not going after an organization's technology and infrastructure. They are going after your most valuable assets - your people and your data. So, do you know when or how your people are being targeted? Do you know who the most cyber-attacked people are in your organization? Are your Very Attacked People (VAPs) the same as your Very Important People (VIPs)?

    Join our cybersecurity experts for a deep dive into what the current healthcare threat landscape looks like, how a people-centric approach can help institutions identify and protect your end users, and the latest findings in healthcare threat research.

    In this session, we’ll share:
    •Why cybersecurity transformation is critical right now
    •What a people-centric approach means to today's healthcare threat landscape
    •How hospitals are leveraging a people-centric strategy to improve their security posture
    •How to better protect your patients' data and improve your end-users' safety
  • Live Demo - Email Fraud Defense Nov 20 2019 5:00 pm UTC 45 mins
    Ash Valeski, Director, Product Marketing, Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
    •Monitor all inbound impostor threats from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Building an Effective Security Awareness Program Nov 19 2019 6:00 pm UTC 60 mins
    Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist
    Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves?

    Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss:

    - Proven best practices for increasing the effectiveness of cybersecurity education
    - How to build a culture of security within your organization
    - Actionable guidance on executing security awareness & training initiatives that deliver measurable results
  • Live Demo: Proofpoint Security Awareness Training Nov 14 2019 5:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Advanced People-Centric Cybersecurity Nov 12 2019 6:00 pm UTC 45 mins
    Joel Sierra, Sales Engineer at Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Live Demo: Social Media Compliance Nov 7 2019 6:00 pm UTC 45 mins
    Coleem Chestnut, Sr. Integration Engineer of Proofpoint
    FINRA and the SEC govern marketing communications and advertising practices when communicating with the public. These regulations put broker-dealers squarely in the spotlight of various risks and responsibilities. So how can you mitigate these threats and better manage the process?

    Learn how to solve for complex social compliance pain points with ease. Proofpoint’s Social Media Compliance solution helps firms and their advisers to engage with customers on social media in a compliant way. Join this demo and listen to product expert Coleem Chestnut, Sr. Integration Engineer, who will demonstrate how our solution:

    - Finds accounts associated with your firm, including rogue adviser accounts
    - Automates reviews and approvals of social profiles
    - Supervises social media activity in real time and notifies you of compliance violations
    - Removes non-compliant social media content
    - Provides detailed reporting and proof of compliance
  • Case Study: How a Large Financial Services Company Utilizes Email Fraud Defense Nov 6 2019 6:00 pm UTC 46 mins
    Rich Wegner, Sr. Cybersecurity Engineer - Financial Services & Ryan Terry, Product Marketing Manager - Proofpoint
    Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. As the number one threat vector to businesses, email must be authenticated to restore trust to business communications. So what is the best way to accomplish this?

    Join us for our case study with one of the largest financial services companies as we examine how they are using Proofpoint's Email Fraud Defense (EFD) to help stop email spoofing attacks in their tracks.

    In this session, we'll share:
    - The benefits of deploying DMARC email authentication
    - How the organization is utilizing Proofpoint's EFD
    - How to strengthen your secure email gateway to better protect your end users

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • What We Have Learned from Working with IT & Legal Oct 31 2019 5:00 pm UTC 60 mins
    Vijay Rathee, Sr. Mgr Sales Engineer & Robert Kreuscher, Solutions Architect
    Compliance solutions aren’t new and Proofpoint has been providing compliance and legal solutions to customers for almost 15 years. For organizations, building and deploying a corporate compliance program and solution that is ready for the future can be a challenge. So are you ready for something new?

    Join the first of this two part webinar series and hear us talk about the lessons we learned and valuable insights from our customers about:

    - Migration and content strategies
    - Content and organizational policies
    - Solution deployment and security scenarios
    - Legal tactics
  • Live Demo: Proofpoint Security Awareness Training Oct 31 2019 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Ramping Up People-Centric Cybersecurity Oct 30 2019 5:00 pm UTC 45 mins
    Joel Sierra, Sales Engineer at Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    1. Identify and remediate account compromise attacks
    2. Solve for data loss through email
    3. Make your users more resilient against attacks through awareness training
  • Top 5 Lessons I Learned Working with Compliance Oct 23 2019 5:00 pm UTC 60 mins
    Dan Nadir, VP of Product Management
    Ever wonder what industry leaders are doing with their compliance programs? Listen as Proofpoint’s Dan Nadir (VP of Product, Digital Risk and Compliance) discusses today’s trends in social selling and compliance programs.

    Building a corporate compliance program that can keep up with changing laws, emerging risks and new regulations is increasingly difficult. Listen to this webinar and gain valuable insights as we cover:

    - Adoption of new communication platforms
    - How to scale a program successfully
    - Supervising for various media types

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Switch from Defense to Offense: Why Archiving All Electronic Content is Critical Recorded: Oct 17 2019 61 mins
    Martin Tuip - Senior Information Archive Strategist & Michael Osterman - Osterman Research Inc.
    Electronic content archiving – the process of capturing, indexing and placing data into long-term storage for later search and retrieval – has been a best practice for many years, particularly in industries that are more heavily regulated, such as financial services, energy, life sciences, healthcare and government. The digital transformation has resulted in the integration of digital technology into all areas of a business, resulting in fundamental changes in how a business operates and the value they deliver to their customers through varied set of communication and collaboration systems. All these new communications have an impact on an organization's compliance and legal readiness. So why is archiving all electronics critical to your organization, and what are some effective ways to approach this?

    Join Proofpoint's expert Martin Tuip and Michael Osterman of Osterman Research as we deep dive into archiving your electronic content, and what an archiving solution looks like.

    In this session, we'll share:

    - How an archiving solution can be used for both defensive purposes and as a proactive tool to glean insight and intelligence about an organization’s operations
    - How to use them to detect problems before they turn into big problems
    - Best practices on moving forward with next generation archiving

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo: Proofpoint Security Awareness Training Recorded: Oct 17 2019 33 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • 2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe Recorded: Oct 17 2019 60 mins
    Davide Canali, Senior Threat Analyst and Richard Davis, Cybersecurity Strategist
    More than 99% of the worldwide attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and trust that leads well-intentioned people to install malware, transfer money or hand over sensitive data is simply more reliable and lucrative to cyber criminals than expensive and quickly patched automated exploits. So how can you better protect yourself, your organization, and your end users from attacks that rely more on social engineering than system vulnerabilities?


    Join our International Cybersecurity Strategist, Richard Davis and Davide Canali, Senior Threat Analyst as we examine the key findings of Proofpoint's 2019 Human Factor Report. We'll take a close look at how threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that trick even savvy users, as well as break down the trends seen across both the EMEA and Asia Pacific regions.

    In this session we'll share:

    - Trends in volume and types of attacks, providing useful insights for both defenders and organizations for both the EMEA and Asia Pacific regions.
    - Refined techniques and new platforms used by attackers
    - The latest targets that make up an expanding attack including as Office 365 and other cloud accounts, as well as the schemes to which users are most likely to respond
    - The evolution of business email compromise and impostor threats
    - Best practices for layered defenses and user training when, in fact, end users represent the last line of defense against these threats

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo: Foundations of People-Centric Cybersecurity Recorded: Oct 16 2019 39 mins
    Joel Sierra, Sales Engineer at Proofpoint
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • How to Solve the $26 Billion Problem of Business Email & Account Compromise Recorded: Oct 10 2019 59 mins
    Mark Guntrip, Group Product Marketing Director for Proofpoint
    The FBI recently released their latest report detailing reported losses attributed to business email compromise (BEC) and Email Account Compromise (EAC) which totaled over $26B between July 2016 and July 2019. While the scale of losses is staggering, how to best protect against these type of threats, which don’t normally include malware or detectable malicious intent, is not an easy task. There are many facets that an organization must consider across email, cloud, authentication, visibility and education in order to address the different attack tactics and be prepared to limit the potential for financial losses. So what can you do to better protect your people and your organization?

    Join Proofpoint to as we deep dive into email fraud and how to defend against it. In this session, we'll share:

    - The techniques for preventing these threats
    - A framework for understanding where potential gaps exist
    - How automation is key in resolving incidents

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Key Considerations for Your Future Email Security Solution Recorded: Oct 8 2019 50 mins
    Cheryl Tang, Product Marketing Director
    The Broadcom acquisition of Symantec’s Enterprise Security Business creates uncertainty for your email security strategy. Unsettled by the acquisition, many Symantec email security customers are reevaluating their email security solution. As you evaluate your options, you may be wondering what critical capabilities your next email security solution must have. One thing is certain. With today’s threat actors continually refining their tactics, you need an email security solution that can keep pace with today’s rapidly changing threat landscape. But what else do you need to defend against the No. 1 threat vector?

    Join Proofpoint for an educational webinar to learn:

    - What the threat landscape looks like today
    - What key capabilities you should look for to future proof your email security
    - How Proofpoint we’ve helped customers with their email security
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service
  • Live at: Sep 24 2019 4:30 pm
  • Presented by: Jennifer Cheng, Dir. of Product Marketing & Catherine Hwang, Dir. of Product Marketing at Proofpoint
  • From:
Your email has been sent.
or close