Hi [[ session.user.profile.firstName ]]

Bridging the Technology & People Divide with Security Awareness Training

The threat landscape is constantly changing and the attacks targeting your people are getting more sophisticated. Threat actors are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even the most savvy users. So how can you better protect yourself, your organization, and your end users?

Join us as we walk you through how we're taking Proofpoint's expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you'll get a better understanding of:

- How we identify and stop malicious inbound threats
- How to better identify end-user risk with our simulated attacks
- How we're helping customers stop real attacks in their tracks with our Closed-Loop Email Analysis and Response (CLEAR) solution
Recorded Dec 18 2019 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Guntrip, Group Product Marketing Director & Mike Bailey, Sr. Product Marketing Manager
Presentation preview: Bridging the Technology & People Divide with Security Awareness Training

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Demo - Proofpoint CASB New Features & Capabilities Recorded: Jan 23 2020 39 mins
    Amish Kohli, Cloud Security Solutions Architect
    Proofpoint Cloud App Security Broker(CASB) is a cloud security platform that helps accelerate migration to the cloud. Proofpoint keeps improving our CASB and tightening our cross-platform integrations to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations.

    Join us to see how Proofpoint cloud security adds value to and benefits from existing email security when organizations migrate their email and other core apps to the cloud. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss.

    - Correlate email threats such as phishing to cloud account compromise
    - Detect and investigate threats using more granular policy rules and forensics capabilities
    - Find out which apps are being accessed during a risky session via Okta integration
    - Drill deeper into Shadow IT and third-party apps forensics
    - Prevent risky file activity in the cloud using browser isolation
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Recorded: Jan 23 2020 38 mins
    Sean Walker, Enterprise Account Executive
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Enterprise Information Archiving Recorded: Jan 21 2020 48 mins
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what is the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • Hijacked! The Perils of Business Email Compromise Recorded: Jan 16 2020 59 mins
    Ryan Terry, ProofPoint; Derrick Butts, Truth Initiative; Michael Weisberg, Garnet River, LLC; Brandon Dunlap (Moderator)
    According to the FBI’s Internet Crime Complaint Center, Business Email Compromise (BEC) resulted in more than $26 Billion in losses since 2016. Bad actors impersonating or using stolen trusted identities use a variety of attack vectors to defraud targets out of money and sensitive information. The problem is only getting worse, as these attacks are increasing due to a larger attack surface and the ability to move quickly through an organization. Detection can be difficult. What can be done to combat this fast growing and moving threat? Join ProofPoint and (ISC)2 on January 16, 2020 at 1PM Eastern for a Roundtable discussion on BEC, the threats it poses and strategies to defend against it.
  • Email Fraud Defense Recorded: Jan 14 2020 39 mins
    Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. best practice Email Fraud Defense requires a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Discover how to:

    • Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
    • Monitor all inbound impostor threats from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Security Awareness Training from Proofpoint Recorded: Jan 7 2020 37 mins
    Sean Walker, Enterprise Account Executive
    Effective security awareness training ensures your work colleagues become a strong last line of defense against cyber attacks. Best practice in cyber security training is to engage colleagues and keep security top-of-mind, by offering continuously updated, interactive cyber security training modules; to arm all employees, contractors and visitors against real-world cyber attacks using personalised training based on industry-leading threat intelligence; and to replace one-size-fits-all content and adopt a new approach that allows you to target the right training to the right people at the right time.

    In this 30 minute demo, you'll learn how to: 
    4) Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    5)  Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    6) Enable your employees to report suspicious messages with a single mouse click

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • A People-Centric Approach to Managing Insider Threats: Introducing ObserveIT Recorded: Dec 19 2019 43 mins
    Mayank Choudhary, SVP of ObserveIT | Proofpoint
    Insider Threats are quickly becoming one of the greatest cyber security threats that organizations face today. They are responsible for three million records are stolen every day and at the heart of 57% of all database breaches last year (Verizon 2019). Research also shows that the average time to spot and contain an insider threat is a massive 77 days -- just 13% of incidents are caught within 30 days (Ponemon 2020).

    The reason they are so prolific and take so long to deal with is because anyone with legitimate, trusted access to an organization’s systems and data – whether full-time employee, part-time contractor or strategic business partner – can be an Insider Threat.

    Managing insider threats fundamentally requires a people-centric approach. With the acquisition of ObserveIT, Proofpoint adds a powerful Insider Threat Management platform to our portfolio of People Centric cybersecurity solutions. The ObserveIT platform delivers unique capability to monitor both user and file activity, enabling security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach.

    Join ObserveIT | Proofpoint SVP Mayank Choudhary, in this webinar to:

    · Learn how the key components of full visibility – user activity, data activity, and behavior analytics – provide the necessary context to understanding Insider Threats

    · Discover how an organization’s risk of an Insider Threat can be reduced through always-on monitoring, without compromising user privacy and compliance; with real-life case studies to illustrate

    · See a demo explaining of how out-of-policy user activity is detected and investigated on-the-spot

    · Learn about the different types of Insider Threats and find out what steps you can take to build your own Insider Threat Management program
  • Live Demo: Proofpoint Security Awareness Training Recorded: Dec 19 2019 34 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Security Awareness Training from ProofPoint - Live Demo Recorded: Dec 19 2019 36 mins
    Sean Walker, Enterprise Account Executive
    See this demonstration of how you can engage your colleagues and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity training to the right people at the right time.

    Register to see this demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to email phishing attacks and their knowledge of cybersecurity beyond the phish
    - Deliver customized online training to your end users to drive behavior change and make them a strong last line of cyber defense
    - Enable your employees to report suspicious messages with a single mouse click

    This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you.
  • Bridging the Technology & People Divide with Security Awareness Training Recorded: Dec 18 2019 33 mins
    Mark Guntrip, Group Product Marketing Director & Mike Bailey, Sr. Product Marketing Manager
    The threat landscape is constantly changing and the attacks targeting your people are getting more sophisticated. Threat actors are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even the most savvy users. So how can you better protect yourself, your organization, and your end users?

    Join us as we walk you through how we're taking Proofpoint's expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you'll get a better understanding of:

    - How we identify and stop malicious inbound threats
    - How to better identify end-user risk with our simulated attacks
    - How we're helping customers stop real attacks in their tracks with our Closed-Loop Email Analysis and Response (CLEAR) solution
  • Live Demo: Security Training for Healthcare Recorded: Dec 12 2019 49 mins
    Ryan Witt, Healthcare Industry Practice Leader & Matt Nesser, Account Executive of Proofpoint
    The 2019 HIMSS Cybersecurity indicated that email is the initial point of compromises for healthcare cyber-attacks – phishing, hacking, BEC – or negligent activity from hospital staff…someone inadvertently clicking on a link or downloading a file. Clearly people are under attack, yet they are also a health system’s first line of defense. So how do you best protect your people and prepare for them for continuous stream of cyber-attacks?

    Join this live demo to see Proofpoint Security Awareness Training in action, and how it safeguards against advance threats and compliance risks.

    You’ll learn:

    - The most common attacks in today's healthcare threat landscape
    - Best practices to improve your security posture
    - A people-centric approach to helping you protect patient data
  • Crime and Email: Real-Life Stories from the Trenches w/ the U.S. Secret Service Recorded: Dec 12 2019 124 mins
    Stephen Doughtery, U.S. Secret Service, Ryan Terry, Proofpoint, Christopher Pierson, BlackCloak
    Email—you either love it or hate it. Cybercriminals love it. We all know that email is the attack vector of choice for hackers. Why? Bottom line, it works. And they really capitalize on it. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC/CEO fraud attacks, W-2 scams, ransomware… the list goes on and on.

    Email fraud is an expensive cybercrime for its victims. All it takes is one mistake, one erroneous mouse click of an email to let an attacker in. That is how it starts. Then attackers move around your email or network and learn more about your employees and company than you do. Eventually they strike—when the time is right. Do they get away with the cash? Or did you arm your employees with the tools and training they need to recognize email fraud and ransomware and stop a possible BEC attack?

    On this web conference, our three experts will share real-world examples of these heinous crimes: what went down, how they got caught, what they got away with, and lessons learned.

    Tune in and get an understanding of how these attacks work and what you can do to make it more difficult for hackers to fool your end-users.
  • Live Demo - Enterprise Information Archiving Recorded: Dec 12 2019 48 mins
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist
    GDPR, Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    So what is best practice with respect to developing and implementing a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • Build a People-Centric Cybersecurity & Compliance Strategy for Financial Service Recorded: Dec 10 2019 44 mins
    Jennifer Cheng, Dir. of Product Marketing & Catherine Hwang, Dir. of Product Marketing at Proofpoint
    More than 99% of all targeted cyber attacks rely on users to activate them. Since financial services firms face some of the most stringent and complex regulations, it's even more crucial for organizations to mitigate cyber risks and streamline compliance.



    It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?

    Join Proofpoint as we examine some of the biggest challenges that CISOs face, and why a people-centric approach to security is necessary in today's financial services threat landscape.

    In this session, we'll share:

    - Why cybersecurity transformation is critical for the financial services sector
    - How to identify users who are most at-risk of cyberattacks or cause the most compliance risk
    - How to mitigate risk of adverse inferences and damaged reputations

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • How Chapman and Cutler LLP Use Email Fraud Defense & DMARC to Stop Email Attacks Recorded: Dec 5 2019 44 mins
    Tanner Luxner, Product Marketing Manager of Proofpoint & Martin Starr, IS Support Consultant of Chapman and Cutler LLP
    Email-based identity deception attacks are impacting organizations of all sizes and in all industries. In fact, business email compromise (BEC) alone has cost organizations more than $26.2 billion in losses worldwide. As the number one threat vector to businesses today, email must be authenticated to restore trust to business communications. So how can you better protect your people?

    Join us for a case study with Chapman and Cutler LLP to learn how they are using Proofpoint’s Email Fraud Defense (EFD) to help stop impostor email attacks in their tracks.

    In this session, we’ll share:

    - The benefits of deploying DMARC email authentication
    - The challenges associated with DMARC authentication
    - How Chapman and Cutler LLP have deployed DMARC authentication efficiently and safely with EFD
  • Live Demo: Proofpoint Security Awareness Training Recorded: Dec 5 2019 38 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Proofpoint Security Awareness Training Recorded: Dec 5 2019 36 mins
    Sean Walker, Enterprise Account Executive
    Engage your colleagues and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity training to the right people at the right time.

    Sign up to see this in-depth demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to email phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a strong last line of cyber defense
    - Enable your employees to report suspicious messages with a single mouse click

    This webinar is replay of a US event which includes Q&A. If your question is not covered, please write in using the interactive features and one of the EMEA team will get back to you.

    -------------------------------------------------------------------------------------------------------------

    About Proofpoint.

    A next-generation cybersecurity company protecting people, data, and brands from advanced threats and compliance risks.

    We collect and analyze more than 100 billion data points a day from more than 100 million email boxes, 200 million social-media accounts, and 7 million mobile apps. 

    Proofpoint was named a leader by Gartner: Magic Quadrant for Security Awareness (https://www.proofpoint.com/us/resources/analyst-reports/gartner-magic-quadrant-security-awareness-training) Computer-Based Training, Joanna Huisman, 18 July 2019.
  • Live Demo: Proofpoint Security Awareness Training Recorded: Dec 5 2019 37 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Building a People-Centric Cybersecurity Strategy for Healthcare Recorded: Dec 4 2019 56 mins
    ISSA International
    More than 99% of all targeted cyber-attacks rely on users to activate them. Nowadays, threat actors are not going after an organization's technology and infrastructure. They are going after your most valuable assets - your people and your data. So, do you know when or how your people are being targeted? Do you know who the most cyber-attacked people are in your organization? Are your Very Attacked People (VAPs) the same as your Very Important People (VIPs)?

    Join our cybersecurity experts for a deep dive into what the current healthcare threat landscape looks like, how a people-centric approach can help institutions identify and protect your end users, and the latest findings in healthcare threat research.

    In this session, we’ll share:
    •Why cybersecurity transformation is critical right now
    •What a people-centric approach means to today's healthcare threat landscape
    •How hospitals are leveraging a people-centric strategy to improve their security posture
    •How to better protect your patients' data and improve your end-users' safety

    Moderator:
    Lee Neely, Senior IT & Security Professional, LLNL

    Speakers:

    Ryan Witt, Managing Director, Healthcare Industry Practice, Proofpoint
    Barbara Guerin, CISO, Renown Health
    Andrew Seward, CISO, Solution Health System
  • Live Demo - Proofpoint CASB New Features & Capabilities Recorded: Dec 4 2019 47 mins
    Amish Kohli, Cloud Security Solutions Architect
    Proofpoint Cloud App Security Broker(CASB) is a cloud security platform that helps accelerate migration to the cloud. Proofpoint keeps improving our CASB and tightening our cross-platform integrations to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations.

    Join us to see how Proofpoint cloud security adds value to and benefits from existing email security when organizations migrate their email and other core apps to the cloud. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss.

    - Correlate email threats such as phishing to cloud account compromise
    - Detect and investigate threats using more granular policy rules and forensics capabilities
    - Find out which apps are being accessed during a risky session via Okta integration
    - Drill deeper into Shadow IT and third-party apps forensics
    - Prevent risky file activity in the cloud using browser isolation
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Bridging the Technology & People Divide with Security Awareness Training
  • Live at: Dec 18 2019 6:00 pm
  • Presented by: Mark Guntrip, Group Product Marketing Director & Mike Bailey, Sr. Product Marketing Manager
  • From:
Your email has been sent.
or close