Hi [[ session.user.profile.firstName ]]

Hoodwinked! Why Users are the Preferred Target for Attackers

Manipulation of human beings has been going on since the dawn of time. With the multiple channels and speed that information and data are arriving to every individual, the opportunity to be manipulated or “conned” is at an all-time high. With the continued diligence in hardening system, the attackers have moved to the softer targets, the “human element”. But an educated and aware user is a resilient target. What can an organization due to better harden their users and make them aware of the myriad threats that target them? Join Proofpoint and (ISC)2 on November 21, 2019 at 10:00 AM PST/1:00 PM EST for a panel discussion on how to better defend against threat actors with a cybersecurity strategy that's focused on your organization's most valuable assets: your people.
Recorded Nov 21 2019 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Guntrip, Group Prod. Mktg Director, ProofPoint; Chrysa Freeman, Sec Awareness Mgr., Code42; Charles Gaughf, (ISC)²;
Presentation preview: Hoodwinked! Why Users are the Preferred Target for Attackers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Jun 16 2020 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training May 19 2020 4:00 pm UTC 45 mins
    Andrew Brown, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Apr 28 2020 4:00 pm UTC 45 mins
    Andrew Brown, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo - Enterprise Information Archiving Apr 28 2020 9:00 am UTC 47 mins
    Shannon Smith, Archiving Sales Specialist & Micah Wyenn, Sales Engineer of Proofpoint
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what' the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • 5 Steps to Building A People-Centric Insider Threat Program Apr 23 2020 1:00 pm UTC 60 mins
    Saikrishna (Sai) Chavali, Cybersecurity Specialist & Erich Anderson, Insider Threat Consultant
    Most organizations understand the challenge of external cyber-attacks. But many of today’s biggest threats come from within. According to a recent study from Ponemon Institute, insider threats of all types have risen 45% in just two years, racking up a 31% increase in average costs over the same time period.

    Whether it’s careless users, disgruntled employees or compromised accounts - the cost of insider threats is on the rise.
    Addressing this type of threat requires a completely different approach to cybersecurity. After all, traditional security solutions are not designed to stop legitimate users accessing systems within the enterprise – or manage the significant risks.

    To address this challenge head-on, organizations need to develop an insider threat program, which can provide visibility into insider-led data breaches and streamline response and investigation, while balancing the protection of corporate assets with employee privacy.

    Join this webinar to learn the top five steps for building and maintaining a people-centric insider threat program, with best practices and real-life examples that you can use, including:
    •What kinds of Insider Threats cost organizations the most?
    •How to determine if your organization is doing enough to address insider threats
    •Five elements to building an effective insider threat program
    •Designing an insider threat management strategy as a combination of people, processes and technology – in that order!
  • Formation de sensibilisation à la sécurité /dernière ligne de défense / Français Apr 21 2020 12:00 pm UTC 34 mins
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • Email Security: Why Now Is The Time To Review Your Strategy Apr 21 2020 9:00 am UTC 57 mins
    Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist
    Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

    Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

    Join us to gain insights into:
    How the email threat landscape has changed with attackers evading legacy approaches;
    How leaders like Proofpoint have innovated to keep up;
    Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe Apr 21 2020 8:00 am UTC 48 mins
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

    Deutsch
  • Security Awareness Training – Your best line of defence Apr 21 2020 1:00 am UTC 39 mins
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Protect yourself. Discover the #1 Threat Vector: Email Apr 16 2020 1:00 pm UTC 60 mins
    Matt Cooke, CyberSecurity Specialist, Proofpoint
    Cybercriminals thrive on disruption and uncertainty and are wasting no time in maximising this opportunity. Coronavirus-related phishing attacks are rife, from those offering a cure to others collecting information needed to populate “government databases”. One even purports to be from WHO, encouraging recipients to log in to its website. All invite victims to click malicious links and hand over credentials or other personal information.

    According to the 2019 Verizon Data Breach Investigations report, 32% of data breaches involved phishing, and 94% of malware incidents were delivered via email. Given these numbers, it’s clear that email continues to be a massive attack surface and a significant exit point for sensitive data. What’s the best way organizations can protect their people from this frequently exploited attack vector?

    Join Matt Cooke of Proofpoint to discover how to keep pace within this rapidly moving threat landscape and best practice ways to protect your people and data from email attacks, and in particular you will learn:
    - The latest threat data and trends for email cyber attacks
    - How best to defend your people and data with Proofpoint Targeted Attack Protection
    - How to streamline your incident response process for emails

    Join us as we go deep and show you how to better protect against email, the number one threat vector for your business

    About Proofpoint

    Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions. www.proofpoint.com. ©Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners.
  • The Private Life of Data Apr 16 2020 9:00 am UTC 60 mins
    Michael McGrath, Senior Director, Compliance and Digital Risk, Proofpoint Jen Gough, Digital Risk Analyst, Proofpoint
    Data has a definite lifecycle. Understanding that lifecycle and looking at data through the lens of that life cycle creates new ways of looking and thinking about data and create a language to understand and see new opportunities for the data the organization holds and also perhaps opportunities to dispose of data that is not going to generate any value for the organization.

    As a CISO or Legal compliance officer, your data may sometimes feels like a precocious and unruly child, and all the while your job is to protect and nurture it.

    Join this Proofpoint webinar to discover how to develop a modern e-discovery and compliance strategy, including:
    - How to control the costs associated with exponential data growth and storage
    - How to mitigate financial harm and reputation risk by protecting the data of your employees and clients
    - How to retain, discover and supervise your data while adhering to complex and changing international regulations

    Join us as we share over 15 years of experience and demonstrate best-practice in data protection, archiving and compliance in 2020

    About Proofpoint
    Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com. ©Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners.
  • Do's and Don’ts for Business Email Compromise (BEC) & Email Account Compromise Apr 15 2020 5:00 pm UTC 60 mins
    Sara Pan, Sr. Product Marketing Manager of Proofpoint
    The financial losses associated with Business Email Compromise (BEC) and Email Account Compromise (EAC) continue to rise. The FBI reported losses of almost $1.7B in 2019 alone. While BEC and EAC start to become one of CISO’s top concerns, there are still a lot of confusion regarding the terms. In addition, many organizations are struggling to identify the scope of the problem regarding BEC/EAC. So how can you better manage this billion-dollar problem in your organization?

    Join us for a deep dive into the dos and don’ts when it comes to BEC and EAC. In this webinar, we’ll be discussing:

    - What is BEC and EAC
    - What do they have in common and how are they different
    - Why is it difficult to prevent BEC/EAC
    - What are the best practices to help you mitigate BEC/EAC risks
  • Live Talks: Securing Data & Access for Your Growing Remote Workforce Apr 15 2020 1:00 pm UTC 48 mins
    Ryan Kalember, EVP Cybersecurity Strategy & Mike Stacy, Director of Advanced Technology Sales Engineering
    The 2020 cyber threat landscape has changed drastically just over the last month as more and more employees are mandated to work from home around the world. But in the rush to ensure business continuity, how you can keep your end users protected?

    Join our Live Talks conversational series with Proofpoint's experts Ryan Kalember, EVP of Cybersecurity Strategy and Mike Stacy, Director of Advanced Technology Sales Engineering as they discuss how you can keep users connected to the data and systems they need to do their job, without compromising how you protect your organization's most valuable assets.

    In this webinar, we'll share:
    - The keys to securely transitioning a remote workforce, and how to adapt your security control stack
    - Insight from the Proofpoint Threat Intel team into how threat actors are targeting newly remote workers
    - The free tools that Proofpoint is offering to help our customers stay secure as they move to a more remote workforce
  • Beyond Phishing: A comprehensive view of user-based risk across your business Apr 15 2020 9:00 am UTC 60 mins
    Paul Down, Director, Proofpoint EMEA
    Nearly all cybersecurity attacks target individuals. In this session we will discuss how to identify who is being targeted within your organisation and their levels of resilience to those attacks. Our data-driven methodology is proven to reduce risk in the shortest possible time through user threat engagement prioritisation.

    Join us as we take a deeper dive into end-user risk and resilience:
    • The risks from Business Email Compromise and Account Email Compromise, Social Media and Insider Threats.
    • Insights into the volume of attacks companies face each year, who from and how they’re being delivered.
    • How to generate actionable data through People Risk Assessments to minimise risk in the fastest possible way.

    At the end of the webinar we’ll provide you the opportunity to take our free People Risk Assessment and see how you compare with other companies in your industry.
  • Live Talks: Securing Data & Access for Your Growing Remote Workforce - APAC Apr 15 2020 1:00 am UTC 48 mins
    Ryan Kalember, EVP Cybersecurity Strategy & Mike Stacy, Director of Advanced Technology Sales Engineering
    The 2020 cyber threat landscape has changed drastically just over the last month as more and more employees are mandated to work from home around the world. But in the rush to ensure business continuity, how you can keep your end users protected?

    Join our Live Talks conversational series with Proofpoint's experts Ryan Kalember, EVP of Cybersecurity Strategy and Mike Stacy, Director of Advanced Technology Sales Engineering as they discuss how you can keep users connected to the data and systems they need to do their job, without compromising how you protect your organization's most valuable assets.

    In this webinar, we'll share:
    - The keys to securely transitioning a remote workforce, and how to adapt your security control stack
    - Insight from the Proofpoint Threat Intel team into how threat actors are targeting newly remote workers
    - The free tools that Proofpoint is offering to help our customers stay secure as they move to a more remote workforce
  • Security Awareness Training –Your best line of defence Apr 14 2020 2:00 pm UTC 31 mins
    Paul Down, Director & Matt Cooke, Cyber Security Specialist
    How susceptible are your users to email attack?
    Join our experts to discover new highly-crafted lures and tricks used by cyber criminals in 2020.
    Learn how to strengthen your last line of cyber defence : your people

    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.

    So how can you better protect yourself, your organisation, and your end users?

    With this webinar you’ll get a better understanding of:

    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)

    Join us to review 2020 best practice in security awareness training

    ABOUT PROOFPOINT
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Strategies for Better SOC Efficiency Apr 9 2020 5:00 pm UTC 60 mins
    Vivek Indrayan, Product Manager & Joseph Yun, Security Automation & Orchestration Principal Analyst
    Security teams face many challenges responding to threats targeting your people. Most deal with an overwhelming number of alerts and a struggle to reduce the significant time it takes to respond to and remediate threats. Join this webinar and live demo to see how Proofpoint helps organizations respond faster and more efficiently by delivering full security orchestration, automation and response.

    In this webinar, you will see:

    - How you can enhance your SOC efficiency

    - How to respond faster to incidents

    - How to better protect the number one threat vector (email) and beyond
  • How to securely enable remote working Apr 9 2020 10:30 am UTC 60 mins
    Edward Rowley SE manager of EMEA, Proofpoint; Mark Edge Cloud Security Specialist EMEA, Proofpoint
    The Threat Landscape has changed drastically recently as employees around the world are mandated to work from home. Working safely and securely has never been more important.

    How do you enable this enormous challenge while maintaining compliance and reducing business exposure?

    Get practical tips on:
    • Providing employees with secure remote access to applications
    • Securely transitioning a remote workforce
    • Keeping malicious code away from corporate devices.
  • ISSA Thought Leadership Series: Proofpoint State of the Phish 2020 Apr 8 2020 5:00 pm UTC 60 mins
    ISSA International
    Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention? The sixth annual State of the Phish again delivers critical, actionable insights into the current state of the phishing threat, including:

    The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses.
    The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
    How organizations are delivering phishing awareness training, and the ways they measure program success

    3,500+ technology user insights: Results of a third-party survey of more than 3,500 working adults across seven countries—the United States, Australia, France, Germany, Japan, Spain and the United Kingdom—provide a global perspective on the cybersecurity awareness levels of the average end-user.

    A survey of more than 600 IT security professionals: Proofpoint surveyed IT security professionals from the same seven countries. They shared insights about what they’re experiencing within their organizations, how they are responding to attacks and the steps they’re taking to improve security postures.

    Nearly 50 million simulated phishing emails: Proofpoint compiled and analyzed data from nearly 50 million simulated phishing emails sent to end-users over a one-year period via its cloud-based Security Education Platform.

    More than 9 million reported emails: Proofpoint logged more than 9 million emails reported by their customers’ end users over a 12-month span.


    Moderator:
    Robert Martin, Sr. Security Engineer, Cisco Systems, Inc.

    Speakers:
    Gretel Egan, Security Awareness Training Strategist, Proofpoint
    Paige Yeater, Director of Information Security Program Management, Mainstay Technologies
    Steve Sanders, Vice President, Internal Audit, CSI
  • Phishing During Pandemic: Actors, Campaigns & Threats Leveraging COVID-19 Lures Recorded: Apr 8 2020 48 mins
    Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint
    Targeted attacks start with email, and these security threats are always evolving. Just in the past few weeks alone, the Email lures leveraging the currently challenging times as a unique theme now represents the greatest collection of attack types that the Proofpoint Threat Research and Detection team has seen in years, if not ever.

    We’ve observed credential phishing, malicious attachments, malicious links, business email compromise (BEC), fake landing pages, downloaders, spam, and malware, among others, all leveraging coronavirus lures to exploit your employees, during these heightened emotional times.

    Join our speakers Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy as they take a deep dive into these tactics and share:

    - The current state and rapid evolution of COVID-themed phishing campaigns
    - Key defence mechanisms to reduce your organization’s risk
    - Awareness and training measures you can take to keep your users from falling victim

    Please note: This webinar won’t have a live Q&A as this is a replay; you can still send us your questions and we will get in touch via email after the session.
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Hoodwinked! Why Users are the Preferred Target for Attackers
  • Live at: Nov 21 2019 6:00 pm
  • Presented by: Mark Guntrip, Group Prod. Mktg Director, ProofPoint; Chrysa Freeman, Sec Awareness Mgr., Code42; Charles Gaughf, (ISC)²;
  • From:
Your email has been sent.
or close