Hi [[ session.user.profile.firstName ]]

Live Demo - Email Fraud Defense

Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

•Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
•Monitor all inbound impostor threats from your domains and those of third parties
•Accurately distinguish between legitimate emails and fraudulent emails
Recorded Nov 20 2019 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint
Presentation preview: Live Demo - Email Fraud Defense

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A People-Centric Approach to Managing Insider Threats: Introducing ObserveIT Dec 19 2019 6:00 pm UTC 60 mins
    Mayank Choudhary, SVP of ObserveIT | Proofpoint
    Insider Threats are quickly becoming one of the greatest cyber security threats that organizations face today. They are responsible for three million records are stolen every day and at the heart of 57% of all database breaches last year (Verizon 2019). Research also shows that the average time to spot and contain an insider threat is a massive 77 days -- just 13% of incidents are caught within 30 days (Ponemon 2020).

    The reason they are so prolific and take so long to deal with is because anyone with legitimate, trusted access to an organization’s systems and data – whether full-time employee, part-time contractor or strategic business partner – can be an Insider Threat.

    Managing insider threats fundamentally requires a people-centric approach. With the acquisition of ObserveIT, Proofpoint adds a powerful Insider Threat Management platform to our portfolio of People Centric cybersecurity solutions. The ObserveIT platform delivers unique capability to monitor both user and file activity, enabling security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach.

    Join ObserveIT | Proofpoint SVP Mayank Choudhary, in this webinar to:

    · Learn how the key components of full visibility – user activity, data activity, and behavior analytics – provide the necessary context to understanding Insider Threats

    · Discover how an organization’s risk of an Insider Threat can be reduced through always-on monitoring, without compromising user privacy and compliance; with real-life case studies to illustrate

    · See a demo explaining of how out-of-policy user activity is detected and investigated on-the-spot

    · Learn about the different types of Insider Threats and find out what steps you can take to build your own Insider Threat Management program
  • Live Demo: Proofpoint Security Awareness Training Dec 19 2019 5:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Security Awareness Training from ProofPoint - Live Demo Dec 19 2019 10:00 am UTC 36 mins
    Sean Walker, Enterprise Account Executive
    See this demonstration of how you can engage your colleagues and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity training to the right people at the right time.

    Register to see this demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to email phishing attacks and their knowledge of cybersecurity beyond the phish
    - Deliver customized online training to your end users to drive behavior change and make them a strong last line of cyber defense
    - Enable your employees to report suspicious messages with a single mouse click

    This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you.
  • Bridging the Technology & People Divide with Security Awareness Training Dec 18 2019 6:00 pm UTC 60 mins
    Mark Guntrip, Group Product Marketing Director & Mike Bailey, Sr. Product Marketing Manager
    The threat landscape is constantly changing and the attacks targeting your people are getting more sophisticated. Threat actors are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even the most savvy users. So how can you better protect yourself, your organization, and your end users?

    Join us as we walk you through how we're taking Proofpoint's expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you'll get a better understanding of:

    - How we identify and stop malicious inbound threats
    - How to better identify end-user risk with our simulated attacks
    - How we're helping customers stop real attacks in their tracks with our Closed-Loop Email Analysis and Response (CLEAR) solution
  • Live Demo: Security Training for Healthcare Dec 12 2019 6:00 pm UTC 45 mins
    Ryan Witt, Healthcare Industry Practice Leader & Joshua Whitnant, Account Executive of Proofpoint
    The 2019 HIMSS Cybersecurity indicated that email is the initial point of compromises for healthcare cyber-attacks – phishing, hacking, BEC – or negligent activity from hospital staff…someone inadvertently clicking on a link or downloading a file. Clearly people are under attack, yet they are also a health system’s first line of defense. So how do you best protect your people and prepare for them for continuous stream of cyber-attacks?

    Join this live demo to see Proofpoint Security Awareness Training in action, and how it safeguards against advance threats and compliance risks.

    You’ll learn:

    - The most common attacks in today's healthcare threat landscape
    - Best practices to improve your security posture
    - A people-centric approach to helping you protect patient data
  • Live Demo - Enterprise Information Archiving Dec 12 2019 10:00 am UTC 48 mins
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist
    GDPR, Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    So what is best practice with respect to developing and implementing a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service Dec 10 2019 6:00 pm UTC 44 mins
    Jennifer Cheng, Dir. of Product Marketing & Catherine Hwang, Dir. of Product Marketing at Proofpoint
    More than 99% of all targeted cyber attacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance.



    It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?

    Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape.

    In this session, we'll share:

    - Why cybersecurity transformation is critical for the financial services sector
    - How to identify users who are most at-risk of cyberattacks or cause the most compliance risk
    - How to mitigate risk of adverse inferences and damaged reputations

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • How Chapman and Cutler LLP Use Email Fraud Defense & DMARC to Stop Email Attacks Recorded: Dec 5 2019 44 mins
    Tanner Luxner, Product Marketing Manager of Proofpoint & Martin Starr, IS Support Consultant of Chapman and Cutler LLP
    Email-based identity deception attacks are impacting organizations of all sizes and in all industries. In fact, business email compromise (BEC) alone has cost organizations more than $26.2 billion in losses worldwide. As the number one threat vector to businesses today, email must be authenticated to restore trust to business communications. So how can you better protect your people?

    Join us for a case study with Chapman and Cutler LLP to learn how they are using Proofpoint’s Email Fraud Defense (EFD) to help stop impostor email attacks in their tracks.

    In this session, we’ll share:

    - The benefits of deploying DMARC email authentication
    - The challenges associated with DMARC authentication
    - How Chapman and Cutler LLP have deployed DMARC authentication efficiently and safely with EFD
  • Live Demo: Proofpoint Security Awareness Training Recorded: Dec 5 2019 38 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Proofpoint Security Awareness Training Recorded: Dec 5 2019 36 mins
    Sean Walker, Enterprise Account Executive
    Engage your colleagues and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity training to the right people at the right time.

    Sign up to see this in-depth demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to email phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a strong last line of cyber defense
    - Enable your employees to report suspicious messages with a single mouse click

    This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you.

    -------------------------------------------------------------------------------------------------------------

    About Proofpoint.

    A next-generation cybersecurity company protecting people, data, and brands from advanced threats and compliance risks.

    We collect and analyze more than 100 billion data points a day from more than 100 million email boxes, 200 million social-media accounts, and 7 million mobile apps. 

    Proofpoint was named a leader by Gartner: Magic Quadrant for Security Awareness (https://www.proofpoint.com/us/resources/analyst-reports/gartner-magic-quadrant-security-awareness-training) Computer-Based Training, Joanna Huisman, 18 July 2019.
  • Live Demo: Proofpoint Security Awareness Training Recorded: Dec 5 2019 37 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Building a People-Centric Cybersecurity Strategy for Healthcare Recorded: Dec 4 2019 56 mins
    ISSA International
    More than 99% of all targeted cyber-attacks rely on users to activate them. Nowadays, threat actors are not going after an organization's technology and infrastructure. They are going after your most valuable assets - your people and your data. So, do you know when or how your people are being targeted? Do you know who the most cyber-attacked people are in your organization? Are your Very Attacked People (VAPs) the same as your Very Important People (VIPs)?

    Join our cybersecurity experts for a deep dive into what the current healthcare threat landscape looks like, how a people-centric approach can help institutions identify and protect your end users, and the latest findings in healthcare threat research.

    In this session, we’ll share:
    •Why cybersecurity transformation is critical right now
    •What a people-centric approach means to today's healthcare threat landscape
    •How hospitals are leveraging a people-centric strategy to improve their security posture
    •How to better protect your patients' data and improve your end-users' safety

    Moderator:
    Lee Neely, Senior IT & Security Professional, LLNL

    Speakers:

    Ryan Witt, Managing Director, Healthcare Industry Practice, Proofpoint
    Barbara Guerin, CISO, Renown Health
    Andrew Seward, CISO, Solution Health System
  • Live Demo - Proofpoint CASB New Features & Capabilities Recorded: Dec 4 2019 47 mins
    Amish Kohli, Cloud Security Solutions Architect
    Proofpoint Cloud App Security Broker(CASB) is a cloud security platform that helps accelerate migration to the cloud. Proofpoint keeps improving our CASB and tightening our cross-platform integrations to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations.

    Join us to see how Proofpoint cloud security adds value to and benefits from existing email security when organizations migrate their email and other core apps to the cloud. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss.

    - Correlate email threats such as phishing to cloud account compromise
    - Detect and investigate threats using more granular policy rules and forensics capabilities
    - Find out which apps are being accessed during a risky session via Okta integration
    - Drill deeper into Shadow IT and third-party apps forensics
    - Prevent risky file activity in the cloud using browser isolation
  • Live Demo - Enterprise Information Archiving Recorded: Dec 3 2019 48 mins
    Shannon Smith, Archiving Sales Specialist & Micah Wyenn, Sales Engineer of Proofpoint
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what' the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • Live Demo: Advanced People-Centric Cybersecurity Recorded: Dec 3 2019 41 mins
    Joel Sierra, Sales Engineer at Proofpoint
    More than 99% of all targeted cyber-attacks exploit human errors rather than system flaws. Nowadays, threat actors are no longer attack your tech infrastructure, they target your most valuable assets - your people.

    So what is best practice when implementing people-centric cyber defense strategy, and where do you start? What are your top priority first fixes?

    Join us for a live demo to learn how to:

    1. Protect your people from email-based attacks
    2. Gain visibility into who in your organization is getting the most attacks
    3. Solve for user awareness through threat simulation and training
    -------
    About Proofpoint
    -------
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Beyond the Phish: A Snapshot of End-User Behavior Recorded: Dec 3 2019 32 mins
    Maiwand Youssofzay, Security Awareness Training Leader, Australia and New Zealand
    You're invited to our most exciting webinar of the year - Beyond the Phish: A snapshot of end-user behaviour!

    During this webinar, we will address key findings from our Beyond the Phish Report that explores end-user knowledge across topics such as cyber hygiene, security, and compliance. The report analyses millions of responses gathered from our Security Education Platform.

    Join us live to learn:
    • The importance of assessing and training end-users on cybersecurity threats beyond email-based social engineering
    • Common strengths and weaknesses among end-users across 14 cybersecurity topics
    • How to gain a holistic view of susceptibility by looking beyond knowledge assessments and training activities

    ---------------------------------------------

    BONUS! All attendees will receive a free download of Beyond the Phish, Proofpoint's most wide-ranging report on user knowledge of cyber-hygiene, security and compliance.

    ---------------------------------------------

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.

    Proofpoint has offices in Sydney, Tokyo and Singapore

    https://www.proofpoint.com/au/contact/office-locations
  • Live Video Panel - Key Factors for Multi-Cloud Security Success Recorded: Dec 2 2019 44 mins
    Gary Marsden, Thales | Darren Busby, MYHSM | James Johnson, Proofpoint
    As the use of multiple clouds and storage services becomes the norm, security risks and challenges increase. From public cloud, to private cloud and cloud-based SaaS, it is essential to secure these complicated environments.

    Join this live panel discussion from Black Hat Europe in London to discuss the future of Multi-Cloud Security, including:

    - How to adopt a multi-cloud security strategy
    - Addressing your cyber risks and challenges
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Recommendations for improving enterprise cloud security

    Panellists
    Gary Marsden, Cloud Services Director, Thales
    Darren Busby, Global Head of Sales, MYHSM
    James Johnson, Cloud Security Specialist, Proofpoint

    Moderator Simon Ratcliffe, Principal Consultant, Advisory, Ensono

    Cloud, Cloud Applications, Cloud Adoption, Hybrid Cloud, Multi Cloud, Cloud Security, Risk Mitigation, SaaS, Security Strategy, Cyber Risk, Vulnerability Management, Breach Detection, Enterprise Security
  • Beyond the Phish: A Snapshot of End-User Behavior Recorded: Nov 28 2019 39 mins
    Paul Down, Senior Director, Proofpoint EMEA
    You're invited to our most exciting webinar of the year - Beyond the Phish: A snapshot of end-user behaviour!

    During this webinar, we will address key findings from our Beyond the Phish Report that explores end-user knowledge across topics such as cyber hygiene, security, and compliance. The report analyses millions of responses gathered from our Security Education Platform.

    Join us live to learn:
    • The importance of assessing and training end-users on cybersecurity threats beyond email-based social engineering
    • Common strengths and weaknesses among end-users across 14 cybersecurity topics
    • How to gain a holistic view of susceptibility by looking beyond knowledge assessments and training activities

    ---------------------------------------------

    BONUS! All attendees will receive a free download of Beyond the Phish, Proofpoint's most wide-ranging report on user knowledge of cyber-hygiene, security and compliance.

    ---------------------------------------------

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Securing Data in the Cloud Starts with People Recorded: Nov 25 2019 60 mins
    Ryan Witt, Heathcare Industry managing director & Itir Clarke, Sr. product marketing manager
    Cybersecurity in healthcare is about people, not technology. In the cloud era, keeping your patients safe means protecting clinicians and patients from cloud threats and data loss. A people-centric approach to security helps you identify people and data at-risk and provide the tools needed to stay alert and keep users and their sensitive data safe. A unified data loss prevention (DLP) platform can get you the visibility needed to discover and stop ex-filtration of sensitive data (PII, PHI and more) housed in cloud apps, email and on-premises file shares. So what does a people-centric strategy look like for your healthcare cloud security?

    Join us for a deep dive into how you can better protect your organization's most valuable assets: your data and your people. In this session, we'll examine the following:

    - Identify which healthcare job functions are most attacked
    - Shorten time to discover and protect sensitive data with out-of-box DLP policies
    - Ensure consistent policy enforcement to lock down access to files with technology shared across email, cloud apps and on-premises file repositories
    - Simplify day-to-day operations by centralizing incident triage and reporting across multiple channels in a single dashboard
  • Prevention & Response Strategies for Phishing Attacks with Okta + Proofpoint Recorded: Nov 25 2019 39 mins
    Lucia Milica, CISO of Proofpoint & Marc Rogers, VP of Cybersecurity at Okta
    Today, more than 80% of breaches are caused by compromised credentials; attackers don’t need to hack in – they can just log in. While the rise in adoption of cloud-based applications serves as a catalyst for rethinking modern security, one consistency remains: email-based credential harvesting remains the most fruitful tactic for today’s threat actors.

    So how can organizations protect against attacks like phishing? Join Lucia Milica, CISO at Proofpoint and Marc Rogers, Executive Director, Cybersecurity at Okta as they share:

    - The anatomy of a phishing attack
    - Various prevention and response strategies
    - Best tools and integrations across authentication and email security
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live Demo - Email Fraud Defense
  • Live at: Nov 20 2019 5:00 pm
  • Presented by: Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint
  • From:
Your email has been sent.
or close