Hi [[ session.user.profile.firstName ]]

2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions

Every year, Proofpoint’s threat research team examines trends from the prior year and predicts changes in the threat landscape for the year to come. For 2020, some of the top concerns include a significant evolution in impostor attacks and increasingly sophisticated attacks on cloud applications.

Join us for a deep dive into the biggest trends that we’re predicting for the next 12 months, and how you can prepare and protect your most valuable assets: your people and your data.

You’ll learn:

- Predictions for the 2020 cyber threat landscape
- Key actions you can take to prepare your organization
- Top resources to help support your security efforts

*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Recorded Jan 28 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Dawson, Threat Intelligence Publications Lead
Presentation preview: 2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Mar 26 2020 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: A People-Centric Approach to Insider Threat Management Mar 24 2020 5:00 pm UTC 45 mins
    Kevin Donovan, Sr. Solutions Architect
    Accordingly to McKinsey more than 50% of all data breaches are the result of insider threats. As more companies look to successfully transition to the cloud, traditional ways of protecting data and intellectual property aren’t enough. Context is key when incidents occur to understand intent from the user-perspective and enable a streamlined investigative process. So how is this achieved?

    Join this live demo as we discuss:

    · Methodologies that reduce investigation times by 60-90%
    · The value behind correlating user activity + data movement in insider related incidents
    · Communication techniques to measure risk when involving other business stakeholders
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access Mar 12 2020 5:00 pm UTC 45 mins
    Michael Kaunitz, Sr. Sales Field Specialist with Proofpoint
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Live Demo - Countering Business Email Compromise (BEC) with Email Fraud Defense Mar 11 2020 5:00 pm UTC 45 mins
    Tanner Luxner, Product Marketing Manager of Proofpoint
    With staggering losses of $1.7 billion in 2019, business email compromise (BEC) is a crucial attack issue organizations to protect against. As these threats don't typically include malware or detectable malicious intent, protecting against them is not an easy task. One very essential component of full protection against BEC is email authentication. How can you use this to better protect your people and your organization?

    Join Proofpoint as we dive into BEC and how Email Authentication can help defend against it. In this session, we'll share:

    - The many components of BEC
    - A framework for understanding where potential gaps exist
    - A live demo of how Email Authentication can help provide protection for these gaps.
  • People-Centric Threats on Digital Channels and How to Stop Them Mar 5 2020 6:00 pm UTC 60 mins
    Amanda Cannata, Product Marketing Manager for Digital Risk and Compliance at Proofpoint
    Threat actors don’t just target your people via email. They also use digital channels, like the web and social media, to launch attacks targeting your employees, partners and customers. And these socially engineered schemes on digital channels can leave your business just as exposed as those that come through email.

    Join this webinar to learn about the biggest digital threats to your people, and how you can take steps to block them. You’ll learn:

    · How attackers register fake web domains to phish customers, conduct targeted email attacks, and more

    · How malicious content on social media can put your customers and executives at risk

    · How the deep web and darknet provide tools and opportunities for threat actors to launch digital attacks
  • Zero Trust Network Access: The People-Centric Alternative to VPN Mar 4 2020 5:00 pm UTC 60 mins
    Gabriel Meekins, Sr. Sales Acct Mgr & William Guilherme, Sr. Sales Engineer
    The network perimeter is dissolving, and applications are migrating to the cloud. The number of users working remotely has grown exponentially over the last decade and to keep up, enterprises need people-centric solutions to protect users and data both on and off-premise.

    Join us for our upcoming webinar where we will take a look at how Zero Trust Network Access (ZTNA) replaces traditional remote access VPNs, which did a great job 20 years ago, but no longer meet the secure remote access needs of today’s enterprise. In today’s work environment, people are becoming the new perimeter, and protecting them and the data they access is the new imperative.

    In this webinar, you will learn how ZTNA solutions:

    ● Microsegment network access and reduce the attack surface
    ● Simplify management across all data centers and clouds
    ● Deliver superior end-user experience around the world
    ● Drive cloud-scale efficiency and agility
  • Live Demo: Proofpoint CASB Adaptive Access Controls Mar 3 2020 6:00 pm UTC 45 mins
    Bo Mendenhall, Cloud Security Solutions Architect from Proofpoint
    Proofpoint Cloud App Security Broker(CASB) is a people-centric cloud security platform that helps defend your data in the cloud with adaptive access controls. Proofpoint keeps improving our CASB and expanding our integrations with leading cloud service providers to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations.

    Join us to see how Proofpoint cloud security helps you monitor for and control risky user access and data handling. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss.

    - TAP SaaS Defense monitoring for cloud risks
    - Third-party apps risks and governance
    - ServiceNow login and event monitoring, including DLP
    - Adaptive access controls including risk-based access
  • Formation de sensibilisation à la sécurité – Votre meilleure ligne de défense Mar 3 2020 1:00 pm UTC 60 mins
    Quentin Habert, Expert en cybersécurité, région SEMEA, Proofpoint
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.
  • Security Awareness-Training – die beste Verteidigung gegen Cyberangriffe Mar 3 2020 9:00 am UTC 60 mins
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.
  • Ensuring that Your Users are the Solid Line of Defense Against Cyber Threats Feb 27 2020 6:00 pm UTC 60 mins
    Mark Guntrip, Group Product Marketing Director of Proofpoint & Michael Osterman, President of Osterman Research Inc.
    Today’s most popular security tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities. But cybercriminals are no longer targeting infrastructure - they are targeting humans. It's the distracted user who clicks on an email attachment, or the eager customer who fills in credentials in a pixel-perfect phishing page who is vulnerable. It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?

    Join Proofpoint for a joint presentation with Osterman Research as we deep dive into some of the biggest challenges CISOs face, and why developing a people-centric strategy to security is the most effective way to protect your most valuable assets: your data and your people.

    In this session, we'll share:

    - Latest research findings on new methods for solving security attacks such as phishing and business email compromise
    - Why cybersecurity transformation is critical for protecting your people against today's threat actors
    - What it means and looks like to have an effective people-centric approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • eCommunications Monitoring: Doing More with Less Feb 27 2020 5:00 pm UTC 45 mins
    John Pepe, JD Regulatory Counsel
    Join us for a short, TED-style talk on what low-tech approaches firms are employing to keep up with the ever growing demands of eCommunications review. Highlights include:

    - Using Risk Assessments to drastically reduce review queues
    - Framing risk scenarios and objectives to balance regulatory obligations against limited resources
    - Rethinking your monitoring program to keep up with the pace of change
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Feb 27 2020 10:00 am UTC 37 mins
    Sean Walker, Enterprise Account Executive
    2019 Results: 99% of the phishing attacks require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. So it will be a user who will unwittingly trigger a cyber attack by clicking on an email or downloading a fake attachment.

    Your users, staff, contractors and management should be empowered to be your organisation's last line of defense. Backed by threat intelligence, Proofpoint’s industry-leading Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join Proofpoint's Security Awareness training demonstartion to:
    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats from emails and downloads
    - Deliver tailored, just-in-time training to your users to educate and ensure new behaviors, building that vital last line of defense
    - Empower your employees to report suspicious messages with a single mouse click

    ====================================================================

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Security Awareness Training – Your best line of defence Feb 27 2020 1:00 am UTC 60 mins
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Bridging the Technology & People Divide with Security Awareness Training Feb 26 2020 6:00 pm UTC 60 mins
    Mark Guntrip, Group Product Marketing Director & Mike Bailey, Sr. Product Marketing Manager
    The threat landscape is constantly changing and the attacks targeting your people are getting more sophisticated. Threat actors are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even the most savvy users. So how can you better protect yourself, your organization, and your end users? Join us as we walk you through how we're taking Proofpoint's expertise in the email security space and applying it to our security awareness training solutions to lower your people-centric risk. With this webinar you'll get a better understanding of:

    · The evolution of email security
    · What’s behind Proofpoint threat intelligence
    · How this technology is integrated into Proofpoint Security Awareness Training
    · Strategies for unifying your email and security awareness efforts
  • Insider Threats & People-Centric Approach to Security & Compliance Feb 25 2020 10:30 pm UTC 30 mins
    Tim Choi, VP Product Marketing, Proofpoint & Mayank Choudhary, SVP Product Management, ObserveIT
    Join Tim Choi and Mayank Choudhary for a conversation about the growing concerns on insider threats and data loss. A new people-centric approach is needed and in this interview session, we will share the suggested approach to this security and compliance problem.

    The audience can learn more about:
    - What is people-centric security and how does it help organizations view their security and compliance program
    - What are insider threats and why cross-functional initiatives between cybersecurity, HR, Legal, Ethics are key in 2020
    - How to drive deterrence and change user behavior
    - How to prevent data loss at the endpoint in 2020

    This video interview will be broadcast LIVE during RSA Conference in San Francisco.
  • Improving Email Security: Strategies & Solutions Feb 25 2020 9:00 pm UTC 60 mins
    Jack Koziol (infosec), Tim Choi (Proofpoint) , Dr. Richard Ford (Cyren) & Rick Holland (Digital Shadows)
    When it comes to data breaches, phishing is a primary cause, according to the 2019 Verizon's Data Breach Investigations Report. Number two is stolen credentials, so it is not surprising that email security is a key concern for CISOs worldwide. 

    Join this interactive panel of industry experts as they discuss the latest trends in email security including business email compromise and email account compromise and how to prevent becoming the next headline. Viewers will be able to ask questions and learn more about: 
    - Emerging trends in email and targeted attacks 
    - How to stay on top of the latest threats 
    - Best solutions to protect your organization and your people

    This panel will be broadcast LIVE during RSA Conference in San Francisco.

    Speakers:
    Jack Koziol, CEO & Founder, Infosec (Moderator)
    Tim Choi, VP Product Marketing, Proofpoint
    Dr. Richard Ford, Chief Technology Officer, Cyren
    Rick Holland, CISO, Vice President Strategy, Digital Shadows
  • State of the Phish 2020 Feb 25 2020 10:00 am UTC 60 mins
    Paul Down, Director, Proofpoint EMEA
    Do you have a good sense of how well your users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks?

    Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including:

    - End-user awareness and knowledge gaps that could be hurting your cybersecurity defences
    - Impacts of phishing attacks and the ways infosec pros are trying to combat these threats
    - How Proofpoint customers are approaching phishing awareness training, and the ways we’re helping them measure success
    - Download our report to learn how organizations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence.

    Join us for an in-depth look at user awareness, vulnerability and resilience.

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Crime and Email: Real-Life Stories from the Trenches w/ the U.S. Secret Service Recorded: Feb 20 2020 124 mins
    Stephen Doughtery, U.S. Secret Service, Ryan Terry, Proofpoint, Christopher Pierson, BlackCloak
    Email—you either love it or hate it. Cybercriminals love it. We all know that email is the attack vector of choice for hackers. Why? Bottom line, it works. And they really capitalize on it. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC/CEO fraud attacks, W-2 scams, ransomware… the list goes on and on.

    Email fraud is an expensive cybercrime for its victims. All it takes is one mistake, one erroneous mouse click of an email to let an attacker in. That is how it starts. Then attackers move around your email or network and learn more about your employees and company than you do. Eventually they strike—when the time is right. Do they get away with the cash? Or did you arm your employees with the tools and training they need to recognize email fraud and ransomware and stop a possible BEC attack?

    On this web conference, our three experts will share real-world examples of these heinous crimes: what went down, how they got caught, what they got away with, and lessons learned.

    Tune in and get an understanding of how these attacks work and what you can do to make it more difficult for hackers to fool your end-users.
  • 2020 Cost of Insider Threats Global Report Recorded: Feb 20 2020 47 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    ● What kinds of Insider Threats cost organizations the most
    ● How investigations are driving up the cost-per-incident for companies
    ● Which organizations, industries, and regions are being targeted the most
    ● How companies can potentially save millions by using a dedicated Insider Threat management approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions
  • Live at: Jan 28 2020 6:00 pm
  • Presented by: Chris Dawson, Threat Intelligence Publications Lead
  • From:
Your email has been sent.
or close