Hi [[ session.user.profile.firstName ]]

Securing Data in the Cloud Starts with People

Cybersecurity in healthcare is about people, not technology. In the cloud era, keeping your patients safe means protecting clinicians and patients from cloud threats and data loss. A people-centric approach to security helps you identify people and data at-risk and provide the tools needed to stay alert and keep users and their sensitive data safe. A unified data loss prevention (DLP) platform can get you the visibility needed to discover and stop ex-filtration of sensitive data (PII, PHI and more) housed in cloud apps, email and on-premises file shares. So what does a people-centric strategy look like for your healthcare cloud security?

Join us for a deep dive into how you can better protect your organization's most valuable assets: your data and your people. In this session, we'll examine the following:

- Identify which healthcare job functions are most attacked
- Shorten time to discover and protect sensitive data with out-of-box DLP policies
- Ensure consistent policy enforcement to lock down access to files with technology shared across email, cloud apps and on-premises file repositories
- Simplify day-to-day operations by centralizing incident triage and reporting across multiple channels in a single dashboard
Recorded Nov 25 2019 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ryan Witt, Heathcare Industry managing director & Itir Clarke, Sr. product marketing manager
Presentation preview: Securing Data in the Cloud Starts with People

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Combating Business Email Compromise (BEC) & Email Account Compromise (EAC) Feb 19 2020 6:00 pm UTC 60 mins
    ISSA International
    Since 2016, Business Email Compromise (BEC) and Email Account Compromise (EAC) have become an exponentially increasing problem, costing organizations over $26 Billion in losses according to the FBI. These very targeted attacks utilize public research and social engineering to target an organization’s people and fraudulently obtain funds and valuable information. So how can you better protect your end users in 2020?

    Join us for our webinar to learn more about these BEC and EAC attacks and how you can effectively protect your organization's most valuable assets: your people and your data. In this session we'll share:
    •Techniques for preventing these cyber threats
    •A framework for understanding where potential gaps exist
    •What a people-centric approach looks like to better protect your company

    Moderator:
    Lee Neely, Senior IT and Cybersecurity Professional, LLNL

    Speakers:
    Tanner Luxner, Product Marketing Manager, Proofpoint
    Sue Bergamo, CIO & CISO, Episerver
  • Email Fraud Defense Feb 18 2020 10:00 am UTC 39 mins
    Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint
    In 2020, email fraud goes beyond malware attachments or malicious URLs, it uses tricks and lures
    to dupe the user - So what is best practice?

    Email fraud is often invisible to even “next-generation” email defenses, as it doesn’t use malware attachments or malicious URLs. As a result best practice Email Fraud Defense requires a comprehensive solution that stops all forms of fraudulent emails, no matter the tactic used or the person being targeted.

    Join our leading experts to discover how to:

    • Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
    • Monitor all inbound impostor threats from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails

    ====================================================================

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Security Awareness Training –Your best line of defence Recorded: Feb 14 2020 32 mins
    Paul Down, Director & Matt Cooke, Cyber Security Specialist
    How susceptible are your users to email attack?
    Join our experts to discover new highly-crafted lures and tricks used by cyber criminals in 2020.
    Learn how to strengthen your last line of cyber defence : your people

    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.

    So how can you better protect yourself, your organisation, and your end users?

    With this webinar you’ll get a better understanding of:

    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)

    Join us to review 2020 best practice in security awareness training

    ABOUT PROOFPOINT
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Reduce Phishing with Proofpoint’s Messaging Security Best Practices Recorded: Feb 13 2020 55 mins
    Brett Shaw, Sr. Product Marketing Manager and Rick Miles Director, Product Management
    Email is the #1 threat vector and organizations are constantly bombarded by phishing messages. In turn, security teams have a hard time keeping up with these attacks and often times don’t get around to responding to all of them. Join this webinar to see how Proofpoint has reduced phishing attacks for organizations and saved security teams countless hours of cleaning up malicious email.

    In this webinar, you will see:

    - How to streamline your incident response process for emails
    - How to leverage your users to identify and reduce phishing
    - A deep dive of Proofpoint Solutions and how they help with phishing
  • 2020 Cyber Threat Landscape - EMEA & APJ Recorded: Feb 13 2020 63 mins
    Adenike Cosgrove, Cybersecurity Strategist, Proofpoint EMEA & Davide Canali, Senior Threat Analyst, Proofpoint EMEA
    45 min of expert predictions of the 2020 cyber threat landscape across EMEA & APJ.
    Includes: Key actions you can take to prepare your organization & resources to help support your security efforts.

    The 2020 Cyber Threat Landscape webinar is a 20/20 look into Cybersecurity predictions for EMEA & APJ.

    Every year, Proofpoint’s threat research team examines trends from the prior year and predicts upcoming changes in the Threat Landscape. For 2020, top concerns include a significant evolution in impostor attacks and increasingly sophisticated strikes on cloud applications.

    Join us for a deep dive into the critical threats that we’re expecting in the next 12 months, and how you can identify and protect your VAPs (Very Attacked People).

    In this 45-minute webinar with Q&A, you’ll learn:
    - Predictions for the 2020 cyber threat landscape across EMEA & APJ
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts


    About Proofpoint
    -----------------------
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Protecting Healthcare Institutions from Cyber Attacks Recorded: Feb 12 2020 59 mins
    Ryan Witt, Healthcare Industry Practice Leader for Proofpoint & Chad Wilson, CISO at Stanford Children’s Health
    From prevention to care, hospitals play a crucial role in the healthcare ecosystem. Hospitals also play a significant role in training future healthcare professionals and perform much of the important research that drives the best possible medical outcomes for kids. Unfortunately, the important role that hospitals play has not gone un-noticed by cybercriminals who increasingly target these entities. Stolen medical records continue to be highly valuable on the dark web, but patients can be especially vulnerable. It may take years for a child or a child’s parents to realize that their personal information has been compromised, especially if their health care provider is unaware that a breach has occurred.

    In this presentation, the speakers will discuss new threat intelligence research that can help hospitals identify the job categories most vulnerable to cyberattack. Using this research, he/she will demonstrate how these vulnerabilities can put patient safety at risk and describe practical, pro-active steps that institutions can take to protect against cyberattacks. The speakers will also offer techniques for helping hospital executives to realize the need for a more robust cybersecurity posture.

    Join us to learn:

    - How cybersecurity shortcomings put patient’s safety at risk
    - How to recognize and prioritize job functions most vulnerable to cyberattack
    - How to most effectively implement security controls to mitigate risk for vulnerable job functions
    - Why hospitals must think about cybersecurity beyond a compliancy perspective
  • Live Demo: Proofpoint Digital Risk Protection Recorded: Feb 12 2020 25 mins
    Mike Dempsey, Director of Technical Sales & Kim Bruce, Regional Sales Director for Proofpoint
    Digital channels such as the web and social media provide a lot of opportunity for people and businesses to connect and communicate. At the same time, these channels provide a lot of opportunity for threat actors to defraud businesses and consumers, through phishing, wire transfer fraud, counterfeit sales and more. So how can you better protect your business from threats across digital channels?

    Join this live demo and listen to product experts Kim Bruce and Mike Dempsey who will demonstrate how our solution helps customers:

    · Identify threats such as lookalike domains, domains selling counterfeit goods and domains involved in active phishing attacks
    · Find threats on social media, including phishing accounts, impersonation accounts, brand scams (like counterfeit goods or fake coupons), and malicious URLs in comments or replies to your posts
    · Monitor deep web and darknet sources to identify physical threats, credential compromise, confidential information exposure, doxing and more
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access Recorded: Feb 11 2020 42 mins
    Chen Nisnkorn, Sr. Director of Technical Sales & Micha Rave, Sr Director Product Management
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Protecting Your Health System from Imposter-Based Emails Recorded: Feb 7 2020 48 mins
    Ryan Witt, Managing Dir of Proofpoint, Anthony Guerra Editor in Chief of Health System CIO and Industry Experts
    Most CISOs agree that the greatest vulnerability to their networks comes not from their technology, but their people. Since the cyber-criminals know this too, it’s no surprise they’ve been targeting health systems using business-compromise emails. These emails target specific pre-selected individuals — based on their roles and likely access — and appear to be coming directly from leaders inside the organization. In this timely webinar, we’ll hear more about these frighteningly effective attacks and learn just how IT professionals can empower their people to know a legitimate request from a con.
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Recorded: Feb 6 2020 30 mins
    Sean Walker, Enterprise Account Executive
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Protecting Your People and Data - Featuring Forrester's Zero Trust Framework Recorded: Feb 5 2020 61 mins
    Ryan Kalember, EVP of Cybersecurity Strategy - Proofpoint & Chase Cunningham, Principal Analyst
    There's lots of noise in the cybersecurity industry around zero-trust, but Forrester Research pioneered the original and most effective framework. It’s never been more important to understand how zero-trust principles apply to your environment, with people becoming the new perimeter, and protecting them and the data they access becoming the new imperative.

    In our upcoming webinar, we will take a closer look at the original Zero Trust Approach as defined by Forrester Research and applied in practice by leading security teams. The webinar will cover:

    - An overview of the Zero Trust approach
    - Concrete first steps for getting started
    - Guidelines on how to evaluate your standing within the maturity model
    - How Zero Trust reinforces people-centric security

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Proofpoint State of the Phish 2020 Recorded: Feb 4 2020 118 mins
    Gretel Egan, Program Content Specialist
    Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention?

    The sixth annual State of the Phish again delivers critical, actionable insights into the current state of the phishing threat, including:

    The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses
    The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
    How organizations are delivering phishing awareness training, and the ways they measure program success

    You will see data related to the following:

    3,500+ technology user insights
    Results of a third-party survey of more than 3,500 working adults across seven countries—the United States, Australia, France, Germany, Japan, Spain and the United Kingdom—provide a global perspective on the cybersecurity awareness levels of the average end-user.

    A survey of more than 600 IT security professionals
    Proofpoint surveyed IT security professionals from the same seven countries. They shared insights about what they’re experiencing within their organizations, how they are responding to attacks and the steps they’re taking to improve security postures.

    Nearly 50 million simulated phishing emails
    Proofpoint compiled and analyzed data from nearly 50 million simulated phishing emails sent to end-users over a one-year period via its cloud-based Security Education Platform.

    More than 9 million reported emails
    Proofpoint logged more than 9 million emails reported by their customers’ end users over a 12-month span. Their analysis of this data helps to prove out the importance of establishing easy-to-use reporting channels for employees.

    19 industries
    Proofpoint compares and contrasts failure rates and reporting rates among organizations across 19 industries.
  • Email Security: Why Now Is The Time To Review Your Strategy Recorded: Feb 4 2020 57 mins
    Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist
    Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

    Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

    Join us to gain insights into:
    How the email threat landscape has changed with attackers evading legacy approaches;
    How leaders like Proofpoint have innovated to keep up;
    Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
  • Rethinking DLP as You Move to the Cloud Recorded: Jan 30 2020 58 mins
    Justin Collins, Senior Director of Professional Services, Proofpoint & Jim Reavis, CEO, CSA
    Whether it’s financial, bank or credit card data, customer or patient information, or intellectual property, the goal of cybersecurity is to protect sensitive data and prevent unwanted access or theft. Legacy DLP solutions often fall short of that goal when you move to the cloud. With the adoption of SaaS applications such as Office 365, G Suite, Slack or Box, the cloud has become the other major channel of data sharing next to email. Securing access to a cloud app such as Office 365 in itself presents a new and significant challenge, let alone protecting sensitive data in the cloud. It is time to rethink DLP and adopt a solution that can unify DLP for email and cloud apps, but is also risk-aware. How can you better your approach in 2020?

    Join us as Proofpoint’s Senior Director of Professional Services, Justin Collins and CSA's CEO, Jim Reavis, discusses the steps for you to consider when transforming your DLP solution. In this session you will learn:
    - How to better discover and protect your organization’s sensitive data with CASB
    - How to unify DLP incident management for cloud apps, email and more
    - How to better identify sensitive data exposures and ex-filtration when an account is compromised
  • 2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions Recorded: Jan 28 2020 59 mins
    Chris Dawson, Threat Intelligence Publications Lead
    Every year, Proofpoint’s threat research team examines trends from the prior year and predicts changes in the threat landscape for the year to come. For 2020, some of the top concerns include a significant evolution in impostor attacks and increasingly sophisticated attacks on cloud applications.

    Join us for a deep dive into the biggest trends that we’re predicting for the next 12 months, and how you can prepare and protect your most valuable assets: your people and your data.

    You’ll learn:

    - Predictions for the 2020 cyber threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Building an Effective Security Awareness Program Recorded: Jan 28 2020 57 mins
    Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist
    Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves?

    Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss:

    - Proven best practices for increasing the effectiveness of cybersecurity education
    - How to build a culture of security within your organization
    - Actionable guidance on executing security awareness & training initiatives that deliver measurable results
  • Live Demo - Proofpoint CASB New Features & Capabilities Recorded: Jan 23 2020 39 mins
    Amish Kohli, Cloud Security Solutions Architect
    Proofpoint Cloud App Security Broker(CASB) is a cloud security platform that helps accelerate migration to the cloud. Proofpoint keeps improving our CASB and tightening our cross-platform integrations to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations.

    Join us to see how Proofpoint cloud security adds value to and benefits from existing email security when organizations migrate their email and other core apps to the cloud. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss.

    - Correlate email threats such as phishing to cloud account compromise
    - Detect and investigate threats using more granular policy rules and forensics capabilities
    - Find out which apps are being accessed during a risky session via Okta integration
    - Drill deeper into Shadow IT and third-party apps forensics
    - Prevent risky file activity in the cloud using browser isolation
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Recorded: Jan 23 2020 38 mins
    Sean Walker, Enterprise Account Executive
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Enterprise Information Archiving Recorded: Jan 21 2020 48 mins
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what is the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • Hijacked! The Perils of Business Email Compromise Recorded: Jan 16 2020 59 mins
    Ryan Terry, ProofPoint; Derrick Butts, Truth Initiative; Michael Weisberg, Garnet River, LLC; Brandon Dunlap (Moderator)
    According to the FBI’s Internet Crime Complaint Center, Business Email Compromise (BEC) resulted in more than $26 Billion in losses since 2016. Bad actors impersonating or using stolen trusted identities use a variety of attack vectors to defraud targets out of money and sensitive information. The problem is only getting worse, as these attacks are increasing due to a larger attack surface and the ability to move quickly through an organization. Detection can be difficult. What can be done to combat this fast growing and moving threat? Join ProofPoint and (ISC)2 on January 16, 2020 at 1PM Eastern for a Roundtable discussion on BEC, the threats it poses and strategies to defend against it.
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Data in the Cloud Starts with People
  • Live at: Nov 25 2019 10:50 pm
  • Presented by: Ryan Witt, Heathcare Industry managing director & Itir Clarke, Sr. product marketing manager
  • From:
Your email has been sent.
or close