Hi [[ session.user.profile.firstName ]]

Closing Security Gaps in Office 365

Microsoft offers default security capabilities for all customers in Office 365. Regardless, security threats are still getting through these defenses. The use of third-party solutions can result in higher catch rates for spam, phishing, malware and other threats. Third-party solutions with true advanced capabilities also reduce the likelihood that more sophisticated threats – such as Business Email Compromise (BEC) and Email Account Compromise (EAC). Watch the webinar to learn:

- How BEC/EAC occurs and can be dangerous
- What are the short comings of native Office 365 security capabilities
- How Proofpoint email and cloud solutions can help you secure Office 365

*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Recorded Nov 21 2019 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Guntrip-Group Product Mktg Dir & Itir Clarke-Sr. Product Mktg Proofpoint & Mike Osterman-President of Osterman Research
Presentation preview: Closing Security Gaps in Office 365

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Phishing During Pandemic: Actors, Campaigns & Threats Leveraging COVID-19 - APAC Apr 8 2020 1:00 am UTC 48 mins
    Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint
    Coronavirus-related email lures now represent the greatest collection of attack types united by a single theme that the Proofpoint Threat Research and Detection team has seen in years, if not ever. We’ve observed credential phishing, malicious attachments, malicious links, business email compromise (BEC), fake landing pages, downloaders, spam, and malware, among others, all leveraging coronavirus lures.

    Join our speakers Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy as they share:

    - The current state and rapid evolution of COVID-themed phishing campaigns
    - Key defense mechanisms to reduce your organization’s risk
    - Awareness and training measures you can take to keep your users from falling victim

    This session is available for CPE credit with ISC(2). To watch more CPE-eligible sessions, please visit https://go.proofpoint.com/cpe-on-demand-webinars.html?utm_source=webinars.
  • Prevent Phishing Attacks with Proofpoint's Security Awareness Training Apr 7 2020 2:00 pm UTC 23 mins
    Andrew Brown, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats

    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense

    - Enable your employees to report suspicious messages with a single mouse click
  • 2020 Cost of Insider Threats Global Report Apr 7 2020 9:00 am UTC 46 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    ● What kinds of Insider Threats cost organizations the most
    ● How investigations are driving up the cost-per-incident for companies
    ● Which organizations, industries, and regions are being targeted the most
    ● How companies can potentially save millions by using a dedicated Insider Threat management approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Forging an Effective Insider Threat Management Program Recorded: Apr 2 2020 62 mins
    Sai Chavali, Senior Prod Mktrg Mgr, ObserveIT; Nick Cavalancia, Fndr & Chief Techvangelist; Michael Weisberg
    Playing defense against the myriad of outside threats that an organization needs to worry about can take all the attention of a cybersecurity team. But it’s critical that they don’t lose sight of the threat that insiders – employees, contractors, partners and business associates can bring to bear. Often time, these parties need legitimate access to systems within the enterprise, but that access can carry significant risk. Taking a proactive approach to detecting risky user behaviour, protecting against data exfiltration and accelerating the investigation time of insider-led data breaches is critical. The development of an Insider threat management program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Is the risk worth the investment? Join Proofpoint and (ISC)2 on April 2,2020 at 1:00PM Eastern for a discussion on how to build an effective insider threat program.
  • State of the Phish 2020 Recorded: Apr 2 2020 32 mins
    Paul Down, Director, Proofpoint EMEA
    Do you have a good sense of how well your users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks?

    Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including:

    - End-user awareness and knowledge gaps that could be hurting your cybersecurity defences
    - Impacts of phishing attacks and the ways infosec pros are trying to combat these threats
    - How Proofpoint customers are approaching phishing awareness training, and the ways we’re helping them measure success
    - Download our report to learn how organizations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence.

    Join us for an in-depth look at user awareness, vulnerability and resilience.

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Live Demo - Enterprise Information Archiving Recorded: Mar 31 2020 43 mins
    John Price, Sr. Archiving Sales Specialist and Mike Fenili, Sr. Sales Engineer
    Today’s businesses generate a lot of communications data, in a lot of formats and in a lot of locations, from computers and on-prem servers to mobile devices and the cloud. Developing a modern data archiving and compliance strategy isn’t easy, especially as regulations continue to evolve. How do you scale your infrastructure to accommodate the data growth and ensure your supervision teams can keep up?

    Join us for a live demo as we take an in-depth look at how Proofpoint solves the data archiving and compliance challenges of the modern enterprise.

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with evolving industry rules and regulations
    - Improve visibility into your archived data
  • Live Talks Series: March 30th Cyber Threat Updates - COVID19 Lures Recorded: Mar 30 2020 30 mins
    Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint
    Proofpoint’s Threat Intelligence team continues to detect credential phishing, malware, and even business email compromise (BEC) attacks, among others - all leveraging coronavirus lures. Join our bi-weekly Live Talks series with Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy as they share the latest from the front lines of COVID-19 phishing.
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Recorded: Mar 26 2020 42 mins
    Joshua Whisnant, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Beyond the Phish: A Snapshot of End-User Behavior Recorded: Mar 26 2020 38 mins
    Paul Down, Senior Director, Proofpoint EMEA
    You're invited to our most exciting webinar of the year - Beyond the Phish: A snapshot of end-user behaviour!

    During this webinar, we will address key findings from our Beyond the Phish Report that explores end-user knowledge across topics such as cyber hygiene, security, and compliance. The report analyses millions of responses gathered from our Security Education Platform.

    Join us live to learn:
    • The importance of assessing and training end-users on cybersecurity threats beyond email-based social engineering
    • Common strengths and weaknesses among end-users across 14 cybersecurity topics
    • How to gain a holistic view of susceptibility by looking beyond knowledge assessments and training activities

    ---------------------------------------------

    BONUS! All attendees will receive a free download of Beyond the Phish, Proofpoint's most wide-ranging report on user knowledge of cyber-hygiene, security and compliance.

    ---------------------------------------------

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Security Awareness Training – Your best line of defence ( APAC / APJ ) Recorded: Mar 26 2020 39 mins
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Live Talks: Securing Data & Access for Your Growing Remote Workforce Recorded: Mar 25 2020 49 mins
    Ryan Kalember, EVP Cybersecurity Strategy & Mike Stacy, Director of Advanced Technology Sales Engineering
    The 2020 cyber threat landscape has changed drastically just over the last month as more and more employees are mandated to work from home around the world. But in the rush to ensure business continuity, how you can keep your end users protected?

    Join our Live Talks conversational series with Proofpoint's experts Ryan Kalember, EVP of Cybersecurity Strategy and Mike Stacy, Director of Advanced Technology Sales Engineering as they discuss how you can keep users connected to the data and systems they need to do their job, without compromising how you protect your organization's most valuable assets.

    In this webinar, we'll share:
    - The keys to securely transitioning a remote workforce, and how to adapt your security control stack
    - Insight from the Proofpoint Threat Intel team into how threat actors are targeting newly remote workers
    - The free tools that Proofpoint is offering to help our customers stay secure as they move to a more remote workforce
  • Live Demo: A People-Centric Approach to Insider Threat Management Recorded: Mar 24 2020 29 mins
    Kevin Donovan, Sr. Solutions Architect
    Accordingly to McKinsey more than 50% of all data breaches are the result of insider threats. As more companies look to successfully transition to the cloud, traditional ways of protecting data and intellectual property aren’t enough. Context is key when incidents occur to understand intent from the user-perspective and enable a streamlined investigative process. So how is this achieved?

    Join this live demo as we discuss:

    · Methodologies that reduce investigation times by 60-90%
    · The value behind correlating user activity + data movement in insider related incidents
    · Communication techniques to measure risk when involving other business stakeholders
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access Recorded: Mar 24 2020 41 mins
    Chen Nisnkorn, Sr. Director of Technical Sales & Micha Rave, Sr Director Product Management
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Protecting Healthcare’s Greatest Cyber Security Risk Recorded: Mar 23 2020 48 mins
    Ryan Kalember, EVP Cybersecurity Strategy
    Health institutions need to look at cybersecurity the same way their attackers look at them - through the lens of their people. That starts by understanding who is healthcare’s very attacked people, or VAPs, and how they’re being attacked. In this session, you’ll hear sophisticated research outlining which healthcare job functions are most attacked and the controls that can be put in place to both identify and protect your people from malware, credential phishing, impersonation and insider threats across email and cloud.
  • Defend Your Cloud Data by Going on the Offensive with CASB Recorded: Mar 20 2020 50 mins
    Ryan Kalember, EVP of Cybersecurity Strategy of Proofpoint & Garrett Bekker, Principal Analyst of 451 Research
    The reasons for implementing cloud security access brokers have steadily moved from an original use case around discovery and asset inventory of SaaS applications to data loss prevention (DLP), monitoring user activity and adaptive access controls. Loss of in-house data control, data breaches, data residency and confidentiality are the top concerns for cloud applications and services.

    Join Garrett Bekker from 451 Research Group and Ryan Kalember, SVP of Cybersecurity at Proofpoint, as they discuss:

    - Top cloud security pain points
    - Need for preventative and responsive cloud security measures
    - Why a people-centric approach to cloud security is imperative
  • Phishing During Pandemic: Actors, Campaigns & Threats Leveraging COVID-19 Lures Recorded: Mar 19 2020 49 mins
    Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint
    Coronavirus-related email lures now represent the greatest collection of attack types united by a single theme that the Proofpoint Threat Research and Detection team has seen in years, if not ever. We’ve observed credential phishing, malicious attachments, malicious links, business email compromise (BEC), fake landing pages, downloaders, spam, and malware, among others, all leveraging coronavirus lures.

    Join our speakers Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy as they share:

    - The current state and rapid evolution of COVID-themed phishing campaigns
    - Key defense mechanisms to reduce your organization’s risk
    - Awareness and training measures you can take to keep your users from falling victim

    This session is available for CPE credit with ISC(2). To watch more CPE-eligible sessions, please visit https://go.proofpoint.com/cpe-on-demand-webinars.html?utm_source=webinars.
  • Protecting Your People and Data - Featuring Forrester's Zero Trust Framework Recorded: Mar 19 2020 60 mins
    Ryan Kalember, EVP of Cybersecurity Strategy - Proofpoint & Chase Cunningham, Principal Analyst
    There's lots of noise in the cybersecurity industry around zero-trust, but Forrester Research pioneered the original and most effective framework. It’s never been more important to understand how zero-trust principles apply to your environment, with people becoming the new perimeter, and protecting them and the data they access becoming the new imperative.

    In our upcoming webinar, we will take a closer look at the original Zero Trust Approach as defined by Forrester Research and applied in practice by leading security teams. The webinar will cover:

    - An overview of the Zero Trust approach
    - Concrete first steps for getting started
    - Guidelines on how to evaluate your standing within the maturity model
    - How Zero Trust reinforces people-centric security

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo - Email Fraud Defense ( APAC / APJ ) Recorded: Mar 19 2020 39 mins
    Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
    •Monitor all inbound impostor threats from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails

    About Proofpoint
    A next-generation cybersecurity company protecting people, data, and brands
    from advanced threats and compliance risks

    Proofpoint has teams working out of Australia, Japan, and Singapore

    Proofpoint Japan, Tokyo, Japan info-japan@proofpoint.com
    Proofpoint Pty Ltd Sydney, Australia infoanz@proofpoint.com
    Proofpoint APAC, Singapore infosg@proofpoint.com
  • 3 Strategies for Staying Compliant Beyond Email Recorded: Mar 18 2020 40 mins
    Amanda Cannata, Product Marketing Manager for Digital Risk and Compliance
    Today’s business value is created with increasingly distributed teams. Organizations are able to scale more successfully by enabling employees with faster, more effective ways to communicate. Slack, Microsoft Teams, and Zoom are just a few of the many engines that contribute to this acceleration. We have seen first-hand how collaboration technologies have become essential to business strategy.

    In this webinar, we will explore how you can build a winning business in this new digital landscape — beyond email and risk-free.

    We'll cover:

    -The compliance risks posed by increasingly distributed electronic communications

    -The challenges associated with capturing and supervising electronic communications

    -Steps you can take to ensure complete capture across all channels
  • FINRA's Exam Priorities, Regulation BI, and the SEC's Cybersecurity Guidance Recorded: Mar 17 2020 54 mins
    John Pepe, JD Regulatory Technology & Counsel
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for the rest of 2020 and beyond.



    Join us for this 30 minute briefing where Proofpoint’s Regulatory Counsel will cover the recent changes in the regulatory landscape. Topics will include:



    - Takeaways from FINRA’s 2020 Exam Priorities

    - How firms are preparing for Regulation Best Interest (June 2020)

    - Key elements in the SEC’s Cybersecurity Guidance and how to prepare
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Closing Security Gaps in Office 365
  • Live at: Nov 21 2019 4:30 pm
  • Presented by: Mark Guntrip-Group Product Mktg Dir & Itir Clarke-Sr. Product Mktg Proofpoint & Mike Osterman-President of Osterman Research
  • From:
Your email has been sent.
or close